93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3", 0xb4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:12:09 executing program 4: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r2, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3eb8d", 0xb6, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b") 03:12:09 executing program 0: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r6 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa46444") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB="08f70300", @ANYRES32=r5, @ANYBLOB="08001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB="0c000600000000000000000008001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r6, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:12:10 executing program 3: r0 = gettid() openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r1, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3", 0xb4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:12:10 executing program 3: r0 = gettid() write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r1, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3", 0xb4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:12:14 executing program 1: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r2, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3eb8d", 0xb6, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b") 03:12:14 executing program 0: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r6 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa46444") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB="08f70300", @ANYRES32=r5, @ANYBLOB="08001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB="0c000600000000000000000008001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r6, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:12:14 executing program 3: r0 = gettid() write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r1, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3", 0xb4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:12:14 executing program 4: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r2, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3eb8d", 0xb6, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b") 03:12:14 executing program 0: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r6 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa46444") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB="08f70300", @ANYRES32=r5, @ANYBLOB="08001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB="0c000600000000000000000008001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r6, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:12:14 executing program 2: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff, 0x1}) r2 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3eb", 0xb5, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYBLOB='u\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB="08f70300", @ANYRES32, @ANYBLOB="08001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB="0c000600000000000000000008001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r2, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:12:15 executing program 5: r0 = gettid() openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r1, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3", 0xb4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:12:15 executing program 1: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r2, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3", 0xb4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:12:15 executing program 3: r0 = gettid() write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r1, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3", 0xb4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:12:15 executing program 4: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r2, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3eb8d", 0xb6, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019") 03:12:15 executing program 2: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff, 0x1}) r2 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3eb", 0xb5, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000080), 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYBLOB='u\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB="08f70300", @ANYRES32, @ANYBLOB="08001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB="0c000600000000000000000008001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r2, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:12:15 executing program 0: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r6 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB="08f70300", @ANYRES32=r5, @ANYBLOB="08001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB="0c000600000000000000000008001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r6, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:12:15 executing program 4: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r2, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3eb8d", 0xb6, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019") 03:12:15 executing program 5: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff, 0x1}) r2 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3eb", 0xb5, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYBLOB='u\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB="08f70300", @ANYRES32, @ANYBLOB="08001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB="0c000600000000000000000008001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r2, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:12:15 executing program 2: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff, 0x1}) r2 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3eb", 0xb5, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000080), 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYBLOB='u\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB="08f70300", @ANYRES32, @ANYBLOB="08001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB="0c000600000000000000000008001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r2, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:12:15 executing program 1: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r2, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3eb8d", 0xb6, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b") 03:12:15 executing program 3: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = socket(0x2a, 0x3, 0x6) getpgrp(0x0) connect$pppoe(r1, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3", 0xb4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:12:15 executing program 0: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r6 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB="08f70300", @ANYRES32=r5, @ANYBLOB="08001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB="0c000600000000000000000008001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r6, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:12:16 executing program 3: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = socket(0x2a, 0x3, 0x6) getpgrp(0x0) connect$pppoe(r1, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3", 0xb4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:12:16 executing program 4: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r2, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3eb8d", 0xb6, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019") 03:12:16 executing program 2: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff, 0x1}) r2 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3eb", 0xb5, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000080), 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYBLOB='u\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB="08f70300", @ANYRES32, @ANYBLOB="08001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB="0c000600000000000000000008001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r2, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:12:16 executing program 5: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r6 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB="08f70300", @ANYRES32=r5, @ANYBLOB="08001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB="0c000600000000000000000008001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r6, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:12:16 executing program 1: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r6 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB="08f70300", @ANYRES32=r5, @ANYBLOB="08001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB="0c000600000000000000000008001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r6, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:12:16 executing program 0: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r6 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB="08f70300", @ANYRES32=r5, @ANYBLOB="08001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB="0c000600000000000000000008001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r6, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:12:17 executing program 2: gettid() r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff, 0x1}) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3eb", 0xb5, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, 0x0}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:12:20 executing program 2: gettid() r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff, 0x1}) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3eb", 0xb5, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, 0x0}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:12:20 executing program 4: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r2, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3eb8d", 0xb6, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa46444") 03:12:20 executing program 1: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r6 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB="08f70300", @ANYRES32=r5, @ANYBLOB="08001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB="0c000600000000000000000008001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r6, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:12:21 executing program 2: gettid() r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff, 0x1}) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3eb", 0xb5, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, 0x0}, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:12:21 executing program 3: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = socket(0x2a, 0x3, 0x6) getpgrp(0x0) connect$pppoe(r1, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3", 0xb4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:12:21 executing program 4: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r2, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3eb8d", 0xb6, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa46444") 03:12:21 executing program 1: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r6 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB="08f70300", @ANYRES32=r5, @ANYBLOB="08001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB="0c000600000000000000000008001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r6, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:12:21 executing program 3: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, 0x0, 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r2, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3", 0xb4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:12:21 executing program 5: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r6 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB="08f70300", @ANYRES32=r5, @ANYBLOB="08001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB="0c000600000000000000000008001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r6, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:12:21 executing program 0: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r6 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB="08f70300", @ANYRES32=r5, @ANYBLOB="08001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB="0c000600000000000000000008001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r6, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:12:21 executing program 2: gettid() r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff, 0x1}) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3eb", 0xb5, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, 0x0}, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) 03:12:21 executing program 4: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r2, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3eb8d", 0xb6, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa46444") 03:12:21 executing program 5: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r6 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB="08f70300", @ANYRES32=r5, @ANYBLOB="08001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB="0c000600000000000000000008001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r6, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:12:21 executing program 1: gettid() r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff, 0x1}) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3eb", 0xb5, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(0xffffffffffffffff, 0x0, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:12:21 executing program 0: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r6 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB="08f70300", @ANYRES32=r5, @ANYBLOB="08001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB="0c000600000000000000000008001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r6, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:12:21 executing program 3: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, 0x0, 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r2, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3", 0xb4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:12:22 executing program 2: gettid() r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff, 0x1}) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3eb", 0xb5, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, 0x0}, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) 03:12:22 executing program 5: gettid() r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff, 0x1}) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3eb", 0xb5, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(0xffffffffffffffff, 0x0, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:12:22 executing program 1: gettid() r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff, 0x1}) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3eb", 0xb5, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(0xffffffffffffffff, 0x0, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:12:22 executing program 2: gettid() r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff, 0x1}) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3eb", 0xb5, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, 0x0}, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) 03:12:23 executing program 2: gettid() r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff, 0x1}) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3eb", 0xb5, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, 0x0}, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) 03:12:23 executing program 1: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r2, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3eb8d", 0xb6, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)) [ 930.851177][ T1239] ieee802154 phy0 wpan0: encryption failed: -22 [ 930.857518][ T1239] ieee802154 phy1 wpan1: encryption failed: -22 03:12:24 executing program 2: gettid() r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff, 0x1}) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3eb", 0xb5, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, 0x0}, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) 03:12:25 executing program 1: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r2, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3eb8d", 0xb6, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)) 03:12:25 executing program 4: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r2, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3eb8d", 0xb6, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1") 03:12:25 executing program 2: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r2, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3eb8d", 0xb6, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa46444") 03:12:25 executing program 0: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r6 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB="08f70300", @ANYRES32=r5, @ANYBLOB="08001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB="0c000600000000000000000008001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r6, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:12:25 executing program 4: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r2, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3eb8d", 0xb6, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1") 03:12:25 executing program 3: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, 0x0, 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r2, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3", 0xb4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:12:26 executing program 5: gettid() r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff, 0x1}) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3eb", 0xb5, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(0xffffffffffffffff, 0x0, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:12:26 executing program 0: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r6 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB="08f70300", @ANYRES32=r5, @ANYBLOB="08001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB="0c000600000000000000000008001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r6, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:12:26 executing program 3: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r2, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3", 0xb4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:12:26 executing program 2: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, 0x0, 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r2, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3", 0xb4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:12:26 executing program 5: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r2, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3eb8d", 0xb6, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa46444") 03:12:26 executing program 3: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r2, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3", 0xb4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:12:29 executing program 1: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r2, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3eb8d", 0xb6, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1") 03:12:29 executing program 5: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) getpgrp(r0) connect$pppoe(0xffffffffffffffff, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3", 0xb4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:12:29 executing program 3: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r2, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3", 0xb4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:12:29 executing program 4: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r2, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3eb8d", 0xb6, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1") 03:12:29 executing program 0: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r6 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB="08f70300", @ANYRES32=r5, @ANYBLOB="08001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB="0c000600000000000000000008001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r6, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:12:30 executing program 3: r0 = gettid() openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r1, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3", 0xb4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:12:30 executing program 2: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, 0x0, 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r2, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3", 0xb4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:12:30 executing program 4: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r2, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3eb8d", 0xb6, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb") 03:12:30 executing program 0: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r6 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB="08f70300", @ANYRES32=r5, @ANYBLOB="08001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB="0c000600000000000000000008001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r6, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:12:30 executing program 5: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r6 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB="08f70300", @ANYRES32=r5, @ANYBLOB="08001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB="0c000600000000000000000008001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r6, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:12:30 executing program 1: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r2, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3eb8d", 0xb6, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1") 03:12:30 executing program 2: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, 0x0, 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r2, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3", 0xb4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:12:30 executing program 3: r0 = gettid() openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r1, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3", 0xb4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:12:31 executing program 4: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r2, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3eb8d", 0xb6, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb") 03:12:31 executing program 1: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r2, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3eb8d", 0xb6, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb") 03:12:31 executing program 5: r0 = gettid() openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r1, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3", 0xb4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:12:31 executing program 2: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r2, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3", 0xb4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:12:32 executing program 1: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) getpgrp(r0) connect$pppoe(0xffffffffffffffff, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3", 0xb4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:12:32 executing program 2: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r2, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3", 0xb4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:12:34 executing program 3: r0 = gettid() openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r1, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3", 0xb4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:12:34 executing program 0: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r6 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB="08f70300", @ANYRES32=r5, @ANYBLOB="08001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB="0c000600000000000000000008001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r6, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:12:34 executing program 4: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r2, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3eb8d", 0xb6, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb") 03:12:34 executing program 3: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r2, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3", 0xb4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:12:34 executing program 4: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r2, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3eb8d", 0xb6, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c") 03:12:34 executing program 0: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r6 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB="08f70300", @ANYRES32=r5, @ANYBLOB="08001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB="0c000600000000000000000008001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r6, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:12:34 executing program 5: r0 = gettid() openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r1, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3", 0xb4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:12:35 executing program 0: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r6 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB="08f70300", @ANYRES32=r5, @ANYBLOB="08001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB="0c000600000000000000000008001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r6, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:12:35 executing program 5: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r6 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB="08f70300", @ANYRES32=r5, @ANYBLOB="08001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB="0c000600000000000000000008001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r6, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:12:35 executing program 3: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r2, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3", 0xb4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:12:36 executing program 1: openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) connect$pppoe(0xffffffffffffffff, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3eb8d", 0xb6, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") getpid() 03:12:36 executing program 2: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r2, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3", 0xb4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:12:36 executing program 5: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = socket(0x0, 0x3, 0x6) getpgrp(r0) connect$pppoe(r2, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3eb8d", 0xb6, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:12:36 executing program 4: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r2, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3eb8d", 0xb6, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c") 03:12:36 executing program 0: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r6 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9a") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB="08f70300", @ANYRES32=r5, @ANYBLOB="08001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB="0c000600000000000000000008001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r6, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:12:36 executing program 1: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r6 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3eb8d", 0xb6, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB="08f70300", @ANYRES32=r5, @ANYBLOB="08001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB="0c000600000000000000000008001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r6, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:12:36 executing program 2: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff, 0x1}) r2 = syz_clone(0xd0209500, 0x0, 0x0, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYBLOB='u\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB="08f70300", @ANYRES32, @ANYBLOB="08001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB="0c000600000000000000000008001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r2, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:12:37 executing program 4: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r2, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3eb8d", 0xb6, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c") 03:12:37 executing program 1: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) getpgrp(0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, 0x0) r0 = syz_clone(0x0, &(0x7f0000000100), 0x0, &(0x7f0000000200), &(0x7f0000000240), 0x0) getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYBLOB='u\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32, @ANYBLOB="08f70300", @ANYRES32, @ANYBLOB="08001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB="0c000600000000000000000008001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r0, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB], 0x64}}, 0x4) 03:12:37 executing program 2: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff, 0x1}) r2 = syz_clone(0x0, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3eb8d", 0xb6, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYBLOB='u\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB="08f70300", @ANYRES32, @ANYBLOB="08001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB="0c000600000000000000000008001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r2, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:12:37 executing program 1: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r2, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, 0x0) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r5 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3eb8d", 0xb6, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r3, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB="08f70300", @ANYRES32=r4, @ANYBLOB="08001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB="0c000600000000000000000008001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r5, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:12:39 executing program 3: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r2, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3", 0xb4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:12:39 executing program 2: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r4 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r4, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, r3, 0x1}) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00'}) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3eb8d", 0xb6, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:12:39 executing program 4: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000040)) r2 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3eb8d", 0xb6, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYBLOB='u\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB="08f70300", @ANYRES32, @ANYBLOB="08001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB="0c000600000000000000000008001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r2, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:12:39 executing program 1: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r4 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r4, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, r3, 0x1}) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00'}) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3eb8d", 0xb6, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") getpid() 03:12:40 executing program 5: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = socket(0x0, 0x3, 0x6) getpgrp(r0) connect$pppoe(r2, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3eb8d", 