&(0x7f0000000680)=[r1]}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', 0x0, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) 09:22:43 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) bpf$BPF_MAP_FREEZE(0x16, 0x0, 0x0) 09:22:43 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r1]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00', 0x0}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', r5, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, 0x0, 0x4004083) 09:22:43 executing program 2: r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00'}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x0, 0x0, 0x0, 0x6}], 0x0, 0x0, 0xec, &(0x7f0000000100)=""/236, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r0]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xc, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x0, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x0, 0x4, 0x0, 0xfffffffffffffff0}, @ldst={0x0, 0x0, 0x2, 0x0, 0x1}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd}, @map_fd={0x18, 0x5}, @map_fd, @map_val={0x18, 0x1}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f00000040c0)) 09:22:43 executing program 4: openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) bpf$BPF_MAP_FREEZE(0x16, 0x0, 0x0) 09:22:43 executing program 5: r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00'}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x0, 0x0, 0x0, 0x6}], 0x0, 0x0, 0xec, &(0x7f0000000100)=""/236, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r0]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xc, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x0, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x0, 0x4, 0x0, 0xfffffffffffffff0}, @ldst={0x0, 0x0, 0x2, 0x0, 0x1}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd}, @map_fd={0x18, 0x5}, @map_fd, @map_val={0x18, 0x1}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f00000040c0)) 09:22:43 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r1]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', 0x0, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) 09:22:43 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r1]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00', 0x0}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', r5, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, 0x0, 0x4004083) 09:22:43 executing program 3: ioctl$VHOST_SET_VRING_KICK(0xffffffffffffffff, 0x4008af20, &(0x7f0000000040)={0x1}) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r1 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r0]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(0xffffffffffffffff, 0x8010af78, &(0x7f00000003c0)) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r2, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(0xffffffffffffffff, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r2}, @map_val={0x18, 0x1, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r3 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r3, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00'}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', 0x0, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r1}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) 09:22:43 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r1]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', 0x0, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) 09:22:43 executing program 4: bpf$BPF_MAP_FREEZE(0x16, 0x0, 0x0) 09:22:44 executing program 2: r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00'}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x0, 0x0, 0x0, 0x6}], 0x0, 0x0, 0xec, &(0x7f0000000100)=""/236, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r0]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xc, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x0, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x0, 0x4, 0x0, 0xfffffffffffffff0}, @ldst={0x0, 0x0, 0x2, 0x0, 0x1}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd}, @map_fd={0x18, 0x5}, @map_fd, @map_val={0x18, 0x1}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f00000040c0)) 09:22:44 executing program 4: ioctl$VHOST_SET_VRING_KICK(0xffffffffffffffff, 0x4008af20, &(0x7f0000000040)={0x1}) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r1 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r0]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(0xffffffffffffffff, 0x8010af78, &(0x7f00000003c0)) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r2, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(0xffffffffffffffff, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r2}, @map_val={0x18, 0x1, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r3 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r3, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00'}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', 0x0, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r1}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) 09:22:44 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r1]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00', 0x0}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', r5, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, 0x0, 0x4004083) 09:22:44 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r1]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00', 0x0}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', r5, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, 0x0, 0x4004083) 09:22:44 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r1]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', 0x0, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) 09:22:44 executing program 3: ioctl$VHOST_SET_VRING_KICK(0xffffffffffffffff, 0x4008af20, &(0x7f0000000040)={0x1}) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r1 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r0]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(0xffffffffffffffff, 0x8010af78, &(0x7f00000003c0)) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r2, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(0xffffffffffffffff, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r2}, @map_val={0x18, 0x1, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r3 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r3, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00'}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', 0x0, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r1}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) 09:22:44 executing program 2: r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00'}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x0, 0x0, 0x0, 0x6}], &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r0]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xc, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x0, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x0, 0x4, 0x0, 0xfffffffffffffff0}, @ldst={0x0, 0x0, 0x2, 0x0, 0x1}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd}, @map_fd={0x18, 0x5}, @map_fd, @map_val={0x18, 0x1}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f00000040c0)) 09:22:44 executing program 4: ioctl$VHOST_SET_VRING_KICK(0xffffffffffffffff, 0x4008af20, &(0x7f0000000040)={0x1}) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r1 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r0]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(0xffffffffffffffff, 0x8010af78, &(0x7f00000003c0)) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r2, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(0xffffffffffffffff, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r2}, @map_val={0x18, 0x1, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r3 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r3, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00'}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', 0x0, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r1}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) 09:22:44 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', 0x0, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff}, 0x80) 09:22:44 executing program 5: ioctl$VHOST_SET_VRING_KICK(0xffffffffffffffff, 0x4008af20, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={0x0, 0x0, 0x8}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x0, &(0x7f0000000080), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x0, 0xc, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x22}, @func, @map_val], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) r1 = socket$inet_mptcp(0x2, 0x1, 0x106) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f00000040c0)) sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, &(0x7f0000004240)={&(0x7f0000004180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000004200)={&(0x7f00000041c0)={0x14, 0x0, 0x200, 0x70bd29, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x4004083) 09:22:44 executing program 2: r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00'}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x0, 0x0, 0x0, 0x6}], &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r0]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xc, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x0, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x0, 0x4, 0x0, 0xfffffffffffffff0}, @ldst={0x0, 0x0, 0x2, 0x0, 0x1}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd}, @map_fd={0x18, 0x5}, @map_fd, @map_val={0x18, 0x1}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f00000040c0)) 09:22:44 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r1]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00'}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', 0x0, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) 09:22:44 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r1]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00', 0x0}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', r5, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, &(0x7f0000004240)={0x0, 0x0, &(0x7f0000004200)={&(0x7f00000041c0)={0x14, 0x0, 0x200, 0x70bd29, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x4004083) 09:22:44 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', 0x0, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff}, 0x80) 09:22:44 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r1]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00'}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00', 0x0}) r6 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000001880)='/sys/fs/f2fs', 0x280000, 0x82) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', r5, 0x38, r6, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) 09:22:44 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', 0x0, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff}, 0x80) 09:22:44 executing program 5: ioctl$VHOST_SET_VRING_KICK(0xffffffffffffffff, 0x4008af20, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x0, 0x0, 0x0, 0x6}], &(0x7f00000000c0)='GPL\x00', 0x0, 0xec, &(0x7f0000000100)=""/236, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r0]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xb, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @ldst={0x0, 0x0, 0x2, 0x0, 0x1}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd}, @map_fd={0x18, 0x5}, @map_fd, @map_val={0x18, 0x1}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) r1 = socket$inet_mptcp(0x2, 0x1, 0x106) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f00000040c0)) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NET_DM_CMD_STOP(r2, &(0x7f0000004240)={&(0x7f0000004180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000004200)={&(0x7f00000041c0)={0x14, 0x0, 0x200, 0x70bd29, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x4004083) 09:22:44 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r1]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00'}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', 0x0, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) 09:22:44 executing program 2: r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00'}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x0, 0x0, 0x0, 0x6}], &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r0]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xc, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x0, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x0, 0x4, 0x0, 0xfffffffffffffff0}, @ldst={0x0, 0x0, 0x2, 0x0, 0x1}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd}, @map_fd={0x18, 0x5}, @map_fd, @map_val={0x18, 0x1}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f00000040c0)) 09:22:44 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[0xffffffffffffffff]}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', 0x0, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff}, 0x80) 09:22:44 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r1]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00', 0x0}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', r5, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, &(0x7f0000004240)={0x0, 0x0, &(0x7f0000004200)={&(0x7f00000041c0)={0x14, 0x0, 0x200, 0x70bd29, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x4004083) 09:22:44 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r1]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00'}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', 0x0, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) 09:22:44 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r1]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00'}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', 0x0, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) 09:22:44 executing program 0: openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[0xffffffffffffffff]}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', 0x0, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff}, 0x80) 09:22:44 executing program 5: ioctl$VHOST_SET_VRING_KICK(0xffffffffffffffff, 0x4008af20, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x0, 0x0, 0x0, 0x6}], &(0x7f00000000c0)='GPL\x00', 0x0, 0xec, &(0x7f0000000100)=""/236, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r0]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xb, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @ldst={0x0, 0x0, 0x2, 0x0, 0x1}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd}, @map_fd={0x18, 0x5}, @map_fd, @map_val={0x18, 0x1}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) r1 = socket$inet_mptcp(0x2, 0x1, 0x106) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f00000040c0)) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NET_DM_CMD_STOP(r2, &(0x7f0000004240)={&(0x7f0000004180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000004200)={&(0x7f00000041c0)={0x14, 0x0, 0x200, 0x70bd29, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x4004083) 09:22:44 executing program 2: r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00'}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x0, 0x0, 0x0, 0x6}], &(0x7f00000000c0)='GPL\x00', 0x0, 0xec, &(0x7f0000000100)=""/236, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xc, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x0, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x0, 0x4, 0x0, 0xfffffffffffffff0}, @ldst={0x0, 0x0, 0x2, 0x0, 0x1}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd}, @map_fd={0x18, 0x5}, @map_fd, @map_val={0x18, 0x1}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f00000040c0)) 09:22:44 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r1]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00'}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', 0x0, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) 09:22:44 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[0xffffffffffffffff]}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', 0x0, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff}, 0x80) 09:22:45 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r1]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00', 0x0}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', r5, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, &(0x7f0000004240)={0x0, 0x0, &(0x7f0000004200)={&(0x7f00000041c0)={0x14, 0x0, 0x200, 0x70bd29, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x4004083) 09:22:45 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(0xffffffffffffffff, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r1]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00'}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', 0x0, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) 09:22:45 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', 0x0, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff}, 0x80) 09:22:45 executing program 2: r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00'}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x0, 0x0, 0x0, 0x6}], &(0x7f00000000c0)='GPL\x00', 0x0, 0xec, &(0x7f0000000100)=""/236, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xc, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x0, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x0, 0x4, 0x0, 0xfffffffffffffff0}, @ldst={0x0, 0x0, 0x2, 0x0, 0x1}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd}, @map_fd={0x18, 0x5}, @map_fd, @map_val={0x18, 0x1}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f00000040c0)) 09:22:45 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', 0x0, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff}, 0x80) 09:22:45 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r1]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00'}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', 0x0, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) 09:22:45 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r1]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00', 0x0}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', r5, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, &(0x7f0000004240)={0x0, 0x0, &(0x7f0000004200)={&(0x7f00000041c0)={0x14, 0x0, 0x200, 0x70bd29, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x4004083) 09:22:45 executing program 2: r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00'}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x0, 0x0, 0x0, 0x6}], &(0x7f00000000c0)='GPL\x00', 0x0, 0xec, &(0x7f0000000100)=""/236, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xc, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x0, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x0, 0x4, 0x0, 0xfffffffffffffff0}, @ldst={0x0, 0x0, 0x2, 0x0, 0x1}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd}, @map_fd={0x18, 0x5}, @map_fd, @map_val={0x18, 0x1}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f00000040c0)) 09:22:45 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', 0x0, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff}, 0x80) 09:22:45 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x0, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[0xffffffffffffffff]}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', 0x0, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff}, 0x80) 09:22:45 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(0xffffffffffffffff, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r1]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00'}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', 0x0, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) 09:22:45 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x0, 0x0, 0x0, &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[0xffffffffffffffff]}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', 0x0, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff}, 0x80) 09:22:45 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r1]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00', 0x0}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', r5, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, &(0x7f0000004240)={&(0x7f0000004180), 0xc, &(0x7f0000004200)={&(0x7f00000041c0)={0x14, 0x0, 0x200, 0x70bd29, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x4004083) 09:22:45 executing program 5: ioctl$VHOST_SET_VRING_KICK(0xffffffffffffffff, 0x4008af20, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x0, 0x0, 0x0, 0x6}], &(0x7f00000000c0)='GPL\x00', 0x0, 0xec, &(0x7f0000000100)=""/236, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r0]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xb, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @ldst={0x0, 0x0, 0x2, 0x0, 0x1}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd}, @map_fd={0x18, 0x5}, @map_fd, @map_val={0x18, 0x1}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) r1 = socket$inet_mptcp(0x2, 0x1, 0x106) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f00000040c0)) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NET_DM_CMD_STOP(r2, &(0x7f0000004240)={&(0x7f0000004180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000004200)={&(0x7f00000041c0)={0x14, 0x0, 0x200, 0x70bd29, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x4004083) 09:22:45 executing program 2: r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00'}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x0, 0x0, 0x0, 0x6}], &(0x7f00000000c0)='GPL\x00', 0x0, 0xec, &(0x7f0000000100)=""/236, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xc, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x0, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x0, 0x4, 0x0, 0xfffffffffffffff0}, @ldst={0x0, 0x0, 0x2, 0x0, 0x1}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd}, @map_fd={0x18, 0x5}, @map_fd, @map_val={0x18, 0x1}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f00000040c0)) 09:22:45 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x0, 0x0, 0x0, &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[0xffffffffffffffff]}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', 0x0, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff}, 0x80) 09:22:45 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(0xffffffffffffffff, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r1]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00'}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', 0x0, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) 09:22:45 executing program 4: openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7}, @jmp={0x5, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff0}, @ldst, @map_idx_val, @map_fd={0x18, 0x5, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd, @map_val], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) socket$inet_mptcp(0x2, 0x1, 0x106) 09:22:45 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r1]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00', 0x0}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', r5, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, &(0x7f0000004240)={&(0x7f0000004180), 