93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3", 0xb4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:12:09 executing program 4: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r2, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3eb8d", 0xb6, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b") 03:12:09 executing program 0: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r6 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa46444") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB="08f70300", @ANYRES32=r5, @ANYBLOB="08001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB="0c000600000000000000000008001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r6, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:12:10 executing program 3: r0 = gettid() openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r1, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3", 0xb4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:12:10 executing program 3: r0 = gettid() write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r1, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3", 0xb4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:12:14 executing program 1: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r2, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3eb8d", 0xb6, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b") 03:12:14 executing program 0: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r6 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa46444") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB="08f70300", @ANYRES32=r5, @ANYBLOB="08001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB="0c000600000000000000000008001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r6, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:12:14 executing program 3: r0 = gettid() write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r1, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3", 0xb4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:12:14 executing program 4: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r2, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3eb8d", 0xb6, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b") 03:12:14 executing program 0: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r6 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa46444") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB="08f70300", @ANYRES32=r5, @ANYBLOB="08001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB="0c000600000000000000000008001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r6, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:12:14 executing program 2: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff, 0x1}) r2 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3eb", 0xb5, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYBLOB='u\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB="08f70300", @ANYRES32, @ANYBLOB="08001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB="0c000600000000000000000008001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r2, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:12:15 executing program 5: r0 = gettid() openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r1, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3", 0xb4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:12:15 executing program 1: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r2, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3", 0xb4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:12:15 executing program 3: r0 = gettid() write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r1, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3", 0xb4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:12:15 executing program 4: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r2, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3eb8d", 0xb6, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019") 03:12:15 executing program 2: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff, 0x1}) r2 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3eb", 0xb5, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000080), 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYBLOB='u\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB="08f70300", @ANYRES32, @ANYBLOB="08001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB="0c000600000000000000000008001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r2, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:12:15 executing program 0: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r6 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB="08f70300", @ANYRES32=r5, @ANYBLOB="08001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB="0c000600000000000000000008001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r6, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:12:15 executing program 4: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r2, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3eb8d", 0xb6, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019") 03:12:15 executing program 5: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff, 0x1}) r2 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3eb", 0xb5, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYBLOB='u\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB="08f70300", @ANYRES32, @ANYBLOB="08001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB="0c000600000000000000000008001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r2, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:12:15 executing program 2: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff, 0x1}) r2 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3eb", 0xb5, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000080), 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYBLOB='u\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB="08f70300", @ANYRES32, @ANYBLOB="08001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB="0c000600000000000000000008001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r2, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:12:15 executing program 1: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r2, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3eb8d", 0xb6, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b") 03:12:15 executing program 3: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = socket(0x2a, 0x3, 0x6) getpgrp(0x0) connect$pppoe(r1, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3", 0xb4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:12:15 executing program 0: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r6 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB="08f70300", @ANYRES32=r5, @ANYBLOB="08001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB="0c000600000000000000000008001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r6, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:12:16 executing program 3: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = socket(0x2a, 0x3, 0x6) getpgrp(0x0) connect$pppoe(r1, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3", 0xb4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:12:16 executing program 4: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r2, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3eb8d", 0xb6, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019") 03:12:16 executing program 2: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff, 0x1}) r2 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3eb", 0xb5, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000080), 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYBLOB='u\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB="08f70300", @ANYRES32, @ANYBLOB="08001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB="0c000600000000000000000008001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r2, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:12:16 executing program 5: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r6 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB="08f70300", @ANYRES32=r5, @ANYBLOB="08001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB="0c000600000000000000000008001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r6, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:12:16 executing program 1: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r6 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB="08f70300", @ANYRES32=r5, @ANYBLOB="08001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB="0c000600000000000000000008001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r6, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:12:16 executing program 0: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r6 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB="08f70300", @ANYRES32=r5, @ANYBLOB="08001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB="0c000600000000000000000008001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r6, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:12:17 executing program 2: gettid() r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff, 0x1}) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3eb", 0xb5, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, 0x0}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:12:20 executing program 2: gettid() r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff, 0x1}) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3eb", 0xb5, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, 0x0}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:12:20 executing program 4: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r2, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3eb8d", 0xb6, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa46444") 03:12:20 executing program 1: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r6 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB="08f70300", @ANYRES32=r5, @ANYBLOB="08001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB="0c000600000000000000000008001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r6, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:12:21 executing program 2: gettid() r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff, 0x1}) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3eb", 0xb5, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, 0x0}, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:12:21 executing program 3: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = socket(0x2a, 0x3, 0x6) getpgrp(0x0) connect$pppoe(r1, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3", 0xb4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:12:21 executing program 4: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r2, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3eb8d", 0xb6, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa46444") 03:12:21 executing program 1: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r6 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB="08f70300", @ANYRES32=r5, @ANYBLOB="08001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB="0c000600000000000000000008001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r6, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:12:21 executing program 3: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, 0x0, 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r2, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3", 0xb4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:12:21 executing program 5: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r6 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB="08f70300", @ANYRES32=r5, @ANYBLOB="08001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB="0c000600000000000000000008001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r6, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:12:21 executing program 0: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r6 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB="08f70300", @ANYRES32=r5, @ANYBLOB="08001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB="0c000600000000000000000008001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r6, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:12:21 executing program 2: gettid() r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff, 0x1}) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3eb", 0xb5, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, 0x0}, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) 03:12:21 executing program 4: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r2, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3eb8d", 0xb6, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa46444") 03:12:21 executing program 5: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r6 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB="08f70300", @ANYRES32=r5, @ANYBLOB="08001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB="0c000600000000000000000008001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r6, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:12:21 executing program 1: gettid() r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff, 0x1}) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3eb", 0xb5, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(0xffffffffffffffff, 0x0, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:12:21 executing program 0: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r6 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB="08f70300", @ANYRES32=r5, @ANYBLOB="08001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB="0c000600000000000000000008001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r6, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:12:21 executing program 3: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, 0x0, 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r2, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3", 0xb4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:12:22 executing program 2: gettid() r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff, 0x1}) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3eb", 0xb5, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, 0x0}, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) 03:12:22 executing program 5: gettid() r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff, 0x1}) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3eb", 0xb5, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(0xffffffffffffffff, 0x0, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:12:22 executing program 1: gettid() r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff, 0x1}) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3eb", 0xb5, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(0xffffffffffffffff, 0x0, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:12:22 executing program 2: gettid() r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff, 0x1}) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3eb", 0xb5, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, 0x0}, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) 03:12:23 executing program 2: gettid() r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff, 0x1}) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3eb", 0xb5, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, 0x0}, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) 03:12:23 executing program 1: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r2, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3eb8d", 0xb6, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)) [ 930.851177][ T1239] ieee802154 phy0 wpan0: encryption failed: -22 [ 930.857518][ T1239] ieee802154 phy1 wpan1: encryption failed: -22 03:12:24 executing program 2: gettid() r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff, 0x1}) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3eb", 0xb5, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, 0x0}, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) 03:12:25 executing program 1: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r2, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3eb8d", 0xb6, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)) 03:12:25 executing program 4: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r2, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3eb8d", 0xb6, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1") 03:12:25 executing program 2: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r2, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3eb8d", 0xb6, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa46444") 03:12:25 executing program 0: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r6 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB="08f70300", @ANYRES32=r5, @ANYBLOB="08001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB="0c000600000000000000000008001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r6, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:12:25 executing program 4: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r2, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3eb8d", 0xb6, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1") 03:12:25 executing program 3: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, 0x0, 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r2, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3", 0xb4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:12:26 executing program 5: gettid() r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff, 0x1}) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3eb", 0xb5, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(0xffffffffffffffff, 0x0, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:12:26 executing program 0: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r6 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB="08f70300", @ANYRES32=r5, @ANYBLOB="08001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB="0c000600000000000000000008001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r6, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:12:26 executing program 3: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r2, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3", 0xb4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:12:26 executing program 2: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, 0x0, 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r2, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3", 0xb4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:12:26 executing program 5: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r2, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3eb8d", 0xb6, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa46444") 03:12:26 executing program 3: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r2, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3", 0xb4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:12:29 executing program 1: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r2, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3eb8d", 0xb6, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1") 03:12:29 executing program 5: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) getpgrp(r0) connect$pppoe(0xffffffffffffffff, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3", 0xb4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:12:29 executing program 3: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r2, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3", 0xb4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:12:29 executing program 4: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r2, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3eb8d", 0xb6, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1") 03:12:29 executing program 0: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r6 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB="08f70300", @ANYRES32=r5, @ANYBLOB="08001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB="0c000600000000000000000008001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r6, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:12:30 executing program 3: r0 = gettid() openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r1, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3", 0xb4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:12:30 executing program 2: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, 0x0, 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r2, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3", 0xb4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:12:30 executing program 4: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r2, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3eb8d", 0xb6, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb") 03:12:30 executing program 0: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r6 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB="08f70300", @ANYRES32=r5, @ANYBLOB="08001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB="0c000600000000000000000008001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r6, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:12:30 executing program 5: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r6 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB="08f70300", @ANYRES32=r5, @ANYBLOB="08001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB="0c000600000000000000000008001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r6, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:12:30 executing program 1: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r2, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3eb8d", 0xb6, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1") 03:12:30 executing program 2: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, 0x0, 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r2, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3", 0xb4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:12:30 executing program 3: r0 = gettid() openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r1, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3", 0xb4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:12:31 executing program 4: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r2, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3eb8d", 0xb6, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb") 03:12:31 executing program 1: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r2, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3eb8d", 0xb6, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb") 03:12:31 executing program 5: r0 = gettid() openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r1, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3", 0xb4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:12:31 executing program 2: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r2, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3", 0xb4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:12:32 executing program 1: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) getpgrp(r0) connect$pppoe(0xffffffffffffffff, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3", 0xb4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:12:32 executing program 2: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r2, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3", 0xb4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:12:34 executing program 3: r0 = gettid() openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r1, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3", 0xb4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:12:34 executing program 0: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r6 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB="08f70300", @ANYRES32=r5, @ANYBLOB="08001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB="0c000600000000000000000008001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r6, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:12:34 executing program 4: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r2, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3eb8d", 0xb6, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb") 03:12:34 executing program 3: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r2, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3", 0xb4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:12:34 executing program 4: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r2, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3eb8d", 0xb6, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c") 03:12:34 executing program 0: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r6 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB="08f70300", @ANYRES32=r5, @ANYBLOB="08001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB="0c000600000000000000000008001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r6, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:12:34 executing program 5: r0 = gettid() openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r1, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3", 0xb4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:12:35 executing program 0: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r6 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB="08f70300", @ANYRES32=r5, @ANYBLOB="08001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB="0c000600000000000000000008001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r6, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:12:35 executing program 5: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r6 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB="08f70300", @ANYRES32=r5, @ANYBLOB="08001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB="0c000600000000000000000008001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r6, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:12:35 executing program 3: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r2, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3", 0xb4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:12:36 executing program 1: openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) connect$pppoe(0xffffffffffffffff, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3eb8d", 0xb6, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") getpid() 03:12:36 executing program 2: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r2, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3", 0xb4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:12:36 executing program 5: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = socket(0x0, 0x3, 0x6) getpgrp(r0) connect$pppoe(r2, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3eb8d", 0xb6, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:12:36 executing program 4: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r2, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3eb8d", 0xb6, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c") 03:12:36 executing program 0: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r6 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9a") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB="08f70300", @ANYRES32=r5, @ANYBLOB="08001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB="0c000600000000000000000008001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r6, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:12:36 executing program 1: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r6 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3eb8d", 0xb6, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB="08f70300", @ANYRES32=r5, @ANYBLOB="08001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB="0c000600000000000000000008001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r6, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:12:36 executing program 2: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff, 0x1}) r2 = syz_clone(0xd0209500, 0x0, 0x0, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYBLOB='u\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB="08f70300", @ANYRES32, @ANYBLOB="08001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB="0c000600000000000000000008001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r2, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:12:37 executing program 4: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r2, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3eb8d", 0xb6, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c") 03:12:37 executing program 1: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) getpgrp(0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, 0x0) r0 = syz_clone(0x0, &(0x7f0000000100), 0x0, &(0x7f0000000200), &(0x7f0000000240), 0x0) getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYBLOB='u\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32, @ANYBLOB="08f70300", @ANYRES32, @ANYBLOB="08001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB="0c000600000000000000000008001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r0, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB], 0x64}}, 0x4) 03:12:37 executing program 2: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff, 0x1}) r2 = syz_clone(0x0, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3eb8d", 0xb6, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYBLOB='u\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB="08f70300", @ANYRES32, @ANYBLOB="08001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB="0c000600000000000000000008001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r2, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:12:37 executing program 1: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r2, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, 0x0) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r5 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3eb8d", 0xb6, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r3, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB="08f70300", @ANYRES32=r4, @ANYBLOB="08001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB="0c000600000000000000000008001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r5, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:12:39 executing program 3: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r2, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3", 0xb4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:12:39 executing program 2: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r4 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r4, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, r3, 0x1}) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00'}) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3eb8d", 0xb6, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:12:39 executing program 4: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000040)) r2 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3eb8d", 0xb6, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYBLOB='u\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB="08f70300", @ANYRES32, @ANYBLOB="08001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB="0c000600000000000000000008001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r2, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:12:39 executing program 1: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r4 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r4, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, r3, 0x1}) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00'}) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3eb8d", 0xb6, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") getpid() 03:12:40 executing program 5: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = socket(0x0, 0x3, 0x6) getpgrp(r0) connect$pppoe(r2, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3eb8d", 0xb6, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:12:40 executing program 3: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r2, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3", 0xb4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:12:40 executing program 4: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff, 0x1}) r2 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3eb8d", 0xb6, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYBLOB='u\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB="08f70300", @ANYRES32, @ANYBLOB="08001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB="0c000600000000000000000008001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r2, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:12:40 executing program 2: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) getpgrp(0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, 0x0) r0 = syz_clone(0x0, &(0x7f0000000100), 0x0, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYBLOB='u\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32, @ANYBLOB="08f70300", @ANYRES32, @ANYBLOB="08001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB="0c000600000000000000000008001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r0, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB], 0x64}}, 0x4) 03:12:40 executing program 0: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r6 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9a") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB="08f70300", @ANYRES32=r5, @ANYBLOB="08001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB="0c000600000000000000000008001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r6, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:12:40 