0xb6, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:12:40 executing program 3: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r2, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3", 0xb4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:12:40 executing program 4: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff, 0x1}) r2 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3eb8d", 0xb6, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYBLOB='u\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB="08f70300", @ANYRES32, @ANYBLOB="08001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB="0c000600000000000000000008001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r2, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:12:40 executing program 2: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) getpgrp(0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, 0x0) r0 = syz_clone(0x0, &(0x7f0000000100), 0x0, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYBLOB='u\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32, @ANYBLOB="08f70300", @ANYRES32, @ANYBLOB="08001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB="0c000600000000000000000008001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r0, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB], 0x64}}, 0x4) 03:12:40 executing program 0: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r6 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9a") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB="08f70300", @ANYRES32=r5, @ANYBLOB="08001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB="0c000600000000000000000008001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r6, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:12:40 executing program 2: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r4 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r4, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, r3, 0x1}) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r7 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3eb8d", 0xb6, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r5, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB="08f70300", @ANYRES32=r6, @ANYBLOB="08001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB="0c000600000000000000000008001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r7, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB], 0x64}}, 0x4) 03:12:40 executing program 0: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r6 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9a") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB="08f70300", @ANYRES32=r5, @ANYBLOB="08001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB="0c000600000000000000000008001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r6, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:12:40 executing program 1: r0 = gettid() openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r1, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3eb8d", 0xb6, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:12:40 executing program 5: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) getpgrp(0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, 0x0) r0 = syz_clone(0x0, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3eb8d", 0xb6, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYBLOB='u\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32, @ANYBLOB="08f70300", @ANYRES32, @ANYBLOB="08001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB="0c000600000000000000000008001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r0, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB], 0x64}}, 0x4) 03:12:40 executing program 3: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r2, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3", 0xb4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:12:40 executing program 5: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r2, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3eb8d", 0xb6, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:12:41 executing program 4: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r4 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r4, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, r3, 0x1}) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r7 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3eb8d", 0xb6, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r5, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB="08f70300", @ANYRES32=r6, @ANYBLOB="08001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB="0c000600000000000000000008001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r7, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:12:41 executing program 0: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r5 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB="08f70300", @ANYRES32=r4, @ANYBLOB="08001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB="0c000600000000000000000008001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r5, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:12:41 executing program 2: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r6 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9a") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB="08f70300", @ANYRES32=r5, @ANYBLOB="08001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB="0c000600000000000000000008001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r6, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:12:41 executing program 1: r0 = gettid() openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r1, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3eb8d", 0xb6, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:12:42 executing program 5: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) r2 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3eb8d", 0xb6, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYBLOB='u\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB="08f70300", @ANYRES32, @ANYBLOB="08001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB="0c000600000000000000000008001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r2, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:12:42 executing program 4: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r2, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3eb8d", 0xb6, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:12:42 executing program 0: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r5 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB="08f70300", @ANYRES32=r4, @ANYBLOB="08001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB="0c000600000000000000000008001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r5, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:12:42 executing program 2: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r5 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB="08f70300", @ANYRES32=r4, @ANYBLOB="08001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB="0c000600000000000000000008001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r5, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:12:43 executing program 4: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) r2 = openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r3 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3eb8d", 0xb6, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYBLOB='u\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB="08f70300", @ANYRES32, @ANYBLOB="08001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB="0c000600000000000000000008001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r3, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:12:43 executing program 5: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) r2 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3eb8d", 0xb6, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYBLOB='u\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB="08f70300", @ANYRES32, @ANYBLOB="08001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB="0c000600000000000000000008001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r2, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:12:46 executing program 3: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r2, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3", 0xb4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:12:46 executing program 0: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r5 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB="08f70300", @ANYRES32=r4, @ANYBLOB="08001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB="0c000600000000000000000008001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r5, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:12:46 executing program 5: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) r2 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3eb8d", 0xb6, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYBLOB='u\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB="08f70300", @ANYRES32, @ANYBLOB="08001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB="0c000600000000000000000008001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r2, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:12:46 executing program 4: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) getpgrp(0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r1 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3eb8d", 0xb6, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYBLOB='u\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32, @ANYBLOB="08f70300", @ANYRES32=r0, @ANYBLOB="08001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB="0c000600000000000000000008001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r1, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB], 0x64}}, 0x4) 03:12:46 executing program 4: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r2, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3", 0xb4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:12:47 executing program 1: r0 = gettid() openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r1, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3eb8d", 0xb6, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:12:47 executing program 3: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = socket(0x0, 0x3, 0x6) getpgrp(r0) connect$pppoe(r2, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3", 0xb4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:12:47 executing program 0: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00'}) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, 0x0, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:12:47 executing program 5: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, 0x0, 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r2, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3eb8d", 0xb6, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:12:47 executing program 2: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r5 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB="08f70300", @ANYRES32=r4, @ANYBLOB="08001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB="0c000600000000000000000008001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r5, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:12:47 executing program 0: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00'}) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, 0x0, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:12:47 executing program 3: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = socket(0x0, 0x3, 0x6) getpgrp(r0) connect$pppoe(r2, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3", 0xb4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:12:47 executing program 1: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = socket(0x0, 0x3, 0x6) getpgrp(r0) connect$pppoe(r2, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3", 0xb4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:12:47 executing program 2: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00'}) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, 0x0, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:12:48 executing program 0: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00'}) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, 0x0, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:12:48 executing program 3: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = socket(0x0, 0x3, 0x6) getpgrp(r0) connect$pppoe(r2, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3", 0xb4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:12:49 executing program 5: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, 0x0, 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r2, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3eb8d", 0xb6, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:12:49 executing program 2: r0 = gettid() openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) getpgrp(r0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r2 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3eb8d", 0xb6, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYBLOB='u\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB="08f70300", @ANYRES32=r1, @ANYBLOB="08001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB="0c000600000000000000000008001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r2, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB], 0x64}}, 0x4) 03:12:49 executing program 1: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket(0x2a, 0x3, 0x6) getpgrp(r0) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3eb8d", 0xb6, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") getpid() 03:12:49 executing program 0: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r6 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB="08f70300", @ANYRES32=r5, @ANYBLOB="08001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB="0c000600000000000000000008001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r6, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:12:49 executing program 4: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = socket(0x0, 0x3, 0x6) getpgrp(r0) connect$pppoe(r2, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3", 0xb4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:12:49 executing program 3: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = socket(0x2a, 0x0, 0x6) getpgrp(r0) connect$pppoe(r2, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3", 0xb4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:12:50 executing program 3: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = socket(0x2a, 0x0, 0x6) getpgrp(r0) connect$pppoe(r2, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3", 0xb4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:12:50 executing program 4: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = socket(0x0, 0x3, 0x6) getpgrp(r0) connect$pppoe(r2, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3", 0xb4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:12:52 executing program 1: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket(0x2a, 0x3, 0x6) getpgrp(r0) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3eb8d", 0xb6, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") getpid() 03:12:53 executing program 2: r0 = gettid() openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) getpgrp(r0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r2 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3eb8d", 0xb6, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYBLOB='u\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB="08f70300", @ANYRES32=r1, @ANYBLOB="08001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB="0c000600000000000000000008001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r2, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB], 0x64}}, 0x4) 03:12:53 executing program 1: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r3 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3eb8d", 0xb6, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYBLOB='u\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB="08f70300", @ANYRES32, @ANYBLOB="08001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB="0c000600000000000000000008001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r3, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:12:53 executing program 5: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, 0x0, 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r2, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3eb8d", 0xb6, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:12:53 executing program 2: r0 = gettid() write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r1, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3eb8d", 0xb6, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:12:53 executing program 5: r0 = gettid() openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) getpgrp(r0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r2 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3eb8d", 0xb6, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYBLOB='u\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB="08f70300", @ANYRES32=r1, @ANYBLOB="08001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB="0c000600000000000000000008001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r2, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB], 0x64}}, 0x4) 03:12:53 executing program 4: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = socket(0x0, 0x3, 0x6) getpgrp(r0) connect$pppoe(r2, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3", 0xb4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:12:53 executing program 0: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r6 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB="08f70300", @ANYRES32=r5, @ANYBLOB="08001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB="0c000600000000000000000008001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r6, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:12:53 executing program 1: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) connect$pppoe(0xffffffffffffffff, 0x0, 0x0) syz_clone(0xd0209500, 0x0, 0x0, 0x0, &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:12:54 executing program 4: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket(0x0, 0x3, 0x6) getpgrp(r0) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3", 0xb4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:12:54 executing program 3: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = socket(0x2a, 0x0, 0x6) getpgrp(r0) connect$pppoe(r2, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3", 0xb4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:12:54 executing program 2: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, 0x0, 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r3 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3eb8d", 0xb6, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYBLOB='u\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB="08f70300", @ANYRES32, @ANYBLOB="08001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB="0c000600000000000000000008001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r3, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:12:54 executing program 0: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r6 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB="08f70300", @ANYRES32=r5, @ANYBLOB="08001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB="0c000600000000000000000008001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r6, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:12:54 executing program 5: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) getpgrp(r0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r3 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3eb8d", 0xb6, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYBLOB='u\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB="08f70300", @ANYRES32=r2, @ANYBLOB="08001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB="0c000600000000000000000008001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r3, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB], 0x64}}, 0x4) 03:12:54 executing program 1: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = socket(0x2a, 0x0, 0x6) getpgrp(r0) connect$pppoe(r2, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3", 0xb4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:12:54 executing program 3: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = socket(0x2a, 0x3, 0x0) getpgrp(r0) connect$pppoe(r2, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3", 0xb4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:12:54 executing program 4: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket(0x0, 0x3, 0x6) getpgrp(r0) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3", 0xb4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:12:55 executing program 0: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r6 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080), 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB="08f70300", @ANYRES32=r5, @ANYBLOB="08001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB="0c000600000000000000000008001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r6, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:12:55 executing program 2: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r4 = socket(0x2a, 0x3, 0x0) getpgrp(r0) connect$pppoe(r4, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) write$RDMA_USER_CM_CMD_CREATE_ID(r2, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, r3, 0x1}) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r7 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3eb8d", 0xb6, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r5, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB="08f70300", @ANYRES32=r6, @ANYBLOB="08001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB="0c000600000000000000000008001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r7, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:12:55 executing program 5: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) connect$pppoe(0xffffffffffffffff, 0x0, 0x0) syz_clone(0xd0209500, 0x0, 0x0, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:12:55 executing program 3: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = socket(0x2a, 0x3, 0x0) getpgrp(r0) connect$pppoe(r2, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3", 0xb4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:12:55 executing program 4: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket(0x0, 0x3, 0x6) getpgrp(r0) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3", 0xb4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:12:55 executing program 0: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r6 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080), 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB="08f70300", @ANYRES32=r5, @ANYBLOB="08001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB="0c000600000000000000000008001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r6, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:12:55 executing program 1: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, 0x0, 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r3 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3eb8d", 0xb6, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYBLOB='u\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB="08f70300", @ANYRES32, @ANYBLOB="08001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB="0c000600000000000000000008001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r3, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:12:55 executing program 3: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = socket(0x2a, 0x3, 0x0) getpgrp(r0) connect$pppoe(r2, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3", 0xb4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:12:56 executing program 0: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r6 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080), 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB="08f70300", @ANYRES32=r5, @ANYBLOB="08001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB="0c000600000000000000000008001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r6, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:12:56 executing program 2: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) getpgrp(r0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r4 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3eb8d", 0xb6, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYBLOB='u\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB="08f70300", @ANYRES32=r3, @ANYBLOB="08001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB="0c000600000000000000000008001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r4, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB], 0x64}}, 0x4) 03:12:56 executing program 4: gettid() r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = socket(0x0, 0x3, 0x6) connect$pppoe(r1, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3", 0xb4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:12:56 executing program 5: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) connect$pppoe(0xffffffffffffffff, 0x0, 0x0) syz_clone(0xd0209500, 0x0, 0x0, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:12:56 executing program 3: gettid() r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = socket(0x2a, 0x3, 0x6) getpgrp(0x0) connect$pppoe(r1, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3", 0xb4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:12:56 executing program 1: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, 0x0, 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r3 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3eb8d", 0xb6, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYBLOB='u\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB="08f70300", @ANYRES32, @ANYBLOB="08001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB="0c000600000000000000000008001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r3, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:12:57 executing program 0: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00'}) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, 0x0}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:12:57 executing program 4: gettid() r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = socket(0x0, 0x3, 0x6) connect$pppoe(r1, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3", 0xb4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:12:57 executing program 5: r0 = gettid() openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r1, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3eb8d", 0xb6, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:12:57 executing program 3: gettid() r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = socket(0x2a, 0x3, 0x6) getpgrp(0x0) connect$pppoe(r1, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3", 0xb4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:12:58 executing program 0: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00'}) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, 0x0}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:13:01 executing program 1: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, 0x0, 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r3 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3eb8d", 0xb6, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYBLOB='u\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB="08f70300", @ANYRES32, @ANYBLOB="08001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB="0c000600000000000000000008001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r3, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:13:01 executing program 5: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, r0, &(0x7f0000000040)={r1, 0xffffffffffffffff, 0x1}) r2 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3eb8d", 0xb6, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYBLOB='u\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32, @ANYBLOB="08f70300", @ANYRES32, @ANYBLOB="08001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB="0c000600000000000000000008001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r2, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:13:02 executing program 2: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) getpgrp(r0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r4 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3eb8d", 0xb6, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYBLOB='u\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB="08f70300", @ANYRES32=r3, @ANYBLOB="08001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB="0c000600000000000000000008001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r4, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB], 0x64}}, 0x4) 03:13:02 executing program 0: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00'}) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, 0x0}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:13:02 executing program 4: gettid() r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = socket(0x0, 0x3, 0x6) connect$pppoe(r1, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3", 0xb4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:13:02 executing program 1: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) connect$pppoe(0xffffffffffffffff, 0x0, 0x0) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3eb8d", 0xb6, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:13:02 executing program 5: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r4 = socket(0x2a, 0x0, 0x6) getpgrp(r0) connect$pppoe(r4, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) write$RDMA_USER_CM_CMD_CREATE_ID(r2, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, r3, 0x1}) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r7 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3eb8d", 0xb6, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r5, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB="08f70300", @ANYRES32=r6, @ANYBLOB="08001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB="0c000600000000000000000008001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r7, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:13:02 executing program 4: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) getpgrp(r0) connect$pppoe(0xffffffffffffffff, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3", 0xb4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:13:02 executing program 0: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00'}) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={0x0, 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:13:02 executing program 2: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00'}) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, 0x0}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:13:02 executing program 3: gettid() r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = socket(0x2a, 0x3, 0x6) getpgrp(0x0) connect$pppoe(r1, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3", 0xb4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:13:02 executing program 5: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r2, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00'}) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3eb8d", 0xb6, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") getpid() 03:13:02 executing program 0: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00'}) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={0x0, 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:13:02 executing program 1: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, r0, &(0x7f0000000040)={r1, 0xffffffffffffffff, 0x1}) r2 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3eb8d", 