0xc, &(0x7f0000004200)={&(0x7f00000041c0)={0x14, 0x0, 0x200, 0x70bd29, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x4004083) 09:22:45 executing program 2: r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00'}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x0, 0x0, 0x0, 0x6}], &(0x7f00000000c0)='GPL\x00', 0x0, 0xec, &(0x7f0000000100)=""/236, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xc, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x0, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x0, 0x4, 0x0, 0xfffffffffffffff0}, @ldst={0x0, 0x0, 0x2, 0x0, 0x1}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd}, @map_fd={0x18, 0x5}, @map_fd, @map_val={0x18, 0x1}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f00000040c0)) 09:22:45 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x0, 0x0, 0x0, &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[0xffffffffffffffff]}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', 0x0, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff}, 0x80) 09:22:45 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r1]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00', 0x0}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', r5, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, &(0x7f0000004240)={&(0x7f0000004180), 0xc, &(0x7f0000004200)={&(0x7f00000041c0)={0x14, 0x0, 0x200, 0x70bd29, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x4004083) 09:22:45 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x0, 0xc, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[0xffffffffffffffff]}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', 0x0, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff}, 0x80) 09:22:45 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, 0x0) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r1]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00'}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', 0x0, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) 09:22:45 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x0, 0xc, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[0xffffffffffffffff]}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', 0x0, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff}, 0x80) 09:22:45 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[r1]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00', 0x0}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', r5, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, &(0x7f0000004240)={&(0x7f0000004180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000004200)={&(0x7f00000041c0)={0x14, 0x0, 0x200, 0x70bd29, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x4004083) 09:22:45 executing program 2: r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00'}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x0, 0x0, 0x0, 0x6}], &(0x7f00000000c0)='GPL\x00', 0x0, 0xec, &(0x7f0000000100)=""/236, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xc, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x0, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x0, 0x4, 0x0, 0xfffffffffffffff0}, @ldst={0x0, 0x0, 0x2, 0x0, 0x1}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd}, @map_fd={0x18, 0x5}, @map_fd, @map_val={0x18, 0x1}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f00000040c0)) 09:22:45 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x0, 0xa, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[0xffffffffffffffff]}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', 0x0, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff}, 0x80) 09:22:45 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, 0x0) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r1]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00'}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', 0x0, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) 09:22:46 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x0, 0xa, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[0xffffffffffffffff]}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', 0x0, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff}, 0x80) 09:22:46 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r1]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00', 0x0}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', r5, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, &(0x7f0000004240)={&(0x7f0000004180), 0xc, &(0x7f0000004200)={&(0x7f00000041c0)={0x14, 0x0, 0x200, 0x70bd29, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x4004083) 09:22:46 executing program 5: r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00'}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x0, 0x0, 0x0, 0x6}], &(0x7f00000000c0)='GPL\x00', 0x0, 0xec, &(0x7f0000000100)=""/236, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xc, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x0, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x0, 0x4, 0x0, 0xfffffffffffffff0}, @ldst={0x0, 0x0, 0x2, 0x0, 0x1}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd}, @map_fd={0x18, 0x5}, @map_fd, @map_val={0x18, 0x1}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f00000040c0)) 09:22:46 executing program 2: r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00'}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x0, 0x0, 0x0, 0x6}], &(0x7f00000000c0)='GPL\x00', 0x0, 0xec, &(0x7f0000000100)=""/236, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, 0xffffffffffffffff]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xc, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x0, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x0, 0x4, 0x0, 0xfffffffffffffff0}, @ldst={0x0, 0x0, 0x2, 0x0, 0x1}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd}, @map_fd={0x18, 0x5}, @map_fd, @map_val={0x18, 0x1}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f00000040c0)) 09:22:46 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x0, 0x9, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5}, @call={0x85, 0x0, 0x0, 0x22}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[0xffffffffffffffff]}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', 0x0, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff}, 0x80) 09:22:46 executing program 4: r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00'}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x0, 0x0, 0x0, 0x6}], &(0x7f00000000c0)='GPL\x00', 0x0, 0xec, &(0x7f0000000100)=""/236, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xc, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x0, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x0, 0x4, 0x0, 0xfffffffffffffff0}, @ldst={0x0, 0x0, 0x2, 0x0, 0x1}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd}, @map_fd={0x18, 0x5}, @map_fd, @map_val={0x18, 0x1}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f00000040c0)) 09:22:46 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, 0x0) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r1]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00'}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', 0x0, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) 09:22:46 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x0, 0x8, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[0xffffffffffffffff]}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', 0x0, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff}, 0x80) 09:22:46 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, 0x0) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r1]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00'}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', 0x0, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) 09:22:46 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r1]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00', 0x0}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', r5, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, &(0x7f0000004240)={&(0x7f0000004180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4000005}, 0x4004083) 09:22:46 executing program 2: r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00'}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x0, 0x0, 0x0, 0x6}], &(0x7f00000000c0)='GPL\x00', 0x0, 0xec, &(0x7f0000000100)=""/236, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, 0xffffffffffffffff]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xc, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x0, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x0, 0x4, 0x0, 0xfffffffffffffff0}, @ldst={0x0, 0x0, 0x2, 0x0, 0x1}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd}, @map_fd={0x18, 0x5}, @map_fd, @map_val={0x18, 0x1}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f00000040c0)) 09:22:46 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x0, 0x6, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[0xffffffffffffffff]}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', 0x0, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff}, 0x80) 09:22:46 executing program 4: r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00'}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x0, 0x0, 0x0, 0x6}], &(0x7f00000000c0)='GPL\x00', 0x0, 0xec, &(0x7f0000000100)=""/236, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xc, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x0, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x0, 0x4, 0x0, 0xfffffffffffffff0}, @ldst={0x0, 0x0, 0x2, 0x0, 0x1}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd}, @map_fd={0x18, 0x5}, @map_fd, @map_val={0x18, 0x1}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f00000040c0)) 09:22:46 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r1]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00'}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', 0x0, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) 09:22:46 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x0, 0x4, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[0xffffffffffffffff]}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', 0x0, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff}, 0x80) 09:22:46 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[r1]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00', 0x0}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', r5, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, &(0x7f0000004240)={&(0x7f0000004180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000004200)={&(0x7f00000041c0)={0x14, 0x0, 0x200, 0x70bd29, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x4004083) 09:22:46 executing program 2: r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00'}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x0, 0x0, 0x0, 0x6}], &(0x7f00000000c0)='GPL\x00', 0x0, 0xec, &(0x7f0000000100)=""/236, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, 0xffffffffffffffff]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xc, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x0, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x0, 0x4, 0x0, 0xfffffffffffffff0}, @ldst={0x0, 0x0, 0x2, 0x0, 0x1}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd}, @map_fd={0x18, 0x5}, @map_fd, @map_val={0x18, 0x1}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f00000040c0)) 09:22:46 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x0, 0x3, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[0xffffffffffffffff]}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', 0x0, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff}, 0x80) 09:22:46 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x0, 0x3, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[0xffffffffffffffff]}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', 0x0, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff}, 0x80) 09:22:46 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r1]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00', 0x0}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', r5, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, &(0x7f0000004240)={&(0x7f0000004180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4000005}, 0x4004083) 09:22:46 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x0, 0x2, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[0xffffffffffffffff]}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', 0x0, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff}, 0x80) 09:22:46 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r1]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00'}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', 0x0, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) 09:22:46 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r1]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00'}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', 0x0, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) 09:22:46 executing program 5: ioctl$VHOST_SET_VRING_KICK(0xffffffffffffffff, 0x4008af20, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={0x0, 0x0, 0x8}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x0, &(0x7f0000000080), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x0, 0xb, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x22}, @map_val], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) r1 = socket$inet_mptcp(0x2, 0x1, 0x106) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f00000040c0)) sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, &(0x7f0000004240)={&(0x7f0000004180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000004200)={&(0x7f00000041c0)={0x14, 0x0, 0x200, 0x70bd29, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x4004083) 09:22:46 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x0, 0x2, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[0xffffffffffffffff]}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', 0x0, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff}, 0x80) 09:22:46 executing program 2: r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00'}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x0, 0x0, 0x0, 0x6}], &(0x7f00000000c0)='GPL\x00', 0x0, 0xec, &(0x7f0000000100)=""/236, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[r0]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xc, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x0, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x0, 0x4, 0x0, 0xfffffffffffffff0}, @ldst={0x0, 0x0, 0x2, 0x0, 0x1}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd}, @map_fd={0x18, 0x5}, @map_fd, @map_val={0x18, 0x1}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f00000040c0)) 09:22:46 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r1]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00'}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', 0x0, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) 09:22:46 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x0, 0x2, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[0xffffffffffffffff]}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', 0x0, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff}, 0x80) 09:22:46 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r1]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00', 0x0}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', r5, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, &(0x7f0000004240)={&(0x7f0000004180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4000005}, 0x4004083) 09:22:46 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r1]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00', 0x0}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', r5, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, &(0x7f0000004240)={&(0x7f0000004180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4000005}, 0x4004083) 09:22:46 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x0, 0x3, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x0, 0x5, 0x4, 0x1, 0xfffffffffffffff0}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[0xffffffffffffffff]}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', 0x0, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff}, 0x80) 09:22:46 executing program 5: r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00'}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x0, 0x0, 0x0, 0x6}], &(0x7f00000000c0)='GPL\x00', 0x0, 0xec, &(0x7f0000000100)=""/236, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, 0xffffffffffffffff]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xc, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x0, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x0, 0x4, 0x0, 0xfffffffffffffff0}, @ldst={0x0, 0x0, 0x2, 0x0, 0x1}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd}, @map_fd={0x18, 0x5}, @map_fd, @map_val={0x18, 0x1}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f00000040c0)) 09:22:47 executing program 2: r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00'}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x0, 0x0, 0x0, 0x6}], &(0x7f00000000c0)='GPL\x00', 0x0, 0xec, &(0x7f0000000100)=""/236, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[r0]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xc, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x0, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x0, 0x4, 0x0, 0xfffffffffffffff0}, @ldst={0x0, 0x0, 0x2, 0x0, 0x1}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd}, @map_fd={0x18, 0x5}, @map_fd, @map_val={0x18, 0x1}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f00000040c0)) 09:22:47 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r1]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00'}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', 0x0, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) 09:22:47 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x0, 0x3, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x0, 0x5, 0x4, 0x1, 0xfffffffffffffff0}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[0xffffffffffffffff]}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', 0x0, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff}, 0x80) 09:22:47 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r1]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00'}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', 0x0, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) 09:22:47 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r1]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00', 0x0}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', r5, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, &(0x7f0000004240)={&(0x7f0000004180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000004200)={0x0}, 0x1, 0x0, 0x0, 0x4000005}, 0x4004083) 09:22:47 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r1]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00', 0x0}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', r5, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, &(0x7f0000004240)={&(0x7f0000004180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4000005}, 0x4004083) 09:22:47 executing program 2: r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00'}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x0, 0x0, 0x0, 0x6}], &(0x7f00000000c0)='GPL\x00', 0x0, 0xec, &(0x7f0000000100)=""/236, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[r0]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xc, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x0, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x0, 0x4, 0x0, 0xfffffffffffffff0}, @ldst={0x0, 0x0, 0x2, 0x0, 0x1}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd}, @map_fd={0x18, 0x5}, @map_fd, @map_val={0x18, 0x1}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f00000040c0)) 09:22:47 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x0, 0x3, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x0, 0x0, 0x4, 0x1, 0xfffffffffffffff0}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[0xffffffffffffffff]}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', 0x0, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff}, 0x80) 09:22:47 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r1]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00'}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', 0x0, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) 09:22:47 executing program 4: r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00'}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x0, 0x0, 0x0, 0x6}], &(0x7f00000000c0)='GPL\x00', 0x0, 0xec, &(0x7f0000000100)=""/236, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[r0]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xc, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x0, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x0, 0x4, 0x0, 0xfffffffffffffff0}, @ldst={0x0, 0x0, 0x2, 0x0, 0x1}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd}, @map_fd={0x18, 0x5}, @map_fd, @map_val={0x18, 0x1}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f00000040c0)) 09:22:47 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x0, 0x3, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x0, 0x0, 0x0, 0x1, 0xfffffffffffffff0}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[0xffffffffffffffff]}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', 0x0, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff}, 0x80) 09:22:47 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r1]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00', 0x0}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', r5, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, &(0x7f0000004240)={&(0x7f0000004180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000004200)={0x0}, 0x1, 0x0, 0x0, 0x4000005}, 0x4004083) 09:22:47 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r1]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00', 0x0}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', r5, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, &(0x7f0000004240)={&(0x7f0000004180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000004200)={0x0}, 0x1, 0x0, 0x0, 0x4000005}, 0x4004083) 09:22:47 executing program 2: r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00'}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x0, 0x0, 0x0, 0x6}], &(0x7f00000000c0)='GPL\x00', 0x0, 0xec, &(0x7f0000000100)=""/236, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r0]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f00000040c0)) 09:22:47 executing program 4: ioctl$VHOST_SET_VRING_KICK(0xffffffffffffffff, 0x4008af20, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={0x0, 0x0, 0x8}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x0, &(0x7f0000000080), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x0, 0xb, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x22}, @map_val], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) r1 = socket$inet_mptcp(0x2, 0x1, 0x106) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f00000040c0)) sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, &(0x7f0000004240)={&(0x7f0000004180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000004200)={&(0x7f00000041c0)={0x14, 0x0, 0x200, 0x70bd29, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x4004083) 09:22:47 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x0, 0x3, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff0}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[0xffffffffffffffff]}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', 0x0, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff}, 0x80) 09:22:47 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r1]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00'}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', 0x0, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) 09:22:47 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x0, 0x3, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff0}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[0xffffffffffffffff]}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', 0x0, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff}, 0x80) 09:22:47 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x0, 0x3, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff0}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[0xffffffffffffffff]}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', 0x0, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff}, 0x80) 09:22:47 executing program 2: r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00'}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x0, 0x0, 0x0, 0x6}], &(0x7f00000000c0)='GPL\x00', 0x0, 0xec, &(0x7f0000000100)=""/236, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r0]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f00000040c0)) 09:22:47 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r1]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00', 0x0}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', r5, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, &(0x7f0000004240)={&(0x7f0000004180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000004200)={0x0}, 0x1, 0x0, 0x0, 0x4000005}, 0x4004083) 09:22:47 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r1]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00', 0x0}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', r5, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, &(0x7f0000004240)={&(0x7f0000004180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000004200)={0x0}, 0x1, 0x0, 0x0, 0x4000005}, 0x4004083) 09:22:47 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r1]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={0x0, 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00', 0x0}) r6 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000001880)='/sys/fs/f2fs', 0x280000, 0x82) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', r5, 0x38, r6, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) 09:22:47 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={0x0, 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r1]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00'}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', 0x0, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) 09:22:47 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x0, 0x3, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x0, 0x0, 0x0, 0x1}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[0xffffffffffffffff]}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', 0x0, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff}, 0x80) 09:22:47 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x0, 0x3, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x0, 0x0, 0x0, 0x1}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[0xffffffffffffffff]}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', 0x0, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff}, 0x80) 09:22:47 executing program 2: r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00'}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x0, 0x0, 0x0, 0x6}], &(0x7f00000000c0)='GPL\x00', 0x0, 0xec, &(0x7f0000000100)=""/236, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r0]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f00000040c0)) 09:22:47 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x0, 0x3, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x0, 0x0, 0x0, 0x1}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[0xffffffffffffffff]}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', 0x0, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff}, 0x80) 09:22:47 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={0x0, 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r1]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00'}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', 0x0, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) 09:22:48 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x0, 0x1, &(0x7f0000000500)=@raw=[@jmp={0x5, 0x0, 0x0, 0x0, 0x1, 0xfffffffffffffff0}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[0xffffffffffffffff]}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', 0x0, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff}, 0x80) 09:22:48 executing program 4: ioctl$VHOST_SET_VRING_KICK(0xffffffffffffffff, 0x4008af20, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x0, 0x0, 0x0, 0x6}], &(0x7f00000000c0)='GPL\x00', 0x0, 0xec, &(0x7f0000000100)=""/236, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r0]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xb, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @ldst={0x0, 0x0, 0x2, 0x0, 0x1}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd}, @map_fd={0x18, 0x5}, @map_fd, @map_val={0x18, 0x1}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) r1 = socket$inet_mptcp(0x2, 0x1, 0x106) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f00000040c0)) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NET_DM_CMD_STOP(r2, &(0x7f0000004240)={&(0x7f0000004180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000004200)={&(0x7f00000041c0)={0x14, 0x0, 0x200, 0x70bd29, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x4004083) 09:22:48 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r1]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00', 0x0}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', r5, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, &(0x7f0000004240)={&(0x7f0000004180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000004200)={&(0x7f00000041c0)={0x14, 0x0, 0x0, 0x70bd29, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x4004083) 09:22:48 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r1]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00', 0x0}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', r5, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, &(0x7f0000004240)={&(0x7f0000004180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000004200)={0x0}, 0x1, 0x0, 0x0, 0x4000005}, 0x4004083) 09:22:48 executing program 2: r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00'}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x0, 0x0, 0x0, 0x6}], &(0x7f00000000c0)='GPL\x00', 0x0, 0xec, &(0x7f0000000100)=""/236, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r0]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x0, 0xc, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x0, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x0, 0x4, 0x0, 0xfffffffffffffff0}, @ldst={0x0, 0x0, 0x2, 0x0, 0x1}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd}, @map_fd={0x18, 0x5}, @map_fd, @map_val={0x18, 0x1}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f00000040c0)) 09:22:48 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x0, 0x1, &(0x7f0000000500)=@raw=[@jmp={0x5, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff0}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[0xffffffffffffffff]}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', 0x0, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff}, 0x80) 09:22:48 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={0x0, 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r1]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00'}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', 0x0, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) 09:22:48 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x0, 0x1, &(0x7f0000000500)=@raw=[@jmp], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[0xffffffffffffffff]}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', 0x0, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff}, 0x80) 09:22:48 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x0, 0x1, &(0x7f0000000500)=@raw=[@jmp], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[0xffffffffffffffff]}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', 0x0, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff}, 0x80) 09:22:48 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r1]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00', 0x0}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', r5, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, &(0x7f0000004240)={&(0x7f0000004180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000004200)={0x0}, 0x1, 0x0, 0x0, 0x4000005}, 0x4004083) 09:22:48 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r1]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00', 0x0}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', r5, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, &(0x7f0000004240)={&(0x7f0000004180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000004200)={&(0x7f00000041c0)={0x14, 0x0, 0x0, 0x70bd29, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x4004083) 09:22:48 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[r1]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00', 0x0}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', r5, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, &(0x7f0000004240)={&(0x7f0000004180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000004200)={&(0x7f00000041c0)={0x14, 0x0, 0x200, 0x70bd29, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x4004083) 09:22:48 executing program 2: r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00'}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x0, 0x0, 0x0, 0x6}], &(0x7f00000000c0)='GPL\x00', 0x0, 0xec, &(0x7f0000000100)=""/236, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r0]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x0, 0xc, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x0, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x0, 0x4, 0x0, 0xfffffffffffffff0}, @ldst={0x0, 0x0, 0x2, 0x0, 0x1}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd}, @map_fd={0x18, 0x5}, @map_fd, @map_val={0x18, 0x1}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f00000040c0)) 09:22:48 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00'}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r1]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00'}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', 0x0, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) 09:22:48 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x0, 0x1, &(0x7f0000000500)=@raw=[@jmp], 0x0, 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[0xffffffffffffffff]}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', 0x0, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff}, 0x80) 09:22:48 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x0, 0x1, &(0x7f0000000500)=@raw=[@jmp], 0x0, 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[0xffffffffffffffff]}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', 0x0, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff}, 0x80) 09:22:48 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r1]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00', 0x0}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', r5, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, &(0x7f0000004240)={&(0x7f0000004180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000004200)={&(0x7f00000041c0)={0x14, 0x0, 0x0, 0x70bd29, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x4004083) 09:22:48 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x0, 0x1, &(0x7f0000000500)=@raw=[@jmp], 0x0, 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[0xffffffffffffffff]}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', 0x0, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff}, 0x80) 09:22:48 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={0x0, 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r1]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00'}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', 0x0, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) 09:22:48 executing program 2: r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00'}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x0, 0x0, 0x0, 0x6}], &(0x7f00000000c0)='GPL\x00', 0x0, 0xec, &(0x7f0000000100)=""/236, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r0]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x0, 0xc, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x0, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x0, 0x4, 0x0, 0xfffffffffffffff0}, @ldst={0x0, 0x0, 0x2, 0x0, 0x1}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd}, @map_fd={0x18, 0x5}, @map_fd, @map_val={0x18, 0x1}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f00000040c0)) 09:22:48 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x0, 0x1, &(0x7f0000000500)=@raw=[@jmp], &(0x7f0000000580)='syzkaller\x00', 0x0, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[0xffffffffffffffff]}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', 0x0, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff}, 0x80) 09:22:48 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00'}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r1]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00'}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', 0x0, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) 09:22:48 executing program 5: ioctl$VHOST_SET_VRING_KICK(0xffffffffffffffff, 0x4008af20, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={0x0, 0x0, 0x8}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x0, &(0x7f0000000080), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x0, 0xb, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x22}, @map_val], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) r1 = socket$inet_mptcp(0x2, 0x1, 0x106) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f00000040c0)) sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, &(0x7f0000004240)={&(0x7f0000004180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000004200)={&(0x7f00000041c0)={0x14, 0x0, 0x200, 0x70bd29, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x4004083) 09:22:48 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x0, 0x1, &(0x7f0000000500)=@raw=[@jmp], &(0x7f0000000580)='syzkaller\x00', 0x0, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[0xffffffffffffffff]}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', 0x0, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff}, 0x80) 09:22:48 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r1]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00', 0x0}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', r5, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, &(0x7f0000004240)={&(0x7f0000004180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000004200)={&(0x7f00000041c0)={0x14, 0x0, 0x200, 0x0, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x4004083) 09:22:48 executing program 2: r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00'}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x0, 0x0, 0x0, 0x6}], &(0x7f00000000c0)='GPL\x00', 0x0, 0xec, &(0x7f0000000100)=""/236, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r0]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0x0, 0x0, &(0x7f0000000580)='syzkaller\x00', 0x9, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f00000040c0)) 09:22:48 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x0, 0x1, &(0x7f0000000500)=@raw=[@jmp], &(0x7f0000000580)='syzkaller\x00', 0x0, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[0xffffffffffffffff]}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', 0x0, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff}, 0x80) 09:22:48 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x0, 0x1, &(0x7f0000000500)=@raw=[@jmp], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[0xffffffffffffffff]}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', 0x0, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff}, 0x80) 09:22:48 executing program 4: ioctl$VHOST_SET_VRING_KICK(0xffffffffffffffff, 0x4008af20, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x0, 0x0, 0x0, 0x6}], &(0x7f00000000c0)='GPL\x00', 0x0, 0xec, &(0x7f0000000100)=""/236, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r0]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xc, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x0, 0x0, 0x2, 0x0, 0x1}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd}, @map_fd={0x18, 0x5}, @map_fd, @map_val={0x18, 0x1}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) r1 = socket$inet_mptcp(0x2, 0x1, 0x106) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f00000040c0)) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NET_DM_CMD_STOP(r2, &(0x7f0000004240)={&(0x7f0000004180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000004200)={&(0x7f00000041c0)={0x14, 0x0, 0x200, 0x70bd29, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x4004083) 09:22:48 executing program 2: r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00'}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x0, 0x0, 0x0, 0x6}], &(0x7f00000000c0)='GPL\x00', 0x0, 0xec, &(0x7f0000000100)=""/236, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r0]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0x0, 0x0, &(0x7f0000000580)='syzkaller\x00', 0x9, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f00000040c0)) 09:22:48 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00'}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r1]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00'}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', 0x0, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) 09:22:48 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x0, 0x1, &(0x7f0000000500)=@raw=[@jmp], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[0xffffffffffffffff]}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', 0x0, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff}, 0x80) 09:22:48 executing program 5: ioctl$VHOST_SET_VRING_KICK(0xffffffffffffffff, 0x4008af20, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={0x0, 0x0, 0x8}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x0, &(0x7f0000000080), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x0, 0xb, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x22}, @map_val], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) r1 = socket$inet_mptcp(0x2, 0x1, 0x106) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f00000040c0)) sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, &(0x7f0000004240)={&(0x7f0000004180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000004200)={&(0x7f00000041c0)={0x14, 0x0, 0x200, 0x70bd29, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x4004083) 09:22:49 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r1]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00', 0x0}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', r5, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, &(0x7f0000004240)={&(0x7f0000004180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000004200)={&(0x7f00000041c0)={0x14, 0x0, 0x200, 0x0, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x4004083) 09:22:49 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x0, 0x1, &(0x7f0000000500)=@raw=[@jmp], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[0xffffffffffffffff]}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', 0x0, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff}, 0x80) 09:22:49 executing program 4: ioctl$VHOST_SET_VRING_KICK(0xffffffffffffffff, 0x4008af20, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x0, 0x0, 0x0, 0x6}], &(0x7f00000000c0)='GPL\x00', 0x0, 0xec, &(0x7f0000000100)=""/236, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r0]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xc, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x0, 0x0, 0x2, 0x0, 0x1}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd}, @map_fd={0x18, 0x5}, @map_fd, @map_val={0x18, 0x1}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) r1 = socket$inet_mptcp(0x2, 0x1, 0x106) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f00000040c0)) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NET_DM_CMD_STOP(r2, &(0x7f0000004240)={&(0x7f0000004180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000004200)={&(0x7f00000041c0)={0x14, 0x0, 0x200, 0x70bd29, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x4004083) 09:22:49 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x0, 0x1, &(0x7f0000000500)=@raw=[@jmp], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[0xffffffffffffffff]}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', 0x0, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff}, 0x80) 09:22:49 executing program 2: r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00'}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x0, 0x0, 0x0, 0x6}], &(0x7f00000000c0)='GPL\x00', 0x0, 0xec, &(0x7f0000000100)=""/236, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r0]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0x0, 0x0, &(0x7f0000000580)='syzkaller\x00', 0x9, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f00000040c0)) 09:22:49 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x0, 0x1, &(0x7f0000000500)=@raw=[@jmp], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[0xffffffffffffffff]}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', 0x0, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff}, 0x80) 09:22:49 executing program 5: ioctl$VHOST_SET_VRING_KICK(0xffffffffffffffff, 0x4008af20, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={0x0, 0x0, 0x8}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x0, &(0x7f0000000080), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x0, 0xb, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x22}, @map_val], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) r1 = socket$inet_mptcp(0x2, 0x1, 