executing program 2: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r4 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r4, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, r3, 0x1}) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r7 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3eb8d", 0xb6, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r5, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB="08f70300", @ANYRES32=r6, @ANYBLOB="08001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB="0c000600000000000000000008001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r7, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB], 0x64}}, 0x4) 03:12:40 executing program 0: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r6 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9a") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB="08f70300", @ANYRES32=r5, @ANYBLOB="08001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB="0c000600000000000000000008001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r6, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:12:40 executing program 1: r0 = gettid() openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r1, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3eb8d", 0xb6, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:12:40 executing program 5: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) getpgrp(0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, 0x0) r0 = syz_clone(0x0, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3eb8d", 0xb6, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYBLOB='u\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32, @ANYBLOB="08f70300", @ANYRES32, @ANYBLOB="08001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB="0c000600000000000000000008001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r0, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB], 0x64}}, 0x4) 03:12:40 executing program 3: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r2, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3", 0xb4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:12:40 executing program 5: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r2, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3eb8d", 0xb6, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:12:41 executing program 4: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r4 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r4, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, r3, 0x1}) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r7 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3eb8d", 0xb6, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r5, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB="08f70300", @ANYRES32=r6, @ANYBLOB="08001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB="0c000600000000000000000008001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r7, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:12:41 executing program 0: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r5 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB="08f70300", @ANYRES32=r4, @ANYBLOB="08001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB="0c000600000000000000000008001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r5, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:12:41 executing program 2: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r6 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9a") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB="08f70300", @ANYRES32=r5, @ANYBLOB="08001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB="0c000600000000000000000008001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r6, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:12:41 executing program 1: r0 = gettid() openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r1, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3eb8d", 0xb6, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:12:42 executing program 5: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) r2 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3eb8d", 0xb6, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYBLOB='u\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB="08f70300", @ANYRES32, @ANYBLOB="08001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB="0c000600000000000000000008001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r2, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:12:42 executing program 4: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r2, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3eb8d", 0xb6, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:12:42 executing program 0: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r5 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB="08f70300", @ANYRES32=r4, @ANYBLOB="08001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB="0c000600000000000000000008001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r5, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:12:42 executing program 2: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r5 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB="08f70300", @ANYRES32=r4, @ANYBLOB="08001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB="0c000600000000000000000008001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r5, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:12:43 executing program 4: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) r2 = openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r3 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3eb8d", 0xb6, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYBLOB='u\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB="08f70300", @ANYRES32, @ANYBLOB="08001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB="0c000600000000000000000008001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r3, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:12:43 executing program 5: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) r2 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3eb8d", 0xb6, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYBLOB='u\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB="08f70300", @ANYRES32, @ANYBLOB="08001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB="0c000600000000000000000008001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r2, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:12:46 executing program 3: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r2, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3", 0xb4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:12:46 executing program 0: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r5 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB="08f70300", @ANYRES32=r4, @ANYBLOB="08001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB="0c000600000000000000000008001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r5, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:12:46 executing program 5: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) r2 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3eb8d", 0xb6, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYBLOB='u\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB="08f70300", @ANYRES32, @ANYBLOB="08001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB="0c000600000000000000000008001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r2, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:12:46 executing program 4: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) getpgrp(0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r1 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3eb8d", 0xb6, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYBLOB='u\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32, @ANYBLOB="08f70300", @ANYRES32=r0, @ANYBLOB="08001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB="0c000600000000000000000008001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r1, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB], 0x64}}, 0x4) 03:12:46 executing program 4: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r2, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3", 0xb4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:12:47 executing program 1: r0 = gettid() openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r1, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3eb8d", 0xb6, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:12:47 executing program 3: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = socket(0x0, 0x3, 0x6) getpgrp(r0) connect$pppoe(r2, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3", 0xb4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:12:47 executing program 0: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00'}) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, 0x0, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:12:47 executing program 5: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, 0x0, 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r2, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3eb8d", 0xb6, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:12:47 executing program 2: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r5 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB="08f70300", @ANYRES32=r4, @ANYBLOB="08001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB="0c000600000000000000000008001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r5, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:12:47 executing program 0: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00'}) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, 0x0, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:12:47 executing program 3: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = socket(0x0, 0x3, 0x6) getpgrp(r0) connect$pppoe(r2, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3", 0xb4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:12:47 executing program 1: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = socket(0x0, 0x3, 0x6) getpgrp(r0) connect$pppoe(r2, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3", 0xb4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:12:47 executing program 2: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00'}) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, 0x0, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:12:48 executing program 0: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00'}) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, 0x0, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:12:48 executing program 3: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = socket(0x0, 0x3, 0x6) getpgrp(r0) connect$pppoe(r2, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3", 0xb4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:12:49 executing program 5: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, 0x0, 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r2, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3eb8d", 0xb6, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:12:49 executing program 2: r0 = gettid() openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) getpgrp(r0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r2 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3eb8d", 0xb6, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYBLOB='u\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB="08f70300", @ANYRES32=r1, @ANYBLOB="08001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB="0c000600000000000000000008001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r2, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB], 0x64}}, 0x4) 03:12:49 executing program 1: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket(0x2a, 0x3, 0x6) getpgrp(r0) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3eb8d", 0xb6, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") getpid() 03:12:49 executing program 0: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r6 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB="08f70300", @ANYRES32=r5, @ANYBLOB="08001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB="0c000600000000000000000008001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r6, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:12:49 executing program 4: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = socket(0x0, 0x3, 0x6) getpgrp(r0) connect$pppoe(r2, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3", 0xb4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:12:49 executing program 3: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = socket(0x2a, 0x0, 0x6) getpgrp(r0) connect$pppoe(r2, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3", 0xb4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:12:50 executing program 3: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = socket(0x2a, 0x0, 0x6) getpgrp(r0) connect$pppoe(r2, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3", 0xb4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:12:50 executing program 4: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = socket(0x0, 0x3, 0x6) getpgrp(r0) connect$pppoe(r2, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3", 0xb4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:12:52 executing program 1: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket(0x2a, 0x3, 0x6) getpgrp(r0) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3eb8d", 0xb6, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") getpid() 03:12:53 executing program 2: r0 = gettid() openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) getpgrp(r0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r2 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3eb8d", 0xb6, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYBLOB='u\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB="08f70300", @ANYRES32=r1, @ANYBLOB="08001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB="0c000600000000000000000008001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r2, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB], 0x64}}, 0x4) 03:12:53 executing program 1: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r3 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3eb8d", 0xb6, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYBLOB='u\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB="08f70300", @ANYRES32, @ANYBLOB="08001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB="0c000600000000000000000008001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r3, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:12:53 executing program 5: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, 0x0, 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r2, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3eb8d", 0xb6, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:12:53 executing program 2: r0 = gettid() write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r1, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3eb8d", 0xb6, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:12:53 executing program 5: r0 = gettid() openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) getpgrp(r0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r2 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3eb8d", 0xb6, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYBLOB='u\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB="08f70300", @ANYRES32=r1, @ANYBLOB="08001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB="0c000600000000000000000008001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r2, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB], 0x64}}, 0x4) 03:12:53 executing program 4: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = socket(0x0, 0x3, 0x6) getpgrp(r0) connect$pppoe(r2, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3", 0xb4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:12:53 executing program 0: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r6 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB="08f70300", @ANYRES32=r5, @ANYBLOB="08001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB="0c000600000000000000000008001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r6, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:12:53 executing program 1: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) connect$pppoe(0xffffffffffffffff, 0x0, 0x0) syz_clone(0xd0209500, 0x0, 0x0, 0x0, &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:12:54 executing program 4: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket(0x0, 0x3, 0x6) getpgrp(r0) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3", 0xb4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:12:54 executing program 3: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = socket(0x2a, 0x0, 0x6) getpgrp(r0) connect$pppoe(r2, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3", 0xb4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:12:54 executing program 2: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, 0x0, 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r3 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3eb8d", 0xb6, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYBLOB='u\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB="08f70300", @ANYRES32, @ANYBLOB="08001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB="0c000600000000000000000008001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r3, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:12:54 executing program 0: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r6 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB="08f70300", @ANYRES32=r5, @ANYBLOB="08001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB="0c000600000000000000000008001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r6, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:12:54 executing program 5: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) getpgrp(r0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r3 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3eb8d", 0xb6, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYBLOB='u\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB="08f70300", @ANYRES32=r2, @ANYBLOB="08001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB="0c000600000000000000000008001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r3, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB], 0x64}}, 0x4) 03:12:54 executing program 1: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = socket(0x2a, 0x0, 0x6) getpgrp(r0) connect$pppoe(r2, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3", 0xb4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:12:54 executing program 3: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = socket(0x2a, 0x3, 0x0) getpgrp(r0) connect$pppoe(r2, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3", 0xb4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:12:54 executing program 4: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket(0x0, 0x3, 0x6) getpgrp(r0) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3", 0xb4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:12:55 executing program 0: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r6 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080), 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB="08f70300", @ANYRES32=r5, @ANYBLOB="08001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB="0c000600000000000000000008001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r6, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:12:55 executing program 2: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r4 = socket(0x2a, 0x3, 0x0) getpgrp(r0) connect$pppoe(r4, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) write$RDMA_USER_CM_CMD_CREATE_ID(r2, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, r3, 0x1}) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r7 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3eb8d", 0xb6, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r5, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB="08f70300", @ANYRES32=r6, @ANYBLOB="08001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB="0c000600000000000000000008001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r7, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:12:55 executing program 5: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) connect$pppoe(0xffffffffffffffff, 0x0, 0x0) syz_clone(0xd0209500, 0x0, 0x0, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:12:55 executing program 3: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = socket(0x2a, 0x3, 0x0) getpgrp(r0) connect$pppoe(r2, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3", 0xb4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:12:55 executing program 4: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket(0x0, 0x3, 0x6) getpgrp(r0) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3", 0xb4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:12:55 executing program 0: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r6 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080), 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB="08f70300", @ANYRES32=r5, @ANYBLOB="08001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB="0c000600000000000000000008001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r6, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:12:55 executing program 1: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, 0x0, 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r3 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3eb8d", 0xb6, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYBLOB='u\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB="08f70300", @ANYRES32, @ANYBLOB="08001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB="0c000600000000000000000008001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r3, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:12:55 executing program 3: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = socket(0x2a, 0x3, 0x0) getpgrp(r0) connect$pppoe(r2, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3", 0xb4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:12:56 executing program 0: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r6 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080), 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB="08f70300", @ANYRES32=r5, @ANYBLOB="08001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB="0c000600000000000000000008001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r6, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:12:56 executing program 2: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) getpgrp(r0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r4 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3eb8d", 0xb6, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYBLOB='u\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB="08f70300", @ANYRES32=r3, @ANYBLOB="08001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB="0c000600000000000000000008001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r4, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB], 0x64}}, 0x4) 03:12:56 executing program 4: gettid() r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = socket(0x0, 0x3, 0x6) connect$pppoe(r1, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3", 0xb4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:12:56 executing program 5: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) connect$pppoe(0xffffffffffffffff, 0x0, 0x0) syz_clone(0xd0209500, 0x0, 0x0, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:12:56 executing program 3: gettid() r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = socket(0x2a, 0x3, 0x6) getpgrp(0x0) connect$pppoe(r1, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3", 0xb4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:12:56 executing program 1: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, 0x0, 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r3 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3eb8d", 0xb6, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYBLOB='u\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB="08f70300", @ANYRES32, @ANYBLOB="08001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB="0c000600000000000000000008001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r3, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:12:57 executing program 0: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00'}) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, 0x0}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:12:57 executing program 4: gettid() r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = socket(0x0, 0x3, 0x6) connect$pppoe(r1, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3", 0xb4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:12:57 executing program 5: r0 = gettid() openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r1, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3eb8d", 0xb6, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:12:57 executing program 3: gettid() r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = socket(0x2a, 0x3, 0x6) getpgrp(0x0) connect$pppoe(r1, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3", 0xb4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:12:58 executing program 0: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00'}) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, 0x0}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:13:01 executing program 1: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, 0x0, 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r3 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3eb8d", 0xb6, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYBLOB='u\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB="08f70300", @ANYRES32, @ANYBLOB="08001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB="0c000600000000000000000008001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r3, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:13:01 executing program 5: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, r0, &(0x7f0000000040)={r1, 0xffffffffffffffff, 0x1}) r2 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3eb8d", 0xb6, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYBLOB='u\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32, @ANYBLOB="08f70300", @ANYRES32, @ANYBLOB="08001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB="0c000600000000000000000008001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r2, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:13:02 executing program 2: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) getpgrp(r0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r4 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3eb8d", 0xb6, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYBLOB='u\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB="08f70300", @ANYRES32=r3, @ANYBLOB="08001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB="0c000600000000000000000008001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r4, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB], 0x64}}, 0x4) 03:13:02 executing program 0: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00'}) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, 0x0}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:13:02 executing program 4: gettid() r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = socket(0x0, 0x3, 0x6) connect$pppoe(r1, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3", 0xb4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:13:02 executing program 1: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) connect$pppoe(0xffffffffffffffff, 0x0, 0x0) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3eb8d", 0xb6, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:13:02 executing program 5: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r4 = socket(0x2a, 0x0, 0x6) getpgrp(r0) connect$pppoe(r4, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) write$RDMA_USER_CM_CMD_CREATE_ID(r2, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, r3, 0x1}) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r7 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3eb8d", 0xb6, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r5, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB="08f70300", @ANYRES32=r6, @ANYBLOB="08001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB="0c000600000000000000000008001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r7, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:13:02 executing program 4: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) getpgrp(r0) connect$pppoe(0xffffffffffffffff, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3", 0xb4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:13:02 executing program 0: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00'}) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={0x0, 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:13:02 executing program 2: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00'}) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, 0x0}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:13:02 executing program 3: gettid() r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = socket(0x2a, 0x3, 0x6) getpgrp(0x0) connect$pppoe(r1, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3", 0xb4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:13:02 executing program 5: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r2, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00'}) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3eb8d", 0xb6, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") getpid() 03:13:02 executing program 0: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00'}) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={0x0, 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:13:02 executing program 1: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, r0, &(0x7f0000000040)={r1, 0xffffffffffffffff, 0x1}) r2 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3eb8d", 0xb6, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYBLOB='u\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32, @ANYBLOB="08f70300", @ANYRES32, @ANYBLOB="08001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB="0c000600000000000000000008001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r2, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:13:03 executing program 4: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) getpgrp(r0) connect$pppoe(0xffffffffffffffff, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3", 0xb4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:13:03 executing program 2: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r4 = socket(0x0, 0x3, 0x6) getpgrp(r0) connect$pppoe(r4, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) write$RDMA_USER_CM_CMD_CREATE_ID(r2, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, r3, 0x1}) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r7 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3eb8d", 0xb6, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r5, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB="08f70300", @ANYRES32=r6, @ANYBLOB="08001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB="0c000600000000000000000008001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r7, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:13:03 executing program 3: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(0xffffffffffffffff, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3", 0xb4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:13:04 executing program 1: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, r0, &(0x7f0000000040)={r1, 0xffffffffffffffff, 0x1}) r2 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3eb8d", 0xb6, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYBLOB='u\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32, @ANYBLOB="08f70300", @ANYRES32, @ANYBLOB="08001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB="0c000600000000000000000008001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r2, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:13:04 executing program 3: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(0xffffffffffffffff, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3", 0xb4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:13:05 executing program 3: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(0xffffffffffffffff, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3", 0xb4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:13:05 executing program 1: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, r0, &(0x7f0000000040)={r1, 0xffffffffffffffff, 0x1}) r2 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3eb8d", 0xb6, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYBLOB='u\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32, @ANYBLOB="08f70300", @ANYRES32, @ANYBLOB="08001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB="0c000600000000000000000008001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r2, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:13:06 executing program 3: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r2, 0x0, 0x0) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3", 0xb4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:13:06 executing program 