0xb6, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYBLOB='u\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32, @ANYBLOB="08f70300", @ANYRES32, @ANYBLOB="08001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB="0c000600000000000000000008001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r2, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:13:03 executing program 4: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) getpgrp(r0) connect$pppoe(0xffffffffffffffff, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3", 0xb4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:13:03 executing program 2: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r4 = socket(0x0, 0x3, 0x6) getpgrp(r0) connect$pppoe(r4, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) write$RDMA_USER_CM_CMD_CREATE_ID(r2, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, r3, 0x1}) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r7 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3eb8d", 0xb6, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r5, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB="08f70300", @ANYRES32=r6, @ANYBLOB="08001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB="0c000600000000000000000008001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r7, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:13:03 executing program 3: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(0xffffffffffffffff, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3", 0xb4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:13:04 executing program 1: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, r0, &(0x7f0000000040)={r1, 0xffffffffffffffff, 0x1}) r2 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3eb8d", 0xb6, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYBLOB='u\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32, @ANYBLOB="08f70300", @ANYRES32, @ANYBLOB="08001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB="0c000600000000000000000008001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r2, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:13:04 executing program 3: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(0xffffffffffffffff, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3", 0xb4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:13:05 executing program 3: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(0xffffffffffffffff, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3", 0xb4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:13:05 executing program 1: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, r0, &(0x7f0000000040)={r1, 0xffffffffffffffff, 0x1}) r2 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3eb8d", 0xb6, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYBLOB='u\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32, @ANYBLOB="08f70300", @ANYRES32, @ANYBLOB="08001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB="0c000600000000000000000008001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r2, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:13:06 executing program 3: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r2, 0x0, 0x0) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3", 0xb4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:13:06 executing program 4: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) getpgrp(r0) connect$pppoe(0xffffffffffffffff, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3", 0xb4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:13:07 executing program 5: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r2, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00'}) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3eb8d", 0xb6, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") getpid() 03:13:07 executing program 1: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, r0, &(0x7f0000000040)={r1, 0xffffffffffffffff, 0x1}) r2 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3eb8d", 0xb6, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYBLOB='u\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32, @ANYBLOB="08f70300", @ANYRES32, @ANYBLOB="08001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB="0c000600000000000000000008001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r2, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB], 0x64}}, 0x4) 03:13:07 executing program 4: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = socket(0x0, 0x3, 0x6) getpgrp(r0) connect$pppoe(r2, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3", 0xb4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:13:07 executing program 0: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00'}) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={0x0, 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:13:07 executing program 2: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r4 = socket(0x0, 0x3, 0x6) getpgrp(r0) connect$pppoe(r4, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) write$RDMA_USER_CM_CMD_CREATE_ID(r2, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, r3, 0x1}) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r7 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3eb8d", 0xb6, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r5, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB="08f70300", @ANYRES32=r6, @ANYBLOB="08001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB="0c000600000000000000000008001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r7, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:13:07 executing program 3: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r2, 0x0, 0x0) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3", 0xb4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:13:07 executing program 0: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r6 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB="08f70300", @ANYRES32=r5, @ANYBLOB="08001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB="0c000600000000000000000008001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r6, @ANYBLOB="08001c00", @ANYRES32], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:13:07 executing program 5: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r2, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00'}) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3eb8d", 0xb6, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") getpid() 03:13:07 executing program 2: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00'}) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={0x0, 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:13:07 executing program 4: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = socket(0x0, 0x3, 0x6) getpgrp(r0) connect$pppoe(r2, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3", 0xb4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:13:08 executing program 5: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r2, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00'}) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3eb8d", 0xb6, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:13:09 executing program 5: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r2, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3eb8d", 0xb6, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:13:10 executing program 5: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r2, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3eb8d", 0xb6, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:13:11 executing program 1: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, r0, &(0x7f0000000040)={r1, 0xffffffffffffffff, 0x1}) r2 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3eb8d", 0xb6, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYBLOB='u\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32, @ANYBLOB="08f70300", @ANYRES32, @ANYBLOB="08001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB="0c000600000000000000000008001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r2, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB], 0x64}}, 0x4) 03:13:11 executing program 5: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket(0x2a, 0x3, 0x6) getpgrp(r0) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3eb8d", 0xb6, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:13:11 executing program 0: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r6 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB="08f70300", @ANYRES32=r5, @ANYBLOB="08001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB="0c000600000000000000000008001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r6, @ANYBLOB="08001c00", @ANYRES32], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:13:11 executing program 2: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r2, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3eb8d", 0xb6, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:13:12 executing program 3: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r2, 0x0, 0x0) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3", 0xb4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:13:12 executing program 4: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = socket(0x0, 0x3, 0x6) getpgrp(r0) connect$pppoe(r2, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3", 0xb4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:13:12 executing program 0: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r6 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB="08f70300", @ANYRES32=r5, @ANYBLOB="08001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB="0c000600000000000000000008001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r6, @ANYBLOB="08001c00"], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:13:12 executing program 1: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, r0, &(0x7f0000000040)={r1, 0xffffffffffffffff, 0x1}) r2 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3eb8d", 0xb6, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYBLOB='u\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32, @ANYBLOB="08f70300", @ANYRES32, @ANYBLOB="08001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB="0c000600000000000000000008001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r2, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB], 0x64}}, 0x4) 03:13:12 executing program 2: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r2, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3eb8d", 0xb6, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:13:12 executing program 5: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket(0x2a, 0x3, 0x6) getpgrp(r0) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3eb8d", 0xb6, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:13:12 executing program 4: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = socket(0x0, 0x3, 0x6) getpgrp(r0) connect$pppoe(r2, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3", 0xb4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:13:12 executing program 3: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r2, &(0x7f0000000440)={0x18, 0x0, {0x0, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3", 0xb4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:13:12 executing program 0: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r6 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB="08f70300", @ANYRES32=r5, @ANYBLOB="08001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB="0c000600000000000000000008001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r6], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:13:12 executing program 2: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r2, 0x0, 0x0) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3", 0xb4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:13:12 executing program 1: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, r0, &(0x7f0000000040)={r1, 0xffffffffffffffff, 0x1}) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3eb8d", 0xb6, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") getpid() bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:13:13 executing program 4: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = socket(0x0, 0x3, 0x6) getpgrp(r0) connect$pppoe(r2, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3", 0xb4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:13:13 executing program 3: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r2, &(0x7f0000000440)={0x18, 0x0, {0x0, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3", 0xb4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:13:13 executing program 1: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, r0, &(0x7f0000000040)={r1, 0xffffffffffffffff, 0x1}) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3eb8d", 0xb6, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") getpid() bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:13:13 executing program 4: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = socket(0x0, 0x3, 0x6) getpgrp(r0) connect$pppoe(r2, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3", 0xb4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:13:14 executing program 3: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r2, &(0x7f0000000440)={0x18, 0x0, {0x0, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3", 0xb4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:13:16 executing program 2: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r2, 0x0, 0x0) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3", 0xb4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:13:17 executing program 5: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket(0x2a, 0x3, 0x6) getpgrp(r0) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3eb8d", 0xb6, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:13:17 executing program 0: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r6 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB="08f70300", @ANYRES32=r5, @ANYBLOB="08001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB="0c000600000000000000000008001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r6], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:13:17 executing program 2: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r6 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB="08f70300", @ANYRES32=r5, @ANYBLOB="08001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB="0c000600000000000000000008001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r6], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:13:17 executing program 1: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, r0, &(0x7f0000000040)={r1, 0xffffffffffffffff, 0x1}) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3eb8d", 0xb6, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") getpid() bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:13:17 executing program 4: r0 = gettid() openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = socket(0x0, 0x3, 0x6) getpgrp(r0) connect$pppoe(r1, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3", 0xb4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:13:17 executing program 1: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, r0, &(0x7f0000000040)={r1, 0xffffffffffffffff, 0x1}) r2 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3eb8d", 0xb6, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYBLOB='u\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32, @ANYBLOB="08f70300", @ANYRES32, @ANYBLOB="08001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB="0c000600000000000000000008001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r2, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:13:17 executing program 0: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r6 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB="08f70300", @ANYRES32=r5, @ANYBLOB="08001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB="0c000600000000000000000008001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r6], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:13:17 executing program 3: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r2, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0x0, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3", 0xb4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:13:17 executing program 5: gettid() r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket(0x2a, 0x3, 0x6) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3eb8d", 0xb6, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:13:17 executing program 3: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r2, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0x0, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3", 0xb4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:13:17 executing program 2: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r6 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB="08f70300", @ANYRES32=r5, @ANYBLOB="08001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB="0c000600000000000000000008001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r6], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:13:17 executing program 3: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r2, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0x0, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3", 0xb4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:13:17 executing program 3: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r2, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, 0x0, 0x0, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:13:17 executing program 4: r0 = gettid() openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = socket(0x0, 0x3, 0x6) getpgrp(r0) connect$pppoe(r1, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3", 0xb4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:13:17 executing program 0: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r6 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB="08f70300", @ANYRES32=r5, @ANYBLOB="08001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB="0c000600000000000000000008001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r6, @ANYBLOB], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:13:18 executing program 1: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, r0, &(0x7f0000000040)={r1, 0xffffffffffffffff, 0x1}) r2 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3eb8d", 0xb6, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYBLOB='u\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32, @ANYBLOB="08f70300", @ANYRES32, @ANYBLOB="08001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB="0c000600000000000000000008001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r2, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:13:18 executing program 5: gettid() r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket(0x2a, 0x3, 0x6) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3eb8d", 0xb6, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:13:18 executing program 3: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r2, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, 0x0, 0x0, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:13:18 executing program 5: gettid() r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket(0x2a, 0x3, 0x6) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3eb8d", 0xb6, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:13:18 executing program 0: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r6 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB="08f70300", @ANYRES32=r5, @ANYBLOB="08001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB="0c000600000000000000000008001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r6, @ANYBLOB], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:13:19 executing program 1: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, r0, &(0x7f0000000040)={r1, 0xffffffffffffffff, 0x1}) r2 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3eb8d", 0xb6, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYBLOB='u\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32, @ANYBLOB="08f70300", @ANYRES32, @ANYBLOB="08001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB="0c000600000000000000000008001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r2, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:13:19 executing program 1: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3eb8d", 0xb6, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYBLOB='u\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32, @ANYBLOB="08f70300", @ANYRES32, @ANYBLOB="08001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB="0c000600000000000000000008001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r1, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:13:21 executing program 5: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) getpgrp(r0) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3eb8d", 0xb6, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:13:21 executing program 0: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r6 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB="08f70300", @ANYRES32=r5, @ANYBLOB="08001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB="0c000600000000000000000008001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r6, @ANYBLOB], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:13:21 executing program 1: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3eb8d", 0xb6, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYBLOB='u\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32, @ANYBLOB="08f70300", @ANYRES32, @ANYBLOB="08001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB="0c000600000000000000000008001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r1, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:13:21 executing program 4: r0 = gettid() openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = socket(0x0, 0x3, 0x6) getpgrp(r0) connect$pppoe(r1, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3", 0xb4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:13:21 executing program 2: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, r0, &(0x7f0000000040)={r1, 0xffffffffffffffff, 0x1}) r2 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3eb8d", 0xb6, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYBLOB='u\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32, @ANYBLOB="08f70300", @ANYRES32, @ANYBLOB="08001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB="0c000600000000000000000008001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r2, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:13:21 executing program 2: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, r0, &(0x7f0000000040)={r1, 0xffffffffffffffff, 0x1}) r2 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3eb8d", 0xb6, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYBLOB='u\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32, @ANYBLOB="08f70300", @ANYRES32, @ANYBLOB="08001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB="0c000600000000000000000008001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r2, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:13:22 executing program 4: r0 = gettid() write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = socket(0x0, 0x3, 0x6) getpgrp(r0) connect$pppoe(r1, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3", 0xb4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:13:22 executing program 3: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r2, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, 0x0, 0x0, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:13:22 executing program 0: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r6 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB="08f70300", @ANYRES32=r5, @ANYBLOB="08001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB="0c000600000000000000000008001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r6, @ANYBLOB='\b\x00'], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:13:23 executing program 4: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = socket(0x0, 0x3, 0x6) getpgrp(0x0) connect$pppoe(r0, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3", 0xb4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:13:23 executing program 3: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r2, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100), 0x0, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:13:23 executing program 0: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r6 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB="08f70300", @ANYRES32=r5, @ANYBLOB="08001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB="0c000600000000000000000008001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r6, @ANYBLOB='\b\x00'], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:13:25 executing program 5: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) getpgrp(r0) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3eb8d", 0xb6, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:13:25 executing program 3: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r2, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100), 0x0, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:13:25 executing program 4: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = socket(0x0, 0x3, 0x6) getpgrp(0x0) connect$pppoe(r0, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3", 0xb4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:13:25 executing program 0: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r6 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB="08f70300", @ANYRES32=r5, @ANYBLOB="08001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB="0c000600000000000000000008001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r6, @ANYBLOB='\b\x00'], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:13:25 executing program 1: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3eb8d", 0xb6, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYBLOB='u\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32, @ANYBLOB="08f70300", @ANYRES32, @ANYBLOB="08001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB="0c000600000000000000000008001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r1, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:13:25 executing program 2: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = socket(0x0, 0x3, 0x6) getpgrp(0x0) connect$pppoe(r0, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3", 0xb4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:13:25 executing program 1: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, r0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff, 0x1}) r1 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3eb8d", 0xb6, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYBLOB='u\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32, @ANYBLOB="08f70300", @ANYRES32, @ANYBLOB="08001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB="0c000600000000000000000008001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r1, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) [ 992.291147][ T1239] ieee802154 phy0 wpan0: encryption failed: -22 [ 992.297482][ T1239] ieee802154 phy1 wpan1: encryption failed: -22 03:13:25 executing program 3: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r2, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100), 0x0, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:13:25 executing program 5: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) getpgrp(r0) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3eb8d", 0xb6, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:13:25 executing program 2: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = socket(0x0, 0x3, 0x6) getpgrp(0x0) connect$pppoe(r0, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3", 0xb4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:13:25 executing program 1: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, r0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff, 0x1}) r1 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3eb8d", 0xb6, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYBLOB='u\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32, @ANYBLOB="08f70300", @ANYRES32, @ANYBLOB="08001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB="0c000600000000000000000008001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r1, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:13:25 executing program 4: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = socket(0x0, 0x3, 0x6) getpgrp(0x0) connect$pppoe(r0, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3", 0xb4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:13:25 executing program 0: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r6 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB="08f70300", @ANYRES32=r5, @ANYBLOB="08001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB="0c000600000000000000000008001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r6, @ANYBLOB="08001c"], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:13:25 executing program 5: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket(0x2a, 0x3, 0x6) getpgrp(r0) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3eb8d", 0xb6, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:13:26 executing program 3: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r2, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68", 0x5a, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:13:26 executing program 4: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = socket(0x0, 0x3, 0x6) getpgrp(0x0) connect$pppoe(r0, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3", 0xb4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:13:26 executing program 0: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r6 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB="08f70300", @ANYRES32=r5, @ANYBLOB="08001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB="0c000600000000000000000008001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r6, @ANYBLOB="08001c"], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:13:26 executing program 5: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket(0x2a, 0x3, 0x6) getpgrp(r0) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3eb8d", 0xb6, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:13:29 executing program 2: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = socket(0x0, 0x3, 0x6) getpgrp(0x0) connect$pppoe(r0, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3", 0xb4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:13:29 executing program 2: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket(0x0, 0x3, 0x6) getpgrp(0x0) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3", 0xb4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:13:29 executing program 1: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, r0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff, 0x1}) r1 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3eb8d", 0xb6, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYBLOB='u\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32, @ANYBLOB="08f70300", @ANYRES32, @ANYBLOB="08001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB="0c000600000000000000000008001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r1, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:13:29 executing program 3: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r2, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68", 0x5a, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:13:30 executing program 3: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r2, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68", 0x5a, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:13:30 executing program 1: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, r0, &(0x7f0000000040)={r1, 0xffffffffffffffff, 0x1}) r2 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3eb8d", 