0x106) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f00000040c0)) sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, &(0x7f0000004240)={&(0x7f0000004180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000004200)={&(0x7f00000041c0)={0x14, 0x0, 0x200, 0x70bd29, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x4004083) 09:22:49 executing program 2: r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00'}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x0, 0x0, 0x0, 0x6}], &(0x7f00000000c0)='GPL\x00', 0x0, 0xec, &(0x7f0000000100)=""/236, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r0]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xa, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x0, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x0, 0x4, 0x0, 0xfffffffffffffff0}, @ldst={0x0, 0x0, 0x2, 0x0, 0x1}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd}, @map_fd={0x18, 0x5}, @map_fd], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f00000040c0)) 09:22:49 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00'}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', 0x0, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) 09:22:49 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x0, 0x1, &(0x7f0000000500)=@raw=[@jmp], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000680)=[0xffffffffffffffff]}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', 0x0, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff}, 0x80) 09:22:49 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r1]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00', 0x0}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', r5, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, &(0x7f0000004240)={&(0x7f0000004180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000004200)={&(0x7f00000041c0)={0x14, 0x0, 0x200, 0x0, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x4004083) 09:22:49 executing program 4: ioctl$VHOST_SET_VRING_KICK(0xffffffffffffffff, 0x4008af20, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x0, 0x0, 0x0, 0x6}], &(0x7f00000000c0)='GPL\x00', 0x0, 0xec, &(0x7f0000000100)=""/236, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r0]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xc, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x0, 0x0, 0x2, 0x0, 0x1}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd}, @map_fd={0x18, 0x5}, @map_fd, @map_val={0x18, 0x1}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) r1 = socket$inet_mptcp(0x2, 0x1, 0x106) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f00000040c0)) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NET_DM_CMD_STOP(r2, &(0x7f0000004240)={&(0x7f0000004180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000004200)={&(0x7f00000041c0)={0x14, 0x0, 0x200, 0x70bd29, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x4004083) 09:22:49 executing program 5: ioctl$VHOST_SET_VRING_KICK(0xffffffffffffffff, 0x4008af20, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={0x0, 0x0, 0x8}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x0, &(0x7f0000000080), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x0, 0xb, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x22}, @map_val], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) r1 = socket$inet_mptcp(0x2, 0x1, 0x106) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f00000040c0)) 09:22:49 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x0, 0x1, &(0x7f0000000500)=@raw=[@jmp], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000680)=[0xffffffffffffffff]}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', 0x0, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff}, 0x80) 09:22:49 executing program 2: r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00'}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x0, 0x0, 0x0, 0x6}], &(0x7f00000000c0)='GPL\x00', 0x0, 0xec, &(0x7f0000000100)=""/236, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r0]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xa, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x0, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x0, 0x4, 0x0, 0xfffffffffffffff0}, @ldst={0x0, 0x0, 0x2, 0x0, 0x1}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd}, @map_fd={0x18, 0x5}, @map_fd], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f00000040c0)) 09:22:49 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00'}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', 0x0, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) 09:22:49 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x0, 0x1, &(0x7f0000000500)=@raw=[@jmp], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', 0x0, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff}, 0x80) 09:22:49 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x0, 0x1, &(0x7f0000000500)=@raw=[@jmp], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$PROG_LOAD(0x5, 0x0, 0x0) 09:22:49 executing program 5: ioctl$VHOST_SET_VRING_KICK(0xffffffffffffffff, 0x4008af20, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={0x0, 0x0, 0x8}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x0, &(0x7f0000000080), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x0, 0xb, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x22}, @map_val], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f00000040c0)) 09:22:49 executing program 4: ioctl$VHOST_SET_VRING_KICK(0xffffffffffffffff, 0x4008af20, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x0, 0x0, 0x0, 0x6}], &(0x7f00000000c0)='GPL\x00', 0x0, 0xec, &(0x7f0000000100)=""/236, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r0]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xc, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x0, 0x0, 0x2, 0x0, 0x1}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd}, @map_fd={0x18, 0x5}, @map_fd, @map_val={0x18, 0x1}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) r1 = socket$inet_mptcp(0x2, 0x1, 0x106) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f00000040c0)) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) 09:22:49 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r1]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00', 0x0}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', r5, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, &(0x7f0000004240)={&(0x7f0000004180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000004200)={&(0x7f00000041c0)={0x14, 0x0, 0x200, 0x70bd29, 0x0, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x4004083) 09:22:49 executing program 2: r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00'}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x0, 0x0, 0x0, 0x6}], &(0x7f00000000c0)='GPL\x00', 0x0, 0xec, &(0x7f0000000100)=""/236, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r0]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0x8, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x0, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x0, 0x4, 0x0, 0xfffffffffffffff0}, @ldst={0x0, 0x0, 0x2, 0x0, 0x1}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd}, @map_fd={0x18, 0x5}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f00000040c0)) 09:22:49 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x0, 0x1, &(0x7f0000000500)=@raw=[@jmp], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000680)=[0xffffffffffffffff]}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', 0x0, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff}, 0x80) 09:22:49 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00'}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', 0x0, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) 09:22:49 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00'}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', 0x0, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) 09:22:49 executing program 5: ioctl$VHOST_SET_VRING_KICK(0xffffffffffffffff, 0x4008af20, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={0x0, 0x0, 0x8}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x0, &(0x7f0000000080), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x0, 0xb, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x22}, @map_val], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f00000040c0)) 09:22:49 executing program 2: r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00'}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x0, 0x0, 0x0, 0x6}], &(0x7f00000000c0)='GPL\x00', 0x0, 0xec, &(0x7f0000000100)=""/236, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r0]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0x8, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x0, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x0, 0x4, 0x0, 0xfffffffffffffff0}, @ldst={0x0, 0x0, 0x2, 0x0, 0x1}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd}, @map_fd={0x18, 0x5}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f00000040c0)) 09:22:49 executing program 4: ioctl$VHOST_SET_VRING_KICK(0xffffffffffffffff, 0x4008af20, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x0, 0x0, 0x0, 0x6}], &(0x7f00000000c0)='GPL\x00', 0x0, 0xec, &(0x7f0000000100)=""/236, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r0]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xc, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x0, 0x0, 0x2, 0x0, 0x1}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd}, @map_fd={0x18, 0x5}, @map_fd, @map_val={0x18, 0x1}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) r1 = socket$inet_mptcp(0x2, 0x1, 0x106) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f00000040c0)) 09:22:49 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r1]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00', 0x0}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', r5, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, &(0x7f0000004240)={&(0x7f0000004180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000004200)={&(0x7f00000041c0)={0x14, 0x0, 0x200, 0x70bd29, 0x0, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x4004083) 09:22:49 executing program 5: ioctl$VHOST_SET_VRING_KICK(0xffffffffffffffff, 0x4008af20, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={0x0, 0x0, 0x8}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x0, &(0x7f0000000080), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x0, 0xb, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x22}, @map_val], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f00000040c0)) 09:22:50 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) ioctl$VHOST_VDPA_GET_IOVA_RANGE(0xffffffffffffffff, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00'}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', 0x0, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) 09:22:50 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x0, 0x1, &(0x7f0000000500)=@raw=[@jmp], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[0xffffffffffffffff]}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', 0x0, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff}, 0x80) 09:22:50 executing program 2: r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00'}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x0, 0x0, 0x0, 0x6}], &(0x7f00000000c0)='GPL\x00', 0x0, 0xec, &(0x7f0000000100)=""/236, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r0]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0x8, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x0, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x0, 0x4, 0x0, 0xfffffffffffffff0}, @ldst={0x0, 0x0, 0x2, 0x0, 0x1}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd}, @map_fd={0x18, 0x5}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f00000040c0)) 09:22:50 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r1]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00', 0x0}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', r5, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, &(0x7f0000004240)={&(0x7f0000004180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000004200)={&(0x7f00000041c0)={0x14, 0x0, 0x200, 0x0, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x4004083) 09:22:50 executing program 4: ioctl$VHOST_SET_VRING_KICK(0xffffffffffffffff, 0x4008af20, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x0, 0x0, 0x0, 0x6}], &(0x7f00000000c0)='GPL\x00', 0x0, 0xec, &(0x7f0000000100)=""/236, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r0]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xc, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x0, 0x0, 0x2, 0x0, 0x1}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd}, @map_fd={0x18, 0x5}, @map_fd, @map_val={0x18, 0x1}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f00000040c0)) 09:22:50 executing program 2: r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00'}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x0, 0x0, 0x0, 0x6}], &(0x7f00000000c0)='GPL\x00', 0x0, 0xec, &(0x7f0000000100)=""/236, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r0]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0x8, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x0, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x0, 0x4, 0x0, 0xfffffffffffffff0}, @ldst={0x0, 0x0, 0x2, 0x0, 0x1}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd}, @map_fd], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f00000040c0)) 09:22:50 executing program 5: ioctl$VHOST_SET_VRING_KICK(0xffffffffffffffff, 0x4008af20, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={0x0, 0x0, 0x8}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x0, &(0x7f0000000080), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x0, 0xb, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x22}, @map_val], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet_mptcp(0x2, 0x1, 0x106) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f00000040c0)) 09:22:50 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r1]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00', 0x0}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', r5, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, &(0x7f0000004240)={&(0x7f0000004180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000004200)={&(0x7f00000041c0)={0x14, 0x0, 0x200, 0x70bd29, 0x0, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x4004083) 09:22:50 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) ioctl$VHOST_VDPA_GET_IOVA_RANGE(0xffffffffffffffff, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00'}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', 0x0, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) 09:22:50 executing program 4: ioctl$VHOST_SET_VRING_KICK(0xffffffffffffffff, 0x4008af20, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x0, 0x0, 0x0, 0x6}], &(0x7f00000000c0)='GPL\x00', 0x0, 0xec, &(0x7f0000000100)=""/236, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r0]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xc, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x0, 0x0, 0x2, 0x0, 0x1}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd}, @map_fd={0x18, 0x5}, @map_fd, @map_val={0x18, 0x1}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f00000040c0)) 09:22:50 executing program 5: ioctl$VHOST_SET_VRING_KICK(0xffffffffffffffff, 0x4008af20, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={0x0, 0x0, 0x8}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x0, &(0x7f0000000080), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x0, 0xb, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x22}, @map_val], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) r1 = socket$inet_mptcp(0x2, 0x1, 0x106) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f00000040c0)) 09:22:50 executing program 0: ioctl$VHOST_SET_VRING_KICK(0xffffffffffffffff, 0x4008af20, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x0, 0x0, 0x0, 0x6}], &(0x7f00000000c0)='GPL\x00', 0x0, 0xec, &(0x7f0000000100)=""/236, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r0]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xc, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x0, 0x0, 0x2, 0x0, 0x1}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd}, @map_fd={0x18, 0x5}, @map_fd, @map_val={0x18, 0x1}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f00000040c0)) 09:22:50 executing program 2: r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00'}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x0, 0x0, 0x0, 0x6}], &(0x7f00000000c0)='GPL\x00', 0x0, 0xec, &(0x7f0000000100)=""/236, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r0]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0x8, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x0, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x0, 0x4, 0x0, 0xfffffffffffffff0}, @ldst={0x0, 0x0, 0x2, 0x0, 0x1}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd}, @map_fd], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f00000040c0)) 09:22:50 executing program 5: ioctl$VHOST_SET_VRING_KICK(0xffffffffffffffff, 0x4008af20, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={0x0, 0x0, 0x8}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x0, &(0x7f0000000080), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1]}, 0x80) r0 = socket$inet_mptcp(0x2, 0x1, 0x106) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f00000040c0)) 09:22:50 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r1]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00', 0x0}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', r5, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, &(0x7f0000004240)={&(0x7f0000004180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000004200)={&(0x7f00000041c0)={0x14, 0x0, 0x200, 0x70bd29, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x4004083) 09:22:50 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) ioctl$VHOST_VDPA_GET_IOVA_RANGE(0xffffffffffffffff, 0x8010af78, 0x0) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00'}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', 0x0, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) 09:22:50 executing program 5: ioctl$VHOST_SET_VRING_KICK(0xffffffffffffffff, 0x4008af20, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={0x0, 0x0, 0x8}, 0x10) r0 = socket$inet_mptcp(0x2, 0x1, 0x106) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f00000040c0)) 09:22:50 executing program 4: ioctl$VHOST_SET_VRING_KICK(0xffffffffffffffff, 0x4008af20, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x0, 0x0, 0x0, 0x6}], &(0x7f00000000c0)='GPL\x00', 0x0, 0xec, &(0x7f0000000100)=""/236, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r0]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xc, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x0, 0x0, 0x2, 0x0, 0x1}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd}, @map_fd={0x18, 0x5}, @map_fd, @map_val={0x18, 0x1}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f00000040c0)) 09:22:50 executing program 5: ioctl$VHOST_SET_VRING_KICK(0xffffffffffffffff, 0x4008af20, 0x0) r0 = socket$inet_mptcp(0x2, 0x1, 0x106) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f00000040c0)) 09:22:50 executing program 2: r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00'}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x0, 0x0, 0x0, 0x6}], &(0x7f00000000c0)='GPL\x00', 0x0, 0xec, &(0x7f0000000100)=""/236, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r0]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0x8, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x0, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x0, 0x4, 0x0, 0xfffffffffffffff0}, @ldst={0x0, 0x0, 0x2, 0x0, 0x1}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd}, @map_fd], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f00000040c0)) 09:22:50 executing program 4: ioctl$VHOST_SET_VRING_KICK(0xffffffffffffffff, 0x4008af20, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x0, 0x0, 0x0, 0x6}], &(0x7f00000000c0)='GPL\x00', 0x0, 0xec, &(0x7f0000000100)=""/236, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r0]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xc, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x0, 0x0, 0x2, 0x0, 0x1}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd}, @map_fd={0x18, 0x5}, @map_fd, @map_val={0x18, 0x1}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) r1 = socket$inet_mptcp(0x2, 0x1, 0x106) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f00000040c0)) 09:22:50 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) ioctl$VHOST_VDPA_GET_IOVA_RANGE(0xffffffffffffffff, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00'}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', 0x0, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) 09:22:50 executing program 5: r0 = socket$inet_mptcp(0x2, 0x1, 0x106) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f00000040c0)) 09:22:50 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) ioctl$VHOST_VDPA_GET_IOVA_RANGE(0xffffffffffffffff, 0x8010af78, 0x0) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00'}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', 0x0, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) 09:22:50 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r1]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00', 0x0}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', r5, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, &(0x7f0000004240)={&(0x7f0000004180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000004200)={&(0x7f00000041c0)={0x14, 0x0, 0x200, 0x70bd29, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x4004083) 09:22:50 executing program 5: socket$inet_mptcp(0x2, 0x1, 0x106) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f00000040c0)) 09:22:50 executing program 2: r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00'}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x0, 0x0, 0x0, 0x6}], &(0x7f00000000c0)='GPL\x00', 0x0, 0xec, &(0x7f0000000100)=""/236, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r0]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xa, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x0, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x0, 0x4, 0x0, 0xfffffffffffffff0}, @ldst={0x0, 0x0, 0x2, 0x0, 0x1}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd}, @map_fd, @map_fd], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f00000040c0)) 09:22:50 executing program 5: socket$inet_mptcp(0x2, 0x1, 0x106) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f00000040c0)) 09:22:50 executing program 4: ioctl$VHOST_SET_VRING_KICK(0xffffffffffffffff, 0x4008af20, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x0, 0x0, 0x0, 0x6}], &(0x7f00000000c0)='GPL\x00', 0x0, 0xec, &(0x7f0000000100)=""/236, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r0]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xc, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x0, 0x0, 0x2, 0x0, 0x1}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd}, @map_fd={0x18, 0x5}, @map_fd, @map_val={0x18, 