4: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) getpgrp(r0) connect$pppoe(0xffffffffffffffff, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3", 0xb4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:13:07 executing program 5: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r2, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00'}) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3eb8d", 0xb6, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") getpid() 03:13:07 executing program 1: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, r0, &(0x7f0000000040)={r1, 0xffffffffffffffff, 0x1}) r2 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3eb8d", 0xb6, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYBLOB='u\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32, @ANYBLOB="08f70300", @ANYRES32, @ANYBLOB="08001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB="0c000600000000000000000008001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r2, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB], 0x64}}, 0x4) 03:13:07 executing program 4: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = socket(0x0, 0x3, 0x6) getpgrp(r0) connect$pppoe(r2, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3", 0xb4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:13:07 executing program 0: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00'}) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={0x0, 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:13:07 executing program 2: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r4 = socket(0x0, 0x3, 0x6) getpgrp(r0) connect$pppoe(r4, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) write$RDMA_USER_CM_CMD_CREATE_ID(r2, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, r3, 0x1}) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r7 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3eb8d", 0xb6, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r5, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB="08f70300", @ANYRES32=r6, @ANYBLOB="08001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB="0c000600000000000000000008001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r7, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:13:07 executing program 3: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r2, 0x0, 0x0) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3", 0xb4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:13:07 executing program 0: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r6 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB="08f70300", @ANYRES32=r5, @ANYBLOB="08001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB="0c000600000000000000000008001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r6, @ANYBLOB="08001c00", @ANYRES32], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:13:07 executing program 5: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r2, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00'}) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3eb8d", 0xb6, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") getpid() 03:13:07 executing program 2: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00'}) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={0x0, 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:13:07 executing program 4: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = socket(0x0, 0x3, 0x6) getpgrp(r0) connect$pppoe(r2, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3", 0xb4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:13:08 executing program 5: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r2, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00'}) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3eb8d", 0xb6, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:13:09 executing program 5: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r2, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3eb8d", 0xb6, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:13:10 executing program 5: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r2, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3eb8d", 0xb6, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:13:11 executing program 1: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, r0, &(0x7f0000000040)={r1, 0xffffffffffffffff, 0x1}) r2 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3eb8d", 0xb6, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYBLOB='u\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32, @ANYBLOB="08f70300", @ANYRES32, @ANYBLOB="08001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB="0c000600000000000000000008001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r2, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB], 0x64}}, 0x4) 03:13:11 executing program 5: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket(0x2a, 0x3, 0x6) getpgrp(r0) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3eb8d", 0xb6, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:13:11 executing program 0: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r6 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB="08f70300", @ANYRES32=r5, @ANYBLOB="08001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB="0c000600000000000000000008001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r6, @ANYBLOB="08001c00", @ANYRES32], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:13:11 executing program 2: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r2, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3eb8d", 0xb6, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:13:12 executing program 3: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r2, 0x0, 0x0) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3", 0xb4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:13:12 executing program 4: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = socket(0x0, 0x3, 0x6) getpgrp(r0) connect$pppoe(r2, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3", 0xb4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:13:12 executing program 0: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r6 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB="08f70300", @ANYRES32=r5, @ANYBLOB="08001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB="0c000600000000000000000008001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r6, @ANYBLOB="08001c00"], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:13:12 executing program 1: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, r0, &(0x7f0000000040)={r1, 0xffffffffffffffff, 0x1}) r2 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3eb8d", 0xb6, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYBLOB='u\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32, @ANYBLOB="08f70300", @ANYRES32, @ANYBLOB="08001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB="0c000600000000000000000008001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r2, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB], 0x64}}, 0x4) 03:13:12 executing program 2: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r2, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3eb8d", 0xb6, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:13:12 executing program 5: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket(0x2a, 0x3, 0x6) getpgrp(r0) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3eb8d", 0xb6, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:13:12 executing program 4: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = socket(0x0, 0x3, 0x6) getpgrp(r0) connect$pppoe(r2, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3", 0xb4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:13:12 executing program 3: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r2, &(0x7f0000000440)={0x18, 0x0, {0x0, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3", 0xb4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:13:12 executing program 0: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r6 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB="08f70300", @ANYRES32=r5, @ANYBLOB="08001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB="0c000600000000000000000008001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r6], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:13:12 executing program 2: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r2, 0x0, 0x0) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3", 0xb4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:13:12 executing program 1: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, r0, &(0x7f0000000040)={r1, 0xffffffffffffffff, 0x1}) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3eb8d", 0xb6, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") getpid() bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:13:13 executing program 4: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = socket(0x0, 0x3, 0x6) getpgrp(r0) connect$pppoe(r2, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3", 0xb4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:13:13 executing program 3: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r2, &(0x7f0000000440)={0x18, 0x0, {0x0, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3", 0xb4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:13:13 executing program 1: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, r0, &(0x7f0000000040)={r1, 0xffffffffffffffff, 0x1}) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3eb8d", 0xb6, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") getpid() bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:13:13 executing program 4: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = socket(0x0, 0x3, 0x6) getpgrp(r0) connect$pppoe(r2, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3", 0xb4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:13:14 executing program 3: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r2, &(0x7f0000000440)={0x18, 0x0, {0x0, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3", 0xb4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:13:16 executing program 2: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r2, 0x0, 0x0) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3", 0xb4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:13:17 executing program 5: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket(0x2a, 0x3, 0x6) getpgrp(r0) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3eb8d", 0xb6, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:13:17 executing program 0: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r6 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB="08f70300", @ANYRES32=r5, @ANYBLOB="08001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB="0c000600000000000000000008001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r6], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:13:17 executing program 2: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r6 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB="08f70300", @ANYRES32=r5, @ANYBLOB="08001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB="0c000600000000000000000008001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r6], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:13:17 executing program 1: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, r0, &(0x7f0000000040)={r1, 0xffffffffffffffff, 0x1}) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3eb8d", 0xb6, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") getpid() bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:13:17 executing program 4: r0 = gettid() openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = socket(0x0, 0x3, 0x6) getpgrp(r0) connect$pppoe(r1, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3", 0xb4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:13:17 executing program 1: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, r0, &(0x7f0000000040)={r1, 0xffffffffffffffff, 0x1}) r2 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3eb8d", 0xb6, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYBLOB='u\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32, @ANYBLOB="08f70300", @ANYRES32, @ANYBLOB="08001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB="0c000600000000000000000008001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r2, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:13:17 executing program 0: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r6 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB="08f70300", @ANYRES32=r5, @ANYBLOB="08001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB="0c000600000000000000000008001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r6], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:13:17 executing program 3: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r2, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0x0, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3", 0xb4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:13:17 executing program 5: gettid() r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket(0x2a, 0x3, 0x6) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3eb8d", 0xb6, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:13:17 executing program 3: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r2, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0x0, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3", 0xb4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:13:17 executing program 2: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r6 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB="08f70300", @ANYRES32=r5, @ANYBLOB="08001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB="0c000600000000000000000008001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r6], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:13:17 executing program 3: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r2, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0x0, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3", 0xb4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:13:17 executing program 3: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r2, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, 0x0, 0x0, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:13:17 executing program 4: r0 = gettid() openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = socket(0x0, 0x3, 0x6) getpgrp(r0) connect$pppoe(r1, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3", 0xb4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:13:17 executing program 0: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r6 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB="08f70300", @ANYRES32=r5, @ANYBLOB="08001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB="0c000600000000000000000008001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r6, @ANYBLOB], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:13:18 executing program 1: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, r0, &(0x7f0000000040)={r1, 0xffffffffffffffff, 0x1}) r2 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3eb8d", 0xb6, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYBLOB='u\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32, @ANYBLOB="08f70300", @ANYRES32, @ANYBLOB="08001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB="0c000600000000000000000008001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r2, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:13:18 executing program 5: gettid() r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket(0x2a, 0x3, 0x6) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3eb8d", 0xb6, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:13:18 executing program 3: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r2, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, 0x0, 0x0, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:13:18 executing program 5: gettid() r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket(0x2a, 0x3, 0x6) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3eb8d", 0xb6, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:13:18 executing program 0: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r6 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB="08f70300", @ANYRES32=r5, @ANYBLOB="08001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB="0c000600000000000000000008001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r6, @ANYBLOB], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:13:19 executing program 1: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, r0, &(0x7f0000000040)={r1, 0xffffffffffffffff, 0x1}) r2 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3eb8d", 0xb6, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYBLOB='u\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32, @ANYBLOB="08f70300", @ANYRES32, @ANYBLOB="08001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB="0c000600000000000000000008001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r2, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:13:19 executing program 1: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3eb8d", 0xb6, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYBLOB='u\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32, @ANYBLOB="08f70300", @ANYRES32, @ANYBLOB="08001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB="0c000600000000000000000008001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r1, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:13:21 executing program 5: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) getpgrp(r0) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3eb8d", 0xb6, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:13:21 executing program 0: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r6 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB="08f70300", @ANYRES32=r5, @ANYBLOB="08001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB="0c000600000000000000000008001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r6, @ANYBLOB], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:13:21 executing program 1: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3eb8d", 0xb6, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYBLOB='u\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32, @ANYBLOB="08f70300", @ANYRES32, @ANYBLOB="08001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB="0c000600000000000000000008001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r1, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:13:21 executing program 4: r0 = gettid() openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = socket(0x0, 0x3, 0x6) getpgrp(r0) connect$pppoe(r1, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3", 0xb4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:13:21 executing program 2: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, r0, &(0x7f0000000040)={r1, 0xffffffffffffffff, 0x1}) r2 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3eb8d", 0xb6, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYBLOB='u\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32, @ANYBLOB="08f70300", @ANYRES32, @ANYBLOB="08001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB="0c000600000000000000000008001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r2, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:13:21 executing program 2: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, r0, &(0x7f0000000040)={r1, 0xffffffffffffffff, 0x1}) r2 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3eb8d", 0xb6, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYBLOB='u\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32, @ANYBLOB="08f70300", @ANYRES32, @ANYBLOB="08001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB="0c000600000000000000000008001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r2, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:13:22 executing program 4: r0 = gettid() write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = socket(0x0, 0x3, 0x6) getpgrp(r0) connect$pppoe(r1, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3", 0xb4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:13:22 executing program 3: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r2, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, 0x0, 0x0, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:13:22 executing program 0: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r6 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB="08f70300", @ANYRES32=r5, @ANYBLOB="08001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB="0c000600000000000000000008001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r6, @ANYBLOB='\b\x00'], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:13:23 executing program 4: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = socket(0x0, 0x3, 0x6) getpgrp(0x0) connect$pppoe(r0, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3", 0xb4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:13:23 executing program 3: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r2, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100), 0x0, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:13:23 executing program 0: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r6 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB="08f70300", @ANYRES32=r5, @ANYBLOB="08001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB="0c000600000000000000000008001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r6, @ANYBLOB='\b\x00'], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:13:25 executing program 5: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) getpgrp(r0) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3eb8d", 0xb6, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:13:25 executing program 3: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r2, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100), 0x0, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:13:25 executing program 4: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = socket(0x0, 0x3, 0x6) getpgrp(0x0) connect$pppoe(r0, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3", 0xb4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:13:25 executing program 0: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r6 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB="08f70300", @ANYRES32=r5, @ANYBLOB="08001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB="0c000600000000000000000008001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r6, @ANYBLOB='\b\x00'], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:13:25 executing program 1: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3eb8d", 0xb6, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYBLOB='u\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32, @ANYBLOB="08f70300", @ANYRES32, @ANYBLOB="08001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB="0c000600000000000000000008001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r1, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:13:25 executing program 2: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = socket(0x0, 0x3, 0x6) getpgrp(0x0) connect$pppoe(r0, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3", 0xb4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:13:25 executing program 1: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, r0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff, 0x1}) r1 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3eb8d", 0xb6, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYBLOB='u\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32, @ANYBLOB="08f70300", @ANYRES32, @ANYBLOB="08001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB="0c000600000000000000000008001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r1, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) [ 992.291147][ T1239] ieee802154 phy0 wpan0: encryption failed: -22 [ 992.297482][ T1239] ieee802154 phy1 wpan1: encryption failed: -22 03:13:25 executing program 3: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r2, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100), 0x0, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:13:25 executing program 5: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) getpgrp(r0) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3eb8d", 0xb6, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:13:25 executing program 2: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = socket(0x0, 0x3, 0x6) getpgrp(0x0) connect$pppoe(r0, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3", 0xb4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:13:25 executing program 1: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, r0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff, 0x1}) r1 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3eb8d", 0xb6, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYBLOB='u\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32, @ANYBLOB="08f70300", @ANYRES32, @ANYBLOB="08001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB="0c000600000000000000000008001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r1, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:13:25 executing program 4: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = socket(0x0, 0x3, 0x6) getpgrp(0x0) connect$pppoe(r0, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3", 0xb4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:13:25 executing program 0: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r6 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB="08f70300", @ANYRES32=r5, @ANYBLOB="08001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB="0c000600000000000000000008001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r6, @ANYBLOB="08001c"], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:13:25 executing program 5: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket(0x2a, 0x3, 0x6) getpgrp(r0) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3eb8d", 0xb6, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:13:26 executing program 3: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r2, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68", 0x5a, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:13:26 executing program 4: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = socket(0x0, 0x3, 0x6) getpgrp(0x0) connect$pppoe(r0, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3", 0xb4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:13:26 executing program 0: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r6 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB="08f70300", @ANYRES32=r5, @ANYBLOB="08001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB="0c000600000000000000000008001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r6, @ANYBLOB="08001c"], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:13:26 executing program 5: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket(0x2a, 0x3, 0x6) getpgrp(r0) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3eb8d", 0xb6, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:13:29 executing program 2: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = socket(0x0, 0x3, 0x6) getpgrp(0x0) connect$pppoe(r0, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3", 0xb4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:13:29 executing program 2: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket(0x0, 0x3, 0x6) getpgrp(0x0) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3", 0xb4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:13:29 executing program 1: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, r0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff, 0x1}) r1 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3eb8d", 0xb6, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYBLOB='u\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32, @ANYBLOB="08f70300", @ANYRES32, @ANYBLOB="08001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB="0c000600000000000000000008001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r1, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:13:29 executing program 3: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r2, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68", 0x5a, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:13:30 executing program 3: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r2, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68", 0x5a, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:13:30 executing program 1: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, r0, &(0x7f0000000040)={r1, 0xffffffffffffffff, 0x1}) r2 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3eb8d", 0xb6, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYBLOB='u\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32, @ANYBLOB="08f70300", @ANYRES32, @ANYBLOB="08001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB="0c000600000000000000000008001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r2, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:13:30 executing program 2: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket(0x0, 0x3, 0x6) getpgrp(0x0) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3", 0xb4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:13:30 executing program 0: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r6 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB="08f70300", @ANYRES32=r5, @ANYBLOB="08001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB="0c000600000000000000000008001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r6, @ANYBLOB="08001c"], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:13:30 executing program 4: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = socket(0x0, 0x3, 0x6) getpgrp(0x0) connect$pppoe(r0, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3", 0xb4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:13:30 executing program 3: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r2, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:13:30 executing program 1: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, r0, &(0x7f0000000040)={r1, 0xffffffffffffffff, 0x1}) r2 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3eb8d", 0xb6, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYBLOB='u\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32, @ANYBLOB="08f70300", @ANYRES32, @ANYBLOB="08001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB="0c000600000000000000000008001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r2, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:13:30 executing program 5: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket(0x2a, 0x3, 0x6) getpgrp(r0) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3eb8d", 0xb6, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:13:30 executing program 0: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB="08f70300", @ANYRES32=r5, @ANYBLOB="08001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB="0c000600000000000000000008001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYBLOB="08001c00"], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:13:30 executing program 4: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket(0x0, 0x3, 0x6) getpgrp(0x0) connect$pppoe(r0, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3", 0xb4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:13:30 executing program 2: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket(0x0, 0x3, 0x6) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3", 0xb4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:13:30 executing program 1: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, r0, &(0x7f0000000040)={r1, 0xffffffffffffffff, 0x1}) r2 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3eb8d", 0xb6, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYBLOB='u\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32, @ANYBLOB="08f70300", @ANYRES32, @ANYBLOB="08001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB="0c000600000000000000000008001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r2, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:13:30 executing program 3: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r2, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:13:31 executing program 0: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB="08f70300", @ANYRES32=r5, @ANYBLOB="08001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB="0c000600000000000000000008001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYBLOB="08001c00"], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:13:31 executing program 4: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket(0x0, 0x3, 0x6) getpgrp(0x0) connect$pppoe(r0, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3", 0xb4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:13:31 executing program 5: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket(0x2a, 0x3, 0x6) getpgrp(r0) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3eb8d", 0xb6, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:13:34 executing program 1: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000040)={r0, 0xffffffffffffffff, 0x1}) r1 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3eb8d", 0xb6, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYBLOB='u\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32, @ANYBLOB="08f70300", @ANYRES32, @ANYBLOB="08001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB="0c000600000000000000000008001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r1, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:13:34 executing program 