0xb6, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYBLOB='u\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32, @ANYBLOB="08f70300", @ANYRES32, @ANYBLOB="08001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB="0c000600000000000000000008001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r2, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:13:30 executing program 2: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket(0x0, 0x3, 0x6) getpgrp(0x0) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3", 0xb4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:13:30 executing program 0: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r6 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB="08f70300", @ANYRES32=r5, @ANYBLOB="08001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB="0c000600000000000000000008001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r6, @ANYBLOB="08001c"], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:13:30 executing program 4: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = socket(0x0, 0x3, 0x6) getpgrp(0x0) connect$pppoe(r0, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3", 0xb4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:13:30 executing program 3: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r2, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:13:30 executing program 1: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, r0, &(0x7f0000000040)={r1, 0xffffffffffffffff, 0x1}) r2 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3eb8d", 0xb6, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYBLOB='u\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32, @ANYBLOB="08f70300", @ANYRES32, @ANYBLOB="08001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB="0c000600000000000000000008001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r2, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:13:30 executing program 5: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket(0x2a, 0x3, 0x6) getpgrp(r0) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3eb8d", 0xb6, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:13:30 executing program 0: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB="08f70300", @ANYRES32=r5, @ANYBLOB="08001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB="0c000600000000000000000008001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYBLOB="08001c00"], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:13:30 executing program 4: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket(0x0, 0x3, 0x6) getpgrp(0x0) connect$pppoe(r0, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3", 0xb4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:13:30 executing program 2: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket(0x0, 0x3, 0x6) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3", 0xb4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:13:30 executing program 1: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, r0, &(0x7f0000000040)={r1, 0xffffffffffffffff, 0x1}) r2 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3eb8d", 0xb6, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYBLOB='u\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32, @ANYBLOB="08f70300", @ANYRES32, @ANYBLOB="08001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB="0c000600000000000000000008001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r2, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:13:30 executing program 3: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r2, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:13:31 executing program 0: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB="08f70300", @ANYRES32=r5, @ANYBLOB="08001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB="0c000600000000000000000008001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYBLOB="08001c00"], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:13:31 executing program 4: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket(0x0, 0x3, 0x6) getpgrp(0x0) connect$pppoe(r0, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3", 0xb4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:13:31 executing program 5: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket(0x2a, 0x3, 0x6) getpgrp(r0) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3eb8d", 0xb6, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:13:34 executing program 1: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000040)={r0, 0xffffffffffffffff, 0x1}) r1 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3eb8d", 0xb6, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYBLOB='u\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32, @ANYBLOB="08f70300", @ANYRES32, @ANYBLOB="08001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB="0c000600000000000000000008001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r1, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:13:34 executing program 0: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB="08f70300", @ANYRES32=r5, @ANYBLOB="08001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB="0c000600000000000000000008001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYBLOB="08001c00"], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:13:34 executing program 1: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000040)={r0, 0xffffffffffffffff, 0x1}) r1 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3eb8d", 0xb6, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYBLOB='u\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32, @ANYBLOB="08f70300", @ANYRES32, @ANYBLOB="08001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB="0c000600000000000000000008001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r1, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:13:34 executing program 2: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket(0x0, 0x3, 0x6) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3", 0xb4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:13:34 executing program 5: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket(0x2a, 0x3, 0x6) getpgrp(r0) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3eb8d", 0xb6, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:13:35 executing program 0: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB="08f70300", @ANYRES32=r5, @ANYBLOB="08001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB="0c000600000000000000000008001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB="08001c00"], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:13:35 executing program 5: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket(0x2a, 0x3, 0x6) getpgrp(r0) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3eb8d", 0xb6, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:13:35 executing program 2: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket(0x0, 0x3, 0x6) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3", 0xb4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:13:35 executing program 4: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket(0x0, 0x3, 0x6) getpgrp(0x0) connect$pppoe(r0, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3", 0xb4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:13:35 executing program 0: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB="08f70300", @ANYRES32=r5, @ANYBLOB="08001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB="0c000600000000000000000008001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB="08001c00"], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:13:35 executing program 5: r0 = gettid() openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket(0x2a, 0x3, 0x6) getpgrp(r0) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3eb8d", 0xb6, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:13:35 executing program 3: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r2, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:13:35 executing program 1: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000040)={r0, 0xffffffffffffffff, 0x1}) r1 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3eb8d", 0xb6, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYBLOB='u\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32, @ANYBLOB="08f70300", @ANYRES32, @ANYBLOB="08001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB="0c000600000000000000000008001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r1, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:13:35 executing program 2: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) getpgrp(0x0) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3", 0xb4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:13:36 executing program 3: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r2, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f9", 0x9e, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:13:36 executing program 1: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) r0 = openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000040)={r0, 0xffffffffffffffff, 0x1}) r1 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3eb8d", 0xb6, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYBLOB='u\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32, @ANYBLOB="08f70300", @ANYRES32, @ANYBLOB="08001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB="0c000600000000000000000008001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r1, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:13:36 executing program 4: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = socket(0x0, 0x0, 0x6) getpgrp(0x0) connect$pppoe(r0, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3", 0xb4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:13:36 executing program 2: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) getpgrp(0x0) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3", 0xb4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:13:37 executing program 4: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = socket(0x0, 0x0, 0x0) getpgrp(0x0) connect$pppoe(r0, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3", 0xb4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:13:39 executing program 0: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB="08f70300", @ANYRES32=r5, @ANYBLOB="08001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB="0c000600000000000000000008001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB="08001c00"], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:13:39 executing program 5: r0 = gettid() openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket(0x2a, 0x3, 0x6) getpgrp(r0) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3eb8d", 0xb6, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:13:39 executing program 1: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) r0 = openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000040)={r0, 0xffffffffffffffff, 0x1}) r1 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3eb8d", 0xb6, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYBLOB='u\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32, @ANYBLOB="08f70300", @ANYRES32, @ANYBLOB="08001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB="0c000600000000000000000008001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r1, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:13:39 executing program 3: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r2, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f9", 0x9e, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:13:39 executing program 0: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r6 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB="08f70300", @ANYRES32=r5, @ANYBLOB="08001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB="0c000600000000000000000008001d00", @ANYRES32, @ANYRES32=r6, @ANYBLOB="08001c00"], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:13:39 executing program 2: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) getpgrp(0x0) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3", 0xb4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:13:39 executing program 5: r0 = gettid() openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket(0x2a, 0x3, 0x6) getpgrp(r0) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3eb8d", 0xb6, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:13:39 executing program 1: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) r0 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3eb8d", 0xb6, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYBLOB='u\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32, @ANYBLOB="08f70300", @ANYRES32, @ANYBLOB="08001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB="0c000600000000000000000008001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r0, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:13:39 executing program 3: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r2, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f9", 0x9e, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:13:39 executing program 0: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r6 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB="08f70300", @ANYRES32=r5, @ANYBLOB="08001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB="0c000600000000000000000008001d00", @ANYRES32, @ANYRES32=r6, @ANYBLOB="08001c00"], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:13:40 executing program 2: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket(0x0, 0x3, 0x6) getpgrp(0x0) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3", 0xb4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:13:40 executing program 4: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = socket(0x0, 0x0, 0x0) getpgrp(0x0) connect$pppoe(r0, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3", 0xb4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:13:40 executing program 5: r0 = gettid() openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket(0x2a, 0x3, 0x6) getpgrp(r0) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3eb8d", 0xb6, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:13:40 executing program 3: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r2, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee", 0xa9, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:13:40 executing program 1: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) r0 = syz_clone(0x0, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3eb8d", 0xb6, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYBLOB='u\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32, @ANYBLOB="08f70300", @ANYRES32, @ANYBLOB="08001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB="0c000600000000000000000008001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r0, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:13:40 executing program 4: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket(0x0, 0x0, 0x0) getpgrp(0x0) connect$pppoe(0xffffffffffffffff, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3", 0xb4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:13:40 executing program 2: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket(0x0, 0x3, 0x6) getpgrp(0x0) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3", 0xb4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:13:40 executing program 0: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r6 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB="08f70300", @ANYRES32=r5, @ANYBLOB="08001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB="0c000600000000000000000008001d00", @ANYRES32, @ANYRES32=r6, @ANYBLOB="08001c00"], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:13:40 executing program 1: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) r0 = syz_clone(0x0, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3eb8d", 0xb6, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYBLOB='u\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32, @ANYBLOB="08f70300", @ANYRES32, @ANYBLOB="08001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB="0c000600000000000000000008001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r0, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:13:40 executing program 5: r0 = gettid() openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket(0x2a, 0x3, 0x6) getpgrp(r0) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3eb8d", 0xb6, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:13:41 executing program 1: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) r0 = syz_clone(0x0, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3eb8d", 0xb6, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYBLOB='u\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32, @ANYBLOB="08f70300", @ANYRES32, @ANYBLOB="08001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB="0c000600000000000000000008001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r0, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:13:41 executing program 4: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket(0x0, 0x0, 0x0) getpgrp(0x0) connect$pppoe(0xffffffffffffffff, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3", 0xb4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:13:41 executing program 3: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r2, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee", 0xa9, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:13:41 executing program 2: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket(0x0, 0x3, 0x6) getpgrp(0x0) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3", 0xb4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:13:41 executing program 1: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) r0 = syz_clone(0xd0209500, 0x0, 0x0, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYBLOB='u\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32, @ANYBLOB="08f70300", @ANYRES32, @ANYBLOB="08001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB="0c000600000000000000000008001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r0, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:13:41 executing program 5: openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket(0x2a, 0x3, 0x6) getpgrp(0x0) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3eb8d", 0xb6, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:13:41 executing program 0: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r6 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB="08f70300", @ANYRES32=r5, @ANYBLOB="08001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB="0c000600000000000000000008001d00", @ANYRES32, @ANYBLOB, @ANYRES32=r6, @ANYBLOB="08001c00"], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:13:41 executing program 4: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket(0x0, 0x0, 0x0) getpgrp(0x0) connect$pppoe(0xffffffffffffffff, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3", 0xb4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:13:41 executing program 3: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r2, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee", 0xa9, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:13:41 executing program 2: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x3, 0x6) getpgrp(0x0) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3", 0xb4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:13:42 executing program 5: openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket(0x2a, 0x3, 0x6) getpgrp(0x0) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3eb8d", 0xb6, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:13:42 executing program 0: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r6 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB="08f70300", @ANYRES32=r5, @ANYBLOB="08001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB="0c000600000000000000000008001d00", @ANYRES32, @ANYBLOB, @ANYRES32=r6, @ANYBLOB="08001c00"], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:13:46 executing program 0: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r6 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB="08f70300", @ANYRES32=r5, @ANYBLOB="08001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB="0c000600000000000000000008001d00", @ANYRES32, @ANYBLOB, @ANYRES32=r6, @ANYBLOB="08001c00"], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:13:46 executing program 0: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r6 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB="08f70300", @ANYRES32=r5, @ANYBLOB="08001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB="0c000600000000000000000008001d00", @ANYRES32, @ANYBLOB='\b\x00', @ANYRES32=r6, @ANYBLOB="08001c00"], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:13:47 executing program 0: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r6 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB="08f70300", @ANYRES32=r5, @ANYBLOB="08001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB="0c000600000000000000000008001d00", @ANYRES32, @ANYBLOB='\b\x00', @ANYRES32=r6, @ANYBLOB="08001c00"], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:13:47 executing program 2: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x3, 0x6) getpgrp(0x0) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3", 0xb4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:13:47 executing program 1: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) r0 = syz_clone(0xd0209500, 0x0, 0x0, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYBLOB='u\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32, @ANYBLOB="08f70300", @ANYRES32, @ANYBLOB="08001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB="0c000600000000000000000008001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r0, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:13:47 executing program 4: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = socket(0x0, 0x0, 0x0) getpgrp(0x0) connect$pppoe(r0, 0x0, 0x0) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3", 0xb4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:13:47 executing program 3: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r2, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f", 0xaf, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:13:47 executing program 2: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x3, 0x6) getpgrp(0x0) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3", 0xb4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:13:47 executing program 3: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r2, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f", 0xaf, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:13:48 executing program 4: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = socket(0x0, 0x0, 0x0) getpgrp(0x0) connect$pppoe(r0, 0x0, 0x0) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3", 0xb4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:13:48 executing program 5: openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket(0x2a, 0x3, 0x6) getpgrp(0x0) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3eb8d", 0xb6, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:13:48 executing program 1: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) r0 = syz_clone(0xd0209500, 0x0, 0x0, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYBLOB='u\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32, @ANYBLOB="08f70300", @ANYRES32, @ANYBLOB="08001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB="0c000600000000000000000008001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r0, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:13:48 executing program 2: openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket(0x0, 0x3, 0x6) getpgrp(0x0) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3", 0xb4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:13:48 executing program 1: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) r0 = syz_clone(0xd0209500, &(0x7f0000000100), 0x0, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYBLOB='u\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32, @ANYBLOB="08f70300", @ANYRES32, @ANYBLOB="08001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB="0c000600000000000000000008001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r0, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:13:48 executing program 0: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r6 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB="08f70300", @ANYRES32=r5, @ANYBLOB="08001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB="0c000600000000000000000008001d00", @ANYRES32, @ANYBLOB='\b\x00', @ANYRES32=r6, @ANYBLOB="08001c00"], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:13:48 executing program 5: r0 = gettid() openat$vcs(0xffffffffffffff9c, 0x0, 0x40042, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket(0x2a, 0x3, 0x6) getpgrp(r0) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3eb8d", 0xb6, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:13:48 executing program 3: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r2, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f", 0xaf, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:13:48 executing program 4: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = socket(0x0, 0x0, 0x0) getpgrp(0x0) connect$pppoe(r0, 0x0, 0x0) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3", 0xb4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:13:48 executing program 1: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) r0 = syz_clone(0xd0209500, &(0x7f0000000100), 0x0, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYBLOB='u\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32, @ANYBLOB="08f70300", @ANYRES32, @ANYBLOB="08001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB="0c000600000000000000000008001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r0, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:13:48 executing program 2: openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket(0x0, 0x3, 0x6) getpgrp(0x0) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3", 0xb4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:13:48 executing program 5: r0 = gettid() openat$vcs(0xffffffffffffff9c, 0x0, 0x40042, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket(0x2a, 0x3, 0x6) getpgrp(r0) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3eb8d", 0xb6, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:13:49 executing program 3: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r2, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747", 0xb2, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:13:49 executing program 0: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r6 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB="08f70300", @ANYRES32=r5, @ANYBLOB="08001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB="0c000600000000000000000008001d00", @ANYRES32, @ANYBLOB="08001c", @ANYRES32=r6, @ANYBLOB="08001c00"], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:13:49 executing program 4: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = socket(0x0, 0x0, 0x0) getpgrp(0x0) connect$pppoe(r0, &(0x7f0000000440)={0x18, 0x0, {0x0, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3", 0xb4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:13:49 executing program 1: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) r0 = syz_clone(0xd0209500, &(0x7f0000000100), 0x0, 0x0, &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYBLOB='u\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32, @ANYBLOB="08f70300", @ANYRES32, @ANYBLOB="08001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB="0c000600000000000000000008001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r0, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:13:53 executing program 5: r0 = gettid() openat$vcs(0xffffffffffffff9c, 0x0, 0x40042, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket(0x2a, 0x3, 0x6) getpgrp(r0) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3eb8d", 0xb6, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:13:53 executing program 3: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r2, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747", 0xb2, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:13:53 executing program 5: r0 = gettid() openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket(0x2a, 0x3, 0x6) getpgrp(r0) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3eb8d", 0xb6, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:13:53 executing program 3: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r2, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747", 0xb2, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:13:53 executing program 5: r0 = gettid() openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket(0x2a, 0x3, 0x6) getpgrp(r0) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3eb8d", 0xb6, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:13:53 executing program 2: openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket(0x0, 0x3, 0x6) getpgrp(0x0) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3", 0xb4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:13:53 executing program 1: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) r0 = syz_clone(0xd0209500, &(0x7f0000000100), 0x0, 0x0, &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYBLOB='u\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32, @ANYBLOB="08f70300", @ANYRES32, @ANYBLOB="08001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB="0c000600000000000000000008001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r0, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:13:53 executing program 4: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = socket(0x0, 0x0, 0x0) getpgrp(0x0) connect$pppoe(r0, &(0x7f0000000440)={0x18, 0x0, {0x0, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3", 0xb4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:13:53 executing program 0: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r6 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB="08f70300", @ANYRES32=r5, @ANYBLOB="08001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB="0c000600000000000000000008001d00", @ANYRES32, @ANYBLOB="08001c", @ANYRES32=r6, @ANYBLOB="08001c00"], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:13:53 executing program 3: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r2, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3", 0xb3, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:13:53 executing program 1: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) r0 = syz_clone(0xd0209500, &(0x7f0000000100), 0x0, 0x0, &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYBLOB='u\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32, @ANYBLOB="08f70300", @ANYRES32, @ANYBLOB="08001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB="0c000600000000000000000008001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r0, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:13:53 executing program 4: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = socket(0x0, 0x0, 0x0) getpgrp(0x0) connect$pppoe(r0, &(0x7f0000000440)={0x18, 0x0, {0x0, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3", 0xb4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:13:53 executing program 2: openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket(0x0, 0x3, 0x6) getpgrp(0x0) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3", 0xb4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:13:53 executing program 0: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r6 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB="08f70300", @ANYRES32=r5, @ANYBLOB="08001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB="0c000600000000000000000008001d00", @ANYRES32, @ANYBLOB="08001c", @ANYRES32=r6, @ANYBLOB="08001c00"], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:13:54 executing program 5: r0 = gettid() openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket(0x2a, 0x3, 0x6) getpgrp(r0) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3eb8d", 0xb6, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:13:54 