0x1}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet_mptcp(0x2, 0x1, 0x106) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f00000040c0)) 09:22:50 executing program 4: ioctl$VHOST_SET_VRING_KICK(0xffffffffffffffff, 0x4008af20, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x0, 0x0, 0x0, 0x6}], &(0x7f00000000c0)='GPL\x00', 0x0, 0xec, &(0x7f0000000100)=""/236, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r0]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xc, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x0, 0x0, 0x2, 0x0, 0x1}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd}, @map_fd={0x18, 0x5}, @map_fd, @map_val={0x18, 0x1}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) r1 = socket$inet_mptcp(0x2, 0x1, 0x106) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f00000040c0)) 09:22:51 executing program 4: ioctl$VHOST_SET_VRING_KICK(0xffffffffffffffff, 0x4008af20, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x0, 0x0, 0x0, 0x6}], &(0x7f00000000c0)='GPL\x00', 0x0, 0xec, &(0x7f0000000100)=""/236, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r0]}, 0x80) r1 = socket$inet_mptcp(0x2, 0x1, 0x106) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f00000040c0)) 09:22:51 executing program 5: socket$inet_mptcp(0x2, 0x1, 0x106) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f00000040c0)) 09:22:51 executing program 4: ioctl$VHOST_SET_VRING_KICK(0xffffffffffffffff, 0x4008af20, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r0 = socket$inet_mptcp(0x2, 0x1, 0x106) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f00000040c0)) 09:22:51 executing program 0: ioctl$VHOST_SET_VRING_KICK(0xffffffffffffffff, 0x4008af20, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x0, 0x0, 0x0, 0x6}], &(0x7f00000000c0)='GPL\x00', 0x0, 0xec, &(0x7f0000000100)=""/236, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r0]}, 0x80) r1 = socket$inet_mptcp(0x2, 0x1, 0x106) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f00000040c0)) 09:22:51 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) ioctl$VHOST_VDPA_GET_IOVA_RANGE(0xffffffffffffffff, 0x8010af78, 0x0) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00'}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', 0x0, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) 09:22:51 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) ioctl$VHOST_VDPA_GET_IOVA_RANGE(0xffffffffffffffff, 0x8010af78, 0x0) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00'}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', 0x0, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) 09:22:51 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r1]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00', 0x0}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', r5, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, &(0x7f0000004240)={&(0x7f0000004180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000004200)={&(0x7f00000041c0)={0x14, 0x0, 0x200, 0x70bd29, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x4004083) 09:22:51 executing program 2: r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00'}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x0, 0x0, 0x0, 0x6}], &(0x7f00000000c0)='GPL\x00', 0x0, 0xec, &(0x7f0000000100)=""/236, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r0]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xa, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x0, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x0, 0x4, 0x0, 0xfffffffffffffff0}, @ldst={0x0, 0x0, 0x2, 0x0, 0x1}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd}, @map_fd, @map_fd], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f00000040c0)) 09:22:51 executing program 4: ioctl$VHOST_SET_VRING_KICK(0xffffffffffffffff, 0x4008af20, 0x0) r0 = socket$inet_mptcp(0x2, 0x1, 0x106) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f00000040c0)) 09:22:51 executing program 5: r0 = socket$inet_mptcp(0x2, 0x1, 0x106) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, 0x0) 09:22:51 executing program 4: r0 = socket$inet_mptcp(0x2, 0x1, 0x106) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f00000040c0)) 09:22:51 executing program 5: r0 = socket$inet_mptcp(0x2, 0x1, 0x106) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, 0x0) 09:22:51 executing program 5: r0 = socket$inet_mptcp(0x2, 0x1, 0x106) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, 0x0) 09:22:51 executing program 4: socket$inet_mptcp(0x2, 0x1, 0x106) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f00000040c0)) 09:22:51 executing program 2: r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00'}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x0, 0x0, 0x0, 0x6}], &(0x7f00000000c0)='GPL\x00', 0x0, 0xec, &(0x7f0000000100)=""/236, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r0]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xa, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x0, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x0, 0x4, 0x0, 0xfffffffffffffff0}, @ldst={0x0, 0x0, 0x2, 0x0, 0x1}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd}, @map_fd, @map_fd], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f00000040c0)) 09:22:51 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) ioctl$VHOST_VDPA_GET_IOVA_RANGE(0xffffffffffffffff, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00'}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', 0x0, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) 09:22:51 executing program 0: socket$inet_mptcp(0x2, 0x1, 0x106) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f00000040c0)) 09:22:51 executing program 4: socket$inet_mptcp(0x2, 0x1, 0x106) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f00000040c0)) 09:22:51 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r1]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00', 0x0}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', r5, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, &(0x7f0000004240)={&(0x7f0000004180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000004200)={&(0x7f00000041c0)={0x14, 0x0, 0x200, 0x70bd29, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x4004083) 09:22:51 executing program 5: socket$inet_mptcp(0x2, 0x1, 0x106) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f00000040c0)) 09:22:51 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r1]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00', 0x0}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', r5, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, &(0x7f0000004240)={&(0x7f0000004180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000004200)={&(0x7f00000041c0)={0x14, 0x0, 0x200, 0x70bd29, 0x0, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x4004083) 09:22:51 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00'}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r1]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00'}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', 0x0, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) 09:22:51 executing program 2: r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00'}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x0, 0x0, 0x0, 0x6}], &(0x7f00000000c0)='GPL\x00', 0x0, 0xec, &(0x7f0000000100)=""/236, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r0]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0x8, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x0, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x0, 0x4, 0x0, 0xfffffffffffffff0}, @ldst={0x0, 0x0, 0x2, 0x0, 0x1}, @map_fd={0x18, 0x5}, @map_fd], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f00000040c0)) 09:22:51 executing program 4: socket$inet_mptcp(0x2, 0x1, 0x106) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f00000040c0)) 09:22:51 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) ioctl$VHOST_VDPA_GET_IOVA_RANGE(0xffffffffffffffff, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00'}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', 0x0, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) 09:22:51 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r1]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00', 0x0}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', r5, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, &(0x7f0000004240)={&(0x7f0000004180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000004200)={&(0x7f00000041c0)={0x14, 0x0, 0x200, 0x70bd29, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x4004083) 09:22:51 executing program 4: r0 = socket$inet_mptcp(0x2, 0x1, 0x106) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, 0x0) 09:22:51 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, 0xffffffffffffffff]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00', 0x0}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', r5, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, &(0x7f0000004240)={&(0x7f0000004180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000004200)={&(0x7f00000041c0)={0x14, 0x0, 0x200, 0x70bd29, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x4004083) 09:22:51 executing program 2: r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00'}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x0, 0x0, 0x0, 0x6}], &(0x7f00000000c0)='GPL\x00', 0x0, 0xec, &(0x7f0000000100)=""/236, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r0]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0x8, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x0, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x0, 0x4, 0x0, 0xfffffffffffffff0}, @ldst={0x0, 0x0, 0x2, 0x0, 0x1}, @map_fd={0x18, 0x5}, @map_fd], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f00000040c0)) 09:22:51 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r2, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r2}, @map_val={0x18, 0x1, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r3 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r3, 0x0, &(0x7f0000000780)) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) 09:22:51 executing program 4: r0 = socket$inet_mptcp(0x2, 0x1, 0x106) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, 0x0) 09:22:51 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) ioctl$VHOST_VDPA_GET_IOVA_RANGE(0xffffffffffffffff, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00'}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', 0x0, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) 09:22:51 executing program 4: r0 = socket$inet_mptcp(0x2, 0x1, 0x106) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, 0x0) 09:22:51 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r1]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00', 0x0}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', r5, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, &(0x7f0000004240)={&(0x7f0000004180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000004200)={&(0x7f00000041c0)={0x14, 0x0, 0x200, 0x70bd29, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x4004083) 09:22:51 executing program 2: r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00'}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x0, 0x0, 0x0, 0x6}], &(0x7f00000000c0)='GPL\x00', 0x0, 0xec, &(0x7f0000000100)=""/236, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r0]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0x8, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x0, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x0, 0x4, 0x0, 0xfffffffffffffff0}, @ldst={0x0, 0x0, 0x2, 0x0, 0x1}, @map_fd={0x18, 0x5}, @map_fd], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f00000040c0)) 09:22:51 executing program 4: r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00'}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x0, 0x0, 0x0, 0x6}], &(0x7f00000000c0)='GPL\x00', 0x0, 0xec, &(0x7f0000000100)=""/236, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r0]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0x8, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x0, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x0, 0x4, 0x0, 0xfffffffffffffff0}, @ldst={0x0, 0x0, 0x2, 0x0, 0x1}, @map_fd={0x18, 0x5}, @map_fd], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f00000040c0)) 09:22:52 executing program 0: ioctl$VHOST_SET_VRING_KICK(0xffffffffffffffff, 0x4008af20, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x0, 0x0, 0x0, 0x6}], &(0x7f00000000c0)='GPL\x00', 0x0, 0xec, &(0x7f0000000100)=""/236, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r0]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xc, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x0, 0x0, 0x2, 0x0, 0x1}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd}, @map_fd={0x18, 0x5}, @map_fd, @map_val={0x18, 0x1}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) r1 = socket$inet_mptcp(0x2, 0x1, 0x106) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f00000040c0)) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NET_DM_CMD_STOP(r2, &(0x7f0000004240)={&(0x7f0000004180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000004200)={&(0x7f00000041c0)={0x14, 0x0, 0x200, 0x70bd29, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x4004083) 09:22:52 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, 0xffffffffffffffff]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00', 0x0}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', r5, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, &(0x7f0000004240)={&(0x7f0000004180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000004200)={&(0x7f00000041c0)={0x14, 0x0, 0x200, 0x70bd29, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x4004083) 09:22:52 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) ioctl$VHOST_VDPA_GET_IOVA_RANGE(0xffffffffffffffff, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={0x0, 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00'}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', 0x0, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) 09:22:52 executing program 2: r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00'}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x0, 0x0, 0x0, 0x6}], &(0x7f00000000c0)='GPL\x00', 0x0, 0xec, &(0x7f0000000100)=""/236, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r0]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xa, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x0, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x0, 0x4, 0x0, 0xfffffffffffffff0}, @ldst={0x0, 0x0, 0x2, 0x0, 0x1}, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0xd}, @map_fd={0x18, 0x5}, @map_fd], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f00000040c0)) 09:22:52 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r1]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00', 0x0}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', r5, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, &(0x7f0000004240)={&(0x7f0000004180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000004200)={&(0x7f00000041c0)={0x14, 0x0, 0x200, 0x70bd29, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x4004083) 09:22:52 executing program 4: r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00'}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x0, 0x0, 0x0, 0x6}], &(0x7f00000000c0)='GPL\x00', 0x0, 0xec, &(0x7f0000000100)=""/236, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r0]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0x8, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x0, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x0, 0x4, 0x0, 0xfffffffffffffff0}, @ldst={0x0, 0x0, 0x2, 0x0, 0x1}, @map_fd={0x18, 0x5}, @map_fd], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f00000040c0)) 09:22:52 executing program 2: r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00'}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x0, 0x0, 0x0, 0x6}], &(0x7f00000000c0)='GPL\x00', 0x0, 0xec, &(0x7f0000000100)=""/236, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r0]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xa, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x0, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x0, 0x4, 0x0, 0xfffffffffffffff0}, @ldst={0x0, 0x0, 0x2, 0x0, 0x1}, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0xd}, @map_fd={0x18, 0x5}, @map_fd], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f00000040c0)) 09:22:52 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, 0xffffffffffffffff]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00', 0x0}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', r5, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, &(0x7f0000004240)={&(0x7f0000004180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000004200)={&(0x7f00000041c0)={0x14, 0x0, 0x200, 0x70bd29, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x4004083) 09:22:52 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) ioctl$VHOST_VDPA_GET_IOVA_RANGE(0xffffffffffffffff, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={0x0, 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00'}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', 0x0, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) 09:22:52 executing program 4: ioctl$VHOST_SET_VRING_KICK(0xffffffffffffffff, 0x4008af20, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x0, 0x0, 0x0, 0x6}], &(0x7f00000000c0)='GPL\x00', 0x0, 0xec, &(0x7f0000000100)=""/236, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r0]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xc, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x0, 0x0, 0x2, 0x0, 0x0, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd}, @map_fd={0x18, 0x5}, @map_fd, @map_val={0x18, 0x1}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) r1 = socket$inet_mptcp(0x2, 0x1, 0x106) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f00000040c0)) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NET_DM_CMD_STOP(r2, &(0x7f0000004240)={&(0x7f0000004180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000004200)={&(0x7f00000041c0)={0x14, 0x0, 0x200, 0x70bd29, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x4004083) 09:22:52 executing program 5: openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xc, &(0x7f0000000500)=@raw=[@jmp={0x5, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff0}, @ldst, @map_idx_val, @map_fd={0x18, 0x5, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd, @map_val], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) socket$inet_mptcp(0x2, 0x1, 0x106) 09:22:52 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r1]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00', 0x0}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', r5, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, &(0x7f0000004240)={&(0x7f0000004180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000004200)={&(0x7f00000041c0)={0x14, 0x0, 0x200, 0x70bd29, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x4004083) 09:22:52 executing program 2: r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00'}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x0, 0x0, 0x0, 0x6}], &(0x7f00000000c0)='GPL\x00', 0x0, 0xec, &(0x7f0000000100)=""/236, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r0]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xa, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x0, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x0, 0x4, 0x0, 0xfffffffffffffff0}, @ldst={0x0, 0x0, 0x2, 0x0, 0x1}, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0xd}, @map_fd={0x18, 0x5}, @map_fd], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f00000040c0)) 09:22:52 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) ioctl$VHOST_VDPA_GET_IOVA_RANGE(0xffffffffffffffff, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={0x0, 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00'}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', 0x0, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) 09:22:52 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, 0xffffffffffffffff]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00', 0x0}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', r5, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, &(0x7f0000004240)={&(0x7f0000004180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000004200)={&(0x7f00000041c0)={0x14, 0x0, 0x200, 0x70bd29, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x4004083) 09:22:52 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r1]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, 0x0) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00', 0x0}) r6 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000001880)='/sys/fs/f2fs', 0x280000, 0x82) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', r5, 0x38, r6, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) 09:22:52 executing program 4: ioctl$VHOST_SET_VRING_KICK(0xffffffffffffffff, 0x4008af20, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x0, 0x0, 0x0, 0x6}], &(0x7f00000000c0)='GPL\x00', 0x0, 0xec, &(0x7f0000000100)=""/236, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r0]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xc, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x0, 0x0, 0x2, 0x0, 0x0, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd}, @map_fd={0x18, 0x5}, @map_fd, @map_val={0x18, 0x1}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) r1 = socket$inet_mptcp(0x2, 0x1, 0x106) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f00000040c0)) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NET_DM_CMD_STOP(r2, &(0x7f0000004240)={&(0x7f0000004180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000004200)={&(0x7f00000041c0)={0x14, 0x0, 0x200, 0x70bd29, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x4004083) 09:22:52 executing program 2: r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00'}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x0, 0x0, 0x0, 0x6}], &(0x7f00000000c0)='GPL\x00', 0x0, 0xec, &(0x7f0000000100)=""/236, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r0]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xa, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x0, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x0, 0x4, 0x0, 0xfffffffffffffff0}, @ldst={0x0, 0x0, 0x2, 0x0, 0x1}, @map_idx_val={0x18, 0xcf17f431a521a788}, @map_fd={0x18, 0x5}, @map_fd], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f00000040c0)) 09:22:52 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r1]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00', 0x0}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', r5, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, &(0x7f0000004240)={&(0x7f0000004180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000004200)={&(0x7f00000041c0)={0x14, 0x0, 0x200, 0x70bd29, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x4004083) 09:22:52 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, 0xffffffffffffffff]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00', 