0: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB="08f70300", @ANYRES32=r5, @ANYBLOB="08001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB="0c000600000000000000000008001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYBLOB="08001c00"], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:13:34 executing program 1: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000040)={r0, 0xffffffffffffffff, 0x1}) r1 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3eb8d", 0xb6, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYBLOB='u\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32, @ANYBLOB="08f70300", @ANYRES32, @ANYBLOB="08001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB="0c000600000000000000000008001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r1, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:13:34 executing program 2: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket(0x0, 0x3, 0x6) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3", 0xb4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:13:34 executing program 5: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket(0x2a, 0x3, 0x6) getpgrp(r0) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3eb8d", 0xb6, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:13:35 executing program 0: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB="08f70300", @ANYRES32=r5, @ANYBLOB="08001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB="0c000600000000000000000008001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB="08001c00"], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:13:35 executing program 5: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket(0x2a, 0x3, 0x6) getpgrp(r0) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3eb8d", 0xb6, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:13:35 executing program 2: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket(0x0, 0x3, 0x6) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3", 0xb4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:13:35 executing program 4: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket(0x0, 0x3, 0x6) getpgrp(0x0) connect$pppoe(r0, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3", 0xb4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:13:35 executing program 0: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB="08f70300", @ANYRES32=r5, @ANYBLOB="08001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB="0c000600000000000000000008001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB="08001c00"], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:13:35 executing program 5: r0 = gettid() openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket(0x2a, 0x3, 0x6) getpgrp(r0) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3eb8d", 0xb6, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:13:35 executing program 3: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r2, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:13:35 executing program 1: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000040)={r0, 0xffffffffffffffff, 0x1}) r1 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3eb8d", 0xb6, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYBLOB='u\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32, @ANYBLOB="08f70300", @ANYRES32, @ANYBLOB="08001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB="0c000600000000000000000008001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r1, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:13:35 executing program 2: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) getpgrp(0x0) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3", 0xb4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:13:36 executing program 3: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r2, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f9", 0x9e, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:13:36 executing program 1: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) r0 = openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000040)={r0, 0xffffffffffffffff, 0x1}) r1 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3eb8d", 0xb6, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYBLOB='u\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32, @ANYBLOB="08f70300", @ANYRES32, @ANYBLOB="08001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB="0c000600000000000000000008001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r1, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:13:36 executing program 4: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = socket(0x0, 0x0, 0x6) getpgrp(0x0) connect$pppoe(r0, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3", 0xb4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:13:36 executing program 2: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) getpgrp(0x0) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3", 0xb4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:13:37 executing program 4: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = socket(0x0, 0x0, 0x0) getpgrp(0x0) connect$pppoe(r0, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3", 0xb4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:13:39 executing program 0: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB="08f70300", @ANYRES32=r5, @ANYBLOB="08001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB="0c000600000000000000000008001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB="08001c00"], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:13:39 executing program 5: r0 = gettid() openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket(0x2a, 0x3, 0x6) getpgrp(r0) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3eb8d", 0xb6, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:13:39 executing program 1: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) r0 = openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000040)={r0, 0xffffffffffffffff, 0x1}) r1 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3eb8d", 0xb6, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYBLOB='u\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32, @ANYBLOB="08f70300", @ANYRES32, @ANYBLOB="08001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB="0c000600000000000000000008001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r1, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:13:39 executing program 3: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r2, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f9", 0x9e, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:13:39 executing program 0: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r6 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB="08f70300", @ANYRES32=r5, @ANYBLOB="08001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB="0c000600000000000000000008001d00", @ANYRES32, @ANYRES32=r6, @ANYBLOB="08001c00"], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:13:39 executing program 2: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) getpgrp(0x0) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3", 0xb4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:13:39 executing program 5: r0 = gettid() openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket(0x2a, 0x3, 0x6) getpgrp(r0) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3eb8d", 0xb6, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:13:39 executing program 1: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) r0 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3eb8d", 0xb6, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYBLOB='u\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32, @ANYBLOB="08f70300", @ANYRES32, @ANYBLOB="08001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB="0c000600000000000000000008001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r0, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:13:39 executing program 3: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r2, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f9", 0x9e, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:13:39 executing program 0: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r6 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB="08f70300", @ANYRES32=r5, @ANYBLOB="08001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB="0c000600000000000000000008001d00", @ANYRES32, @ANYRES32=r6, @ANYBLOB="08001c00"], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:13:40 executing program 2: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket(0x0, 0x3, 0x6) getpgrp(0x0) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3", 0xb4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:13:40 executing program 4: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = socket(0x0, 0x0, 0x0) getpgrp(0x0) connect$pppoe(r0, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3", 0xb4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:13:40 executing program 5: r0 = gettid() openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket(0x2a, 0x3, 0x6) getpgrp(r0) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3eb8d", 0xb6, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:13:40 executing program 3: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r2, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee", 0xa9, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:13:40 executing program 1: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) r0 = syz_clone(0x0, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3eb8d", 0xb6, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYBLOB='u\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32, @ANYBLOB="08f70300", @ANYRES32, @ANYBLOB="08001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB="0c000600000000000000000008001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r0, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:13:40 executing program 4: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket(0x0, 0x0, 0x0) getpgrp(0x0) connect$pppoe(0xffffffffffffffff, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3", 0xb4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:13:40 executing program 2: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket(0x0, 0x3, 0x6) getpgrp(0x0) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3", 0xb4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:13:40 executing program 0: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r6 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB="08f70300", @ANYRES32=r5, @ANYBLOB="08001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB="0c000600000000000000000008001d00", @ANYRES32, @ANYRES32=r6, @ANYBLOB="08001c00"], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:13:40 executing program 1: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) r0 = syz_clone(0x0, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3eb8d", 0xb6, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYBLOB='u\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32, @ANYBLOB="08f70300", @ANYRES32, @ANYBLOB="08001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB="0c000600000000000000000008001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r0, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:13:40 executing program 5: r0 = gettid() openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket(0x2a, 0x3, 0x6) getpgrp(r0) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3eb8d", 0xb6, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:13:41 executing program 1: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) r0 = syz_clone(0x0, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3eb8d", 0xb6, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYBLOB='u\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32, @ANYBLOB="08f70300", @ANYRES32, @ANYBLOB="08001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB="0c000600000000000000000008001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r0, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:13:41 executing program 4: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket(0x0, 0x0, 0x0) getpgrp(0x0) connect$pppoe(0xffffffffffffffff, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3", 0xb4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:13:41 executing program 3: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r2, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee", 0xa9, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:13:41 executing program 2: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket(0x0, 0x3, 0x6) getpgrp(0x0) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3", 0xb4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:13:41 executing program 1: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) r0 = syz_clone(0xd0209500, 0x0, 0x0, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYBLOB='u\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32, @ANYBLOB="08f70300", @ANYRES32, @ANYBLOB="08001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB="0c000600000000000000000008001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r0, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:13:41 executing program 5: openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket(0x2a, 0x3, 0x6) getpgrp(0x0) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3eb8d", 0xb6, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:13:41 executing program 0: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r6 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB="08f70300", @ANYRES32=r5, @ANYBLOB="08001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB="0c000600000000000000000008001d00", @ANYRES32, @ANYBLOB, @ANYRES32=r6, @ANYBLOB="08001c00"], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:13:41 executing program 4: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket(0x0, 0x0, 0x0) getpgrp(0x0) connect$pppoe(0xffffffffffffffff, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3", 0xb4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:13:41 executing program 3: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r2, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee", 0xa9, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:13:41 executing program 2: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x3, 0x6) getpgrp(0x0) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3", 0xb4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:13:42 executing program 5: openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket(0x2a, 0x3, 0x6) getpgrp(0x0) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3eb8d", 0xb6, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:13:42 executing program 0: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r6 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB="08f70300", @ANYRES32=r5, @ANYBLOB="08001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB="0c000600000000000000000008001d00", @ANYRES32, @ANYBLOB, @ANYRES32=r6, @ANYBLOB="08001c00"], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:13:46 executing program 0: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r6 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB="08f70300", @ANYRES32=r5, @ANYBLOB="08001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB="0c000600000000000000000008001d00", @ANYRES32, @ANYBLOB, @ANYRES32=r6, @ANYBLOB="08001c00"], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:13:46 executing program 0: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r6 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB="08f70300", @ANYRES32=r5, @ANYBLOB="08001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB="0c000600000000000000000008001d00", @ANYRES32, @ANYBLOB='\b\x00', @ANYRES32=r6, @ANYBLOB="08001c00"], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:13:47 executing program 0: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r6 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB="08f70300", @ANYRES32=r5, @ANYBLOB="08001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB="0c000600000000000000000008001d00", @ANYRES32, @ANYBLOB='\b\x00', @ANYRES32=r6, @ANYBLOB="08001c00"], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:13:47 executing program 2: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x3, 0x6) getpgrp(0x0) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3", 0xb4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:13:47 executing program 1: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) r0 = syz_clone(0xd0209500, 0x0, 0x0, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYBLOB='u\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32, @ANYBLOB="08f70300", @ANYRES32, @ANYBLOB="08001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB="0c000600000000000000000008001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r0, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:13:47 executing program 4: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = socket(0x0, 0x0, 0x0) getpgrp(0x0) connect$pppoe(r0, 0x0, 0x0) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3", 0xb4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:13:47 executing program 3: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r2, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f", 0xaf, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:13:47 executing program 2: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x3, 0x6) getpgrp(0x0) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3", 0xb4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:13:47 executing program 3: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r2, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f", 0xaf, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:13:48 executing program 4: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = socket(0x0, 0x0, 0x0) getpgrp(0x0) connect$pppoe(r0, 0x0, 0x0) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3", 0xb4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:13:48 executing program 5: openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket(0x2a, 0x3, 0x6) getpgrp(0x0) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3eb8d", 0xb6, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:13:48 executing program 1: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) r0 = syz_clone(0xd0209500, 0x0, 0x0, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYBLOB='u\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32, @ANYBLOB="08f70300", @ANYRES32, @ANYBLOB="08001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB="0c000600000000000000000008001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r0, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:13:48 executing program 2: openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket(0x0, 0x3, 0x6) getpgrp(0x0) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3", 0xb4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:13:48 executing program 1: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) r0 = syz_clone(0xd0209500, &(0x7f0000000100), 0x0, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYBLOB='u\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32, @ANYBLOB="08f70300", @ANYRES32, @ANYBLOB="08001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB="0c000600000000000000000008001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r0, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:13:48 executing program 0: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r6 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB="08f70300", @ANYRES32=r5, @ANYBLOB="08001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB="0c000600000000000000000008001d00", @ANYRES32, @ANYBLOB='\b\x00', @ANYRES32=r6, @ANYBLOB="08001c00"], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:13:48 executing program 5: r0 = gettid() openat$vcs(0xffffffffffffff9c, 0x0, 0x40042, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket(0x2a, 0x3, 0x6) getpgrp(r0) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3eb8d", 0xb6, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:13:48 executing program 3: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r2, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f", 0xaf, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:13:48 executing program 4: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = socket(0x0, 0x0, 0x0) getpgrp(0x0) connect$pppoe(r0, 0x0, 0x0) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3", 0xb4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:13:48 executing program 1: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) r0 = syz_clone(0xd0209500, &(0x7f0000000100), 0x0, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYBLOB='u\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32, @ANYBLOB="08f70300", @ANYRES32, @ANYBLOB="08001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB="0c000600000000000000000008001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r0, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:13:48 executing program 2: openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket(0x0, 0x3, 0x6) getpgrp(0x0) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3", 0xb4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:13:48 executing program 5: r0 = gettid() openat$vcs(0xffffffffffffff9c, 0x0, 0x40042, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket(0x2a, 0x3, 0x6) getpgrp(r0) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3eb8d", 0xb6, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:13:49 executing program 3: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r2, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747", 0xb2, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:13:49 executing program 0: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r6 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB="08f70300", @ANYRES32=r5, @ANYBLOB="08001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB="0c000600000000000000000008001d00", @ANYRES32, @ANYBLOB="08001c", @ANYRES32=r6, @ANYBLOB="08001c00"], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:13:49 executing program 4: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = socket(0x0, 0x0, 0x0) getpgrp(0x0) connect$pppoe(r0, &(0x7f0000000440)={0x18, 0x0, {0x0, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3", 0xb4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:13:49 executing program 1: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) r0 = syz_clone(0xd0209500, &(0x7f0000000100), 0x0, 0x0, &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYBLOB='u\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32, @ANYBLOB="08f70300", @ANYRES32, @ANYBLOB="08001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB="0c000600000000000000000008001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r0, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:13:53 executing program 5: r0 = gettid() openat$vcs(0xffffffffffffff9c, 0x0, 0x40042, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket(0x2a, 0x3, 0x6) getpgrp(r0) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3eb8d", 0xb6, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:13:53 executing program 3: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r2, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747", 0xb2, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:13:53 executing program 5: r0 = gettid() openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket(0x2a, 0x3, 0x6) getpgrp(r0) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3eb8d", 0xb6, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:13:53 executing program 3: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r2, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747", 0xb2, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:13:53 executing program 5: r0 = gettid() openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket(0x2a, 0x3, 0x6) getpgrp(r0) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3eb8d", 0xb6, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:13:53 executing program 2: openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket(0x0, 0x3, 0x6) getpgrp(0x0) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3", 0xb4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:13:53 executing program 1: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) r0 = syz_clone(0xd0209500, &(0x7f0000000100), 0x0, 0x0, &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYBLOB='u\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32, @ANYBLOB="08f70300", @ANYRES32, @ANYBLOB="08001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB="0c000600000000000000000008001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r0, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:13:53 executing program 4: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = socket(0x0, 0x0, 0x0) getpgrp(0x0) connect$pppoe(r0, &(0x7f0000000440)={0x18, 0x0, {0x0, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3", 0xb4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:13:53 executing program 0: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r6 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB="08f70300", @ANYRES32=r5, @ANYBLOB="08001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB="0c000600000000000000000008001d00", @ANYRES32, @ANYBLOB="08001c", @ANYRES32=r6, @ANYBLOB="08001c00"], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:13:53 executing program 3: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r2, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3", 0xb3, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:13:53 executing program 1: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) r0 = syz_clone(0xd0209500, &(0x7f0000000100), 0x0, 0x0, &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYBLOB='u\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32, @ANYBLOB="08f70300", @ANYRES32, @ANYBLOB="08001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB="0c000600000000000000000008001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r0, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:13:53 executing program 4: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = socket(0x0, 0x0, 0x0) getpgrp(0x0) connect$pppoe(r0, &(0x7f0000000440)={0x18, 0x0, {0x0, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3", 0xb4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:13:53 executing program 2: openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket(0x0, 0x3, 0x6) getpgrp(0x0) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3", 0xb4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:13:53 executing program 0: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r6 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB="08f70300", @ANYRES32=r5, @ANYBLOB="08001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB="0c000600000000000000000008001d00", @ANYRES32, @ANYBLOB="08001c", @ANYRES32=r6, @ANYBLOB="08001c00"], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:13:54 executing program 5: r0 = gettid() openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket(0x2a, 0x3, 0x6) getpgrp(r0) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3eb8d", 0xb6, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:13:54 executing program 1: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) r0 = syz_clone(0xd0209500, &(0x7f0000000100), 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYBLOB='u\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32, @ANYBLOB="08f70300", @ANYRES32, @ANYBLOB="08001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB="0c000600000000000000000008001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r0, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:13:54 executing program 4: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = socket(0x0, 0x0, 0x0) getpgrp(0x0) connect$pppoe(r0, &(0x7f0000000440)={0x18, 0x0, {0x0, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0x0, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3", 0xb4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:13:54 executing program 2: openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket(0x0, 0x3, 0x6) getpgrp(0x0) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3", 0xb4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:13:54 executing program 0: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r6 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB="08f70300", @ANYRES32=r5, @ANYBLOB="08001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB="0c000600000000000000000008001d00", @ANYBLOB="08001c00", @ANYRES32=r6, @ANYBLOB="08001c00"], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:13:54 executing program 1: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) r0 = syz_clone(0xd0209500, &(0x7f0000000100), 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYBLOB='u\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32, @ANYBLOB="08f70300", @ANYRES32, @ANYBLOB="08001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB="0c000600000000000000000008001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r0, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:13:54 executing program 3: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r2, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3", 0xb3, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:13:54 executing program 4: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = socket(0x0, 0x0, 0x0) getpgrp(0x0) connect$pppoe(r0, &(0x7f0000000440)={0x18, 0x0, {0x0, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0x0, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3", 0xb4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:13:54 executing program 4: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = socket(0x0, 0x0, 0x0) getpgrp(0x0) connect$pppoe(r0, &(0x7f0000000440)={0x18, 0x0, {0x0, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0x0, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3", 0xb4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:13:54 executing program 4: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = socket(0x0, 0x0, 0x0) getpgrp(0x0) connect$pppoe(r0, &(0x7f0000000440)={0x18, 0x0, {0x0, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, 0x0, 0x0, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:13:58 executing program 1: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) r0 = syz_clone(0xd0209500, &(0x7f0000000100), 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYBLOB='u\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32, @ANYBLOB="08f70300", @ANYRES32, @ANYBLOB="08001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB="0c000600000000000000000008001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r0, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:13:58 executing program 5: r0 = gettid() openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket(0x2a, 0x3, 0x6) getpgrp(r0) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3eb8d", 0xb6, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:13:58 executing program 3: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r2, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3", 0xb3, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:13:58 executing program 0: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r6 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB="08f70300", @ANYRES32=r5, @ANYBLOB="08001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB="0c000600000000000000000008001d00", @ANYBLOB="08001c00", @ANYRES32=r6, @ANYBLOB="08001c00"], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:13:58 executing program 1: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) r0 = syz_clone(0xd0209500, &(0x7f0000000100), 0x0, &(0x7f0000000200), &(0x7f0000000240), 0x0) getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYBLOB='u\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32, @ANYBLOB="08f70300", @ANYRES32, @ANYBLOB="08001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB="0c000600000000000000000008001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r0, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:13:59 executing program 2: openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket(0x0, 0x3, 0x6) getpgrp(0x0) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3", 0xb4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:13:59 executing program 5: r0 = gettid() openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket(0x2a, 0x3, 0x6) getpgrp(r0) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3eb8d", 0xb6, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:13:59 executing program 3: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r2, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3", 0xb4, 0x0, &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:13:59 executing program 0: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r6 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB="08f70300", @ANYRES32=r5, @ANYBLOB="08001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB="0c000600000000000000000008001d00", @ANYBLOB="08001c00", @ANYRES32=r6, @ANYBLOB="08001c00"], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:13:59 executing program 1: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) syz_clone(0xd0209500, &(0x7f0000000100), 0x0, &(0x7f0000000200), &(0x7f0000000240), 0x0) getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(0xffffffffffffffff, 0x0, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:13:59 executing program 2: openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket(0x0, 0x0, 0x6) getpgrp(0x0) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3", 0xb4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:14:00 executing program 4: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = socket(0x0, 0x0, 0x0) getpgrp(0x0) connect$pppoe(r0, &(0x7f0000000440)={0x18, 