executing program 1: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) r0 = syz_clone(0xd0209500, &(0x7f0000000100), 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYBLOB='u\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32, @ANYBLOB="08f70300", @ANYRES32, @ANYBLOB="08001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB="0c000600000000000000000008001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r0, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:13:54 executing program 4: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = socket(0x0, 0x0, 0x0) getpgrp(0x0) connect$pppoe(r0, &(0x7f0000000440)={0x18, 0x0, {0x0, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0x0, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3", 0xb4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:13:54 executing program 2: openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket(0x0, 0x3, 0x6) getpgrp(0x0) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3", 0xb4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:13:54 executing program 0: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r6 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB="08f70300", @ANYRES32=r5, @ANYBLOB="08001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB="0c000600000000000000000008001d00", @ANYBLOB="08001c00", @ANYRES32=r6, @ANYBLOB="08001c00"], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:13:54 executing program 1: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) r0 = syz_clone(0xd0209500, &(0x7f0000000100), 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYBLOB='u\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32, @ANYBLOB="08f70300", @ANYRES32, @ANYBLOB="08001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB="0c000600000000000000000008001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r0, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:13:54 executing program 3: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r2, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3", 0xb3, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:13:54 executing program 4: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = socket(0x0, 0x0, 0x0) getpgrp(0x0) connect$pppoe(r0, &(0x7f0000000440)={0x18, 0x0, {0x0, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0x0, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3", 0xb4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:13:54 executing program 4: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = socket(0x0, 0x0, 0x0) getpgrp(0x0) connect$pppoe(r0, &(0x7f0000000440)={0x18, 0x0, {0x0, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0x0, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3", 0xb4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:13:54 executing program 4: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = socket(0x0, 0x0, 0x0) getpgrp(0x0) connect$pppoe(r0, &(0x7f0000000440)={0x18, 0x0, {0x0, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, 0x0, 0x0, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:13:58 executing program 1: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) r0 = syz_clone(0xd0209500, &(0x7f0000000100), 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYBLOB='u\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32, @ANYBLOB="08f70300", @ANYRES32, @ANYBLOB="08001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB="0c000600000000000000000008001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r0, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:13:58 executing program 5: r0 = gettid() openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket(0x2a, 0x3, 0x6) getpgrp(r0) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3eb8d", 0xb6, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:13:58 executing program 3: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r2, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3", 0xb3, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:13:58 executing program 0: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r6 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB="08f70300", @ANYRES32=r5, @ANYBLOB="08001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB="0c000600000000000000000008001d00", @ANYBLOB="08001c00", @ANYRES32=r6, @ANYBLOB="08001c00"], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:13:58 executing program 1: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) r0 = syz_clone(0xd0209500, &(0x7f0000000100), 0x0, &(0x7f0000000200), &(0x7f0000000240), 0x0) getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYBLOB='u\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32, @ANYBLOB="08f70300", @ANYRES32, @ANYBLOB="08001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB="0c000600000000000000000008001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r0, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:13:59 executing program 2: openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket(0x0, 0x3, 0x6) getpgrp(0x0) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3", 0xb4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:13:59 executing program 5: r0 = gettid() openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket(0x2a, 0x3, 0x6) getpgrp(r0) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3eb8d", 0xb6, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:13:59 executing program 3: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r2, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3", 0xb4, 0x0, &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:13:59 executing program 0: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r6 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB="08f70300", @ANYRES32=r5, @ANYBLOB="08001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB="0c000600000000000000000008001d00", @ANYBLOB="08001c00", @ANYRES32=r6, @ANYBLOB="08001c00"], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:13:59 executing program 1: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) syz_clone(0xd0209500, &(0x7f0000000100), 0x0, &(0x7f0000000200), &(0x7f0000000240), 0x0) getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(0xffffffffffffffff, 0x0, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:13:59 executing program 2: openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket(0x0, 0x0, 0x6) getpgrp(0x0) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3", 0xb4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:14:00 executing program 4: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = socket(0x0, 0x0, 0x0) getpgrp(0x0) connect$pppoe(r0, &(0x7f0000000440)={0x18, 0x0, {0x0, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, 0x0, 0x0, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:14:00 executing program 5: r0 = gettid() openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket(0x2a, 0x3, 0x6) getpgrp(r0) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3eb8d", 0xb6, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:14:00 executing program 1: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) syz_clone(0xd0209500, &(0x7f0000000100), 0x0, &(0x7f0000000200), &(0x7f0000000240), 0x0) getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(0xffffffffffffffff, 0x0, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:14:00 executing program 0: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r6 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB="08f70300", @ANYRES32=r5, @ANYBLOB="08001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32, @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r6, @ANYBLOB="08001c00"], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:14:00 executing program 3: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r2, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3", 0xb4, 0x0, &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:14:00 executing program 2: openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket(0x0, 0x0, 0x6) getpgrp(0x0) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3", 0xb4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:14:00 executing program 5: r0 = gettid() openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket(0x2a, 0x3, 0x6) getpgrp(r0) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3eb8d", 0xb6, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:14:00 executing program 1: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) syz_clone(0xd0209500, &(0x7f0000000100), 0x0, &(0x7f0000000200), &(0x7f0000000240), 0x0) getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(0xffffffffffffffff, 0x0, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:14:00 executing program 4: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = socket(0x0, 0x0, 0x0) getpgrp(0x0) connect$pppoe(r0, &(0x7f0000000440)={0x18, 0x0, {0x0, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, 0x0, 0x0, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:14:00 executing program 3: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r2, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3", 0xb4, 0x0, &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:14:00 executing program 5: r0 = gettid() openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket(0x0, 0x3, 0x6) getpgrp(r0) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3eb8d", 0xb6, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:14:01 executing program 0: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r6 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB="08f70300", @ANYRES32=r5, @ANYBLOB="08001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32, @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r6, @ANYBLOB="08001c00"], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:14:01 executing program 2: openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket(0x0, 0x0, 0x6) getpgrp(0x0) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3", 0xb4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:14:01 executing program 4: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = socket(0x0, 0x0, 0x0) getpgrp(0x0) connect$pppoe(r0, &(0x7f0000000440)={0x18, 0x0, {0x0, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100), 0x0, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:14:01 executing program 3: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r2, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3", 0xb4, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:14:01 executing program 1: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) r0 = syz_clone(0xd0209500, &(0x7f0000000100), 0x0, &(0x7f0000000200), &(0x7f0000000240), 0x0) getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYBLOB='u\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32, @ANYBLOB="08f70300", @ANYRES32, @ANYBLOB="08001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB="0c000600000000000000000008001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r0, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:14:01 executing program 4: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = socket(0x0, 0x0, 0x0) getpgrp(0x0) connect$pppoe(r0, &(0x7f0000000440)={0x18, 0x0, {0x0, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100), 0x0, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:14:01 executing program 3: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r2, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3", 0xb4, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:14:01 executing program 5: r0 = gettid() openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket(0x0, 0x3, 0x6) getpgrp(r0) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3eb8d", 0xb6, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:14:01 executing program 4: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = socket(0x0, 0x0, 0x0) getpgrp(0x0) connect$pppoe(r0, &(0x7f0000000440)={0x18, 0x0, {0x0, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100), 0x0, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:14:01 executing program 3: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r2, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3", 0xb4, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:14:01 executing program 0: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r6 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB="08f70300", @ANYRES32=r5, @ANYBLOB="08001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32, @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r6, @ANYBLOB="08001c00"], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:14:02 executing program 2: openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket(0x0, 0x3, 0x0) getpgrp(0x0) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3", 0xb4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:14:02 executing program 3: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r2, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3", 0xb4, &(0x7f0000000200), &(0x7f0000000240), 0x0) 03:14:05 executing program 2: openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket(0x0, 0x3, 0x0) getpgrp(0x0) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3", 0xb4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:14:05 executing program 0: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r6 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB="08f70300", @ANYRES32=r5, @ANYBLOB="08001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r6, @ANYBLOB="08001c00"], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:14:05 executing program 1: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) r0 = syz_clone(0xd0209500, &(0x7f0000000100), 0x0, &(0x7f0000000200), &(0x7f0000000240), 0x0) getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYBLOB='u\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32, @ANYBLOB="08f70300", @ANYRES32, @ANYBLOB="08001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB="0c000600000000000000000008001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r0, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:14:05 executing program 4: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = socket(0x0, 0x0, 0x0) getpgrp(0x0) connect$pppoe(r0, &(0x7f0000000440)={0x18, 0x0, {0x0, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68", 0x5a, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:14:05 executing program 0: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r6 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB="08f70300", @ANYRES32=r5, @ANYBLOB="08001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r6, @ANYBLOB="08001c00"], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:14:05 executing program 4: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = socket(0x0, 0x0, 0x0) getpgrp(0x0) connect$pppoe(r0, &(0x7f0000000440)={0x18, 0x0, {0x0, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68", 0x5a, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:14:06 executing program 5: r0 = gettid() openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket(0x0, 0x3, 0x6) getpgrp(r0) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3eb8d", 0xb6, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:14:06 executing program 1: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) r0 = syz_clone(0xd0209500, &(0x7f0000000100), 0x0, &(0x7f0000000200), &(0x7f0000000240), 0x0) getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYBLOB='u\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32, @ANYBLOB="08f70300", @ANYRES32, @ANYBLOB="08001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB="0c000600000000000000000008001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r0, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:14:06 executing program 2: openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket(0x0, 0x3, 0x0) getpgrp(0x0) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3", 0xb4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:14:06 executing program 4: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = socket(0x0, 0x0, 0x0) getpgrp(0x0) connect$pppoe(r0, &(0x7f0000000440)={0x18, 0x0, {0x0, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68", 0x5a, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:14:06 executing program 0: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r6 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB="08f70300", @ANYRES32=r5, @ANYBLOB="08001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYBLOB, @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r6, @ANYBLOB="08001c00"], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:14:07 executing program 3: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r2, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3", 0xb4, &(0x7f0000000200), &(0x7f0000000240), 0x0) 03:14:07 executing program 5: r0 = gettid() openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket(0x2a, 0x0, 0x6) getpgrp(r0) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3eb8d", 0xb6, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:14:07 executing program 1: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) r0 = syz_clone(0xd0209500, &(0x7f0000000100), 0x0, &(0x7f0000000200), &(0x7f0000000240), 0x0) getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000080), 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYBLOB='u\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32, @ANYBLOB="08f70300", @ANYRES32, @ANYBLOB="08001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB="0c000600000000000000000008001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r0, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:14:07 executing program 2: openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket(0x0, 0x3, 0x6) getpgrp(0x0) syz_clone(0x0, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3", 0xb4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:14:07 executing program 2: openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket(0x0, 0x3, 0x6) getpgrp(0x0) syz_clone(0x0, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3", 0xb4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:14:07 executing program 2: openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket(0x0, 0x3, 0x6) getpgrp(0x0) syz_clone(0x0, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3", 0xb4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:14:07 executing program 3: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r2, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3", 0xb4, &(0x7f0000000200), &(0x7f0000000240), 0x0) 03:14:07 executing program 5: r0 = gettid() openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket(0x2a, 0x0, 0x6) getpgrp(r0) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3eb8d", 0xb6, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:14:08 executing program 2: openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket(0x0, 0x3, 0x6) getpgrp(0x0) syz_clone(0xd0209500, 0x0, 0x0, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:14:10 executing program 4: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = socket(0x0, 0x0, 0x0) getpgrp(0x0) connect$pppoe(r0, &(0x7f0000000440)={0x18, 0x0, {0x0, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:14:10 executing program 0: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r6 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB="08f70300", @ANYRES32=r5, @ANYBLOB="08001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYBLOB, @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r6, @ANYBLOB="08001c00"], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:14:10 executing program 1: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) r0 = syz_clone(0xd0209500, &(0x7f0000000100), 0x0, &(0x7f0000000200), &(0x7f0000000240), 0x0) getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000080), 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYBLOB='u\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32, @ANYBLOB="08f70300", @ANYRES32, @ANYBLOB="08001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB="0c000600000000000000000008001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r0, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:14:10 executing program 4: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = socket(0x0, 0x0, 0x0) getpgrp(0x0) connect$pppoe(r0, &(0x7f0000000440)={0x18, 0x0, {0x0, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:14:10 executing program 0: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r6 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB="08f70300", @ANYRES32=r5, @ANYBLOB="08001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYBLOB, @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r6, @ANYBLOB="08001c00"], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:14:10 executing program 1: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) r0 = syz_clone(0xd0209500, &(0x7f0000000100), 0x0, &(0x7f0000000200), &(0x7f0000000240), 0x0) getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000080), 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYBLOB='u\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32, @ANYBLOB="08f70300", @ANYRES32, @ANYBLOB="08001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB="0c000600000000000000000008001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r0, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:14:11 executing program 0: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r6 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB="08f70300", @ANYRES32=r5, @ANYBLOB="08001d00", @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r6, @ANYBLOB="08001c00"], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:14:11 executing program 1: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) syz_clone(0xd0209500, &(0x7f0000000100), 0x0, &(0x7f0000000200), &(0x7f0000000240), 0x0) getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, 0x0}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:14:11 executing program 4: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = socket(0x0, 0x0, 0x0) getpgrp(0x0) connect$pppoe(r0, &(0x7f0000000440)={0x18, 0x0, {0x0, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:14:11 executing program 3: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r2, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3", 0xb4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)) 03:14:11 executing program 5: r0 = gettid() openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket(0x2a, 0x0, 0x6) getpgrp(r0) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3eb8d", 0xb6, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:14:12 executing program 2: openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket(0x0, 0x3, 0x6) getpgrp(0x0) syz_clone(0xd0209500, 0x0, 0x0, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:14:12 executing program 3: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r2, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3", 0xb4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)) 03:14:12 executing program 0: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r6 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB="08f70300", @ANYRES32=r5, @ANYBLOB="08001d00", @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r6, @ANYBLOB="08001c00"], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:14:12 executing program 5: r0 = gettid() openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket(0x2a, 0x3, 0x0) getpgrp(r0) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3eb8d", 0xb6, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:14:12 executing program 1: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) syz_clone(0xd0209500, &(0x7f0000000100), 0x0, &(0x7f0000000200), &(0x7f0000000240), 0x0) getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, 0x0}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:14:12 executing program 3: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r2, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3", 0xb4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)) 03:14:12 executing program 2: openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket(0x0, 0x3, 0x6) getpgrp(0x0) syz_clone(0xd0209500, 0x0, 0x0, 0x0, &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:14:13 executing program 5: r0 = gettid() openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket(0x2a, 0x3, 0x0) getpgrp(r0) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3eb8d", 0xb6, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:14:13 executing program 2: openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket(0x0, 0x3, 0x6) getpgrp(0x0) syz_clone(0xd0209500, 0x0, 0x0, 0x0, &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:14:14 executing program 1: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) syz_clone(0xd0209500, &(0x7f0000000100), 0x0, &(0x7f0000000200), &(0x7f0000000240), 0x0) getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, 0x0}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:14:14 executing program 3: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r2, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3", 0xb4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497") 03:14:14 executing program 5: r0 = gettid() openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket(0x2a, 0x3, 0x0) getpgrp(r0) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3eb8d", 0xb6, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:14:14 executing program 4: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = socket(0x0, 0x0, 0x0) getpgrp(0x0) connect$pppoe(r0, &(0x7f0000000440)={0x18, 0x0, {0x0, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f9", 0x9e, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:14:14 executing program 2: openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket(0x0, 0x3, 0x6) getpgrp(0x0) syz_clone(0xd0209500, 0x0, 0x0, 0x0, &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:14:14 executing program 0: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r6 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB="08f70300", @ANYRES32=r5, @ANYBLOB="08001d00", @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r6, @ANYBLOB="08001c00"], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:14:17 executing program 1: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) syz_clone(0xd0209500, &(0x7f0000000100), 0x0, &(0x7f0000000200), &(0x7f0000000240), 0x0) getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={0x0, 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:14:17 executing program 5: gettid() openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket(0x2a, 0x3, 0x6) getpgrp(0x0) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3eb8d", 0xb6, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:14:17 executing program 3: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r2, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3", 0xb4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497") 03:14:17 executing program 2: openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket(0x0, 0x3, 0x6) getpgrp(0x0) syz_clone(0xd0209500, 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:14:18 executing program 4: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = socket(0x0, 0x0, 0x0) getpgrp(0x0) connect$pppoe(r0, &(0x7f0000000440)={0x18, 0x0, {0x0, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f9", 0x9e, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:14:18 executing program 2: openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket(0x0, 0x3, 0x6) getpgrp(0x0) syz_clone(0xd0209500, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0) 03:14:18 executing program 5: gettid() openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket(0x2a, 0x3, 0x6) getpgrp(0x0) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3eb8d", 0xb6, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:14:18 executing program 1: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) syz_clone(0xd0209500, &(0x7f0000000100), 0x0, &(0x7f0000000200), &(0x7f0000000240), 0x0) getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={0x0, 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:14:18 executing program 0: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r6 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB="08f70300", @ANYRES32=r5, @ANYBLOB="08001d00", @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r6, @ANYBLOB="08001c00"], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:14:18 executing program 3: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r2, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3", 0xb4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497") 03:14:18 executing program 2: openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket(0x0, 0x3, 0x6) getpgrp(0x0) syz_clone(0xd0209500, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0) 03:14:18 executing program 5: gettid() openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket(0x2a, 0x3, 0x6) getpgrp(0x0) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3eb8d", 0xb6, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:14:18 executing program 4: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = socket(0x0, 0x0, 0x0) getpgrp(0x0) connect$pppoe(r0, &(0x7f0000000440)={0x18, 0x0, {0x0, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f9", 0x9e, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:14:18 executing program 0: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r6 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB="08f70300", @ANYRES32=r5, @ANYBLOB="08001d00", @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r6, @ANYBLOB="08001c00"], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:14:18 executing program 2: openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket(0x0, 0x3, 0x6) getpgrp(0x0) syz_clone(0xd0209500, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0) 03:14:18 executing program 1: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) syz_clone(0xd0209500, &(0x7f0000000100), 0x0, &(0x7f0000000200), &(0x7f0000000240), 0x0) getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={0x0, 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:14:19 executing program 3: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r2, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3", 0xb4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b") 03:14:19 executing program 2: openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket(0x0, 0x3, 0x6) getpgrp(0x0) syz_clone(0xd0209500, 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000280)) 03:14:19 executing program 5: r0 = gettid() openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket(0x2a, 0x3, 0x6) getpgrp(r0) syz_clone(0x0, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3eb8d", 0xb6, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:14:19 executing program 4: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = socket(0x0, 0x0, 0x0) getpgrp(0x0) connect$pppoe(r0, &(0x7f0000000440)={0x18, 0x0, {0x0, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798", 0x88, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:14:19 executing program 0: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r6 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB="08f70300", @ANYRES32=r5, @ANYBLOB="08001d00", @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r6, @ANYBLOB="08001c00"], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:14:19 executing program 5: r0 = gettid() openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket(0x2a, 0x3, 0x6) getpgrp(r0) syz_clone(0x0, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3eb8d", 0xb6, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:14:19 executing program 2: openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket(0x0, 0x3, 0x6) getpgrp(0x0) syz_clone(0xd0209500, 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000280)) 03:14:19 executing program 3: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r2, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3", 0xb4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b") 03:14:19 executing program 1: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) syz_clone(0xd0209500, &(0x7f0000000100), 