0x0}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', r5, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, &(0x7f0000004240)={&(0x7f0000004180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000004200)={&(0x7f00000041c0)={0x14, 0x0, 0x200, 0x70bd29, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x4004083) 09:22:52 executing program 2: r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00'}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x0, 0x0, 0x0, 0x6}], &(0x7f00000000c0)='GPL\x00', 0x0, 0xec, &(0x7f0000000100)=""/236, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r0]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xa, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x0, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x0, 0x4, 0x0, 0xfffffffffffffff0}, @ldst={0x0, 0x0, 0x2, 0x0, 0x1}, @map_idx_val={0x18, 0xcf17f431a521a788}, @map_fd={0x18, 0x5}, @map_fd], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f00000040c0)) 09:22:52 executing program 5: ioctl$VHOST_SET_VRING_KICK(0xffffffffffffffff, 0x4008af20, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x0, 0x0, 0x0, 0x6}], &(0x7f00000000c0)='GPL\x00', 0x0, 0xec, &(0x7f0000000100)=""/236, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r0]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xc, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x0, 0x0, 0x2, 0x0, 0x0, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd}, @map_fd={0x18, 0x5}, @map_fd, @map_val={0x18, 0x1}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) r1 = socket$inet_mptcp(0x2, 0x1, 0x106) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f00000040c0)) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NET_DM_CMD_STOP(r2, &(0x7f0000004240)={&(0x7f0000004180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000004200)={&(0x7f00000041c0)={0x14, 0x0, 0x200, 0x70bd29, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x4004083) 09:22:52 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) ioctl$VHOST_VDPA_GET_IOVA_RANGE(0xffffffffffffffff, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00'}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00'}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', 0x0, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) 09:22:52 executing program 4: ioctl$VHOST_SET_VRING_KICK(0xffffffffffffffff, 0x4008af20, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={0x0, 0x0, 0x8}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x0, &(0x7f0000000080), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x0, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9}, @map_val], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) r1 = socket$inet_mptcp(0x2, 0x1, 0x106) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f00000040c0)) sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, &(0x7f0000004240)={&(0x7f0000004180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000004200)={&(0x7f00000041c0)={0x14, 0x0, 0x200, 0x70bd29, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x4004083) 09:22:53 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r1]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00', 0x0}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', r5, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, &(0x7f0000004240)={&(0x7f0000004180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000004200)={&(0x7f00000041c0)={0x14, 0x0, 0x200, 0x70bd29, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x4004083) 09:22:53 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, 0xffffffffffffffff]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00', 0x0}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', r5, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) 09:22:53 executing program 5: ioctl$VHOST_SET_VRING_KICK(0xffffffffffffffff, 0x4008af20, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x0, 0x0, 0x0, 0x6}], &(0x7f00000000c0)='GPL\x00', 0x0, 0xec, &(0x7f0000000100)=""/236, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r0]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xc, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x0, 0x0, 0x2, 0x0, 0x0, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd}, @map_fd={0x18, 0x5}, @map_fd, @map_val={0x18, 0x1}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) r1 = socket$inet_mptcp(0x2, 0x1, 0x106) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f00000040c0)) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NET_DM_CMD_STOP(r2, &(0x7f0000004240)={&(0x7f0000004180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000004200)={&(0x7f00000041c0)={0x14, 0x0, 0x200, 0x70bd29, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x4004083) 09:22:53 executing program 2: r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00'}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x0, 0x0, 0x0, 0x6}], &(0x7f00000000c0)='GPL\x00', 0x0, 0xec, &(0x7f0000000100)=""/236, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r0]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0x9, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x0, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x0, 0x4, 0x0, 0xfffffffffffffff0}, @map_idx_val={0x18, 0xcf17f431a521a788}, @map_fd={0x18, 0x5}, @map_fd], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f00000040c0)) 09:22:53 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) ioctl$VHOST_VDPA_GET_IOVA_RANGE(0xffffffffffffffff, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00'}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00'}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', 0x0, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) 09:22:53 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) ioctl$VHOST_VDPA_GET_IOVA_RANGE(0xffffffffffffffff, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00'}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00'}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', 0x0, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) 09:22:53 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r1]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00', 0x0}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', r5, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, &(0x7f0000004240)={&(0x7f0000004180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000004200)={&(0x7f00000041c0)={0x14, 0x0, 0x200, 0x70bd29, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x4004083) 09:22:53 executing program 2: r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00'}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x0, 0x0, 0x0, 0x6}], &(0x7f00000000c0)='GPL\x00', 0x0, 0xec, &(0x7f0000000100)=""/236, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r0]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0x9, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x0, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x0, 0x4, 0x0, 0xfffffffffffffff0}, @map_idx_val={0x18, 0xcf17f431a521a788}, @map_fd={0x18, 0x5}, @map_fd], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f00000040c0)) 09:22:53 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) ioctl$VHOST_VDPA_GET_IOVA_RANGE(0xffffffffffffffff, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00'}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00'}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', 0x0, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) 09:22:53 executing program 5: ioctl$VHOST_SET_VRING_KICK(0xffffffffffffffff, 0x4008af20, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x0, 0x0, 0x0, 0x6}], &(0x7f00000000c0)='GPL\x00', 0x0, 0xec, &(0x7f0000000100)=""/236, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r0]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xc, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x0, 0x0, 0x2, 0x0, 0x0, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd}, @map_fd={0x18, 0x5}, @map_fd, @map_val={0x18, 0x1}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) r1 = socket$inet_mptcp(0x2, 0x1, 0x106) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f00000040c0)) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NET_DM_CMD_STOP(r2, &(0x7f0000004240)={&(0x7f0000004180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000004200)={&(0x7f00000041c0)={0x14, 0x0, 0x200, 0x70bd29, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x4004083) 09:22:53 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, 0xffffffffffffffff]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00', 0x0}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', r5, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) 09:22:53 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, 0xffffffffffffffff]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00', 0x0}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', r5, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) 09:22:53 executing program 2: r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00'}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x0, 0x0, 0x0, 0x6}], &(0x7f00000000c0)='GPL\x00', 0x0, 0xec, &(0x7f0000000100)=""/236, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r0]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0x9, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x0, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x0, 0x4, 0x0, 0xfffffffffffffff0}, @map_idx_val={0x18, 0xcf17f431a521a788}, @map_fd={0x18, 0x5}, @map_fd], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f00000040c0)) 09:22:53 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r1]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00', 0x0}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', r5, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, &(0x7f0000004240)={&(0x7f0000004180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000004200)={&(0x7f00000041c0)={0x14, 0x0, 0x200, 0x70bd29, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x4004083) 09:22:53 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) ioctl$VHOST_VDPA_GET_IOVA_RANGE(0xffffffffffffffff, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, 0x0, 0x0) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00'}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', 0x0, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) 09:22:53 executing program 2: r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00'}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x0, 0x0, 0x0, 0x6}], &(0x7f00000000c0)='GPL\x00', 0x0, 0xec, &(0x7f0000000100)=""/236, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r0]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0x9, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x0, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x0, 0x4, 0x0, 0xfffffffffffffff0}, @map_idx_val, @map_fd={0x18, 0x5}, @map_fd], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f00000040c0)) 09:22:53 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, 0xffffffffffffffff]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00', 0x0}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', r5, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) 09:22:53 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, 0xffffffffffffffff]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00', 0x0}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', r5, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) 09:22:53 executing program 5: ioctl$VHOST_SET_VRING_KICK(0xffffffffffffffff, 0x4008af20, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x0, 0x0, 0x0, 0x6}], &(0x7f00000000c0)='GPL\x00', 0x0, 0xec, &(0x7f0000000100)=""/236, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r0]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xc, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x0, 0x0, 0x2, 0x0, 0x0, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd}, @map_fd={0x18, 0x5}, @map_fd, @map_val={0x18, 0x1}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) r1 = socket$inet_mptcp(0x2, 0x1, 0x106) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f00000040c0)) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) 09:22:53 executing program 2: r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00'}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x0, 0x0, 0x0, 0x6}], &(0x7f00000000c0)='GPL\x00', 0x0, 0xec, &(0x7f0000000100)=""/236, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r0]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0x9, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x0, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x0, 0x4, 0x0, 0xfffffffffffffff0}, @map_idx_val, @map_fd={0x18, 0x5}, @map_fd], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f00000040c0)) 09:22:53 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) ioctl$VHOST_VDPA_GET_IOVA_RANGE(0xffffffffffffffff, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, 0x0, 0x0) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00'}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', 0x0, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) 09:22:53 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r1]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00', 0x0}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', r5, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, &(0x7f0000004240)={&(0x7f0000004180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000004200)={&(0x7f00000041c0)={0x14, 0x0, 0x200, 0x70bd29, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x4004083) 09:22:54 executing program 5: ioctl$VHOST_SET_VRING_KICK(0xffffffffffffffff, 0x4008af20, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x0, 0x0, 0x0, 0x6}], &(0x7f00000000c0)='GPL\x00', 0x0, 0xec, &(0x7f0000000100)=""/236, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r0]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xc, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x0, 0x0, 0x2, 0x0, 0x0, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd}, @map_fd={0x18, 0x5}, @map_fd, @map_val={0x18, 0x1}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) socket$inet_mptcp(0x2, 0x1, 0x106) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) 09:22:54 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, 0xffffffffffffffff]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00', 0x0}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', r5, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) 09:22:54 executing program 2: r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00'}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x0, 0x0, 0x0, 0x6}], &(0x7f00000000c0)='GPL\x00', 0x0, 0xec, &(0x7f0000000100)=""/236, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r0]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0x9, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x0, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x0, 0x4, 0x0, 0xfffffffffffffff0}, @map_idx_val, @map_fd={0x18, 0x5}, @map_fd], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f00000040c0)) 09:22:54 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) ioctl$VHOST_VDPA_GET_IOVA_RANGE(0xffffffffffffffff, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, 0x0, 0x0) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00'}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', 0x0, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) 09:22:54 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, 0xffffffffffffffff]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00', 0x0}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', r5, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) 09:22:54 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r1]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00', 0x0}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', r5, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, &(0x7f0000004240)={&(0x7f0000004180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000004200)={&(0x7f00000041c0)={0x14, 0x0, 0x200, 0x70bd29, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x4004083) 09:22:54 executing program 5: ioctl$VHOST_SET_VRING_KICK(0xffffffffffffffff, 0x4008af20, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x0, 0x0, 0x0, 0x6}], &(0x7f00000000c0)='GPL\x00', 0x0, 0xec, &(0x7f0000000100)=""/236, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r0]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xc, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x0, 0x0, 0x2, 0x0, 0x0, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd}, @map_fd={0x18, 0x5}, @map_fd, @map_val={0x18, 0x1}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) 09:22:54 executing program 2: r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00'}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x0, 0x0, 0x0, 0x6}], &(0x7f00000000c0)='GPL\x00', 0x0, 0xec, &(0x7f0000000100)=""/236, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r0]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0x8, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x0, 0x3, 0x0, 0x5}, @map_idx_val={0x18, 0xcf17f431a521a788}, @map_fd={0x18, 0x5}, @map_fd], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f00000040c0)) 09:22:54 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, 0xffffffffffffffff]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00', 0x0}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', r5, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) 09:22:54 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) ioctl$VHOST_VDPA_GET_IOVA_RANGE(0xffffffffffffffff, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480), 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00'}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', 0x0, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) 09:22:54 executing program 4: r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00'}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x0, 0x0, 0x0, 0x6}], &(0x7f00000000c0)='GPL\x00', 0x0, 0xec, &(0x7f0000000100)=""/236, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r0]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0x9, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x0, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x0, 0x4, 0x0, 0xfffffffffffffff0}, @map_idx_val, @map_fd={0x18, 0x5}, @map_fd], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f00000040c0)) 09:22:54 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r1]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00', 0x0}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', r5, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, &(0x7f0000004240)={&(0x7f0000004180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000004200)={&(0x7f00000041c0)={0x14, 0x0, 0x200, 0x70bd29, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x4004083) 09:22:54 executing program 5: ioctl$VHOST_SET_VRING_KICK(0xffffffffffffffff, 0x4008af20, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x0, 0x0, 0x0, 0x6}], &(0x7f00000000c0)='GPL\x00', 0x0, 0xec, &(0x7f0000000100)=""/236, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r0]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xc, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x0, 0x0, 0x2, 0x0, 0x0, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd}, @map_fd={0x18, 0x5}, @map_fd, @map_val={0x18, 0x1}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) 09:22:54 executing program 2: r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00'}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x0, 0x0, 0x0, 0x6}], &(0x7f00000000c0)='GPL\x00', 0x0, 0xec, &(0x7f0000000100)=""/236, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r0]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0x8, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x0, 0x3, 0x0, 0x5}, @map_idx_val={0x18, 0xcf17f431a521a788}, @map_fd={0x18, 0x5}, @map_fd], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f00000040c0)) 09:22:54 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, 0xffffffffffffffff]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00', 0x0}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', r5, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) 09:22:54 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, 0xffffffffffffffff]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00', 0x0}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', r5, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) 09:22:54 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) ioctl$VHOST_VDPA_GET_IOVA_RANGE(0xffffffffffffffff, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480), 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00'}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', 0x0, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) 09:22:54 executing program 5: ioctl$VHOST_SET_VRING_KICK(0xffffffffffffffff, 0x4008af20, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x0, 0x0, 0x0, 0x6}], &(0x7f00000000c0)='GPL\x00', 0x0, 0xec, &(0x7f0000000100)=""/236, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r0]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xc, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x0, 0x0, 0x2, 0x0, 0x0, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd}, @map_fd={0x18, 0x5}, @map_fd, @map_val={0x18, 0x1}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) 09:22:54 executing program 2: r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00'}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x0, 0x0, 0x0, 0x6}], &(0x7f00000000c0)='GPL\x00', 0x0, 0xec, &(0x7f0000000100)=""/236, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r0]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0x8, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x0, 0x3, 0x0, 0x5}, @map_idx_val, @map_fd={0x18, 0x5}, @map_fd], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f00000040c0)) 09:22:54 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) ioctl$VHOST_VDPA_GET_IOVA_RANGE(0xffffffffffffffff, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480), 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(0xffffffffffffffff, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00'}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', 0x0, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) 09:22:54 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r1]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00', 0x0}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', r5, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, &(0x7f0000004240)={&(0x7f0000004180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000004200)={&(0x7f00000041c0)={0x14, 0x0, 0x200, 0x70bd29, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x4004083) 09:22:54 executing program 5: ioctl$VHOST_SET_VRING_KICK(0xffffffffffffffff, 0x4008af20, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x0, 0x0, 0x0, 0x6}], &(0x7f00000000c0)='GPL\x00', 0x0, 