0x0, {0x0, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, 0x0, 0x0, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:14:00 executing program 5: r0 = gettid() openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket(0x2a, 0x3, 0x6) getpgrp(r0) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3eb8d", 0xb6, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:14:00 executing program 1: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) syz_clone(0xd0209500, &(0x7f0000000100), 0x0, &(0x7f0000000200), &(0x7f0000000240), 0x0) getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(0xffffffffffffffff, 0x0, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:14:00 executing program 0: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r6 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB="08f70300", @ANYRES32=r5, @ANYBLOB="08001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32, @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r6, @ANYBLOB="08001c00"], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:14:00 executing program 3: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r2, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3", 0xb4, 0x0, &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:14:00 executing program 2: openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket(0x0, 0x0, 0x6) getpgrp(0x0) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3", 0xb4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:14:00 executing program 5: r0 = gettid() openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket(0x2a, 0x3, 0x6) getpgrp(r0) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3eb8d", 0xb6, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:14:00 executing program 1: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) syz_clone(0xd0209500, &(0x7f0000000100), 0x0, &(0x7f0000000200), &(0x7f0000000240), 0x0) getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(0xffffffffffffffff, 0x0, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:14:00 executing program 4: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = socket(0x0, 0x0, 0x0) getpgrp(0x0) connect$pppoe(r0, &(0x7f0000000440)={0x18, 0x0, {0x0, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, 0x0, 0x0, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:14:00 executing program 3: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r2, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3", 0xb4, 0x0, &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:14:00 executing program 5: r0 = gettid() openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket(0x0, 0x3, 0x6) getpgrp(r0) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3eb8d", 0xb6, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:14:01 executing program 0: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r6 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB="08f70300", @ANYRES32=r5, @ANYBLOB="08001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32, @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r6, @ANYBLOB="08001c00"], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:14:01 executing program 2: openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket(0x0, 0x0, 0x6) getpgrp(0x0) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3", 0xb4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:14:01 executing program 4: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = socket(0x0, 0x0, 0x0) getpgrp(0x0) connect$pppoe(r0, &(0x7f0000000440)={0x18, 0x0, {0x0, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100), 0x0, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:14:01 executing program 3: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r2, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3", 0xb4, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:14:01 executing program 1: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) r0 = syz_clone(0xd0209500, &(0x7f0000000100), 0x0, &(0x7f0000000200), &(0x7f0000000240), 0x0) getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYBLOB='u\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32, @ANYBLOB="08f70300", @ANYRES32, @ANYBLOB="08001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB="0c000600000000000000000008001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r0, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:14:01 executing program 4: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = socket(0x0, 0x0, 0x0) getpgrp(0x0) connect$pppoe(r0, &(0x7f0000000440)={0x18, 0x0, {0x0, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100), 0x0, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:14:01 executing program 3: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r2, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3", 0xb4, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:14:01 executing program 5: r0 = gettid() openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket(0x0, 0x3, 0x6) getpgrp(r0) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3eb8d", 0xb6, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:14:01 executing program 4: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = socket(0x0, 0x0, 0x0) getpgrp(0x0) connect$pppoe(r0, &(0x7f0000000440)={0x18, 0x0, {0x0, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100), 0x0, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:14:01 executing program 3: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r2, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3", 0xb4, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:14:01 executing program 0: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r6 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB="08f70300", @ANYRES32=r5, @ANYBLOB="08001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32, @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r6, @ANYBLOB="08001c00"], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:14:02 executing program 2: openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket(0x0, 0x3, 0x0) getpgrp(0x0) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3", 0xb4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:14:02 executing program 3: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r2, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3", 0xb4, &(0x7f0000000200), &(0x7f0000000240), 0x0) 03:14:05 executing program 2: openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket(0x0, 0x3, 0x0) getpgrp(0x0) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3", 0xb4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:14:05 executing program 0: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r6 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB="08f70300", @ANYRES32=r5, @ANYBLOB="08001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r6, @ANYBLOB="08001c00"], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:14:05 executing program 1: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) r0 = syz_clone(0xd0209500, &(0x7f0000000100), 0x0, &(0x7f0000000200), &(0x7f0000000240), 0x0) getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYBLOB='u\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32, @ANYBLOB="08f70300", @ANYRES32, @ANYBLOB="08001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB="0c000600000000000000000008001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r0, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:14:05 executing program 4: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = socket(0x0, 0x0, 0x0) getpgrp(0x0) connect$pppoe(r0, &(0x7f0000000440)={0x18, 0x0, {0x0, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68", 0x5a, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:14:05 executing program 0: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r6 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB="08f70300", @ANYRES32=r5, @ANYBLOB="08001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r6, @ANYBLOB="08001c00"], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:14:05 executing program 4: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = socket(0x0, 0x0, 0x0) getpgrp(0x0) connect$pppoe(r0, &(0x7f0000000440)={0x18, 0x0, {0x0, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68", 0x5a, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:14:06 executing program 5: r0 = gettid() openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket(0x0, 0x3, 0x6) getpgrp(r0) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3eb8d", 0xb6, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:14:06 executing program 1: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) r0 = syz_clone(0xd0209500, &(0x7f0000000100), 0x0, &(0x7f0000000200), &(0x7f0000000240), 0x0) getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYBLOB='u\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32, @ANYBLOB="08f70300", @ANYRES32, @ANYBLOB="08001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB="0c000600000000000000000008001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r0, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:14:06 executing program 2: openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket(0x0, 0x3, 0x0) getpgrp(0x0) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3", 0xb4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:14:06 executing program 4: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = socket(0x0, 0x0, 0x0) getpgrp(0x0) connect$pppoe(r0, &(0x7f0000000440)={0x18, 0x0, {0x0, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68", 0x5a, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:14:06 executing program 0: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r6 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB="08f70300", @ANYRES32=r5, @ANYBLOB="08001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYBLOB, @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r6, @ANYBLOB="08001c00"], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:14:07 executing program 3: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r2, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3", 0xb4, &(0x7f0000000200), &(0x7f0000000240), 0x0) 03:14:07 executing program 5: r0 = gettid() openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket(0x2a, 0x0, 0x6) getpgrp(r0) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3eb8d", 0xb6, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:14:07 executing program 1: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) r0 = syz_clone(0xd0209500, &(0x7f0000000100), 0x0, &(0x7f0000000200), &(0x7f0000000240), 0x0) getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000080), 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYBLOB='u\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32, @ANYBLOB="08f70300", @ANYRES32, @ANYBLOB="08001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB="0c000600000000000000000008001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r0, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:14:07 executing program 2: openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket(0x0, 0x3, 0x6) getpgrp(0x0) syz_clone(0x0, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3", 0xb4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:14:07 executing program 2: openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket(0x0, 0x3, 0x6) getpgrp(0x0) syz_clone(0x0, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3", 0xb4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:14:07 executing program 2: openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket(0x0, 0x3, 0x6) getpgrp(0x0) syz_clone(0x0, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3", 0xb4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:14:07 executing program 3: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r2, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3", 0xb4, &(0x7f0000000200), &(0x7f0000000240), 0x0) 03:14:07 executing program 5: r0 = gettid() openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket(0x2a, 0x0, 0x6) getpgrp(r0) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3eb8d", 0xb6, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:14:08 executing program 2: openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket(0x0, 0x3, 0x6) getpgrp(0x0) syz_clone(0xd0209500, 0x0, 0x0, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:14:10 executing program 4: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = socket(0x0, 0x0, 0x0) getpgrp(0x0) connect$pppoe(r0, &(0x7f0000000440)={0x18, 0x0, {0x0, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:14:10 executing program 0: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r6 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB="08f70300", @ANYRES32=r5, @ANYBLOB="08001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYBLOB, @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r6, @ANYBLOB="08001c00"], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:14:10 executing program 1: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) r0 = syz_clone(0xd0209500, &(0x7f0000000100), 0x0, &(0x7f0000000200), &(0x7f0000000240), 0x0) getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000080), 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYBLOB='u\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32, @ANYBLOB="08f70300", @ANYRES32, @ANYBLOB="08001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB="0c000600000000000000000008001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r0, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:14:10 executing program 4: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = socket(0x0, 0x0, 0x0) getpgrp(0x0) connect$pppoe(r0, &(0x7f0000000440)={0x18, 0x0, {0x0, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:14:10 executing program 0: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r6 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB="08f70300", @ANYRES32=r5, @ANYBLOB="08001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYBLOB, @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r6, @ANYBLOB="08001c00"], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:14:10 executing program 1: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) r0 = syz_clone(0xd0209500, &(0x7f0000000100), 0x0, &(0x7f0000000200), &(0x7f0000000240), 0x0) getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000080), 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYBLOB='u\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32, @ANYBLOB="08f70300", @ANYRES32, @ANYBLOB="08001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB="0c000600000000000000000008001d00", @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r0, @ANYBLOB="08001c00", @ANYRES32, @ANYBLOB], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:14:11 executing program 0: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r6 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB="08f70300", @ANYRES32=r5, @ANYBLOB="08001d00", @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r6, @ANYBLOB="08001c00"], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:14:11 executing program 1: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) syz_clone(0xd0209500, &(0x7f0000000100), 0x0, &(0x7f0000000200), &(0x7f0000000240), 0x0) getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, 0x0}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:14:11 executing program 4: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = socket(0x0, 0x0, 0x0) getpgrp(0x0) connect$pppoe(r0, &(0x7f0000000440)={0x18, 0x0, {0x0, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:14:11 executing program 3: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r2, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3", 0xb4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)) 03:14:11 executing program 5: r0 = gettid() openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket(0x2a, 0x0, 0x6) getpgrp(r0) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3eb8d", 0xb6, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:14:12 executing program 2: openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket(0x0, 0x3, 0x6) getpgrp(0x0) syz_clone(0xd0209500, 0x0, 0x0, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:14:12 executing program 3: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r2, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3", 0xb4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)) 03:14:12 executing program 0: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r6 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB="08f70300", @ANYRES32=r5, @ANYBLOB="08001d00", @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r6, @ANYBLOB="08001c00"], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:14:12 executing program 5: r0 = gettid() openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket(0x2a, 0x3, 0x0) getpgrp(r0) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3eb8d", 0xb6, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:14:12 executing program 1: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) syz_clone(0xd0209500, &(0x7f0000000100), 0x0, &(0x7f0000000200), &(0x7f0000000240), 0x0) getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, 0x0}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:14:12 executing program 3: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r2, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3", 0xb4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)) 03:14:12 executing program 2: openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket(0x0, 0x3, 0x6) getpgrp(0x0) syz_clone(0xd0209500, 0x0, 0x0, 0x0, &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:14:13 executing program 5: r0 = gettid() openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket(0x2a, 0x3, 0x0) getpgrp(r0) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3eb8d", 0xb6, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:14:13 executing program 2: openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket(0x0, 0x3, 0x6) getpgrp(0x0) syz_clone(0xd0209500, 0x0, 0x0, 0x0, &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:14:14 executing program 1: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) syz_clone(0xd0209500, &(0x7f0000000100), 0x0, &(0x7f0000000200), &(0x7f0000000240), 0x0) getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, 0x0}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:14:14 executing program 3: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r2, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3", 0xb4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497") 03:14:14 executing program 5: r0 = gettid() openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket(0x2a, 0x3, 0x0) getpgrp(r0) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3eb8d", 0xb6, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:14:14 executing program 4: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = socket(0x0, 0x0, 0x0) getpgrp(0x0) connect$pppoe(r0, &(0x7f0000000440)={0x18, 0x0, {0x0, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f9", 0x9e, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:14:14 executing program 2: openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket(0x0, 0x3, 0x6) getpgrp(0x0) syz_clone(0xd0209500, 0x0, 0x0, 0x0, &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:14:14 executing program 0: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r6 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB="08f70300", @ANYRES32=r5, @ANYBLOB="08001d00", @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r6, @ANYBLOB="08001c00"], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:14:17 executing program 1: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) syz_clone(0xd0209500, &(0x7f0000000100), 0x0, &(0x7f0000000200), &(0x7f0000000240), 0x0) getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={0x0, 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:14:17 executing program 5: gettid() openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket(0x2a, 0x3, 0x6) getpgrp(0x0) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3eb8d", 0xb6, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:14:17 executing program 3: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r2, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3", 0xb4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497") 03:14:17 executing program 2: openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket(0x0, 0x3, 0x6) getpgrp(0x0) syz_clone(0xd0209500, 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:14:18 executing program 4: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = socket(0x0, 0x0, 0x0) getpgrp(0x0) connect$pppoe(r0, &(0x7f0000000440)={0x18, 0x0, {0x0, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f9", 0x9e, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:14:18 executing program 2: openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket(0x0, 0x3, 0x6) getpgrp(0x0) syz_clone(0xd0209500, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0) 03:14:18 executing program 5: gettid() openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket(0x2a, 0x3, 0x6) getpgrp(0x0) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3eb8d", 0xb6, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:14:18 executing program 1: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) syz_clone(0xd0209500, &(0x7f0000000100), 0x0, &(0x7f0000000200), &(0x7f0000000240), 0x0) getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={0x0, 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:14:18 executing program 0: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r6 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB="08f70300", @ANYRES32=r5, @ANYBLOB="08001d00", @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r6, @ANYBLOB="08001c00"], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:14:18 executing program 3: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r2, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3", 0xb4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497") 03:14:18 executing program 2: openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket(0x0, 0x3, 0x6) getpgrp(0x0) syz_clone(0xd0209500, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0) 03:14:18 executing program 5: gettid() openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket(0x2a, 0x3, 0x6) getpgrp(0x0) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3eb8d", 0xb6, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:14:18 executing program 4: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = socket(0x0, 0x0, 0x0) getpgrp(0x0) connect$pppoe(r0, &(0x7f0000000440)={0x18, 0x0, {0x0, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f9", 0x9e, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:14:18 executing program 0: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r6 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB="08f70300", @ANYRES32=r5, @ANYBLOB="08001d00", @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r6, @ANYBLOB="08001c00"], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:14:18 executing program 2: openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket(0x0, 0x3, 0x6) getpgrp(0x0) syz_clone(0xd0209500, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0) 03:14:18 executing program 1: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) syz_clone(0xd0209500, &(0x7f0000000100), 0x0, &(0x7f0000000200), &(0x7f0000000240), 0x0) getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={0x0, 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:14:19 executing program 3: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r2, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3", 0xb4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b") 03:14:19 executing program 2: openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket(0x0, 0x3, 0x6) getpgrp(0x0) syz_clone(0xd0209500, 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000280)) 03:14:19 executing program 5: r0 = gettid() openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket(0x2a, 0x3, 0x6) getpgrp(r0) syz_clone(0x0, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3eb8d", 0xb6, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:14:19 executing program 4: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = socket(0x0, 0x0, 0x0) getpgrp(0x0) connect$pppoe(r0, &(0x7f0000000440)={0x18, 0x0, {0x0, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798", 0x88, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:14:19 executing program 0: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r6 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB="08f70300", @ANYRES32=r5, @ANYBLOB="08001d00", @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r6, @ANYBLOB="08001c00"], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:14:19 executing program 5: r0 = gettid() openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket(0x2a, 0x3, 0x6) getpgrp(r0) syz_clone(0x0, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3eb8d", 0xb6, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:14:19 executing program 2: openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket(0x0, 0x3, 0x6) getpgrp(0x0) syz_clone(0xd0209500, 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000280)) 03:14:19 executing program 3: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r2, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3", 0xb4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b") 03:14:19 executing program 1: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) syz_clone(0xd0209500, &(0x7f0000000100), 0x0, &(0x7f0000000200), &(0x7f0000000240), 0x0) getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={0x0, 0x64}}, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:14:19 executing program 5: r0 = gettid() openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket(0x2a, 0x3, 0x6) getpgrp(r0) syz_clone(0x0, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3eb8d", 0xb6, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:14:19 executing program 2: openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket(0x0, 0x3, 0x6) getpgrp(0x0) syz_clone(0xd0209500, 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000280)) 03:14:19 executing program 3: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r2, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3", 0xb4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b") 03:14:19 executing program 5: r0 = gettid() openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket(0x2a, 0x3, 0x6) getpgrp(r0) syz_clone(0xd0209500, 0x0, 0x0, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:14:20 executing program 2: openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket(0x0, 0x3, 0x6) getpgrp(0x0) syz_clone(0xd0209500, 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497") 03:14:20 executing program 4: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = socket(0x0, 0x0, 0x0) getpgrp(0x0) connect$pppoe(r0, &(0x7f0000000440)={0x18, 0x0, {0x0, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798", 0x88, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:14:20 executing program 2: openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket(0x0, 0x3, 0x6) getpgrp(0x0) syz_clone(0xd0209500, 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000280)='\b') 03:14:22 executing program 0: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r6 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB="08f70300", @ANYRES32=r5, @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r6, @ANYBLOB="08001c00"], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:14:22 executing program 1: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) syz_clone(0xd0209500, &(0x7f0000000100), 0x0, &(0x7f0000000200), &(0x7f0000000240), 0x0) getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={0x0, 0x64}}, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:14:22 executing program 2: openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket(0x0, 0x3, 0x6) getpgrp(0x0) syz_clone(0xd0209500, 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000280)='\b') 03:14:22 executing program 5: r0 = gettid() openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket(0x2a, 0x3, 0x6) getpgrp(r0) syz_clone(0xd0209500, 0x0, 0x0, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:14:22 executing program 4: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = socket(0x0, 0x0, 0x0) getpgrp(0x0) connect$pppoe(r0, &(0x7f0000000440)={0x18, 0x0, {0x0, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798", 0x88, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:14:22 executing program 5: r0 = gettid() openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket(0x2a, 0x3, 0x6) getpgrp(r0) syz_clone(0xd0209500, 0x0, 0x0, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:14:22 executing program 1: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) syz_clone(0xd0209500, &(0x7f0000000100), 0x0, &(0x7f0000000200), &(0x7f0000000240), 0x0) getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={0x0, 0x64}}, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) 03:14:22 executing program 3: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r2, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3", 0xb4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019") 03:14:22 executing program 2: openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket(0x0, 0x3, 0x6) getpgrp(0x0) syz_clone(0xd0209500, 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000280)='\b') 03:14:22 executing program 4: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = socket(0x0, 0x0, 0x0) getpgrp(0x0) connect$pppoe(r0, &(0x7f0000000440)={0x18, 0x0, {0x0, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a4", 0x93, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:14:22 executing program 0: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r6 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB="08f70300", @ANYRES32=r5, @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r6, @ANYBLOB="08001c00"], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) [ 1053.721646][ T1239] ieee802154 phy0 wpan0: encryption failed: -22 [ 1053.728066][ T1239] ieee802154 phy1 wpan1: encryption failed: -22 03:14:32 executing program 2: openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket(0x0, 0x3, 0x6) getpgrp(0x0) syz_clone(0xd0209500, 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92") 03:14:32 executing program 3: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r2, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3", 0xb4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019") 03:14:32 executing program 5: r0 = gettid() openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket(0x2a, 0x3, 0x6) getpgrp(r0) syz_clone(0xd0209500, &(0x7f0000000100), 0x0, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:14:32 executing program 4: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = socket(0x0, 0x0, 0x0) getpgrp(0x0) connect$pppoe(r0, &(0x7f0000000440)={0x18, 0x0, {0x0, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a4", 0x93, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:14:32 executing program 0: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00'}) r5 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB="08f70300", @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r5, @ANYBLOB="08001c00"], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:14:32 executing program 2: openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket(0x0, 0x3, 0x6) getpgrp(0x0) syz_clone(0xd0209500, 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92") 03:14:32 executing program 5: r0 = gettid() openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket(0x2a, 0x3, 0x6) getpgrp(r0) syz_clone(0xd0209500, &(0x7f0000000100), 0x0, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:14:32 executing program 1: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) syz_clone(0xd0209500, &(0x7f0000000100), 0x0, &(0x7f0000000200), &(0x7f0000000240), 0x0) getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={0x0, 0x64}}, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) 03:14:33 executing program 3: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r2, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3", 0xb4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019") 03:14:33 executing program 4: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = socket(0x0, 0x0, 0x0) getpgrp(0x0) connect$pppoe(r0, &(0x7f0000000440)={0x18, 0x0, {0x0, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a4", 0x93, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:14:33 executing program 2: openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket(0x0, 0x3, 0x6) getpgrp(0x0) syz_clone(0xd0209500, 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92") 03:14:33 executing program 0: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00'}) r5 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB="08f70300", @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r5, @ANYBLOB="08001c00"], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:14:33 executing program 5: r0 = gettid() openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket(0x2a, 0x3, 0x6) getpgrp(r0) syz_clone(0xd0209500, &(0x7f0000000100), 0x0, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:14:33 executing program 1: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) syz_clone(0xd0209500, &(0x7f0000000100), 0x0, &(0x7f0000000200), &(0x7f0000000240), 0x0) getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={0x0, 0x64}}, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) 03:14:33 executing program 2: openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket(0x0, 0x3, 0x6) getpgrp(0x0) syz_clone(0xd0209500, 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a46") 