0x0, &(0x7f0000000200), &(0x7f0000000240), 0x0) getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={0x0, 0x64}}, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:14:19 executing program 5: r0 = gettid() openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket(0x2a, 0x3, 0x6) getpgrp(r0) syz_clone(0x0, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3eb8d", 0xb6, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:14:19 executing program 2: openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket(0x0, 0x3, 0x6) getpgrp(0x0) syz_clone(0xd0209500, 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000280)) 03:14:19 executing program 3: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r2, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3", 0xb4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b") 03:14:19 executing program 5: r0 = gettid() openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket(0x2a, 0x3, 0x6) getpgrp(r0) syz_clone(0xd0209500, 0x0, 0x0, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:14:20 executing program 2: openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket(0x0, 0x3, 0x6) getpgrp(0x0) syz_clone(0xd0209500, 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497") 03:14:20 executing program 4: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = socket(0x0, 0x0, 0x0) getpgrp(0x0) connect$pppoe(r0, &(0x7f0000000440)={0x18, 0x0, {0x0, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798", 0x88, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:14:20 executing program 2: openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket(0x0, 0x3, 0x6) getpgrp(0x0) syz_clone(0xd0209500, 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000280)='\b') 03:14:22 executing program 0: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r6 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB="08f70300", @ANYRES32=r5, @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r6, @ANYBLOB="08001c00"], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:14:22 executing program 1: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) syz_clone(0xd0209500, &(0x7f0000000100), 0x0, &(0x7f0000000200), &(0x7f0000000240), 0x0) getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={0x0, 0x64}}, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:14:22 executing program 2: openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket(0x0, 0x3, 0x6) getpgrp(0x0) syz_clone(0xd0209500, 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000280)='\b') 03:14:22 executing program 5: r0 = gettid() openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket(0x2a, 0x3, 0x6) getpgrp(r0) syz_clone(0xd0209500, 0x0, 0x0, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:14:22 executing program 4: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = socket(0x0, 0x0, 0x0) getpgrp(0x0) connect$pppoe(r0, &(0x7f0000000440)={0x18, 0x0, {0x0, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798", 0x88, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:14:22 executing program 5: r0 = gettid() openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket(0x2a, 0x3, 0x6) getpgrp(r0) syz_clone(0xd0209500, 0x0, 0x0, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:14:22 executing program 1: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) syz_clone(0xd0209500, &(0x7f0000000100), 0x0, &(0x7f0000000200), &(0x7f0000000240), 0x0) getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={0x0, 0x64}}, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) 03:14:22 executing program 3: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r2, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3", 0xb4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019") 03:14:22 executing program 2: openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket(0x0, 0x3, 0x6) getpgrp(0x0) syz_clone(0xd0209500, 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000280)='\b') 03:14:22 executing program 4: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = socket(0x0, 0x0, 0x0) getpgrp(0x0) connect$pppoe(r0, &(0x7f0000000440)={0x18, 0x0, {0x0, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a4", 0x93, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:14:22 executing program 0: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r6 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB="08f70300", @ANYRES32=r5, @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r6, @ANYBLOB="08001c00"], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) [ 1053.721646][ T1239] ieee802154 phy0 wpan0: encryption failed: -22 [ 1053.728066][ T1239] ieee802154 phy1 wpan1: encryption failed: -22 03:14:32 executing program 2: openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket(0x0, 0x3, 0x6) getpgrp(0x0) syz_clone(0xd0209500, 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92") 03:14:32 executing program 3: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r2, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3", 0xb4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019") 03:14:32 executing program 5: r0 = gettid() openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket(0x2a, 0x3, 0x6) getpgrp(r0) syz_clone(0xd0209500, &(0x7f0000000100), 0x0, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:14:32 executing program 4: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = socket(0x0, 0x0, 0x0) getpgrp(0x0) connect$pppoe(r0, &(0x7f0000000440)={0x18, 0x0, {0x0, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a4", 0x93, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:14:32 executing program 0: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00'}) r5 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB="08f70300", @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r5, @ANYBLOB="08001c00"], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:14:32 executing program 2: openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket(0x0, 0x3, 0x6) getpgrp(0x0) syz_clone(0xd0209500, 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92") 03:14:32 executing program 5: r0 = gettid() openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket(0x2a, 0x3, 0x6) getpgrp(r0) syz_clone(0xd0209500, &(0x7f0000000100), 0x0, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:14:32 executing program 1: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) syz_clone(0xd0209500, &(0x7f0000000100), 0x0, &(0x7f0000000200), &(0x7f0000000240), 0x0) getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={0x0, 0x64}}, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) 03:14:33 executing program 3: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r2, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3", 0xb4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019") 03:14:33 executing program 4: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = socket(0x0, 0x0, 0x0) getpgrp(0x0) connect$pppoe(r0, &(0x7f0000000440)={0x18, 0x0, {0x0, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a4", 0x93, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:14:33 executing program 2: openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket(0x0, 0x3, 0x6) getpgrp(0x0) syz_clone(0xd0209500, 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92") 03:14:33 executing program 0: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00'}) r5 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB="08f70300", @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r5, @ANYBLOB="08001c00"], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:14:33 executing program 5: r0 = gettid() openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket(0x2a, 0x3, 0x6) getpgrp(r0) syz_clone(0xd0209500, &(0x7f0000000100), 0x0, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:14:33 executing program 1: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) syz_clone(0xd0209500, &(0x7f0000000100), 0x0, &(0x7f0000000200), &(0x7f0000000240), 0x0) getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={0x0, 0x64}}, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) 03:14:33 executing program 2: openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket(0x0, 0x3, 0x6) getpgrp(0x0) syz_clone(0xd0209500, 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a46") 03:14:33 executing program 5: r0 = gettid() openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket(0x2a, 0x3, 0x6) getpgrp(r0) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be", 0x5b, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:14:33 executing program 4: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = socket(0x0, 0x0, 0x0) getpgrp(0x0) connect$pppoe(r0, &(0x7f0000000440)={0x18, 0x0, {0x0, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1f", 0x99, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:14:33 executing program 3: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r2, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3", 0xb4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa46444") 03:14:34 executing program 2: openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket(0x0, 0x3, 0x6) getpgrp(0x0) syz_clone(0xd0209500, 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92") 03:14:34 executing program 0: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00'}) r5 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB="08f70300", @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r5, @ANYBLOB="08001c00"], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:14:34 executing program 1: r0 = gettid() openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket(0x2a, 0x3, 0x6) getpgrp(r0) syz_clone(0xd0209500, &(0x7f0000000100), 0x0, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:14:34 executing program 2: openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket(0x0, 0x3, 0x6) getpgrp(0x0) syz_clone(0xd0209500, 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92") 03:14:34 executing program 3: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r2, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3", 0xb4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa46444") 03:14:34 executing program 4: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = socket(0x0, 0x0, 0x0) getpgrp(0x0) connect$pppoe(r0, &(0x7f0000000440)={0x18, 0x0, {0x0, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1f", 0x99, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:14:34 executing program 5: r0 = gettid() openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket(0x2a, 0x3, 0x6) getpgrp(r0) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be", 0x5b, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:14:35 executing program 2: openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket(0x0, 0x3, 0x6) getpgrp(0x0) syz_clone(0xd0209500, 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92") 03:14:35 executing program 0: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00'}) r5 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB="08f70300", @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r5, @ANYBLOB="08001c00"], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:14:35 executing program 2: openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket(0x0, 0x3, 0x6) getpgrp(0x0) syz_clone(0xd0209500, 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba2998") 03:14:35 executing program 1: openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket(0x0, 0x3, 0x6) getpgrp(0x0) syz_clone(0xd0209500, 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92") 03:14:35 executing program 4: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = socket(0x0, 0x0, 0x0) getpgrp(0x0) connect$pppoe(r0, &(0x7f0000000440)={0x18, 0x0, {0x0, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1f", 0x99, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:14:35 executing program 2: openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket(0x0, 0x3, 0x6) getpgrp(0x0) syz_clone(0xd0209500, 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba2998") 03:14:35 executing program 3: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r2, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3", 0xb4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa46444") 03:14:36 executing program 0: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00'}) r5 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB="08f70300", @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r5, @ANYBLOB="08001c00"], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:14:36 executing program 2: openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket(0x0, 0x3, 0x6) getpgrp(0x0) syz_clone(0xd0209500, 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba2998") 03:14:36 executing program 1: openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket(0x0, 0x3, 0x6) getpgrp(0x0) syz_clone(0xd0209500, 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92") 03:14:36 executing program 4: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = socket(0x0, 0x0, 0x0) getpgrp(0x0) connect$pppoe(r0, &(0x7f0000000440)={0x18, 0x0, {0x0, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38", 0x9c, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:14:36 executing program 5: r0 = gettid() openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket(0x2a, 0x3, 0x6) getpgrp(r0) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be", 0x5b, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:14:36 executing program 3: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r2, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3", 0xb4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1") 03:14:44 executing program 2: openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket(0x0, 0x3, 0x6) getpgrp(0x0) syz_clone(0xd0209500, 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a") 03:14:44 executing program 0: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00'}) r5 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB="08f70300", @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r5, @ANYBLOB="08001c00"], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:14:44 executing program 2: openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket(0x0, 0x3, 0x6) getpgrp(0x0) syz_clone(0xd0209500, 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a") 03:14:44 executing program 2: openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket(0x0, 0x3, 0x6) getpgrp(0x0) syz_clone(0xd0209500, 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a") 03:14:44 executing program 5: r0 = gettid() openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket(0x2a, 0x3, 0x6) getpgrp(r0) syz_clone(0xd0209500, &(0x7f0000000100), 0x0, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:14:45 executing program 2: openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket(0x0, 0x3, 0x6) getpgrp(0x0) syz_clone(0xd0209500, 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a42") 03:14:45 executing program 2: openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket(0x0, 0x3, 0x6) getpgrp(0x0) syz_clone(0xd0209500, 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a42") 03:14:45 executing program 5: r0 = gettid() openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket(0x2a, 0x3, 0x6) getpgrp(r0) syz_clone(0xd0209500, &(0x7f0000000100), 0x0, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:14:47 executing program 1: openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket(0x0, 0x3, 0x6) getpgrp(0x0) syz_clone(0xd0209500, 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92") 03:14:47 executing program 5: r0 = gettid() openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket(0x2a, 0x3, 0x6) getpgrp(r0) syz_clone(0xd0209500, &(0x7f0000000100), 0x0, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:14:47 executing program 4: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = socket(0x0, 0x0, 0x0) getpgrp(0x0) connect$pppoe(r0, &(0x7f0000000440)={0x18, 0x0, {0x0, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38", 0x9c, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:14:48 executing program 3: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r2, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3", 0xb4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1") 03:14:48 executing program 5: r0 = gettid() openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket(0x2a, 0x3, 0x6) getpgrp(r0) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf2", 0x2e, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:14:48 executing program 4: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = socket(0x0, 0x0, 0x0) getpgrp(0x0) connect$pppoe(r0, &(0x7f0000000440)={0x18, 0x0, {0x0, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38", 0x9c, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:14:48 executing program 0: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r6 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYRES32=r5, @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r6, @ANYBLOB="08001c00"], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:14:48 executing program 1: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00'}) r5 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB="08f70300", @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r5, @ANYBLOB="08001c00"], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:14:48 executing program 2: openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket(0x0, 0x3, 0x6) getpgrp(0x0) syz_clone(0xd0209500, 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a42") 03:14:48 executing program 0: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r6 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYRES32=r5, @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r6, @ANYBLOB="08001c00"], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:14:48 executing program 3: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r2, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3", 0xb4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1") 03:14:48 executing program 2: openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket(0x0, 0x3, 0x6) getpgrp(0x0) syz_clone(0xd0209500, 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a") 03:14:48 executing program 1: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00'}) r5 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB="08f70300", @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r5, @ANYBLOB="08001c00"], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:14:48 executing program 0: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r6 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYRES32=r5, @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r6, @ANYBLOB="08001c00"], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:14:48 executing program 5: r0 = gettid() openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket(0x2a, 0x3, 0x6) getpgrp(r0) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf2", 0x2e, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:14:48 executing program 4: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = socket(0x0, 0x0, 0x0) getpgrp(0x0) connect$pppoe(r0, &(0x7f0000000440)={0x18, 0x0, {0x0, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6", 0x9d, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:14:48 executing program 2: openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket(0x0, 0x3, 0x6) getpgrp(0x0) syz_clone(0xd0209500, 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a") 03:14:48 executing program 3: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r2, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3", 0xb4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb") 03:14:48 executing program 0: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r6 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB, @ANYRES32=r5, @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r6, @ANYBLOB="08001c00"], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:14:48 executing program 1: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r6 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYRES32=r5, @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r6, @ANYBLOB="08001c00"], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:14:48 executing program 5: r0 = gettid() openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket(0x2a, 0x3, 0x6) getpgrp(r0) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf2", 0x2e, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:14:48 executing program 4: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = socket(0x0, 0x0, 0x0) getpgrp(0x0) connect$pppoe(r0, &(0x7f0000000440)={0x18, 0x0, {0x0, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6", 0x9d, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:14:51 executing program 2: openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket(0x0, 0x3, 0x6) getpgrp(0x0) syz_clone(0xd0209500, 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a") 03:14:51 executing program 0: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r6 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB, @ANYRES32=r5, @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r6, @ANYBLOB="08001c00"], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:14:51 executing program 2: openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket(0x0, 0x3, 0x6) getpgrp(0x0) syz_clone(0xd0209500, 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a") 03:14:52 executing program 4: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = socket(0x0, 0x0, 0x0) getpgrp(0x0) connect$pppoe(r0, &(0x7f0000000440)={0x18, 0x0, {0x0, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6", 0x9d, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:14:52 executing program 5: r0 = gettid() openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket(0x2a, 0x3, 0x6) getpgrp(r0) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984", 0x45, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:14:52 executing program 1: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r6 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYRES32=r5, @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r6, @ANYBLOB="08001c00"], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:14:52 executing program 2: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = socket(0x0, 0x0, 0x0) getpgrp(0x0) connect$pppoe(r0, &(0x7f0000000440)={0x18, 0x0, {0x0, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6", 0x9d, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:14:53 executing program 3: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r2, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3", 0xb4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb") 03:14:53 executing program 0: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r6 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB, @ANYRES32=r5, @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r6, @ANYBLOB="08001c00"], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:14:53 executing program 2: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r6 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB, @ANYRES32=r5, @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r6, @ANYBLOB="08001c00"], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:14:53 executing program 4: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = socket(0x0, 0x0, 0x0) getpgrp(0x0) connect$pppoe(r0, &(0x7f0000000440)={0x18, 0x0, {0x0, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f9", 0x9e, 0x0, &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:14:53 executing program 5: r0 = gettid() openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket(0x2a, 0x3, 0x6) getpgrp(r0) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984", 0x45, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:14:53 executing program 1: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r6 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYRES32=r5, @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r6, @ANYBLOB="08001c00"], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:14:53 executing program 0: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r6 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB="08f7", @ANYRES32=r5, @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r6, @ANYBLOB="08001c00"], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:14:53 executing program 2: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r6 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB, @ANYRES32=r5, @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r6, @ANYBLOB="08001c00"], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:15:02 executing program 1: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r6 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYRES32=r5, @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r6, @ANYBLOB="08001c00"], 0x64}}, 0x4) 03:15:03 executing program 3: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r2, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3", 0xb4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb") 03:15:03 executing program 2: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r6 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB, @ANYRES32=r5, @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r6, @ANYBLOB="08001c00"], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:15:03 executing program 0: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r6 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB="08f7", @ANYRES32=r5, @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r6, @ANYBLOB="08001c00"], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:15:03 executing program 4: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = socket(0x0, 0x0, 0x0) getpgrp(0x0) connect$pppoe(r0, &(0x7f0000000440)={0x18, 0x0, {0x0, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f9", 0x9e, 0x0, &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:15:03 executing program 5: r0 = gettid() openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket(0x2a, 0x3, 0x6) getpgrp(r0) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984", 0x45, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:15:04 executing program 0: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r6 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB="08f7", @ANYRES32=r5, @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r6, @ANYBLOB="08001c00"], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:15:04 executing program 5: r0 = gettid() openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket(0x2a, 0x3, 0x6) getpgrp(r0) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c74579", 0x50, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:15:04 executing program 1: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r6 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYRES32=r5, @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r6, @ANYBLOB="08001c00"], 0x64}}, 0x4) 03:15:04 executing program 4: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = socket(0x0, 0x0, 0x0) getpgrp(0x0) connect$pppoe(r0, &(0x7f0000000440)={0x18, 0x0, {0x0, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f9", 0x9e, 0x0, &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:15:04 executing program 3: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r2, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3", 0xb4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c") 03:15:04 executing program 2: r0 = gettid() openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket(0x2a, 0x3, 0x6) getpgrp(r0) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984", 0x45, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:15:05 executing program 4: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = socket(0x0, 0x0, 0x0) getpgrp(0x0) connect$pppoe(r0, &(0x7f0000000440)={0x18, 0x0, {0x0, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f9", 0x9e, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:15:05 executing program 0: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r6 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB="08f703", @ANYRES32=r5, @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r6, @ANYBLOB="08001c00"], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:15:05 executing program 5: r0 = gettid() openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket(0x2a, 0x3, 0x6) getpgrp(r0) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c74579", 0x50, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:15:05 executing program 3: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r2, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3", 0xb4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c") 03:15:05 executing program 1: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r6 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYRES32=r5, @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r6, @ANYBLOB="08001c00"], 0x64}}, 0x4) 03:15:05 executing program 4: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = socket(0x0, 0x0, 0x0) getpgrp(0x0) connect$pppoe(r0, &(0x7f0000000440)={0x18, 0x0, {0x0, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f9", 0x9e, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:15:05 executing program 2: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r6 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYRES32=r5, @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r6, @ANYBLOB="08001c00"], 0x64}}, 0x4) 03:15:05 executing program 0: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r6 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB="08f703", @ANYRES32=r5, @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r6, @ANYBLOB="08001c00"], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:15:06 executing program 3: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r2, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3", 0xb4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb") 03:15:06 executing program 4: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = socket(0x0, 0x0, 0x0) getpgrp(0x0) connect$pppoe(r0, &(0x7f0000000440)={0x18, 0x0, {0x0, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f9", 0x9e, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:15:06 executing program 1: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00'}) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() 03:15:06 executing program 5: r0 = gettid() openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket(0x2a, 0x3, 0x6) getpgrp(r0) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c74579", 0x50, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:15:06 executing program 2: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r6 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB="08f703", @ANYRES32=r5, @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r6, @ANYBLOB="08001c00"], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:15:07 executing program 3: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r2, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3", 0xb4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9") 03:15:07 executing program 3: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r2, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3", 0xb4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1") 03:15:07 executing program 2: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r6 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB="08f703", @ANYRES32=r5, @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r6, @ANYBLOB="08001c00"], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:15:08 executing program 1: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00'}) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() 03:15:08 executing program 4: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = socket(0x0, 0x0, 0x0) getpgrp(0x0) connect$pppoe(r0, &(0x7f0000000440)={0x18, 0x0, {0x0, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f9", 0x9e, &(0x7f0000000200), &(0x7f0000000240), 0x0) 03:15:08 executing program 1: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00'}) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() 03:15:08 executing program 