0xec, &(0x7f0000000100)=""/236, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r0]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xc, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x0, 0x0, 0x2, 0x0, 0x0, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd}, @map_fd={0x18, 0x5}, @map_fd, @map_val={0x18, 0x1}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) 09:22:54 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, 0xffffffffffffffff]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00', 0x0}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', r5, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) 09:22:54 executing program 4: ioctl$VHOST_SET_VRING_KICK(0xffffffffffffffff, 0x4008af20, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x0, 0x0, 0x0, 0x6}], &(0x7f00000000c0)='GPL\x00', 0x0, 0xec, &(0x7f0000000100)=""/236, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r0]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xc, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x0, 0x0, 0x2, 0x0, 0x0, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd}, @map_fd={0x18, 0x5}, @map_fd, @map_val={0x18, 0x1}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) 09:22:54 executing program 2: r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00'}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x0, 0x0, 0x0, 0x6}], &(0x7f00000000c0)='GPL\x00', 0x0, 0xec, &(0x7f0000000100)=""/236, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r0]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0x8, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x0, 0x3, 0x0, 0x5}, @map_idx_val, @map_fd={0x18, 0x5}, @map_fd], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f00000040c0)) 09:22:54 executing program 5: ioctl$VHOST_SET_VRING_KICK(0xffffffffffffffff, 0x4008af20, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x0, 0x0, 0x0, 0x6}], &(0x7f00000000c0)='GPL\x00', 0x0, 0xec, &(0x7f0000000100)=""/236, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r0]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xc, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x0, 0x0, 0x2, 0x0, 0x0, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd}, @map_fd={0x18, 0x5}, @map_fd, @map_val={0x18, 0x1}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) 09:22:55 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r1]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00', 0x0}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', r5, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, &(0x7f0000004240)={&(0x7f0000004180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000004200)={&(0x7f00000041c0)={0x14, 0x0, 0x200, 0x70bd29, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x4004083) 09:22:55 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r1]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00', 0x0}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', r5, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, &(0x7f0000004240)={&(0x7f0000004180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000004200)={&(0x7f00000041c0)={0x14, 0x0, 0x200, 0x70bd29, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x4004083) 09:22:55 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) ioctl$VHOST_VDPA_GET_IOVA_RANGE(0xffffffffffffffff, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480), 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(0xffffffffffffffff, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00'}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', 0x0, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) 09:22:55 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, 0xffffffffffffffff]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r2, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r2}, @map_val={0x18, 0x1, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r3 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r3, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00'}) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) 09:22:55 executing program 5: ioctl$VHOST_SET_VRING_KICK(0xffffffffffffffff, 0x4008af20, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x0, 0x0, 0x0, 0x6}], &(0x7f00000000c0)='GPL\x00', 0x0, 0xec, &(0x7f0000000100)=""/236, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r0]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xc, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x0, 0x0, 0x2, 0x0, 0x0, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd}, @map_fd={0x18, 0x5}, @map_fd, @map_val={0x18, 0x1}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) 09:22:55 executing program 2: r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00'}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x0, 0x0, 0x0, 0x6}], &(0x7f00000000c0)='GPL\x00', 0x0, 0xec, &(0x7f0000000100)=""/236, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r0]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0x8, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x0, 0x3, 0x0, 0x5}, @map_idx_val, @map_fd={0x18, 0x5}, @map_fd], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f00000040c0)) 09:22:55 executing program 5: ioctl$VHOST_SET_VRING_KICK(0xffffffffffffffff, 0x4008af20, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x0, 0x0, 0x0, 0x6}], &(0x7f00000000c0)='GPL\x00', 0x0, 0xec, &(0x7f0000000100)=""/236, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) 09:22:55 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r1]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00', 0x0}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', r5, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, &(0x7f0000004240)={&(0x7f0000004180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000004200)={&(0x7f00000041c0)={0x14, 0x0, 0x200, 0x70bd29, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x4004083) 09:22:55 executing program 4: r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00'}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x0, 0x0, 0x0, 0x6}], &(0x7f00000000c0)='GPL\x00', 0x0, 0xec, &(0x7f0000000100)=""/236, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r0]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0x8, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x0, 0x3, 0x0, 0x5}, @map_idx_val, @map_fd={0x18, 0x5}, @map_fd], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f00000040c0)) 09:22:55 executing program 5: ioctl$VHOST_SET_VRING_KICK(0xffffffffffffffff, 0x4008af20, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) 09:22:55 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, 0xffffffffffffffff]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r2, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r2}, @map_val={0x18, 0x1, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r3 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r3, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00'}) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) 09:22:55 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) ioctl$VHOST_VDPA_GET_IOVA_RANGE(0xffffffffffffffff, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480), 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(0xffffffffffffffff, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00'}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', 0x0, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) 09:22:55 executing program 5: ioctl$VHOST_SET_VRING_KICK(0xffffffffffffffff, 0x4008af20, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) 09:22:55 executing program 2: r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00'}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x0, 0x0, 0x0, 0x6}], &(0x7f00000000c0)='GPL\x00', 0x0, 0xec, &(0x7f0000000100)=""/236, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r0]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0x6, &(0x7f0000000500)=@raw=[@map_idx_val={0x18, 0xcf17f431a521a788}, @map_fd={0x18, 0x5}, @map_fd], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f00000040c0)) 09:22:55 executing program 5: syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) 09:22:55 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) ioctl$VHOST_VDPA_GET_IOVA_RANGE(0xffffffffffffffff, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480), 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(0xffffffffffffffff, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00'}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', 0x0, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) 09:22:55 executing program 5: r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00'}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x0, 0x0, 0x0, 0x6}], &(0x7f00000000c0)='GPL\x00', 0x0, 0xec, &(0x7f0000000100)=""/236, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r0]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0x9, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x0, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x0, 0x4, 0x0, 0xfffffffffffffff0}, @map_idx_val={0x18, 0xcf17f431a521a788}, @map_fd={0x18, 0x5}, @map_fd], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f00000040c0)) 09:22:55 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) ioctl$VHOST_VDPA_GET_IOVA_RANGE(0xffffffffffffffff, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480), 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00'}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', 0x0, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) 09:22:55 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r1]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00', 0x0}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', r5, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, &(0x7f0000004240)={&(0x7f0000004180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000004200)={&(0x7f00000041c0)={0x14, 0x0, 0x200, 0x70bd29, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x4004083) 09:22:55 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, 0xffffffffffffffff]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r2, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r2}, @map_val={0x18, 0x1, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r3 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r3, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00'}) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) 09:22:55 executing program 2: r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00'}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x0, 0x0, 0x0, 0x6}], &(0x7f00000000c0)='GPL\x00', 0x0, 0xec, &(0x7f0000000100)=""/236, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r0]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0x6, &(0x7f0000000500)=@raw=[@map_idx_val={0x18, 0xcf17f431a521a788}, @map_fd={0x18, 0x5}, @map_fd], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f00000040c0)) 09:22:55 executing program 4: r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00'}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x0, 0x0, 0x0, 0x6}], &(0x7f00000000c0)='GPL\x00', 0x0, 0xec, &(0x7f0000000100)=""/236, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r0]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0x9, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x0, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x0, 0x4, 0x0, 0xfffffffffffffff0}, @map_idx_val={0x18, 0xcf17f431a521a788}, @map_fd={0x18, 0x5}, @map_fd], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f00000040c0)) 09:22:55 executing program 5: ioctl$VHOST_SET_VRING_KICK(0xffffffffffffffff, 0x4008af20, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={0x0, 0x0, 0x8}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x0, &(0x7f0000000080), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x0, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9}, @map_val], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) r1 = socket$inet_mptcp(0x2, 0x1, 0x106) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f00000040c0)) sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, &(0x7f0000004240)={&(0x7f0000004180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000004200)={&(0x7f00000041c0)={0x14, 0x0, 0x200, 0x70bd29, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x4004083) 09:22:55 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, 0xffffffffffffffff]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r2, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r2}, @map_val={0x18, 0x1, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r3 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r3, 0x0, &(0x7f0000000780)) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) 09:22:55 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) ioctl$VHOST_VDPA_GET_IOVA_RANGE(0xffffffffffffffff, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480), 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00'}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', 0x0, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) 09:22:55 executing program 2: r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00'}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x0, 0x0, 0x0, 0x6}], &(0x7f00000000c0)='GPL\x00', 0x0, 0xec, &(0x7f0000000100)=""/236, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r0]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0x6, &(0x7f0000000500)=@raw=[@map_idx_val={0x18, 0xcf17f431a521a788}, @map_fd={0x18, 0x5}, @map_fd], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f00000040c0)) 09:22:55 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) ioctl$VHOST_VDPA_GET_IOVA_RANGE(0xffffffffffffffff, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480), 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00'}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', 0x0, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) 09:22:55 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00', 0x0}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', r5, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) 09:22:55 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r1]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00', 0x0}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', r5, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, &(0x7f0000004240)={&(0x7f0000004180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000004200)={&(0x7f00000041c0)={0x14, 0x0, 0x200, 0x70bd29, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x4004083) 09:22:56 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, 0xffffffffffffffff]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r2, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r2}, @map_val={0x18, 0x1, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r3 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r3, 0x0, &(0x7f0000000780)) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) 09:22:56 executing program 2: r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00'}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x0, 0x0, 0x0, 0x6}], &(0x7f00000000c0)='GPL\x00', 0x0, 0xec, &(0x7f0000000100)=""/236, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r0]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0x8, &(0x7f0000000500)=@raw=[@btf_id, @map_idx_val={0x18, 0xcf17f431a521a788}, @map_fd={0x18, 0x5}, @map_fd], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f00000040c0)) 09:22:56 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) ioctl$VHOST_VDPA_GET_IOVA_RANGE(0xffffffffffffffff, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480), 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00'}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', 0x0, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) 09:22:56 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) ioctl$VHOST_VDPA_GET_IOVA_RANGE(0xffffffffffffffff, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480), 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00'}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', 0x0, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) 09:22:56 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00', 0x0}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', r5, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, &(0x7f0000004240)={&(0x7f0000004180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000004200)={&(0x7f00000041c0)={0x14, 0x0, 0x200, 0x70bd29, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x4004083) 09:22:56 executing program 2: r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00'}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x0, 0x0, 0x0, 0x6}], &(0x7f00000000c0)='GPL\x00', 0x0, 0xec, &(0x7f0000000100)=""/236, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r0]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0x8, &(0x7f0000000500)=@raw=[@btf_id, @map_idx_val={0x18, 0xcf17f431a521a788}, @map_fd={0x18, 0x5}, @map_fd], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f00000040c0)) 09:22:56 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r1]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00', 0x0}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', r5, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, &(0x7f0000004240)={&(0x7f0000004180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000004200)={&(0x7f00000041c0)={0x14, 0x0, 0x200, 0x70bd29, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x4004083) 09:22:56 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, 0xffffffffffffffff]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r2, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r2}, @map_val={0x18, 0x1, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r3 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r3, 0x0, &(0x7f0000000780)) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) 09:22:56 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r1 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) ioctl$VHOST_VDPA_GET_IOVA_RANGE(0xffffffffffffffff, 0x8010af78, &(0x7f00000003c0)) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480), 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r2, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00'}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', 0x0, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r1}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) 09:22:56 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r1]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(0xffffffffffffffff, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00', 0x0}) r6 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000001880)='/sys/fs/f2fs', 0x280000, 0x82) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', r5, 0x38, r6, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) 09:22:56 executing program 4: openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp, @ldst, @map_idx_val, @map_fd={0x18, 0x5, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd, @map_val], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) socket$inet_mptcp(0x2, 0x1, 0x106) 09:22:56 executing program 2: r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00'}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x0, 0x0, 0x0, 0x6}], &(0x7f00000000c0)='GPL\x00', 0x0, 0xec, &(0x7f0000000100)=""/236, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r0]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0x8, &(0x7f0000000500)=@raw=[@btf_id, @map_idx_val={0x18, 0xcf17f431a521a788}, @map_fd={0x18, 0x5}, @map_fd], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f00000040c0)) 09:22:56 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, 0xffffffffffffffff]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r2, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r2}, @map_val={0x18, 0x1, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$IOCTL_GET_NCIDEV_IDX(0xffffffffffffffff, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00'}) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) 09:22:56 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r1]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00', 0x0}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', r5, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, &(0x7f0000004240)={&(0x7f0000004180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000004200)={&(0x7f00000041c0)={0x14, 0x0, 0x200, 0x70bd29, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x4004083) 09:22:56 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r1 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) ioctl$VHOST_VDPA_GET_IOVA_RANGE(0xffffffffffffffff, 0x8010af78, &(0x7f00000003c0)) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480), 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r2, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00'}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', 0x0, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r1}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) 09:22:56 executing program 5: ioctl$VHOST_SET_VRING_KICK(0xffffffffffffffff, 0x4008af20, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={0x0, 0x0, 0x8}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x0, &(0x7f0000000080), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x0, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9}, @map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) r1 = socket$inet_mptcp(0x2, 0x1, 0x106) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f00000040c0)) sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, &(0x7f0000004240)={&(0x7f0000004180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000004200)={&(0x7f00000041c0)={0x14, 0x0, 0x200, 0x70bd29, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x4004083) 09:22:56 executing program 2: r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00'}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x0, 0x0, 0x0, 0x6}], &(0x7f00000000c0)='GPL\x00', 0x0, 0xec, &(0x7f0000000100)=""/236, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r0]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0x8, &(0x7f0000000500)=@raw=[@btf_id, @map_idx_val={0x18, 0xcf17f431a521a788}, @map_fd={0x18, 0x5}, @map_fd], 0x0, 0x9, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f00000040c0)) 09:22:56 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, 0xffffffffffffffff]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r2, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r2}, @map_val={0x18, 0x1, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$IOCTL_GET_NCIDEV_IDX(0xffffffffffffffff, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00'}) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) 09:22:56 executing program 5: ioctl$VHOST_SET_VRING_KICK(0xffffffffffffffff, 0x4008af20, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x0, 0x0, 0x0, 0x6}], &(0x7f00000000c0)='GPL\x00', 0x0, 0xec, &(0x7f0000000100)=""/236, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r0]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xc, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x0, 