03:14:33 executing program 5: r0 = gettid() openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket(0x2a, 0x3, 0x6) getpgrp(r0) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be", 0x5b, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:14:33 executing program 4: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = socket(0x0, 0x0, 0x0) getpgrp(0x0) connect$pppoe(r0, &(0x7f0000000440)={0x18, 0x0, {0x0, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1f", 0x99, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:14:33 executing program 3: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r2, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3", 0xb4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa46444") 03:14:34 executing program 2: openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket(0x0, 0x3, 0x6) getpgrp(0x0) syz_clone(0xd0209500, 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92") 03:14:34 executing program 0: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00'}) r5 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB="08f70300", @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r5, @ANYBLOB="08001c00"], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:14:34 executing program 1: r0 = gettid() openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket(0x2a, 0x3, 0x6) getpgrp(r0) syz_clone(0xd0209500, &(0x7f0000000100), 0x0, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:14:34 executing program 2: openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket(0x0, 0x3, 0x6) getpgrp(0x0) syz_clone(0xd0209500, 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92") 03:14:34 executing program 3: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r2, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3", 0xb4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa46444") 03:14:34 executing program 4: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = socket(0x0, 0x0, 0x0) getpgrp(0x0) connect$pppoe(r0, &(0x7f0000000440)={0x18, 0x0, {0x0, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1f", 0x99, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:14:34 executing program 5: r0 = gettid() openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket(0x2a, 0x3, 0x6) getpgrp(r0) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be", 0x5b, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:14:35 executing program 2: openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket(0x0, 0x3, 0x6) getpgrp(0x0) syz_clone(0xd0209500, 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92") 03:14:35 executing program 0: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00'}) r5 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB="08f70300", @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r5, @ANYBLOB="08001c00"], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:14:35 executing program 2: openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket(0x0, 0x3, 0x6) getpgrp(0x0) syz_clone(0xd0209500, 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba2998") 03:14:35 executing program 1: openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket(0x0, 0x3, 0x6) getpgrp(0x0) syz_clone(0xd0209500, 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92") 03:14:35 executing program 4: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = socket(0x0, 0x0, 0x0) getpgrp(0x0) connect$pppoe(r0, &(0x7f0000000440)={0x18, 0x0, {0x0, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1f", 0x99, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:14:35 executing program 2: openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket(0x0, 0x3, 0x6) getpgrp(0x0) syz_clone(0xd0209500, 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba2998") 03:14:35 executing program 3: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r2, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3", 0xb4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa46444") 03:14:36 executing program 0: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00'}) r5 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB="08f70300", @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r5, @ANYBLOB="08001c00"], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:14:36 executing program 2: openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket(0x0, 0x3, 0x6) getpgrp(0x0) syz_clone(0xd0209500, 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba2998") 03:14:36 executing program 1: openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket(0x0, 0x3, 0x6) getpgrp(0x0) syz_clone(0xd0209500, 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92") 03:14:36 executing program 4: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = socket(0x0, 0x0, 0x0) getpgrp(0x0) connect$pppoe(r0, &(0x7f0000000440)={0x18, 0x0, {0x0, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38", 0x9c, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:14:36 executing program 5: r0 = gettid() openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket(0x2a, 0x3, 0x6) getpgrp(r0) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be", 0x5b, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:14:36 executing program 3: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r2, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3", 0xb4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1") 03:14:44 executing program 2: openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket(0x0, 0x3, 0x6) getpgrp(0x0) syz_clone(0xd0209500, 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a") 03:14:44 executing program 0: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00'}) r5 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB="08f70300", @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r5, @ANYBLOB="08001c00"], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:14:44 executing program 2: openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket(0x0, 0x3, 0x6) getpgrp(0x0) syz_clone(0xd0209500, 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a") 03:14:44 executing program 2: openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket(0x0, 0x3, 0x6) getpgrp(0x0) syz_clone(0xd0209500, 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a") 03:14:44 executing program 5: r0 = gettid() openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket(0x2a, 0x3, 0x6) getpgrp(r0) syz_clone(0xd0209500, &(0x7f0000000100), 0x0, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:14:45 executing program 2: openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket(0x0, 0x3, 0x6) getpgrp(0x0) syz_clone(0xd0209500, 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a42") 03:14:45 executing program 2: openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket(0x0, 0x3, 0x6) getpgrp(0x0) syz_clone(0xd0209500, 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a42") 03:14:45 executing program 5: r0 = gettid() openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket(0x2a, 0x3, 0x6) getpgrp(r0) syz_clone(0xd0209500, &(0x7f0000000100), 0x0, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:14:47 executing program 1: openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket(0x0, 0x3, 0x6) getpgrp(0x0) syz_clone(0xd0209500, 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92") 03:14:47 executing program 5: r0 = gettid() openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket(0x2a, 0x3, 0x6) getpgrp(r0) syz_clone(0xd0209500, &(0x7f0000000100), 0x0, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:14:47 executing program 4: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = socket(0x0, 0x0, 0x0) getpgrp(0x0) connect$pppoe(r0, &(0x7f0000000440)={0x18, 0x0, {0x0, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38", 0x9c, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:14:48 executing program 3: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r2, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3", 0xb4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1") 03:14:48 executing program 5: r0 = gettid() openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket(0x2a, 0x3, 0x6) getpgrp(r0) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf2", 0x2e, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:14:48 executing program 4: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = socket(0x0, 0x0, 0x0) getpgrp(0x0) connect$pppoe(r0, &(0x7f0000000440)={0x18, 0x0, {0x0, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38", 0x9c, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:14:48 executing program 0: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r6 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYRES32=r5, @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r6, @ANYBLOB="08001c00"], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:14:48 executing program 1: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00'}) r5 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB="08f70300", @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r5, @ANYBLOB="08001c00"], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:14:48 executing program 2: openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket(0x0, 0x3, 0x6) getpgrp(0x0) syz_clone(0xd0209500, 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a42") 03:14:48 executing program 0: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r6 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYRES32=r5, @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r6, @ANYBLOB="08001c00"], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:14:48 executing program 3: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r2, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3", 0xb4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1") 03:14:48 executing program 2: openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket(0x0, 0x3, 0x6) getpgrp(0x0) syz_clone(0xd0209500, 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a") 03:14:48 executing program 1: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00'}) r5 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB="08f70300", @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r5, @ANYBLOB="08001c00"], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:14:48 executing program 0: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r6 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYRES32=r5, @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r6, @ANYBLOB="08001c00"], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:14:48 executing program 5: r0 = gettid() openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket(0x2a, 0x3, 0x6) getpgrp(r0) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf2", 0x2e, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:14:48 executing program 4: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = socket(0x0, 0x0, 0x0) getpgrp(0x0) connect$pppoe(r0, &(0x7f0000000440)={0x18, 0x0, {0x0, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6", 0x9d, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:14:48 executing program 2: openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket(0x0, 0x3, 0x6) getpgrp(0x0) syz_clone(0xd0209500, 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a") 03:14:48 executing program 3: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r2, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3", 0xb4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb") 03:14:48 executing program 0: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r6 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB, @ANYRES32=r5, @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r6, @ANYBLOB="08001c00"], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:14:48 executing program 1: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r6 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYRES32=r5, @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r6, @ANYBLOB="08001c00"], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:14:48 executing program 5: r0 = gettid() openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket(0x2a, 0x3, 0x6) getpgrp(r0) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf2", 0x2e, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:14:48 executing program 4: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = socket(0x0, 0x0, 0x0) getpgrp(0x0) connect$pppoe(r0, &(0x7f0000000440)={0x18, 0x0, {0x0, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6", 0x9d, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:14:51 executing program 2: openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket(0x0, 0x3, 0x6) getpgrp(0x0) syz_clone(0xd0209500, 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a") 03:14:51 executing program 0: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r6 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB, @ANYRES32=r5, @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r6, @ANYBLOB="08001c00"], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:14:51 executing program 2: openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket(0x0, 0x3, 0x6) getpgrp(0x0) syz_clone(0xd0209500, 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a") 03:14:52 executing program 4: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = socket(0x0, 0x0, 0x0) getpgrp(0x0) connect$pppoe(r0, &(0x7f0000000440)={0x18, 0x0, {0x0, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6", 0x9d, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:14:52 executing program 5: r0 = gettid() openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket(0x2a, 0x3, 0x6) getpgrp(r0) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984", 0x45, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:14:52 executing program 1: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r6 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYRES32=r5, @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r6, @ANYBLOB="08001c00"], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:14:52 executing program 2: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = socket(0x0, 0x0, 0x0) getpgrp(0x0) connect$pppoe(r0, &(0x7f0000000440)={0x18, 0x0, {0x0, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6", 0x9d, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:14:53 executing program 3: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r2, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3", 0xb4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb") 03:14:53 executing program 0: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r6 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB, @ANYRES32=r5, @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r6, @ANYBLOB="08001c00"], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:14:53 executing program 2: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r6 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB, @ANYRES32=r5, @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r6, @ANYBLOB="08001c00"], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:14:53 executing program 4: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = socket(0x0, 0x0, 0x0) getpgrp(0x0) connect$pppoe(r0, &(0x7f0000000440)={0x18, 0x0, {0x0, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f9", 0x9e, 0x0, &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:14:53 executing program 5: r0 = gettid() openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket(0x2a, 0x3, 0x6) getpgrp(r0) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984", 0x45, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:14:53 executing program 1: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r6 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYRES32=r5, @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r6, @ANYBLOB="08001c00"], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:14:53 executing program 0: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r6 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB="08f7", @ANYRES32=r5, @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r6, @ANYBLOB="08001c00"], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:14:53 executing program 2: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r6 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB, @ANYRES32=r5, @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r6, @ANYBLOB="08001c00"], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:15:02 executing program 1: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r6 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYRES32=r5, @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r6, @ANYBLOB="08001c00"], 0x64}}, 0x4) 03:15:03 executing program 3: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r2, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3", 0xb4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb") 03:15:03 executing program 2: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r6 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB, @ANYRES32=r5, @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r6, @ANYBLOB="08001c00"], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:15:03 executing program 0: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r6 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB="08f7", @ANYRES32=r5, @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r6, @ANYBLOB="08001c00"], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:15:03 executing program 4: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = socket(0x0, 0x0, 0x0) getpgrp(0x0) connect$pppoe(r0, &(0x7f0000000440)={0x18, 0x0, {0x0, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f9", 0x9e, 0x0, &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:15:03 executing program 5: r0 = gettid() openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket(0x2a, 0x3, 0x6) getpgrp(r0) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984", 0x45, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:15:04 executing program 0: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r6 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB="08f7", @ANYRES32=r5, @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r6, @ANYBLOB="08001c00"], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:15:04 executing program 5: r0 = gettid() openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket(0x2a, 0x3, 0x6) getpgrp(r0) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c74579", 0x50, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:15:04 executing program 1: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r6 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYRES32=r5, @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r6, @ANYBLOB="08001c00"], 0x64}}, 0x4) 03:15:04 executing program 4: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = socket(0x0, 0x0, 0x0) getpgrp(0x0) connect$pppoe(r0, &(0x7f0000000440)={0x18, 0x0, {0x0, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f9", 0x9e, 0x0, &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:15:04 executing program 3: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r2, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3", 0xb4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c") 03:15:04 executing program 2: r0 = gettid() openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket(0x2a, 0x3, 0x6) getpgrp(r0) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984", 0x45, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:15:05 executing program 4: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = socket(0x0, 0x0, 0x0) getpgrp(0x0) connect$pppoe(r0, &(0x7f0000000440)={0x18, 0x0, {0x0, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f9", 0x9e, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:15:05 executing program 0: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r6 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB="08f703", @ANYRES32=r5, @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r6, @ANYBLOB="08001c00"], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:15:05 executing program 5: r0 = gettid() openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket(0x2a, 0x3, 0x6) getpgrp(r0) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c74579", 0x50, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:15:05 executing program 3: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r2, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3", 0xb4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c") 03:15:05 executing program 1: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r6 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYRES32=r5, @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r6, @ANYBLOB="08001c00"], 0x64}}, 0x4) 03:15:05 executing program 4: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = socket(0x0, 0x0, 0x0) getpgrp(0x0) connect$pppoe(r0, &(0x7f0000000440)={0x18, 0x0, {0x0, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f9", 0x9e, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:15:05 executing program 2: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r6 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYRES32=r5, @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r6, @ANYBLOB="08001c00"], 0x64}}, 0x4) 03:15:05 executing program 0: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r6 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB="08f703", @ANYRES32=r5, @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r6, @ANYBLOB="08001c00"], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:15:06 executing program 3: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r2, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3", 0xb4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb") 03:15:06 executing program 4: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = socket(0x0, 0x0, 0x0) getpgrp(0x0) connect$pppoe(r0, &(0x7f0000000440)={0x18, 0x0, {0x0, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f9", 0x9e, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:15:06 executing program 1: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00'}) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() 03:15:06 executing program 5: r0 = gettid() openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket(0x2a, 0x3, 0x6) getpgrp(r0) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c74579", 0x50, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:15:06 executing program 2: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r6 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB="08f703", @ANYRES32=r5, @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r6, @ANYBLOB="08001c00"], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:15:07 executing program 3: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r2, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3", 0xb4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9") 03:15:07 executing program 3: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r2, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3", 0xb4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1") 03:15:07 executing program 2: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r6 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB="08f703", @ANYRES32=r5, @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r6, @ANYBLOB="08001c00"], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:15:08 executing program 1: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00'}) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() 03:15:08 executing program 4: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = socket(0x0, 0x0, 0x0) getpgrp(0x0) connect$pppoe(r0, &(0x7f0000000440)={0x18, 0x0, {0x0, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f9", 0x9e, &(0x7f0000000200), &(0x7f0000000240), 0x0) 03:15:08 executing program 1: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00'}) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() 03:15:08 executing program 0: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r6 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB="08f703", @ANYRES32=r5, @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r6, @ANYBLOB="08001c00"], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:15:08 executing program 5: r0 = gettid() openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket(0x2a, 0x3, 0x6) getpgrp(r0) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0a", 0x56, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:15:08 executing program 4: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = socket(0x0, 0x0, 0x0) getpgrp(0x0) connect$pppoe(r0, &(0x7f0000000440)={0x18, 0x0, {0x0, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f9", 0x9e, &(0x7f0000000200), &(0x7f0000000240), 0x0) 03:15:08 executing program 1: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r6 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYRES32=r5, @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r6, @ANYBLOB="08001c00"], 0x64}}, 0x4) 03:15:08 executing program 5: r0 = gettid() openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket(0x2a, 0x3, 0x6) getpgrp(r0) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0a", 0x56, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:15:08 executing program 0: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r6 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYBLOB="08f70300", @ANYRES32=r5, @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r6, @ANYBLOB="08001c00"], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:15:09 executing program 4: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r6 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB="08f703", @ANYRES32=r5, @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r6, @ANYBLOB="08001c00"], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:15:16 executing program 3: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r2, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3", 0xb4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1") 03:15:16 executing program 5: r0 = gettid() openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket(0x2a, 0x3, 0x6) getpgrp(r0) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0a", 0x56, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:15:16 executing program 0: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r6 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYBLOB="08f70300", @ANYRES32=r5, @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r6, @ANYBLOB="08001c00"], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:15:16 executing program 1: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r5, @ANYBLOB="08001c00"], 0x64}}, 0x4) 03:15:16 executing program 4: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r6 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB="08f703", @ANYRES32=r5, @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r6, @ANYBLOB="08001c00"], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:15:16 executing program 2: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r6 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYBLOB="08f70300", @ANYRES32=r5, @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r6, @ANYBLOB="08001c00"], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:15:16 executing program 4: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r6 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB="08f703", @ANYRES32=r5, @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r6, @ANYBLOB="08001c00"], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:15:17 executing program 1: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r5, @ANYBLOB="08001c00"], 0x64}}, 0x4) 03:15:17 executing program 3: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r2, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3", 0xb4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1") 03:15:20 executing program 0: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r6 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYBLOB="08f70300", @ANYRES32=r5, @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r6, @ANYBLOB="08001c00"], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:15:20 executing program 0: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r6 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32, @ANYBLOB="08f70300", @ANYRES32=r5, @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r6, @ANYBLOB="08001c00"], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:15:20 executing program 1: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r5, @ANYBLOB="08001c00"], 0x64}}, 0x4) 03:15:21 executing program 0: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r6 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32, @ANYBLOB="08f70300", @ANYRES32=r5, @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r6, @ANYBLOB="08001c00"], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:15:21 executing program 5: r0 = gettid() openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket(0x2a, 0x3, 0x6) getpgrp(r0) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:15:21 executing program 1: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r5 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYRES32=r4, @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r5, @ANYBLOB="08001c00"], 0x64}}, 0x4) 03:15:21 executing program 3: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r2, &(0x7f0000000440)={0x18, 0x0, {0x3, @remote, 'ip6gre0\x00'}}, 0x1e) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d798a93fda8052a12f367709a41868458efe1fcbbd38c6f95d4afda39fa914754749ee4123bbb4968f993747e3b3", 0xb4, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1") 03:15:21 executing program 4: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r6 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB="08f703", @ANYRES32=r5, @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r6, @ANYBLOB="08001c00"], 0x64}}, 0x4) 03:15:21 executing program 2: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r6 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYBLOB="08f70300", @ANYRES32=r5, @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r6, @ANYBLOB="08001c00"], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:15:21 executing program 0: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r6 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32, @ANYBLOB="08f70300", @ANYRES32=r5, @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r6, @ANYBLOB="08001c00"], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:15:22 executing program 2: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r6 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYBLOB="08f70300", @ANYRES32=r5, @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r6, @ANYBLOB="08001c00"], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:15:22 executing program 4: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00'}) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() 03:15:22 executing program 5: r0 = gettid() openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket(0x2a, 0x3, 0x6) getpgrp(r0) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:15:22 executing program 3: r0 = gettid() openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket(0x2a, 0x3, 0x6) getpgrp(r0) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:15:22 executing program 0: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r6 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYRES32=r0, @ANYBLOB="08f70300", @ANYRES32=r5, @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r6, @ANYBLOB="08001c00"], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:15:22 executing program 1: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r5 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYRES32=r4, @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r5, @ANYBLOB="08001c00"], 0x64}}, 0x4) [ 1115.162114][ T1239] ieee802154 phy0 wpan0: encryption failed: -22 [ 1115.168534][ T1239] ieee802154 phy1 wpan1: encryption failed: -22 03:15:28 executing program 2: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r5 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYRES32=r4, @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r5, @ANYBLOB="08001c00"], 0x64}}, 0x4) 03:15:28 executing program 1: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r5 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYRES32=r4, @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r5, @ANYBLOB="08001c00"], 0x64}}, 0x4) 03:15:28 executing program 4: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00'}) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() 03:15:28 executing program 3: r0 = gettid() openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket(0x2a, 0x3, 0x6) getpgrp(r0) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:15:28 executing program 5: r0 = gettid() openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket(0x2a, 0x3, 0x6) getpgrp(r0) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:15:28 executing program 0: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r6 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYRES32=r0, @ANYBLOB="08f70300", @ANYRES32=r5, @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r6, @ANYBLOB="08001c00"], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:15:28 executing program 2: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r6 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYRES32=r0, @ANYBLOB="08f70300", @ANYRES32=r5, @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r6, @ANYBLOB="08001c00"], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:15:30 executing program 3: r0 = gettid() openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket(0x2a, 0x3, 0x6) getpgrp(r0) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:15:30 executing program 1: r0 = gettid() openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r1, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r4 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r2, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYRES32=r3, @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r4, @ANYBLOB="08001c00"], 0x64}}, 0x4) 03:15:30 executing program 4: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00'}) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() 03:15:30 executing program 2: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r6 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYRES32=r0, @ANYBLOB="08f70300", @ANYRES32=r5, @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r6, @ANYBLOB="08001c00"], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:15:30 executing program 0: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r6 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYRES32=r0, @ANYBLOB="08f70300", @ANYRES32=r5, @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r6, @ANYBLOB="08001c00"], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:15:30 executing program 3: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00'}) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() 03:15:30 executing program 4: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r6 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB="08f703", @ANYRES32=r5, @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r6, @ANYBLOB="08001c00"], 0x64}}, 0x4) 03:15:35 executing program 1: r0 = gettid() openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r1, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r4 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r2, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYRES32=r3, @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r4, @ANYBLOB="08001c00"], 0x64}}, 0x4) 03:15:36 executing program 4: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r6 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB="08f703", @ANYRES32=r5, @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r6, @ANYBLOB="08001c00"], 0x64}}, 0x4) [ 1123.944620][ T1032] netdevsim netdevsim2 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1124.005026][ T1032] netdevsim netdevsim2 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1124.064176][ T1032] netdevsim netdevsim2 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1124.125708][ T1032] netdevsim netdevsim2 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1125.278841][ T1032] device hsr_slave_0 left promiscuous mode [ 1125.286510][ T1032] device hsr_slave_1 left promiscuous mode [ 1125.295107][ T1032] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1125.304446][ T1032] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1125.313428][ T1032] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1125.323011][ T1032] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1125.332679][ T1032] device bridge_slave_1 left promiscuous mode [ 1125.338837][ T1032] bridge0: port 2(bridge_slave_1) entered disabled state [ 1125.347073][ T1032] device bridge_slave_0 left promiscuous mode [ 1125.354940][ T1032] bridge0: port 1(bridge_slave_0) entered disabled state [ 1125.366010][ T1032] device veth1_macvtap left promiscuous mode [ 1125.373556][ T1032] device veth0_macvtap left promiscuous mode [ 1125.379611][ T1032] device veth1_vlan left promiscuous mode [ 1125.385815][ T1032] device veth0_vlan left promiscuous mode [ 1125.497844][ T1032] team0 (unregistering): Port device team_slave_1 removed [ 1125.509421][ T1032] team0 (unregistering): Port device team_slave_0 removed [ 1125.519509][ T1032] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1125.532646][ T1032] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1125.559184][ T1032] bond0 (unregistering): Released all slaves 03:15:40 executing program 5: r0 = gettid() openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket(0x2a, 0x3, 0x6) getpgrp(r0) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68", 0x5a, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:15:40 executing program 1: r0 = gettid() openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r1, 0x0, 0x0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r4 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r2, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYRES32=r3, @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r4, @ANYBLOB="08001c00"], 0x64}}, 0x4) 03:15:40 executing program 0: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r6 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB, @ANYRES32=r0, @ANYBLOB="08f70300", @ANYRES32=r5, @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r6, @ANYBLOB="08001c00"], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:15:40 executing program 4: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r6 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB="08f703", @ANYRES32=r5, @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r6, @ANYBLOB="08001c00"], 0x64}}, 0x4) 03:15:40 executing program 3: r0 = gettid() openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r1, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r4 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r2, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYRES32=r3, @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r4, @ANYBLOB="08001c00"], 0x64}}, 0x4) 03:15:40 executing program 1: r0 = gettid() openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r1, 0x0, 0x0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r4 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r2, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYRES32=r3, @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r4, @ANYBLOB="08001c00"], 0x64}}, 0x4) 03:16:20 executing program 2: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r6 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYRES32=r0, @ANYBLOB="08f70300", @ANYRES32=r5, @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r6, @ANYBLOB="08001c00"], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:16:20 executing program 4: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB="08f703", @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r5, @ANYBLOB="08001c00"], 0x64}}, 0x4) 03:16:20 executing program 1: r0 = gettid() openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r1, 0x0, 0x0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r4 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r2, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYRES32=r3, @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r4, @ANYBLOB="08001c00"], 0x64}}, 0x4) 03:16:20 executing program 3: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r6 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB, @ANYRES32=r0, @ANYBLOB="08f70300", @ANYRES32=r5, @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r6, @ANYBLOB="08001c00"], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:16:20 executing program 5: r0 = gettid() openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket(0x2a, 0x3, 0x6) getpgrp(r0) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68", 0x5a, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:16:20 executing program 0: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r6 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB, @ANYRES32=r0, @ANYBLOB="08f70300", @ANYRES32=r5, @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r6, @ANYBLOB="08001c00"], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:16:21 executing program 5: r0 = gettid() openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket(0x2a, 0x3, 0x6) getpgrp(r0) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68", 0x5a, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:16:21 executing program 1: r0 = gettid() openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket(0x2a, 0x3, 0x6) getpgrp(r0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r3 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r1, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYRES32=r2, @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r3, @ANYBLOB="08001c00"], 0x64}}, 0x4) 03:16:21 executing program 0: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r6 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB, @ANYRES32=r0, @ANYBLOB="08f70300", @ANYRES32=r5, @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r6, @ANYBLOB="08001c00"], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:16:21 executing program 4: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB="08f703", @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r5, @ANYBLOB="08001c00"], 0x64}}, 0x4) 03:16:21 executing program 3: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r6 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB, @ANYRES32=r0, @ANYBLOB="08f70300", @ANYRES32=r5, @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r6, @ANYBLOB="08001c00"], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:16:21 executing program 0: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r6 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c", @ANYRES32=r0, @ANYBLOB="08f70300", @ANYRES32=r5, @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r6, @ANYBLOB="08001c00"], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) [ 1175.882753][ T4722] Bluetooth: hci0: unexpected cc 0x0c03 length: 249 > 1 [ 1175.890255][ T4722] Bluetooth: hci0: unexpected cc 0x1003 length: 249 > 9 [ 1175.897782][ T4722] Bluetooth: hci0: unexpected cc 0x1001 length: 249 > 9 [ 1175.905401][ T4722] Bluetooth: hci0: unexpected cc 0x0c23 length: 249 > 4 [ 1175.913094][ T4722] Bluetooth: hci0: unexpected cc 0x0c25 length: 249 > 3 [ 1175.920266][ T4722] Bluetooth: hci0: unexpected cc 0x0c38 length: 249 > 2 [ 1175.928131][ T4721] Bluetooth: hci0: HCI_REQ-0x0c1a [ 1175.989202][ T4721] chnl_net:caif_netlink_parms(): no params data found [ 1176.015895][ T4721] bridge0: port 1(bridge_slave_0) entered blocking state [ 1176.023422][ T4721] bridge0: port 1(bridge_slave_0) entered disabled state [ 1176.031455][ T4721] device bridge_slave_0 entered promiscuous mode [ 1176.038805][ T4721] bridge0: port 2(bridge_slave_1) entered blocking state [ 1176.046163][ T4721] bridge0: port 2(bridge_slave_1) entered disabled state [ 1176.054412][ T4721] device bridge_slave_1 entered promiscuous mode [ 1176.068518][ T4721] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1176.078813][ T4721] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1176.097202][ T4721] team0: Port device team_slave_0 added [ 1176.103679][ T4721] team0: Port device team_slave_1 added [ 1176.116760][ T4721] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1176.124362][ T4721] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1176.151778][ T4721] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1176.163128][ T4721] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1176.170229][ T4721] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1176.196239][ T4721] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1176.218142][ T4721] device hsr_slave_0 entered promiscuous mode [ 1176.224855][ T4721] device hsr_slave_1 entered promiscuous mode [ 1176.231494][ T4721] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 1176.239091][ T4721] Cannot create hsr debugfs directory [ 1176.601679][ T1239] ieee802154 phy0 wpan0: encryption failed: -22 [ 1176.608053][ T1239] ieee802154 phy1 wpan1: encryption failed: -22 [ 1176.735127][ T4721] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 1176.744091][ T4721] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 1176.755911][ T4721] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 1176.765943][ T4721] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 1176.787441][ T4721] bridge0: port 2(bridge_slave_1) entered blocking state [ 1176.794590][ T4721] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1176.801933][ T4721] bridge0: port 1(bridge_slave_0) entered blocking state [ 1176.808992][ T4721] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1176.849715][ T4721] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1176.866370][T22935] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1176.877687][T22935] bridge0: port 1(bridge_slave_0) entered disabled state [ 1176.885558][T22935] bridge0: port 2(bridge_slave_1) entered disabled state [ 1176.895759][T22935] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1176.907351][ T4721] 8021q: adding VLAN 0 to HW filter on device team0 [ 1176.923419][T22935] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1176.933871][T22935] bridge0: port 1(bridge_slave_0) entered blocking state [ 1176.941086][T22935] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1176.963195][ T3723] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1176.974623][ T3723] bridge0: port 2(bridge_slave_1) entered blocking state [ 1176.981788][ T3723] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1176.990109][ T3723] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1177.018501][ T4721] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1177.035490][ T4721] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1177.047749][T22944] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1177.056268][T22944] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1177.065328][T22944] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1177.074522][T22944] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1177.083048][T22944] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1177.091523][T22944] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1177.099766][T22944] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1177.110982][T22944] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1177.211030][T22944] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1177.219586][T22944] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1177.229716][ T4721] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1177.246416][T22944] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1177.256499][T22944] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1177.274402][ T4721] device veth0_vlan entered promiscuous mode [ 1177.283746][T22935] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1177.292398][T22935] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1177.305086][ T4721] device veth1_vlan entered promiscuous mode [ 1177.312851][T22944] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1177.320625][T22944] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1177.329639][T22944] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 1177.347969][ T4721] device veth0_macvtap entered promiscuous mode [ 1177.356795][T22935] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 1177.365614][T22935] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1177.374910][T22935] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1177.385292][ T4721] device veth1_macvtap entered promiscuous mode [ 1177.394408][T22944] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 1177.402919][T22944] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1177.416725][ T4721] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1177.428036][ T4721] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1177.438651][ T4721] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1177.449370][ T4721] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1177.459608][ T4721] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1177.470196][ T4721] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1177.480189][ T4721] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1177.491250][ T4721] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1177.503231][ T4721] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1177.513864][ T4721] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1177.524824][ T4721] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1177.534327][T22935] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1177.545054][T22935] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1177.554945][ T4721] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1177.567965][ T4721] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1177.578413][ T4721] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1177.592226][ T4721] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1177.602822][ T4721] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1177.615384][ T4721] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1177.625973][ T4721] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1177.637765][ T4721] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1177.648803][ T4721] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1177.661703][ T4721] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1177.673321][ T4721] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1177.682482][T22944] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1177.694164][T22944] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1177.704739][ T4721] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1177.715496][ T4721] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1177.726139][ T4721] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1177.736842][ T4721] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1177.777631][T18699] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 1177.788373][T18699] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 1177.808271][T22944] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 1177.817774][T18699] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 1177.827361][T18699] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 1177.836902][T22944] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready 03:16:30 executing program 1: r0 = gettid() openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket(0x2a, 0x3, 0x6) getpgrp(r0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r3 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r1, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYRES32=r2, @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r3, @ANYBLOB="08001c00"], 0x64}}, 0x4) 03:16:30 executing program 5: r0 = gettid() openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket(0x2a, 0x3, 0x6) getpgrp(r0) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be", 0x5b, 0x0, &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:16:30 executing program 4: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB="08f703", @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r5, @ANYBLOB="08001c00"], 0x64}}, 0x4) 03:16:30 executing program 3: r0 = gettid() openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r1, 0x0, 0x0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r4 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r2, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYRES32=r3, @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r4, @ANYBLOB="08001c00"], 0x64}}, 0x4) 03:16:30 executing program 0: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r6 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c", @ANYRES32=r0, @ANYBLOB="08f70300", @ANYRES32=r5, @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r6, @ANYBLOB="08001c00"], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:16:30 executing program 2: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r6 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c", @ANYRES32=r0, @ANYBLOB="08f70300", @ANYRES32=r5, @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r6, @ANYBLOB="08001c00"], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) [ 1177.960875][ T4722] Bluetooth: hci0: command 0x0409 tx timeout 03:16:31 executing program 1: r0 = gettid() openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket(0x2a, 0x3, 0x6) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r3 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r1, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYRES32=r2, @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r3, @ANYBLOB="08001c00"], 0x64}}, 0x4) 03:16:31 executing program 0: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r6 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c", @ANYRES32=r0, @ANYBLOB="08f70300", @ANYRES32=r5, @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r6, @ANYBLOB="08001c00"], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:16:31 executing program 5: r0 = gettid() openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket(0x2a, 0x3, 0x6) getpgrp(r0) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be", 0x5b, 0x0, &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:16:31 executing program 4: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r5 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB="08f703", @ANYRES32=r4, @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r5, @ANYBLOB="08001c00"], 0x64}}, 0x4) 03:16:31 executing program 3: r0 = gettid() openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket(0x2a, 0x3, 0x6) getpgrp(r0) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68", 0x5a, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:16:31 executing program 2: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r6 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c", @ANYRES32=r0, @ANYBLOB="08f70300", @ANYRES32=r5, @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r6, @ANYBLOB="08001c00"], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:16:31 executing program 5: r0 = gettid() openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket(0x2a, 0x3, 0x6) getpgrp(r0) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be", 0x5b, 0x0, &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:16:31 executing program 1: r0 = gettid() openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket(0x2a, 0x3, 0x6) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r3 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r1, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYRES32=r2, @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r3, @ANYBLOB="08001c00"], 0x64}}, 0x4) 03:16:31 executing program 0: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r6 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c0006000000000000", @ANYRES32=r0, @ANYBLOB="08f70300", @ANYRES32=r5, @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r6, @ANYBLOB="08001c00"], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:16:31 executing program 4: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r5 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB="08f703", @ANYRES32=r4, @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r5, @ANYBLOB="08001c00"], 0x64}}, 0x4) 03:16:31 executing program 3: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r5 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB="08f703", @ANYRES32=r4, @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r5, @ANYBLOB="08001c00"], 0x64}}, 0x4) 03:16:31 executing program 5: r0 = gettid() openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket(0x2a, 0x3, 0x6) getpgrp(r0) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be", 0x5b, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:16:31 executing program 2: r0 = gettid() openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket(0x2a, 0x3, 0x6) getpgrp(r0) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be", 0x5b, 0x0, &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:16:31 executing program 5: r0 = gettid() openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket(0x2a, 0x3, 0x6) getpgrp(r0) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be", 0x5b, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") [ 1180.040924][ T4722] Bluetooth: hci0: command 0x041b tx timeout [ 1182.121133][ T4722] Bluetooth: hci0: command 0x040f tx timeout [ 1184.200886][ T4722] Bluetooth: hci0: command 0x0419 tx timeout 03:16:38 executing program 4: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r5 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB="08f703", @ANYRES32=r4, @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r5, @ANYBLOB="08001c00"], 0x64}}, 0x4) 03:16:38 executing program 3: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r5 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB="08f703", @ANYRES32=r4, @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r5, @ANYBLOB="08001c00"], 0x64}}, 0x4) 03:16:39 executing program 0: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r6 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c0006000000000000", @ANYRES32=r0, @ANYBLOB="08f70300", @ANYRES32=r5, @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r6, @ANYBLOB="08001c00"], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:16:42 executing program 1: r0 = gettid() openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket(0x2a, 0x3, 0x6) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r3 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r1, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYRES32=r2, @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r3, @ANYBLOB="08001c00"], 0x64}}, 0x4) 03:16:42 executing program 3: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r6 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c", @ANYRES32=r0, @ANYBLOB="08f70300", @ANYRES32=r5, @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r6, @ANYBLOB="08001c00"], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:16:42 executing program 0: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r6 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c0006000000000000", @ANYRES32=r0, @ANYBLOB="08f70300", @ANYRES32=r5, @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r6, @ANYBLOB="08001c00"], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:16:42 executing program 4: r0 = gettid() openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r1, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r4 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r2, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB="08f703", @ANYRES32=r3, @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r4, @ANYBLOB="08001c00"], 0x64}}, 0x4) 03:16:42 executing program 1: r0 = gettid() openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r3 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r1, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYRES32=r2, @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r3, @ANYBLOB="08001c00"], 0x64}}, 0x4) 03:16:43 executing program 0: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r6 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008", @ANYRES32=r0, @ANYBLOB="08f70300", @ANYRES32=r5, @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r6, @ANYBLOB="08001c00"], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:16:43 executing program 3: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r6 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c0006000000000000", @ANYRES32=r0, @ANYBLOB="08f70300", @ANYRES32=r5, @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r6, @ANYBLOB="08001c00"], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:16:43 executing program 2: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r6 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32, @ANYBLOB="08f70300", @ANYRES32=r5, @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r6, @ANYBLOB="08001c00"], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:16:44 executing program 5: r0 = gettid() openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket(0x2a, 0x3, 0x6) getpgrp(r0) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be", 0x5b, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:16:44 executing program 5: r0 = gettid() openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket(0x2a, 0x3, 0x6) getpgrp(r0) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be", 0x5b, &(0x7f0000000200), &(0x7f0000000240), 0x0) 03:16:44 executing program 2: r0 = gettid() openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket(0x2a, 0x3, 0x6) getpgrp(r0) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff", 0x59, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:16:44 executing program 5: r0 = gettid() openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket(0x2a, 0x3, 0x6) getpgrp(r0) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be", 0x5b, &(0x7f0000000200), &(0x7f0000000240), 0x0) 03:16:44 executing program 2: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r6 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB="08f703", @ANYRES32=r5, @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r6, @ANYBLOB="08001c00"], 0x64}}, 0x4) 03:16:45 executing program 5: r0 = gettid() openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket(0x2a, 0x3, 0x6) getpgrp(r0) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be", 0x5b, &(0x7f0000000200), &(0x7f0000000240), 0x0) 03:16:45 executing program 2: r0 = gettid() openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket(0x2a, 0x3, 0x6) getpgrp(r0) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0a", 0x56, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:16:52 executing program 5: r0 = gettid() openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket(0x2a, 0x3, 0x6) getpgrp(r0) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be", 0x5b, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)) 03:16:52 executing program 2: r0 = gettid() openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket(0x2a, 0x3, 0x6) getpgrp(r0) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0a", 0x56, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa464446e2254a1a9fb6c0e") 03:16:52 executing program 4: r0 = gettid() openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r1, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r4 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r2, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB="08f703", @ANYRES32=r3, @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r4, @ANYBLOB="08001c00"], 0x64}}, 0x4) 03:16:52 executing program 1: r0 = gettid() openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r3 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r1, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYRES32=r2, @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r3, @ANYBLOB="08001c00"], 0x64}}, 0x4) 03:16:52 executing program 0: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r6 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008", @ANYRES32=r0, @ANYBLOB="08f70300", @ANYRES32=r5, @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r6, @ANYBLOB="08001c00"], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:16:52 executing program 3: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r6 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c0006000000000000", @ANYRES32=r0, @ANYBLOB="08f70300", @ANYRES32=r5, @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r6, @ANYBLOB="08001c00"], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:16:52 executing program 5: r0 = gettid() openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket(0x2a, 0x3, 0x6) getpgrp(r0) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be", 0x5b, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)) 03:16:52 executing program 2: r0 = gettid() openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r1, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r4 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r2, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB="08f703", @ANYRES32=r3, @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r4, @ANYBLOB="08001c00"], 0x64}}, 0x4) [ 1199.948401][T18711] netdevsim netdevsim1 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 03:16:52 executing program 0: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r6 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008", @ANYRES32=r0, @ANYBLOB="08f70300", @ANYRES32=r5, @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r6, @ANYBLOB="08001c00"], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:16:53 executing program 4: r0 = gettid() openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r1, 0x0, 0x0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r4 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r2, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB="08f703", @ANYRES32=r3, @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r4, @ANYBLOB="08001c00"], 0x64}}, 0x4) [ 1200.061272][T18711] netdevsim netdevsim1 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1200.177454][T18711] netdevsim netdevsim1 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1200.258080][T18711] netdevsim netdevsim1 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 03:16:53 executing program 2: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00'}) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() 03:16:53 executing program 4: r0 = gettid() openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r1, 0x0, 0x0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r4 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r2, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB="08f703", @ANYRES32=r3, @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r4, @ANYBLOB="08001c00"], 0x64}}, 0x4) 03:16:53 executing program 5: r0 = gettid() openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket(0x2a, 0x3, 0x6) getpgrp(r0) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be", 0x5b, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)) 03:16:53 executing program 0: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r6 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c", @ANYRES32=r0, @ANYBLOB="08f70300", @ANYRES32=r5, @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r6, @ANYBLOB="08001c00"], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:16:53 executing program 3: r0 = gettid() openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket(0x2a, 0x3, 0x6) getpgrp(r0) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be", 