0: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r6 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB="08f703", @ANYRES32=r5, @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r6, @ANYBLOB="08001c00"], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:15:08 executing program 5: r0 = gettid() openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket(0x2a, 0x3, 0x6) getpgrp(r0) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0a", 0x56, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:15:08 executing program 4: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = socket(0x0, 0x0, 0x0) getpgrp(0x0) connect$pppoe(r0, &(0x7f0000000440)={0x18, 0x0, {0x0, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f9", 0x9e, &(0x7f0000000200), &(0x7f0000000240), 0x0) 03:15:08 executing program 1: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r6 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYRES32=r5, @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r6, @ANYBLOB="08001c00"], 0x64}}, 0x4) 03:15:08 executing program 5: r0 = gettid() openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket(0x2a, 0x3, 0x6) getpgrp(r0) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0a", 0x56, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:15:08 executing program 0: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r6 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYBLOB="08f70300", @ANYRES32=r5, @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r6, @ANYBLOB="08001c00"], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:15:09 executing program 4: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r6 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB="08f703", @ANYRES32=r5, @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r6, @ANYBLOB="08001c00"], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:15:16 executing program 3: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r2, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3", 0xb4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1") 03:15:16 executing program 5: r0 = gettid() openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket(0x2a, 0x3, 0x6) getpgrp(r0) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0a", 0x56, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:15:16 executing program 0: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r6 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYBLOB="08f70300", @ANYRES32=r5, @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r6, @ANYBLOB="08001c00"], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:15:16 executing program 1: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r5, @ANYBLOB="08001c00"], 0x64}}, 0x4) 03:15:16 executing program 4: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r6 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB="08f703", @ANYRES32=r5, @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r6, @ANYBLOB="08001c00"], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:15:16 executing program 2: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r6 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYBLOB="08f70300", @ANYRES32=r5, @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r6, @ANYBLOB="08001c00"], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:15:16 executing program 4: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r6 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB="08f703", @ANYRES32=r5, @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r6, @ANYBLOB="08001c00"], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:15:17 executing program 1: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r5, @ANYBLOB="08001c00"], 0x64}}, 0x4) 03:15:17 executing program 3: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r2, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3", 0xb4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1") 03:15:20 executing program 0: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r6 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYBLOB="08f70300", @ANYRES32=r5, @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r6, @ANYBLOB="08001c00"], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:15:20 executing program 0: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r6 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32, @ANYBLOB="08f70300", @ANYRES32=r5, @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r6, @ANYBLOB="08001c00"], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:15:20 executing program 1: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r5, @ANYBLOB="08001c00"], 0x64}}, 0x4) 03:15:21 executing program 0: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r6 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32, @ANYBLOB="08f70300", @ANYRES32=r5, @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r6, @ANYBLOB="08001c00"], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:15:21 executing program 5: r0 = gettid() openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket(0x2a, 0x3, 0x6) getpgrp(r0) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:15:21 executing program 1: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r5 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYRES32=r4, @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r5, @ANYBLOB="08001c00"], 0x64}}, 0x4) 03:15:21 executing program 3: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r2, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3", 0xb4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1") 03:15:21 executing program 4: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r6 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB="08f703", @ANYRES32=r5, @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r6, @ANYBLOB="08001c00"], 0x64}}, 0x4) 03:15:21 executing program 2: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r6 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYBLOB="08f70300", @ANYRES32=r5, @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r6, @ANYBLOB="08001c00"], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:15:21 executing program 0: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r6 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32, @ANYBLOB="08f70300", @ANYRES32=r5, @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r6, @ANYBLOB="08001c00"], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:15:22 executing program 2: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r6 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYBLOB="08f70300", @ANYRES32=r5, @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r6, @ANYBLOB="08001c00"], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:15:22 executing program 4: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00'}) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() 03:15:22 executing program 5: r0 = gettid() openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket(0x2a, 0x3, 0x6) getpgrp(r0) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:15:22 executing program 3: r0 = gettid() openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket(0x2a, 0x3, 0x6) getpgrp(r0) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:15:22 executing program 0: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r6 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYRES32=r0, @ANYBLOB="08f70300", @ANYRES32=r5, @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r6, @ANYBLOB="08001c00"], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:15:22 executing program 1: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r5 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYRES32=r4, @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r5, @ANYBLOB="08001c00"], 0x64}}, 0x4) [ 1115.162114][ T1239] ieee802154 phy0 wpan0: encryption failed: -22 [ 1115.168534][ T1239] ieee802154 phy1 wpan1: encryption failed: -22 03:15:28 executing program 2: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r5 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYRES32=r4, @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r5, @ANYBLOB="08001c00"], 0x64}}, 0x4) 03:15:28 executing program 1: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r5 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYRES32=r4, @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r5, @ANYBLOB="08001c00"], 0x64}}, 0x4) 03:15:28 executing program 4: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00'}) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() 03:15:28 executing program 3: r0 = gettid() openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket(0x2a, 0x3, 0x6) getpgrp(r0) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:15:28 executing program 5: r0 = gettid() openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket(0x2a, 0x3, 0x6) getpgrp(r0) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:15:28 executing program 0: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r6 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYRES32=r0, @ANYBLOB="08f70300", @ANYRES32=r5, @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r6, @ANYBLOB="08001c00"], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:15:28 executing program 2: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r6 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYRES32=r0, @ANYBLOB="08f70300", @ANYRES32=r5, @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r6, @ANYBLOB="08001c00"], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:15:30 executing program 3: r0 = gettid() openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket(0x2a, 0x3, 0x6) getpgrp(r0) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:15:30 executing program 1: r0 = gettid() openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r1, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r4 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r2, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYRES32=r3, @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r4, @ANYBLOB="08001c00"], 0x64}}, 0x4) 03:15:30 executing program 4: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00'}) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() 03:15:30 executing program 2: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r6 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYRES32=r0, @ANYBLOB="08f70300", @ANYRES32=r5, @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r6, @ANYBLOB="08001c00"], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:15:30 executing program 0: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r6 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYRES32=r0, @ANYBLOB="08f70300", @ANYRES32=r5, @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r6, @ANYBLOB="08001c00"], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:15:30 executing program 3: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00'}) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() 03:15:30 executing program 4: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r6 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB="08f703", @ANYRES32=r5, @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r6, @ANYBLOB="08001c00"], 0x64}}, 0x4) 03:15:35 executing program 1: r0 = gettid() openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r1, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r4 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r2, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYRES32=r3, @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r4, @ANYBLOB="08001c00"], 0x64}}, 0x4) 03:15:36 executing program 4: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r6 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB="08f703", @ANYRES32=r5, @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r6, @ANYBLOB="08001c00"], 0x64}}, 0x4) [ 1123.944620][ T1032] netdevsim netdevsim2 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1124.005026][ T1032] netdevsim netdevsim2 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1124.064176][ T1032] netdevsim netdevsim2 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1124.125708][ T1032] netdevsim netdevsim2 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1125.278841][ T1032] device hsr_slave_0 left promiscuous mode [ 1125.286510][ T1032] device hsr_slave_1 left promiscuous mode [ 1125.295107][ T1032] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1125.304446][ T1032] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1125.313428][ T1032] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1125.323011][ T1032] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1125.332679][ T1032] device bridge_slave_1 left promiscuous mode [ 1125.338837][ T1032] bridge0: port 2(bridge_slave_1) entered disabled state [ 1125.347073][ T1032] device bridge_slave_0 left promiscuous mode [ 1125.354940][ T1032] bridge0: port 1(bridge_slave_0) entered disabled state [ 1125.366010][ T1032] device veth1_macvtap left promiscuous mode [ 1125.373556][ T1032] device veth0_macvtap left promiscuous mode [ 1125.379611][ T1032] device veth1_vlan left promiscuous mode [ 1125.385815][ T1032] device veth0_vlan left promiscuous mode [ 1125.497844][ T1032] team0 (unregistering): Port device team_slave_1 removed [ 1125.509421][ T1032] team0 (unregistering): Port device team_slave_0 removed [ 1125.519509][ T1032] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1125.532646][ T1032] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1125.559184][ T1032] bond0 (unregistering): Released all slaves 03:15:40 executing program 5: r0 = gettid() openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket(0x2a, 0x3, 0x6) getpgrp(r0) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68", 0x5a, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:15:40 executing program 1: r0 = gettid() openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r1, 0x0, 0x0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r4 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r2, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYRES32=r3, @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r4, @ANYBLOB="08001c00"], 0x64}}, 0x4) 03:15:40 executing program 0: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r6 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB, @ANYRES32=r0, @ANYBLOB="08f70300", @ANYRES32=r5, @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r6, @ANYBLOB="08001c00"], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:15:40 executing program 4: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r6 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB="08f703", @ANYRES32=r5, @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r6, @ANYBLOB="08001c00"], 0x64}}, 0x4) 03:15:40 executing program 3: r0 = gettid() openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r1, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r4 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r2, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYRES32=r3, @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r4, @ANYBLOB="08001c00"], 0x64}}, 0x4) 03:15:40 executing program 1: r0 = gettid() openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r1, 0x0, 0x0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r4 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r2, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYRES32=r3, @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r4, @ANYBLOB="08001c00"], 0x64}}, 0x4) 03:16:20 executing program 2: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r6 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYRES32=r0, @ANYBLOB="08f70300", @ANYRES32=r5, @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r6, @ANYBLOB="08001c00"], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:16:20 executing program 4: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB="08f703", @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r5, @ANYBLOB="08001c00"], 0x64}}, 0x4) 03:16:20 executing program 1: r0 = gettid() openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r1, 0x0, 0x0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r4 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r2, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYRES32=r3, @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r4, @ANYBLOB="08001c00"], 0x64}}, 0x4) 03:16:20 executing program 3: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r6 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB, @ANYRES32=r0, @ANYBLOB="08f70300", @ANYRES32=r5, @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r6, @ANYBLOB="08001c00"], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:16:20 executing program 5: r0 = gettid() openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket(0x2a, 0x3, 0x6) getpgrp(r0) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68", 0x5a, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:16:20 executing program 0: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r6 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB, @ANYRES32=r0, @ANYBLOB="08f70300", @ANYRES32=r5, @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r6, @ANYBLOB="08001c00"], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:16:21 executing program 5: r0 = gettid() openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket(0x2a, 0x3, 0x6) getpgrp(r0) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68", 0x5a, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:16:21 executing program 1: r0 = gettid() openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket(0x2a, 0x3, 0x6) getpgrp(r0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r3 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r1, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYRES32=r2, @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r3, @ANYBLOB="08001c00"], 0x64}}, 0x4) 03:16:21 executing program 0: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r6 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB, @ANYRES32=r0, @ANYBLOB="08f70300", @ANYRES32=r5, @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r6, @ANYBLOB="08001c00"], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:16:21 executing program 4: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB="08f703", @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r5, @ANYBLOB="08001c00"], 0x64}}, 0x4) 03:16:21 executing program 3: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r6 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB, @ANYRES32=r0, @ANYBLOB="08f70300", @ANYRES32=r5, @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r6, @ANYBLOB="08001c00"], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:16:21 executing program 0: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r6 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c", @ANYRES32=r0, @ANYBLOB="08f70300", @ANYRES32=r5, @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r6, @ANYBLOB="08001c00"], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) [ 1175.882753][ T4722] Bluetooth: hci0: unexpected cc 0x0c03 length: 249 > 1 [ 1175.890255][ T4722] Bluetooth: hci0: unexpected cc 0x1003 length: 249 > 9 [ 1175.897782][ T4722] Bluetooth: hci0: unexpected cc 0x1001 length: 249 > 9 [ 1175.905401][ T4722] Bluetooth: hci0: unexpected cc 0x0c23 length: 249 > 4 [ 1175.913094][ T4722] Bluetooth: hci0: unexpected cc 0x0c25 length: 249 > 3 [ 1175.920266][ T4722] Bluetooth: hci0: unexpected cc 0x0c38 length: 249 > 2 [ 1175.928131][ T4721] Bluetooth: hci0: HCI_REQ-0x0c1a [ 1175.989202][ T4721] chnl_net:caif_netlink_parms(): no params data found [ 1176.015895][ T4721] bridge0: port 1(bridge_slave_0) entered blocking state [ 1176.023422][ T4721] bridge0: port 1(bridge_slave_0) entered disabled state [ 1176.031455][ T4721] device bridge_slave_0 entered promiscuous mode [ 1176.038805][ T4721] bridge0: port 2(bridge_slave_1) entered blocking state [ 1176.046163][ T4721] bridge0: port 2(bridge_slave_1) entered disabled state [ 1176.054412][ T4721] device bridge_slave_1 entered promiscuous mode [ 1176.068518][ T4721] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1176.078813][ T4721] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1176.097202][ T4721] team0: Port device team_slave_0 added [ 1176.103679][ T4721] team0: Port device team_slave_1 added [ 1176.116760][ T4721] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1176.124362][ T4721] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1176.151778][ T4721] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1176.163128][ T4721] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1176.170229][ T4721] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1176.196239][ T4721] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1176.218142][ T4721] device hsr_slave_0 entered promiscuous mode [ 1176.224855][ T4721] device hsr_slave_1 entered promiscuous mode [ 1176.231494][ T4721] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 1176.239091][ T4721] Cannot create hsr debugfs directory [ 1176.601679][ T1239] ieee802154 phy0 wpan0: encryption failed: -22 [ 1176.608053][ T1239] ieee802154 phy1 wpan1: encryption failed: -22 [ 1176.735127][ T4721] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 1176.744091][ T4721] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 1176.755911][ T4721] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 1176.765943][ T4721] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 1176.787441][ T4721] bridge0: port 2(bridge_slave_1) entered blocking state [ 1176.794590][ T4721] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1176.801933][ T4721] bridge0: port 1(bridge_slave_0) entered blocking state [ 1176.808992][ T4721] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1176.849715][ T4721] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1176.866370][T22935] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1176.877687][T22935] bridge0: port 1(bridge_slave_0) entered disabled state [ 1176.885558][T22935] bridge0: port 2(bridge_slave_1) entered disabled state [ 1176.895759][T22935] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1176.907351][ T4721] 8021q: adding VLAN 0 to HW filter on device team0 [ 1176.923419][T22935] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1176.933871][T22935] bridge0: port 1(bridge_slave_0) entered blocking state [ 1176.941086][T22935] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1176.963195][ T3723] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1176.974623][ T3723] bridge0: port 2(bridge_slave_1) entered blocking state [ 1176.981788][ T3723] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1176.990109][ T3723] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1177.018501][ T4721] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1177.035490][ T4721] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1177.047749][T22944] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1177.056268][T22944] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1177.065328][T22944] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1177.074522][T22944] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1177.083048][T22944] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1177.091523][T22944] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1177.099766][T22944] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1177.110982][T22944] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1177.211030][T22944] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1177.219586][T22944] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1177.229716][ T4721] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1177.246416][T22944] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1177.256499][T22944] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1177.274402][ T4721] device veth0_vlan entered promiscuous mode [ 1177.283746][T22935] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1177.292398][T22935] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1177.305086][ T4721] device veth1_vlan entered promiscuous mode [ 1177.312851][T22944] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1177.320625][T22944] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1177.329639][T22944] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 1177.347969][ T4721] device veth0_macvtap entered promiscuous mode [ 1177.356795][T22935] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 1177.365614][T22935] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1177.374910][T22935] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1177.385292][ T4721] device veth1_macvtap entered promiscuous mode [ 1177.394408][T22944] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 1177.402919][T22944] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1177.416725][ T4721] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1177.428036][ T4721] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1177.438651][ T4721] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1177.449370][ T4721] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1177.459608][ T4721] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1177.470196][ T4721] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1177.480189][ T4721] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1177.491250][ T4721] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1177.503231][ T4721] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1177.513864][ T4721] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1177.524824][ T4721] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1177.534327][T22935] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1177.545054][T22935] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1177.554945][ T4721] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1177.567965][ T4721] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1177.578413][ T4721] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1177.592226][ T4721] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1177.602822][ T4721] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1177.615384][ T4721] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1177.625973][ T4721] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1177.637765][ T4721] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1177.648803][ T4721] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1177.661703][ T4721] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1177.673321][ T4721] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1177.682482][T22944] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1177.694164][T22944] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1177.704739][ T4721] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1177.715496][ T4721] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1177.726139][ T4721] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1177.736842][ T4721] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1177.777631][T18699] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 1177.788373][T18699] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 1177.808271][T22944] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 1177.817774][T18699] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 1177.827361][T18699] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 1177.836902][T22944] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready 03:16:30 executing program 1: r0 = gettid() openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket(0x2a, 0x3, 0x6) getpgrp(r0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r3 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r1, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYRES32=r2, @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r3, @ANYBLOB="08001c00"], 0x64}}, 0x4) 03:16:30 executing program 5: r0 = gettid() openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket(0x2a, 0x3, 0x6) getpgrp(r0) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be", 0x5b, 0x0, &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:16:30 executing program 4: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB="08f703", @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r5, @ANYBLOB="08001c00"], 0x64}}, 0x4) 03:16:30 executing program 3: r0 = gettid() openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r1, 0x0, 0x0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r4 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r2, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYRES32=r3, @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r4, @ANYBLOB="08001c00"], 0x64}}, 0x4) 03:16:30 executing program 0: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r6 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c", @ANYRES32=r0, @ANYBLOB="08f70300", @ANYRES32=r5, @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r6, @ANYBLOB="08001c00"], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:16:30 executing program 2: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r6 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c", @ANYRES32=r0, @ANYBLOB="08f70300", @ANYRES32=r5, @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r6, @ANYBLOB="08001c00"], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) [ 1177.960875][ T4722] Bluetooth: hci0: command 0x0409 tx timeout 03:16:31 executing program 1: r0 = gettid() openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket(0x2a, 0x3, 0x6) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r3 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r1, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYRES32=r2, @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r3, @ANYBLOB="08001c00"], 0x64}}, 0x4) 03:16:31 executing program 0: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r6 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c", @ANYRES32=r0, @ANYBLOB="08f70300", @ANYRES32=r5, @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r6, @ANYBLOB="08001c00"], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:16:31 executing program 5: r0 = gettid() openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket(0x2a, 0x3, 0x6) getpgrp(r0) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be", 0x5b, 0x0, &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:16:31 executing program 4: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r5 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB="08f703", @ANYRES32=r4, @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r5, @ANYBLOB="08001c00"], 0x64}}, 0x4) 03:16:31 executing program 3: r0 = gettid() openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket(0x2a, 0x3, 0x6) getpgrp(r0) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68", 0x5a, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:16:31 executing program 2: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r6 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c", @ANYRES32=r0, @ANYBLOB="08f70300", @ANYRES32=r5, @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r6, @ANYBLOB="08001c00"], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:16:31 executing program 5: r0 = gettid() openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket(0x2a, 0x3, 0x6) getpgrp(r0) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be", 0x5b, 0x0, &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:16:31 executing program 1: r0 = gettid() openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket(0x2a, 0x3, 0x6) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r3 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r1, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYRES32=r2, @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r3, @ANYBLOB="08001c00"], 0x64}}, 0x4) 03:16:31 executing program 0: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r6 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c0006000000000000", @ANYRES32=r0, @ANYBLOB="08f70300", @ANYRES32=r5, @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r6, @ANYBLOB="08001c00"], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:16:31 executing program 4: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r5 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB="08f703", @ANYRES32=r4, @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r5, @ANYBLOB="08001c00"], 0x64}}, 0x4) 03:16:31 executing program 3: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r5 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB="08f703", @ANYRES32=r4, @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r5, @ANYBLOB="08001c00"], 0x64}}, 0x4) 03:16:31 executing program 5: r0 = gettid() openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket(0x2a, 0x3, 0x6) getpgrp(r0) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be", 0x5b, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:16:31 executing program 2: r0 = gettid() openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket(0x2a, 0x3, 0x6) getpgrp(r0) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be", 0x5b, 0x0, &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:16:31 executing program 5: r0 = gettid() openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket(0x2a, 0x3, 0x6) getpgrp(r0) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be", 0x5b, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") [ 1180.040924][ T4722] Bluetooth: hci0: command 0x041b tx timeout [ 1182.121133][ T4722] Bluetooth: hci0: command 0x040f tx timeout [ 1184.200886][ T4722] Bluetooth: hci0: command 0x0419 tx timeout 03:16:38 executing program 4: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r5 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB="08f703", @ANYRES32=r4, @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r5, @ANYBLOB="08001c00"], 0x64}}, 0x4) 03:16:38 executing program 3: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r5 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB="08f703", @ANYRES32=r4, @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r5, @ANYBLOB="08001c00"], 0x64}}, 0x4) 03:16:39 executing program 0: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r6 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c0006000000000000", @ANYRES32=r0, @ANYBLOB="08f70300", @ANYRES32=r5, @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r6, @ANYBLOB="08001c00"], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:16:42 executing program 1: r0 = gettid() openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket(0x2a, 0x3, 0x6) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r3 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r1, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYRES32=r2, @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r3, @ANYBLOB="08001c00"], 0x64}}, 0x4) 03:16:42 executing program 3: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r6 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c", @ANYRES32=r0, @ANYBLOB="08f70300", @ANYRES32=r5, @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r6, @ANYBLOB="08001c00"], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:16:42 executing program 0: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r6 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c0006000000000000", @ANYRES32=r0, @ANYBLOB="08f70300", @ANYRES32=r5, @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r6, @ANYBLOB="08001c00"], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:16:42 executing program 4: r0 = gettid() openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r1, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r4 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r2, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB="08f703", @ANYRES32=r3, @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r4, @ANYBLOB="08001c00"], 0x64}}, 0x4) 03:16:42 executing program 1: r0 = gettid() openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r3 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r1, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYRES32=r2, @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r3, @ANYBLOB="08001c00"], 0x64}}, 0x4) 03:16:43 executing program 0: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r6 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008", @ANYRES32=r0, @ANYBLOB="08f70300", @ANYRES32=r5, @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r6, @ANYBLOB="08001c00"], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:16:43 executing program 3: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r6 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c0006000000000000", @ANYRES32=r0, @ANYBLOB="08f70300", @ANYRES32=r5, @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r6, @ANYBLOB="08001c00"], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:16:43 executing program 2: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r6 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32, @ANYBLOB="08f70300", @ANYRES32=r5, @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r6, @ANYBLOB="08001c00"], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:16:44 executing program 5: r0 = gettid() openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket(0x2a, 0x3, 0x6) getpgrp(r0) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be", 0x5b, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:16:44 executing program 5: r0 = gettid() openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket(0x2a, 0x3, 0x6) getpgrp(r0) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be", 0x5b, &(0x7f0000000200), &(0x7f0000000240), 0x0) 03:16:44 executing program 2: r0 = gettid() openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket(0x2a, 0x3, 0x6) getpgrp(r0) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:16:44 executing program 5: r0 = gettid() openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket(0x2a, 0x3, 0x6) getpgrp(r0) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be", 0x5b, &(0x7f0000000200), &(0x7f0000000240), 0x0) 03:16:44 executing program 2: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r6 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB="08f703", @ANYRES32=r5, @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r6, @ANYBLOB="08001c00"], 0x64}}, 0x4) 03:16:45 executing program 5: r0 = gettid() openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket(0x2a, 0x3, 0x6) getpgrp(r0) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be", 0x5b, &(0x7f0000000200), &(0x7f0000000240), 0x0) 03:16:45 executing program 2: r0 = gettid() openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket(0x2a, 0x3, 0x6) getpgrp(r0) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0a", 0x56, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:16:52 executing program 5: r0 = gettid() openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket(0x2a, 0x3, 0x6) getpgrp(r0) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be", 0x5b, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)) 03:16:52 executing program 2: r0 = gettid() openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket(0x2a, 0x3, 0x6) getpgrp(r0) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0a", 0x56, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:16:52 executing program 4: r0 = gettid() openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r1, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r4 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r2, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB="08f703", @ANYRES32=r3, @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r4, @ANYBLOB="08001c00"], 0x64}}, 0x4) 03:16:52 executing program 1: r0 = gettid() openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r3 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r1, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYRES32=r2, @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r3, @ANYBLOB="08001c00"], 0x64}}, 0x4) 03:16:52 executing program 0: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r6 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008", @ANYRES32=r0, @ANYBLOB="08f70300", @ANYRES32=r5, @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r6, @ANYBLOB="08001c00"], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:16:52 executing program 3: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r6 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c0006000000000000", @ANYRES32=r0, @ANYBLOB="08f70300", @ANYRES32=r5, @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r6, @ANYBLOB="08001c00"], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:16:52 executing program 5: r0 = gettid() openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket(0x2a, 0x3, 0x6) getpgrp(r0) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be", 0x5b, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)) 03:16:52 executing program 2: r0 = gettid() openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r1, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r4 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r2, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB="08f703", @ANYRES32=r3, @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r4, @ANYBLOB="08001c00"], 0x64}}, 0x4) [ 1199.948401][T18711] netdevsim netdevsim1 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 03:16:52 executing program 0: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r6 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008", @ANYRES32=r0, @ANYBLOB="08f70300", @ANYRES32=r5, @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r6, @ANYBLOB="08001c00"], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:16:53 executing program 4: r0 = gettid() openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r1, 0x0, 0x0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r4 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r2, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB="08f703", @ANYRES32=r3, @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r4, @ANYBLOB="08001c00"], 0x64}}, 0x4) [ 1200.061272][T18711] netdevsim netdevsim1 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1200.177454][T18711] netdevsim netdevsim1 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1200.258080][T18711] netdevsim netdevsim1 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 03:16:53 executing program 2: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00'}) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() 03:16:53 executing program 4: r0 = gettid() openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r1, 0x0, 0x0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r4 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r2, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB="08f703", @ANYRES32=r3, @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r4, @ANYBLOB="08001c00"], 0x64}}, 0x4) 03:16:53 executing program 5: r0 = gettid() openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket(0x2a, 0x3, 0x6) getpgrp(r0) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be", 0x5b, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)) 03:16:53 executing program 0: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r6 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c", @ANYRES32=r0, @ANYBLOB="08f70300", @ANYRES32=r5, @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r6, @ANYBLOB="08001c00"], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:16:53 executing program 3: r0 = gettid() openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket(0x2a, 0x3, 0x6) getpgrp(r0) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be", 0x5b, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)) [ 1203.558631][T18711] device hsr_slave_0 left promiscuous mode [ 1203.569828][T18711] device hsr_slave_1 left promiscuous mode [ 1203.576427][T18711] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1203.586162][T18711] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1203.595614][T18711] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1203.603221][T18711] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1203.617918][T18711] device bridge_slave_1 left promiscuous mode [ 1203.630877][T18711] bridge0: port 2(bridge_slave_1) entered disabled state [ 1203.638877][T18711] device bridge_slave_0 left promiscuous mode [ 1203.654895][T18711] bridge0: port 1(bridge_slave_0) entered disabled state [ 1203.681113][T18711] device veth1_macvtap left promiscuous mode [ 1203.687238][T18711] device veth0_macvtap left promiscuous mode [ 1203.700822][T18711] device veth1_vlan left promiscuous mode [ 1203.706668][T18711] device veth0_vlan left promiscuous mode [ 1203.919495][T18711] team0 (unregistering): Port device team_slave_1 removed [ 1203.931556][T18711] team0 (unregistering): Port device team_slave_0 removed [ 1203.944570][T18711] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1203.968828][T18711] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1204.015965][T18711] bond0 (unregistering): Released all slaves [ 1238.052081][ T1239] ieee802154 phy0 wpan0: encryption failed: -22 [ 1238.058404][ T1239] ieee802154 phy1 wpan1: encryption failed: -22 03:17:42 executing program 1: r0 = gettid() openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r3 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r1, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYRES32=r2, @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r3, @ANYBLOB="08001c00"], 0x64}}, 0x4) 03:17:42 executing program 4: r0 = gettid() openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r1, 0x0, 0x0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r4 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r2, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB="08f703", @ANYRES32=r3, @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r4, @ANYBLOB="08001c00"], 0x64}}, 0x4) 03:17:42 executing program 2: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00'}) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() 03:17:42 executing program 0: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r6 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c", @ANYRES32=r0, @ANYBLOB="08f70300", @ANYRES32=r5, @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r6, @ANYBLOB="08001c00"], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:17:42 executing program 3: r0 = gettid() openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket(0x2a, 0x3, 0x6) getpgrp(r0) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be", 0x5b, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)) 03:17:42 executing program 5: r0 = gettid() openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket(0x2a, 0x3, 0x6) getpgrp(r0) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be", 0x5b, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497") 03:17:43 executing program 4: r0 = gettid() openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket(0x2a, 0x3, 0x6) getpgrp(r0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r3 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r1, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB="08f703", @ANYRES32=r2, @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r3, @ANYBLOB="08001c00"], 0x64}}, 0x4) 03:17:43 executing program 0: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r6 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c", @ANYRES32=r0, @ANYBLOB="08f70300", @ANYRES32=r5, @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r6, @ANYBLOB="08001c00"], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:17:43 executing program 5: r0 = gettid() openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket(0x2a, 0x3, 0x6) getpgrp(r0) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be", 0x5b, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497") 03:17:43 executing program 3: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r6 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c", @ANYRES32=r0, @ANYBLOB="08f70300", @ANYRES32=r5, @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r6, @ANYBLOB="08001c00"], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:17:43 executing program 2: r0 = gettid() openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r1, 0x0, 0x0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r4 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r2, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB="08f703", @ANYRES32=r3, @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r4, @ANYBLOB="08001c00"], 0x64}}, 0x4) 03:17:43 executing program 5: r0 = gettid() openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket(0x2a, 0x3, 0x6) getpgrp(r0) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be", 0x5b, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497") [ 1254.440866][ T4722] Bluetooth: hci1: Opcode 0x c03 failed: -110 [ 1258.692452][ T3633] Bluetooth: hci1: unexpected cc 0x0c03 length: 249 > 1 [ 1258.699680][ T3633] Bluetooth: hci1: unexpected cc 0x1003 length: 249 > 9 [ 1258.708894][ T3633] Bluetooth: hci1: unexpected cc 0x1001 length: 249 > 9 [ 1258.716388][ T3633] Bluetooth: hci1: unexpected cc 0x0c23 length: 249 > 4 [ 1258.742571][ T3633] Bluetooth: hci1: unexpected cc 0x0c25 length: 249 > 3 [ 1258.749778][ T3633] Bluetooth: hci1: unexpected cc 0x0c38 length: 249 > 2 [ 1258.758390][ T5996] Bluetooth: hci1: HCI_REQ-0x0c1a [ 1258.835621][ T5996] chnl_net:caif_netlink_parms(): no params data found [ 1258.863447][ T5996] bridge0: port 1(bridge_slave_0) entered blocking state [ 1258.870540][ T5996] bridge0: port 1(bridge_slave_0) entered disabled state [ 1258.878219][ T5996] device bridge_slave_0 entered promiscuous mode [ 1258.885887][ T5996] bridge0: port 2(bridge_slave_1) entered blocking state [ 1258.893525][ T5996] bridge0: port 2(bridge_slave_1) entered disabled state [ 1258.901192][ T5996] device bridge_slave_1 entered promiscuous mode [ 1258.916890][ T5996] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1258.927412][ T5996] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1258.944126][ T5996] team0: Port device team_slave_0 added [ 1258.950515][ T5996] team0: Port device team_slave_1 added [ 1258.963506][ T5996] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1258.970456][ T5996] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1258.997144][ T5996] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1259.009288][ T5996] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1259.016406][ T5996] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1259.042510][ T5996] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1259.065851][ T5996] device hsr_slave_0 entered promiscuous mode [ 1259.072292][ T5996] device hsr_slave_1 entered promiscuous mode [ 1259.078579][ T5996] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 1259.086347][ T5996] Cannot create hsr debugfs directory [ 1259.706210][ T5996] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 1259.717725][ T5996] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 1259.726867][ T5996] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 1259.737462][ T5996] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 1259.756815][ T5996] bridge0: port 2(bridge_slave_1) entered blocking state [ 1259.763934][ T5996] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1259.771443][ T5996] bridge0: port 1(bridge_slave_0) entered blocking state [ 1259.778515][ T5996] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1259.825442][ T5996] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1259.837573][T22940] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1259.849076][T22940] bridge0: port 1(bridge_slave_0) entered disabled state [ 1259.857256][T22940] bridge0: port 2(bridge_slave_1) entered disabled state [ 1259.867555][T22940] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1259.879395][ T5996] 8021q: adding VLAN 0 to HW filter on device team0 [ 1259.888854][T22940] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1259.898003][T22940] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1259.906670][T22940] bridge0: port 1(bridge_slave_0) entered blocking state [ 1259.913762][T22940] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1259.931418][T22940] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1259.940146][T22940] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1259.948863][T22940] bridge0: port 2(bridge_slave_1) entered blocking state [ 1259.955964][T22940] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1259.965774][T22940] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1259.974587][T22940] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1259.985572][T22940] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1259.994441][T22940] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1260.010092][ T5996] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1260.025431][ T5996] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1260.037829][T22930] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1260.048345][T22930] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1260.057598][T22930] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1260.068282][T22930] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1260.076775][T22930] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1260.085612][T22930] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1260.095305][T22930] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1260.106578][T22925] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1260.252990][T22925] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1260.260415][T22925] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1260.274262][ T5996] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1260.303551][T22925] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1260.316467][T22925] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1260.333996][ T4136] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1260.342513][ T4136] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1260.352228][ T5996] device veth0_vlan entered promiscuous mode [ 1260.359461][ T3676] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1260.372958][ T3676] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1260.382879][ T5996] device veth1_vlan entered promiscuous mode [ 1260.401075][ T3676] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 1260.418321][ T3676] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 1260.427761][ T3676] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1260.438538][ T3676] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1260.449222][ T5996] device veth0_macvtap entered promiscuous mode [ 1260.459390][ T5996] device veth1_macvtap entered promiscuous mode [ 1260.474386][ T5996] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1260.488177][ T5996] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1260.499063][ T5996] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1260.510384][ T5996] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1260.520298][ T5996] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1260.531434][ T5996] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1260.541328][ T5996] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1260.553349][ T5996] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1260.563922][ T5996] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1260.577772][ T5996] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1260.591622][ T5996] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1260.599581][ T4136] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 1260.608064][ T4136] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1260.616546][ T4136] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1260.624989][ T4136] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1260.634869][ T5996] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1260.645566][ T5996] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1260.656379][ T5996] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1260.666840][ T5996] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1260.676697][ T5996] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1260.688857][ T5996] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1260.699507][ T5996] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1260.709972][ T5996] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1260.719843][ T5996] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1260.730354][ T5996] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1260.741591][ T5996] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1260.750194][T22930] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1260.759161][T22930] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1260.768897][ T5996] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1260.778470][ T5996] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1260.787638][ T5996] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1260.796582][ T5996] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1260.840935][ T3633] Bluetooth: hci1: command 0x0409 tx timeout [ 1260.845720][ T3536] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 1260.866457][ T3536] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 1260.876737][ T7999] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 1260.886343][ T7999] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 1260.887670][T22940] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 1260.903062][T22940] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready 03:17:54 executing program 1: r0 = gettid() openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r3 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r1, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYRES32=r2, @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r3, @ANYBLOB="08001c00"], 0x64}}, 0x4) 03:17:54 executing program 0: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r6 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB="08f70300", @ANYRES32=r5, @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r6, @ANYBLOB="08001c00"], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:17:54 executing program 4: r0 = gettid() openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket(0x2a, 0x3, 0x6) getpgrp(r0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r3 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r1, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB="08f703", @ANYRES32=r2, @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r3, @ANYBLOB="08001c00"], 0x64}}, 0x4) 03:17:54 executing program 5: r0 = gettid() openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket(0x2a, 0x3, 0x6) getpgrp(r0) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be", 0x5b, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b") 03:17:54 executing program 2: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r6 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c", @ANYRES32=r0, @ANYBLOB="08f70300", @ANYRES32=r5, @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r6, @ANYBLOB="08001c00"], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:17:54 executing program 3: r0 = gettid() openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket(0x2a, 0x3, 0x6) getpgrp(r0) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be", 0x5b, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)) 03:17:54 executing program 0: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r6 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB="08f70300", @ANYRES32=r5, @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r6, @ANYBLOB="08001c00"], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:17:54 executing program 5: r0 = gettid() openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket(0x2a, 0x3, 0x6) getpgrp(r0) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be", 0x5b, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b") 03:17:54 executing program 4: r0 = gettid() openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket(0x2a, 0x3, 0x6) getpgrp(r0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r3 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r1, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB="08f703", @ANYRES32=r2, @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r3, @ANYBLOB="08001c00"], 0x64}}, 0x4) 03:17:54 executing program 2: r0 = gettid() openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket(0x2a, 0x3, 0x6) getpgrp(r0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r3 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r1, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB="08f703", @ANYRES32=r2, @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r3, @ANYBLOB="08001c00"], 0x64}}, 0x4) 03:17:54 executing program 3: r0 = gettid() openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket(0x2a, 0x3, 0x6) getpgrp(r0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r3 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r1, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB="08f703", @ANYRES32=r2, @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r3, @ANYBLOB="08001c00"], 0x64}}, 0x4) 03:17:54 executing program 1: r0 = gettid() openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r3 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r1, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYRES32=r2, @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r3, @ANYBLOB="08001c00"], 0x64}}, 0x4) 03:17:54 executing program 5: r0 = gettid() openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket(0x2a, 0x3, 0x6) getpgrp(r0) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be", 0x5b, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d5") 03:17:55 executing program 4: r0 = gettid() openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = socket(0x2a, 0x3, 0x6) connect$pppoe(r1, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r4 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r2, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB="08f703", @ANYRES32=r3, @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r4, @ANYBLOB="08001c00"], 0x64}}, 0x4) 03:17:55 executing program 0: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r6 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB="08f70300", @ANYRES32=r5, @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r6, @ANYBLOB="08001c00"], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:17:55 executing program 2: r0 = gettid() openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r3 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r1, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYRES32=r2, @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r3, @ANYBLOB="08001c00"], 0x64}}, 0x4) 03:17:55 executing program 1: r0 = gettid() openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r3 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r1, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYRES32=r2, @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r3, @ANYBLOB="08001c00"], 0x64}}, 0x4) 03:17:55 executing program 3: r0 = gettid() openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r3 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r1, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYRES32=r2, @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r3, @ANYBLOB="08001c00"], 0x64}}, 0x4) 03:17:55 executing program 4: r0 = gettid() openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = socket(0x2a, 0x3, 0x6) connect$pppoe(r1, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r4 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r2, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB="08f703", @ANYRES32=r3, @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r4, @ANYBLOB="08001c00"], 0x64}}, 0x4) 03:17:55 executing program 5: r0 = gettid() openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket(0x2a, 0x3, 0x6) getpgrp(r0) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be", 0x5b, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d5") 03:17:55 executing program 0: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r6 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB="08f70300", @ANYRES32=r5, @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r6, @ANYBLOB="08001c00"], 0x64}}, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) [ 1262.921089][ T3633] Bluetooth: hci1: command 0x041b tx timeout 03:17:56 executing program 2: r0 = gettid() openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket(0x2a, 0x3, 0x6) getpgrp(r0) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be", 0x5b, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d5")