0x5b, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)) [ 1203.558631][T18711] device hsr_slave_0 left promiscuous mode [ 1203.569828][T18711] device hsr_slave_1 left promiscuous mode [ 1203.576427][T18711] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1203.586162][T18711] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1203.595614][T18711] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1203.603221][T18711] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1203.617918][T18711] device bridge_slave_1 left promiscuous mode [ 1203.630877][T18711] bridge0: port 2(bridge_slave_1) entered disabled state [ 1203.638877][T18711] device bridge_slave_0 left promiscuous mode [ 1203.654895][T18711] bridge0: port 1(bridge_slave_0) entered disabled state [ 1203.681113][T18711] device veth1_macvtap left promiscuous mode [ 1203.687238][T18711] device veth0_macvtap left promiscuous mode [ 1203.700822][T18711] device veth1_vlan left promiscuous mode [ 1203.706668][T18711] device veth0_vlan left promiscuous mode [ 1203.919495][T18711] team0 (unregistering): Port device team_slave_1 removed [ 1203.931556][T18711] team0 (unregistering): Port device team_slave_0 removed [ 1203.944570][T18711] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1203.968828][T18711] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1204.015965][T18711] bond0 (unregistering): Released all slaves [ 1238.052081][ T1239] ieee802154 phy0 wpan0: encryption failed: -22 [ 1238.058404][ T1239] ieee802154 phy1 wpan1: encryption failed: -22 03:17:42 executing program 1: r0 = gettid() openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r3 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r1, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYRES32=r2, @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r3, @ANYBLOB="08001c00"], 0x64}}, 0x4) 03:17:42 executing program 4: r0 = gettid() openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r1, 0x0, 0x0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r4 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r2, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB="08f703", @ANYRES32=r3, @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r4, @ANYBLOB="08001c00"], 0x64}}, 0x4) 03:17:42 executing program 2: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00'}) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() 03:17:42 executing program 0: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r6 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c", @ANYRES32=r0, @ANYBLOB="08f70300", @ANYRES32=r5, @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r6, @ANYBLOB="08001c00"], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:17:42 executing program 3: r0 = gettid() openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket(0x2a, 0x3, 0x6) getpgrp(r0) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be", 0x5b, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)) 03:17:42 executing program 5: r0 = gettid() openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket(0x2a, 0x3, 0x6) getpgrp(r0) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be", 0x5b, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497") 03:17:43 executing program 4: r0 = gettid() openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket(0x2a, 0x3, 0x6) getpgrp(r0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r3 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r1, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB="08f703", @ANYRES32=r2, @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r3, @ANYBLOB="08001c00"], 0x64}}, 0x4) 03:17:43 executing program 0: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r6 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c", @ANYRES32=r0, @ANYBLOB="08f70300", @ANYRES32=r5, @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r6, @ANYBLOB="08001c00"], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:17:43 executing program 5: r0 = gettid() openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket(0x2a, 0x3, 0x6) getpgrp(r0) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be", 0x5b, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497") 03:17:43 executing program 3: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r6 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c", @ANYRES32=r0, @ANYBLOB="08f70300", @ANYRES32=r5, @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r6, @ANYBLOB="08001c00"], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:17:43 executing program 2: r0 = gettid() openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r1, 0x0, 0x0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r4 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r2, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB="08f703", @ANYRES32=r3, @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r4, @ANYBLOB="08001c00"], 0x64}}, 0x4) 03:17:43 executing program 5: r0 = gettid() openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket(0x2a, 0x3, 0x6) getpgrp(r0) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be", 0x5b, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497") [ 1254.440866][ T4722] Bluetooth: hci1: Opcode 0x c03 failed: -110 [ 1258.692452][ T3633] Bluetooth: hci1: unexpected cc 0x0c03 length: 249 > 1 [ 1258.699680][ T3633] Bluetooth: hci1: unexpected cc 0x1003 length: 249 > 9 [ 1258.708894][ T3633] Bluetooth: hci1: unexpected cc 0x1001 length: 249 > 9 [ 1258.716388][ T3633] Bluetooth: hci1: unexpected cc 0x0c23 length: 249 > 4 [ 1258.742571][ T3633] Bluetooth: hci1: unexpected cc 0x0c25 length: 249 > 3 [ 1258.749778][ T3633] Bluetooth: hci1: unexpected cc 0x0c38 length: 249 > 2 [ 1258.758390][ T5996] Bluetooth: hci1: HCI_REQ-0x0c1a [ 1258.835621][ T5996] chnl_net:caif_netlink_parms(): no params data found [ 1258.863447][ T5996] bridge0: port 1(bridge_slave_0) entered blocking state [ 1258.870540][ T5996] bridge0: port 1(bridge_slave_0) entered disabled state [ 1258.878219][ T5996] device bridge_slave_0 entered promiscuous mode [ 1258.885887][ T5996] bridge0: port 2(bridge_slave_1) entered blocking state [ 1258.893525][ T5996] bridge0: port 2(bridge_slave_1) entered disabled state [ 1258.901192][ T5996] device bridge_slave_1 entered promiscuous mode [ 1258.916890][ T5996] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1258.927412][ T5996] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1258.944126][ T5996] team0: Port device team_slave_0 added [ 1258.950515][ T5996] team0: Port device team_slave_1 added [ 1258.963506][ T5996] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1258.970456][ T5996] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1258.997144][ T5996] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1259.009288][ T5996] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1259.016406][ T5996] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1259.042510][ T5996] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1259.065851][ T5996] device hsr_slave_0 entered promiscuous mode [ 1259.072292][ T5996] device hsr_slave_1 entered promiscuous mode [ 1259.078579][ T5996] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 1259.086347][ T5996] Cannot create hsr debugfs directory [ 1259.706210][ T5996] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 1259.717725][ T5996] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 1259.726867][ T5996] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 1259.737462][ T5996] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 1259.756815][ T5996] bridge0: port 2(bridge_slave_1) entered blocking state [ 1259.763934][ T5996] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1259.771443][ T5996] bridge0: port 1(bridge_slave_0) entered blocking state [ 1259.778515][ T5996] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1259.825442][ T5996] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1259.837573][T22940] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1259.849076][T22940] bridge0: port 1(bridge_slave_0) entered disabled state [ 1259.857256][T22940] bridge0: port 2(bridge_slave_1) entered disabled state [ 1259.867555][T22940] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1259.879395][ T5996] 8021q: adding VLAN 0 to HW filter on device team0 [ 1259.888854][T22940] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1259.898003][T22940] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1259.906670][T22940] bridge0: port 1(bridge_slave_0) entered blocking state [ 1259.913762][T22940] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1259.931418][T22940] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1259.940146][T22940] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1259.948863][T22940] bridge0: port 2(bridge_slave_1) entered blocking state [ 1259.955964][T22940] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1259.965774][T22940] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1259.974587][T22940] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1259.985572][T22940] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1259.994441][T22940] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1260.010092][ T5996] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1260.025431][ T5996] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1260.037829][T22930] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1260.048345][T22930] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1260.057598][T22930] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1260.068282][T22930] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1260.076775][T22930] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1260.085612][T22930] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1260.095305][T22930] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1260.106578][T22925] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1260.252990][T22925] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1260.260415][T22925] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1260.274262][ T5996] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1260.303551][T22925] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1260.316467][T22925] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1260.333996][ T4136] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1260.342513][ T4136] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1260.352228][ T5996] device veth0_vlan entered promiscuous mode [ 1260.359461][ T3676] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1260.372958][ T3676] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1260.382879][ T5996] device veth1_vlan entered promiscuous mode [ 1260.401075][ T3676] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 1260.418321][ T3676] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 1260.427761][ T3676] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1260.438538][ T3676] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1260.449222][ T5996] device veth0_macvtap entered promiscuous mode [ 1260.459390][ T5996] device veth1_macvtap entered promiscuous mode [ 1260.474386][ T5996] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1260.488177][ T5996] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1260.499063][ T5996] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1260.510384][ T5996] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1260.520298][ T5996] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1260.531434][ T5996] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1260.541328][ T5996] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1260.553349][ T5996] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1260.563922][ T5996] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1260.577772][ T5996] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1260.591622][ T5996] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1260.599581][ T4136] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 1260.608064][ T4136] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1260.616546][ T4136] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1260.624989][ T4136] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1260.634869][ T5996] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1260.645566][ T5996] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1260.656379][ T5996] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1260.666840][ T5996] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1260.676697][ T5996] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1260.688857][ T5996] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1260.699507][ T5996] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1260.709972][ T5996] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1260.719843][ T5996] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1260.730354][ T5996] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1260.741591][ T5996] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1260.750194][T22930] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1260.759161][T22930] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1260.768897][ T5996] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1260.778470][ T5996] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1260.787638][ T5996] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1260.796582][ T5996] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1260.840935][ T3633] Bluetooth: hci1: command 0x0409 tx timeout [ 1260.845720][ T3536] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 1260.866457][ T3536] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 1260.876737][ T7999] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 1260.886343][ T7999] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 1260.887670][T22940] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 1260.903062][T22940] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready 03:17:54 executing program 1: r0 = gettid() openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r3 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r1, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYRES32=r2, @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r3, @ANYBLOB="08001c00"], 0x64}}, 0x4) 03:17:54 executing program 0: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r6 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB="08f70300", @ANYRES32=r5, @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r6, @ANYBLOB="08001c00"], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:17:54 executing program 4: r0 = gettid() openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket(0x2a, 0x3, 0x6) getpgrp(r0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r3 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r1, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB="08f703", @ANYRES32=r2, @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r3, @ANYBLOB="08001c00"], 0x64}}, 0x4) 03:17:54 executing program 5: r0 = gettid() openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket(0x2a, 0x3, 0x6) getpgrp(r0) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be", 0x5b, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b") 03:17:54 executing program 2: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r6 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c", @ANYRES32=r0, @ANYBLOB="08f70300", @ANYRES32=r5, @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r6, @ANYBLOB="08001c00"], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:17:54 executing program 3: r0 = gettid() openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket(0x2a, 0x3, 0x6) getpgrp(r0) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be", 0x5b, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)) 03:17:54 executing program 0: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r6 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB="08f70300", @ANYRES32=r5, @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r6, @ANYBLOB="08001c00"], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:17:54 executing program 5: r0 = gettid() openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket(0x2a, 0x3, 0x6) getpgrp(r0) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be", 0x5b, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b") 03:17:54 executing program 4: r0 = gettid() openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket(0x2a, 0x3, 0x6) getpgrp(r0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r3 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r1, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB="08f703", @ANYRES32=r2, @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r3, @ANYBLOB="08001c00"], 0x64}}, 0x4) 03:17:54 executing program 2: r0 = gettid() openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket(0x2a, 0x3, 0x6) getpgrp(r0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r3 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r1, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB="08f703", @ANYRES32=r2, @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r3, @ANYBLOB="08001c00"], 0x64}}, 0x4) 03:17:54 executing program 3: r0 = gettid() openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) socket(0x2a, 0x3, 0x6) getpgrp(r0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r3 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r1, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB="08f703", @ANYRES32=r2, @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r3, @ANYBLOB="08001c00"], 0x64}}, 0x4) 03:17:54 executing program 1: r0 = gettid() openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r3 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r1, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYRES32=r2, @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r3, @ANYBLOB="08001c00"], 0x64}}, 0x4) 03:17:54 executing program 5: r0 = gettid() openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket(0x2a, 0x3, 0x6) getpgrp(r0) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be", 0x5b, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d5") 03:17:55 executing program 4: r0 = gettid() openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = socket(0x2a, 0x3, 0x6) connect$pppoe(r1, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r4 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r2, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB="08f703", @ANYRES32=r3, @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r4, @ANYBLOB="08001c00"], 0x64}}, 0x4) 03:17:55 executing program 0: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r6 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB="08f70300", @ANYRES32=r5, @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r6, @ANYBLOB="08001c00"], 0x64}}, 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 03:17:55 executing program 2: r0 = gettid() openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r3 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r1, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYRES32=r2, @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r3, @ANYBLOB="08001c00"], 0x64}}, 0x4) 03:17:55 executing program 1: r0 = gettid() openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r3 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r1, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYRES32=r2, @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r3, @ANYBLOB="08001c00"], 0x64}}, 0x4) 03:17:55 executing program 3: r0 = gettid() openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r3 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r1, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYRES32=r2, @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r3, @ANYBLOB="08001c00"], 0x64}}, 0x4) 03:17:55 executing program 4: r0 = gettid() openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = socket(0x2a, 0x3, 0x6) connect$pppoe(r1, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r4 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r2, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB="08f703", @ANYRES32=r3, @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r4, @ANYBLOB="08001c00"], 0x64}}, 0x4) 03:17:55 executing program 5: r0 = gettid() openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket(0x2a, 0x3, 0x6) getpgrp(r0) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be", 0x5b, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d5") 03:17:55 executing program 0: r0 = gettid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = socket(0x2a, 0x3, 0x6) getpgrp(r0) connect$pppoe(r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0x0, 0x7, r1, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x1}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r6 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB="08f70300", @ANYRES32=r5, @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r6, @ANYBLOB="08001c00"], 0x64}}, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001e00)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) [ 1262.921089][ T3633] Bluetooth: hci1: command 0x041b tx timeout 03:17:56 executing program 2: r0 = gettid() openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket(0x2a, 0x3, 0x6) getpgrp(r0) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be", 0x5b, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d5") [ 1263.650938][ T28] INFO: task syz-executor.5:3445 blocked for more than 143 seconds. [ 1263.659018][ T28] Not tainted 6.1.0-rc2-syzkaller-00105-gb229b6ca5abb #0 [ 1263.700616][ T28] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 1263.743367][ T28] task:syz-executor.5 state:D stack:25568 pid:3445 ppid:3618 flags:0x00004000 [ 1263.779265][ T28] Call Trace: [ 1263.794544][ T28] [ 1263.807785][ T28] __schedule+0xae9/0x53f0 [ 1263.829943][ T28] ? rcu_read_lock_sched_held+0xd/0x70 [ 1263.848727][ T28] ? lock_acquire+0x4fc/0x630 [ 1263.896347][ T28] ? rcu_read_lock_sched_held+0xd/0x70 [ 1263.908443][ T28] ? lock_downgrade+0x6e0/0x6e0 [ 1263.930197][ T28] ? io_schedule_timeout+0x140/0x140 [ 1263.950497][ T28] ? trace_hardirqs_on+0x2d/0x160 [ 1263.985152][ T28] ? _raw_spin_unlock_irqrestore+0x3d/0x70 [ 1264.004885][ T28] schedule+0xda/0x1b0 [ 1264.009009][ T28] wb_wait_for_completion+0x17e/0x240 [ 1264.050682][ T28] ? wb_writeback+0xd70/0xd70 [ 1264.057148][ T28] ? rcu_read_lock_sched_held+0xd/0x70 [ 1264.099801][ T28] ? prepare_to_wait_exclusive+0x2b0/0x2b0 [ 1264.125921][ T28] ? lock_release+0x810/0x810 [ 1264.143772][ T28] __writeback_inodes_sb_nr+0x1d7/0x280 [ 1264.149374][ T28] ? bdi_split_work_to_wbs+0x1030/0x1030 [ 1264.198783][ T28] ? _find_next_bit+0x117/0x140 [ 1264.215096][ T28] ? get_nr_dirty_inodes+0x11a/0x1b0 [ 1264.220530][ T28] try_to_writeback_inodes_sb+0x94/0xc0 03:17:57 executing program 4: r0 = gettid() openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = socket(0x2a, 0x3, 0x6) connect$pppoe(r1, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r4 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r2, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB="08f703", @ANYRES32=r3, @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r4, @ANYBLOB="08001c00"], 0x64}}, 0x4) [ 1264.267791][ T28] ext4_nonda_switch+0x1aa/0x1f0 [ 1264.284160][ T28] ext4_da_write_begin+0x16c/0xb50 [ 1264.290442][ T28] ? ktime_get_coarse_real_ts64+0x1b7/0x200 [ 1264.348863][ T28] ? trace_hardirqs_on+0x2d/0x160 [ 1264.374946][ T28] ? ktime_get_coarse_real_ts64+0x1b7/0x200 [ 1264.390200][ T28] ? ext4_write_begin+0x1120/0x1120 [ 1264.415063][ T28] ? current_time+0x1e6/0x2c0 [ 1264.424507][ T28] generic_perform_write+0x252/0x570 [ 1264.429850][ T28] ? folio_add_wait_queue+0x1b0/0x1b0 [ 1264.458244][ T28] ? discard_new_inode+0x190/0x190 [ 1264.471667][ T28] ? down_write_killable_nested+0x250/0x250 [ 1264.488216][ T28] ext4_buffered_write_iter+0x15b/0x460 [ 1264.505129][ T28] ext4_file_write_iter+0x8b8/0x16e0 03:17:57 executing program 2: r0 = gettid() openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket(0x2a, 0x3, 0x6) getpgrp(r0) syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be", 0x5b, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d5") [ 1264.544620][ T28] ? rcu_read_lock_sched_held+0xd/0x70 [ 1264.567071][ T28] ? lock_release+0x5cb/0x810 [ 1264.589639][ T28] ? __up_read+0x192/0x720 [ 1264.609660][ T28] ? ext4_file_mmap+0x440/0x440 [ 1264.629324][ T28] ? up_write+0x520/0x520 [ 1264.644037][ T28] __kernel_write_iter+0x25e/0x730 [ 1264.664017][ T28] ? vfs_read+0x930/0x930 [ 1264.676228][ T28] ? __kernel_write+0xc7/0x110 [ 1264.696577][ T28] ? __kernel_write_iter+0x730/0x730 [ 1264.718024][ T28] dump_user_range+0x230/0x700 [ 1264.746109][ T28] ? do_coredump+0x3bc0/0x3bc0 [ 1264.770703][ T28] ? d_path+0x169/0x7a0 [ 1264.785638][ T28] ? dump_align+0x9c/0xc0 [ 1264.790149][ T28] ? notesize+0x90/0x90 [ 1264.827333][ T28] elf_core_dump+0x26de/0x3510 [ 1264.855702][ T28] ? load_elf_phdrs+0x210/0x210 03:17:57 executing program 1: r0 = gettid() openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r3 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r1, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYRES32=r2, @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r3, @ANYBLOB="08001c00"], 0x64}}, 0x4) [ 1264.860644][ T28] ? kvmalloc_node+0x3f/0x1b0 [ 1264.893819][ T28] ? kasan_save_stack+0x1e/0x40 [ 1264.898782][ T28] ? kasan_set_track+0x21/0x30 [ 1264.973915][ T28] ? __kasan_kmalloc+0xa1/0xb0 [ 1264.978849][ T28] ? get_signal+0x1be1/0x2430 [ 1264.987406][ T28] ? arch_do_signal_or_restart+0x82/0x2300 [ 1265.001044][ T3633] Bluetooth: hci1: command 0x040f tx timeout [ 1265.011344][ T28] ? exit_to_user_mode_prepare+0x15f/0x250 03:17:57 executing program 2: r0 = gettid() openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = socket(0x2a, 0x3, 0x6) connect$pppoe(r1, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r4 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r2, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB="08f703", @ANYRES32=r3, @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r4, @ANYBLOB="08001c00"], 0x64}}, 0x4) 03:17:57 executing program 4: r0 = gettid() openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x40042, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) getpgrp(r0) connect$pppoe(0xffffffffffffffff, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan0\x00', 0x0}) r3 = syz_clone(0xd0209500, &(0x7f0000000100)="e584ede34e63060d0d8cd26b0fee181dbced6010312db414b8df1896514cfc8940d1eee1f07416f7af1e071cfcf218353eca362ae94c62320dd68df71de8e181eda2588984ebbaa1c5c7f30856c745793b68addbaf0aab00ff68be43a4f7ee5e567a2370125516398cd84675c6d44141691abd523acbdfad37b92faea947d6d6aa7ef96d8ce8d7", 0x87, &(0x7f0000000200), 0x0, &(0x7f0000000280)="088b75ee5c23ac596ce9ae5d99cb3977b0f98b9f7b5da12a467b8c95ae88eefc71300b92a2dc6dea2264ba29989f18f20a5a426a462c69534ecddbdda8c09f07cd265475a497d50f1dcb95e1c02524ec9deb5435fb18bdff59c98f181186cfc0ae35981c1dd40f247b32788117ebc62503d7327456b8525e4019d8b5a4d73b9aa4") getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r1, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYRES16=0x0, @ANYBLOB="00042abd7000fddbdd25140000000c000600000000000000000008001c00", @ANYRES32=r0, @ANYBLOB="08f703", @ANYRES32=r2, @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="08001c00", @ANYRES32=r3, @ANYBLOB="08001c00"], 0x64}}, 0x4) [ 1265.025851][ T28] ? irqentry_exit_to_user_mode+0x5/0x30 [ 1265.035504][ T28] ? asm_exc_general_protection+0x22/0x30 [ 1265.041538][ T28] ? 0xffffffffff600000 [ 1265.045764][ T28] ? rcu_read_lock_sched_held+0xd/0x70 [ 1265.052990][ T28] ? lock_release+0x5cb/0x810 [ 1265.057772][ T28] ? mas_ascend+0x41a/0x790 [ 1265.062829][ T28] ? mas_next+0x232/0xc90 [ 1265.067282][ T28] do_coredump+0x26c5/0x3bc0 [ 1265.073484][ T28] ? dump_emit+0x340/0x340 [ 1265.078006][ T28] ? lock_release+0x810/0x810 [ 1265.083763][ T28] ? rcu_read_lock_sched_held+0xd/0x70 [ 1265.089305][ T28] ? lock_acquire+0x4fc/0x630 [ 1265.094152][ T28] ? rcu_read_lock_sched_held+0xd/0x70 [ 1265.099866][ T28] ? lock_release+0x5cb/0x810 [ 1265.104994][ T28] ? debug_check_no_obj_freed+0x20c/0x420 [ 1265.112694][ T28] ? rcu_read_lock_sched_held+0xd/0x70 [ 1265.118298][ T28] ? lock_release+0x5cb/0x810 [ 1265.123368][ T28] ? debug_check_no_obj_freed+0x20c/0x420 [ 1265.129505][ T28] ? io_sqe_buffer_register+0x5b0/0x13b0 [ 1265.139006][ T28] ? get_signal+0xcd6/0x2430 [ 1265.143898][ T28] ? kmem_cache_free+0xea/0x5b0 [ 1265.148974][ T28] get_signal+0x1be1/0x2430 [ 1265.155939][ T28] ? exit_signals+0x8b0/0x8b0 [ 1265.160888][ T28] ? _raw_spin_unlock_irqrestore+0x50/0x70 [ 1265.166930][ T28] ? trace_hardirqs_on+0x2d/0x160 [ 1265.174199][ T28] arch_do_signal_or_restart+0x82/0x2300 [ 1265.179968][ T28] ? force_sig+0xa7/0xe0 [ 1265.184600][ T28] ? get_sigframe_size+0x10/0x10 [ 1265.189823][ T28] ? exc_general_protection+0x12d/0x210 [ 1265.197771][ T28] exit_to_user_mode_prepare+0x15f/0x250 [ 1265.203857][ T28] irqentry_exit_to_user_mode+0x5/0x30 [ 1265.209524][ T28] asm_exc_general_protection+0x22/0x30 [ 1265.217187][ T28] RIP: 0033:0x7fa52ec8b5b1 [ 1265.221894][ T28] RSP: 002b:00000000200001b0 EFLAGS: 00010217 [ 1265.228156][ T28] RAX: 0000000000000000 RBX: 00007fa52edabf80 RCX: 00007fa52ec8b5a9 [ 1265.239222][ T28] RDX: 0000000020000200 RSI: 00000000200001b0 RDI: 0000000000000000 [ 1265.249292][ T28] RBP: 00007fa52ece67b0 R08: 0000000020000280 R09: 0000000020000280 [ 1265.260694][ T28] R10: 0000000020000240 R11: 0000000000000246 R12: 0000000000000000 [ 1265.268873][ T28] R13: 00007ffd9c15acef R14: 00007fa52faa0300 R15: 0000000000022000 [ 1265.278886][ T28] [ 1265.282255][ T28] INFO: lockdep is turned off. [ 1265.287820][ T28] NMI backtrace for cpu 1 [ 1265.292145][ T28] CPU: 1 PID: 28 Comm: khungtaskd Not tainted 6.1.0-rc2-syzkaller-00105-gb229b6ca5abb #0 [ 1265.301957][ T28] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/11/2022 [ 1265.312018][ T28] Call Trace: [ 1265.315301][ T28] [ 1265.318239][ T28] dump_stack_lvl+0xcd/0x134 [ 1265.322858][ T28] nmi_cpu_backtrace.cold+0x24/0x18a [ 1265.328173][ T28] nmi_trigger_cpumask_backtrace+0x32f/0x3c0 [ 1265.334926][ T28] ? lapic_can_unplug_cpu+0x80/0x80 [ 1265.341965][ T28] watchdog+0xc71/0xfc0 [ 1265.346119][ T28] ? proc_dohung_task_timeout_secs+0x80/0x80 [ 1265.352183][ T28] kthread+0x2e4/0x3a0 [ 1265.356241][ T28] ? kthread_complete_and_exit+0x40/0x40 [ 1265.361864][ T28] ret_from_fork+0x1f/0x30 [ 1265.366273][ T28] [ 1265.370124][ T28] Sending NMI from CPU 1 to CPUs 0: [ 1265.375595][ C0] NMI backtrace for cpu 0 [ 1265.375604][ C0] CPU: 0 PID: 7999 Comm: kworker/u4:7 Not tainted 6.1.0-rc2-syzkaller-00105-gb229b6ca5abb #0 [ 1265.375618][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/11/2022 [ 1265.375627][ C0] Workqueue: phy14 ieee80211_iface_work [ 1265.375649][ C0] RIP: 0010:__sanitizer_cov_trace_pc+0x0/0x60 [ 1265.375671][ C0] Code: 48 89 ef 5d e9 e1 13 34 00 5d be 03 00 00 00 e9 d6 8e 87 02 66 0f 1f 44 00 00 48 8b be a8 01 00 00 e8 b4 ff ff ff 31 c0 c3 90 <65> 8b 05 b9 d2 85 7e 89 c1 48 8b 34 24 81 e1 00 01 00 00 65 48 8b [ 1265.375683][ C0] RSP: 0018:ffffc90014d579d8 EFLAGS: 00000297 [ 1265.375692][ C0] RAX: 0000000000000000 RBX: 0000000000000078 RCX: ffffffff88dcb9a4 [ 1265.375700][ C0] RDX: ffff888057a957c0 RSI: 0000000000000000 RDI: 0000000000000006 [ 1265.375708][ C0] RBP: 000000000000000c R08: 0000000000000006 R09: 0000000000000008 [ 1265.375715][ C0] R10: 000000000000000c R11: 000000000008c07e R12: 0000000000000008 [ 1265.375722][ C0] R13: 0000000000000008 R14: 00000000000000b4 R15: 0000000000000000 [ 1265.375732][ C0] FS: 0000000000000000(0000) GS:ffff8880b9a00000(0000) knlGS:0000000000000000 [ 1265.375744][ C0] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1265.375753][ C0] CR2: 00007f89b734ea70 CR3: 0000000060f2e000 CR4: 0000000000350ef0 [ 1265.375761][ C0] Call Trace: [ 1265.375764][ C0] [ 1265.375767][ C0] ieee80211_sta_get_rates+0x482/0x960 [ 1265.375787][ C0] ieee80211_ibss_rx_queued_mgmt+0x11c4/0x3190 [ 1265.375804][ C0] ? lock_release+0x5cb/0x810 [ 1265.375817][ C0] ? wait_for_completion_io_timeout+0x20/0x20 [ 1265.375835][ C0] ? ieee80211_ibss_rx_no_sta+0x840/0x840 [ 1265.375851][ C0] ? rcu_read_lock_sched_held+0xd/0x70 [ 1265.375863][ C0] ? lock_acquire+0x4fc/0x630 [ 1265.375876][ C0] ? rcu_read_lock_sched_held+0xd/0x70 [ 1265.375887][ C0] ? rcu_read_lock_sched_held+0xd/0x70 [ 1265.375899][ C0] ? lock_release+0x5cb/0x810 [ 1265.375911][ C0] ? kcov_remote_start+0x277/0x7a0 [ 1265.375931][ C0] ? do_raw_spin_unlock+0x171/0x230 [ 1265.375946][ C0] ? kcov_remote_start+0x156/0x7a0 [ 1265.375964][ C0] ? trace_hardirqs_on+0x2d/0x160 [ 1265.375977][ C0] ? _raw_spin_unlock_irqrestore+0x3d/0x70 [ 1265.375995][ C0] ieee80211_iface_work+0xa47/0xd30 [ 1265.376014][ C0] process_one_work+0x9bf/0x1710 [ 1265.376032][ C0] ? pwq_dec_nr_in_flight+0x2a0/0x2a0 [ 1265.376050][ C0] ? rwlock_bug.part.0+0x90/0x90 [ 1265.376067][ C0] worker_thread+0x665/0x1080 [ 1265.376089][ C0] ? process_one_work+0x1710/0x1710 [ 1265.376106][ C0] kthread+0x2e4/0x3a0 [ 1265.376125][ C0] ? kthread_complete_and_exit+0x40/0x40 [ 1265.376140][ C0] ret_from_fork+0x1f/0x30 [ 1265.376160][ C0] [ 1265.376672][ T28] Kernel panic - not syncing: hung_task: blocked tasks [ 1265.641488][ T28] CPU: 0 PID: 28 Comm: khungtaskd Not tainted 6.1.0-rc2-syzkaller-00105-gb229b6ca5abb #0 [ 1265.651278][ T28] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/11/2022 [ 1265.661321][ T28] Call Trace: [ 1265.664588][ T28] [ 1265.667505][ T28] dump_stack_lvl+0xcd/0x134 [ 1265.672441][ T28] panic+0x2c8/0x622 [ 1265.679207][ T28] ? panic_print_sys_info.part.0+0x110/0x110 [ 1265.689110][ T28] ? preempt_schedule_thunk+0x16/0x18 [ 1265.698444][ T28] ? watchdog.cold+0x130/0x158 [ 1265.706809][ T28] watchdog.cold+0x141/0x158 [ 1265.714445][ T28] ? proc_dohung_task_timeout_secs+0x80/0x80 [ 1265.725120][ T28] kthread+0x2e4/0x3a0 [ 1265.731088][ T28] ? kthread_complete_and_exit+0x40/0x40 [ 1265.736725][ T28] ret_from_fork+0x1f/0x30 [ 1265.741140][ T28] [ 1265.744849][ T28] Kernel Offset: disabled [ 1265.749164][ T28] Rebooting in 86400 seconds..