0x0, 0x0, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd}, @map_fd={0x18, 0x5}, @map_fd, @map_val={0x18, 0x1}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) r1 = socket$inet_mptcp(0x2, 0x1, 0x106) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f00000040c0)) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NET_DM_CMD_STOP(r2, &(0x7f0000004240)={&(0x7f0000004180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000004200)={&(0x7f00000041c0)={0x14, 0x0, 0x200, 0x70bd29, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x4004083) 09:22:56 executing program 4: ioctl$VHOST_SET_VRING_KICK(0xffffffffffffffff, 0x4008af20, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={0x0, 0x0, 0x8}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x0, &(0x7f0000000080), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x0, 0xc, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) r1 = socket$inet_mptcp(0x2, 0x1, 0x106) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f00000040c0)) sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, &(0x7f0000004240)={&(0x7f0000004180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000004200)={&(0x7f00000041c0)={0x14, 0x0, 0x200, 0x70bd29, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x4004083) 09:22:56 executing program 2: r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00'}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x0, 0x0, 0x0, 0x6}], &(0x7f00000000c0)='GPL\x00', 0x0, 0xec, &(0x7f0000000100)=""/236, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r0]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0x8, &(0x7f0000000500)=@raw=[@btf_id, @map_idx_val={0x18, 0xcf17f431a521a788}, @map_fd={0x18, 0x5}, @map_fd], 0x0, 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f00000040c0)) 09:22:56 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r1 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) ioctl$VHOST_VDPA_GET_IOVA_RANGE(0xffffffffffffffff, 0x8010af78, &(0x7f00000003c0)) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480), 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = openat$nci(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r2, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00'}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', 0x0, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r1}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) 09:22:56 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r1]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00', 0x0}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', r5, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, &(0x7f0000004240)={&(0x7f0000004180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000004200)={&(0x7f00000041c0)={0x14, 0x0, 0x200, 0x70bd29, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x4004083) 09:22:56 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r1]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00', 0x0}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', r5, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, &(0x7f0000004240)={&(0x7f0000004180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000004200)={&(0x7f00000041c0)={0x14, 0x0, 0x200, 0x70bd29, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x4004083) 09:22:56 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, 0xffffffffffffffff]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r2, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r2}, @map_val={0x18, 0x1, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$IOCTL_GET_NCIDEV_IDX(0xffffffffffffffff, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00'}) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) 09:22:57 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00', 0x0}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', r5, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, &(0x7f0000004240)={&(0x7f0000004180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000004200)={&(0x7f00000041c0)={0x14, 0x0, 0x200, 0x70bd29, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x4004083) 09:22:57 executing program 2: r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00'}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x0, 0x0, 0x0, 0x6}], &(0x7f00000000c0)='GPL\x00', 0x0, 0xec, &(0x7f0000000100)=""/236, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r0]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0x8, &(0x7f0000000500)=@raw=[@btf_id, @map_idx_val={0x18, 0xcf17f431a521a788}, @map_fd={0x18, 0x5}, @map_fd], 0x0, 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f00000040c0)) 09:22:57 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r1 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) ioctl$VHOST_VDPA_GET_IOVA_RANGE(0xffffffffffffffff, 0x8010af78, &(0x7f00000003c0)) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480), 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = openat$nci(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r2, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00'}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', 0x0, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r1}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) 09:22:57 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, 0xffffffffffffffff]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r2, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r2}, @map_val={0x18, 0x1, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) r3 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r3, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00'}) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) 09:22:57 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r1]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00', 0x0}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', r5, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, &(0x7f0000004240)={&(0x7f0000004180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000004200)={&(0x7f00000041c0)={0x14, 0x0, 0x200, 0x70bd29, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x4004083) 09:22:57 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, 0xffffffffffffffff]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r2, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r2}, @map_val={0x18, 0x1, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$IOCTL_GET_NCIDEV_IDX(0xffffffffffffffff, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00'}) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) 09:22:57 executing program 2: r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00'}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x0, 0x0, 0x0, 0x6}], &(0x7f00000000c0)='GPL\x00', 0x0, 0xec, &(0x7f0000000100)=""/236, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r0]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0x8, &(0x7f0000000500)=@raw=[@btf_id, @map_idx_val={0x18, 0xcf17f431a521a788}, @map_fd={0x18, 0x5}, @map_fd], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f00000040c0)) 09:22:57 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00', 0x0}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', r5, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, &(0x7f0000004240)={&(0x7f0000004180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000004200)={&(0x7f00000041c0)={0x14, 0x0, 0x200, 0x70bd29, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x4004083) 09:22:57 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r1 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) ioctl$VHOST_VDPA_GET_IOVA_RANGE(0xffffffffffffffff, 0x8010af78, &(0x7f00000003c0)) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480), 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = openat$nci(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r2, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00'}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', 0x0, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r1}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) 09:22:57 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r1]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00', 0x0}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', r5, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, &(0x7f0000004240)={&(0x7f0000004180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000004200)={&(0x7f00000041c0)={0x14, 0x0, 0x200, 0x70bd29, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x4004083) 09:22:57 executing program 4: openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff0}, @ldst, @map_idx_val, @map_fd={0x18, 0x5, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd, @map_val], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) socket$inet_mptcp(0x2, 0x1, 0x106) 09:22:57 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r1 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) ioctl$VHOST_VDPA_GET_IOVA_RANGE(0xffffffffffffffff, 0x8010af78, &(0x7f00000003c0)) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480), 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(0xffffffffffffffff, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00'}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', 0x0, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r1}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) 09:22:57 executing program 2: r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00'}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x0, 0x0, 0x0, 0x6}], &(0x7f00000000c0)='GPL\x00', 0x0, 0xec, &(0x7f0000000100)=""/236, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r0]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0x8, &(0x7f0000000500)=@raw=[@btf_id, @map_idx_val={0x18, 0xcf17f431a521a788}, @map_fd={0x18, 0x5}, @map_fd], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f00000040c0)) 09:22:57 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, 0xffffffffffffffff]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r2, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r2}, @map_val={0x18, 0x1, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) r3 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r3, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00'}) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) 09:22:57 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[r1]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00', 0x0}) r6 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000001880)='/sys/fs/f2fs', 0x280000, 0x82) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', r5, 0x38, r6, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) 09:22:57 executing program 4: openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff0}, @ldst, @map_idx_val, @map_fd={0x18, 0x5, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd, @map_val], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) socket$inet_mptcp(0x2, 0x1, 0x106) 09:22:57 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r1 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) ioctl$VHOST_VDPA_GET_IOVA_RANGE(0xffffffffffffffff, 0x8010af78, &(0x7f00000003c0)) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480), 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(0xffffffffffffffff, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00'}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', 0x0, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r1}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) 09:22:57 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r1]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00', 0x0}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', r5, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, &(0x7f0000004240)={&(0x7f0000004180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000004200)={&(0x7f00000041c0)={0x14, 0x0, 0x200, 0x70bd29, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x4004083) 09:22:57 executing program 2: r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00'}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x0, 0x0, 0x0, 0x6}], &(0x7f00000000c0)='GPL\x00', 0x0, 0xec, &(0x7f0000000100)=""/236, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r0]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0x8, &(0x7f0000000500)=@raw=[@btf_id, @map_idx_val={0x18, 0xcf17f431a521a788}, @map_fd={0x18, 0x5}, @map_fd], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f00000040c0)) 09:22:57 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, 0xffffffffffffffff]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r2, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r2}, @map_val={0x18, 0x1, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) r3 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r3, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00'}) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) 09:22:57 executing program 5: r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00'}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x0, 0x0, 0x0, 0x6}], &(0x7f00000000c0)='GPL\x00', 0x0, 0xec, &(0x7f0000000100)=""/236, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r0]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0x8, &(0x7f0000000500)=@raw=[@btf_id, @map_idx_val={0x18, 0xcf17f431a521a788}, @map_fd={0x18, 0x5}, @map_fd], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f00000040c0)) 09:22:57 executing program 2: r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00'}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x0, 0x0, 0x0, 0x6}], &(0x7f00000000c0)='GPL\x00', 0x0, 0xec, &(0x7f0000000100)=""/236, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r0]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0x8, &(0x7f0000000500)=@raw=[@btf_id, @map_idx_val={0x18, 0xcf17f431a521a788}, @map_fd={0x18, 0x5}, @map_fd], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f00000040c0)) 09:22:57 executing program 4: ioctl$VHOST_SET_VRING_KICK(0xffffffffffffffff, 0x4008af20, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={0x0, 0x0, 0x8}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x0, &(0x7f0000000080), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x0, 0x0, 0x0, &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) r1 = socket$inet_mptcp(0x2, 0x1, 0x106) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f00000040c0)) sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, &(0x7f0000004240)={&(0x7f0000004180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000004200)={&(0x7f00000041c0)={0x14, 0x0, 0x200, 0x70bd29, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x4004083) 09:22:57 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r1]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00', 0x0}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', r5, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, &(0x7f0000004240)={&(0x7f0000004180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000004200)={&(0x7f00000041c0)={0x14, 0x0, 0x200, 0x70bd29, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x4004083) 09:22:57 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r1 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) ioctl$VHOST_VDPA_GET_IOVA_RANGE(0xffffffffffffffff, 0x8010af78, &(0x7f00000003c0)) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480), 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(0xffffffffffffffff, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00'}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', 0x0, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r1}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) 09:22:57 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, 0xffffffffffffffff]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r1, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r2, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00'}) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) 09:22:57 executing program 5: ioctl$VHOST_SET_VRING_KICK(0xffffffffffffffff, 0x4008af20, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x0, 0x0, 0x0, 0x6}], &(0x7f00000000c0)='GPL\x00', 0x0, 0xec, &(0x7f0000000100)=""/236, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r0]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xc, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x0, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd}, @map_fd={0x18, 0x5}, @map_fd, @map_val={0x18, 0x1}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) r1 = socket$inet_mptcp(0x2, 0x1, 0x106) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f00000040c0)) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NET_DM_CMD_STOP(r2, &(0x7f0000004240)={&(0x7f0000004180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000004200)={&(0x7f00000041c0)={0x14, 0x0, 0x200, 0x70bd29, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x4004083) 09:22:58 executing program 4: ioctl$VHOST_SET_VRING_KICK(0xffffffffffffffff, 0x4008af20, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={0x0, 0x0, 0x8}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x0, &(0x7f0000000080), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x0, 0x0, 0x0, &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) r1 = socket$inet_mptcp(0x2, 0x1, 0x106) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f00000040c0)) sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, &(0x7f0000004240)={&(0x7f0000004180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000004200)={&(0x7f00000041c0)={0x14, 0x0, 0x200, 0x70bd29, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x4004083) 09:22:58 executing program 2: r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00'}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x0, 0x0, 0x0, 0x6}], &(0x7f00000000c0)='GPL\x00', 0x0, 0xec, &(0x7f0000000100)=""/236, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r0]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0x8, &(0x7f0000000500)=@raw=[@btf_id, @map_idx_val={0x18, 0xcf17f431a521a788}, @map_fd={0x18, 0x5}, @map_fd], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f00000040c0)) 09:22:58 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r1 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) ioctl$VHOST_VDPA_GET_IOVA_RANGE(0xffffffffffffffff, 0x8010af78, &(0x7f00000003c0)) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480), 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00'}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', 0x0, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r1}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) 09:22:58 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r1]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00', 0x0}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', r5, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, &(0x7f0000004240)={&(0x7f0000004180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000004200)={&(0x7f00000041c0)={0x14, 0x0, 0x200, 0x70bd29, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x4004083) 09:22:58 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r1 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) ioctl$VHOST_VDPA_GET_IOVA_RANGE(0xffffffffffffffff, 0x8010af78, &(0x7f00000003c0)) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480), 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(0xffffffffffffffff, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00'}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', 0x0, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r1}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) 09:22:58 executing program 5: r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00'}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x0, 0x0, 0x0, 0x6}], &(0x7f00000000c0)='GPL\x00', 0x0, 0xec, &(0x7f0000000100)=""/236, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r0]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0x8, &(0x7f0000000500)=@raw=[@btf_id, @map_idx_val={0x18, 0xcf17f431a521a788}, @map_fd={0x18, 0x5}, @map_fd], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f00000040c0)) 09:22:58 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, 0xffffffffffffffff]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r1, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r2, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00'}) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) 09:22:58 executing program 2: r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00'}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x0, 0x0, 0x0, 0x6}], &(0x7f00000000c0)='GPL\x00', 0x0, 0xec, &(0x7f0000000100)=""/236, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r0]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0x8, &(0x7f0000000500)=@raw=[@btf_id, @map_idx_val={0x18, 0xcf17f431a521a788}, @map_fd={0x18, 0x5}, @map_fd], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f00000040c0)) 09:22:58 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r1 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) ioctl$VHOST_VDPA_GET_IOVA_RANGE(0xffffffffffffffff, 0x8010af78, &(0x7f00000003c0)) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480), 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00'}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', 0x0, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r1}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) 09:22:58 executing program 5: ioctl$VHOST_SET_VRING_KICK(0xffffffffffffffff, 0x4008af20, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x0, 0x0, 0x0, 0x6}], &(0x7f00000000c0)='GPL\x00', 0x0, 0xec, &(0x7f0000000100)=""/236, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r0]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xc, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x0, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd}, @map_fd={0x18, 0x5}, @map_fd, @map_val={0x18, 0x1}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) r1 = socket$inet_mptcp(0x2, 0x1, 0x106) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f00000040c0)) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NET_DM_CMD_STOP(r2, &(0x7f0000004240)={&(0x7f0000004180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000004200)={&(0x7f00000041c0)={0x14, 0x0, 0x200, 0x70bd29, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x4004083) 09:22:58 executing program 4: openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x0, 0x0, 0x0, 0x1, 0xfffffffffffffff0}, @ldst, @map_idx_val, @map_fd={0x18, 0x5, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd, @map_val], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) socket$inet_mptcp(0x2, 0x1, 0x106) 09:22:58 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r1]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00', 0x0}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', r5, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, &(0x7f0000004240)={&(0x7f0000004180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000004200)={&(0x7f00000041c0)={0x14, 0x0, 0x200, 0x70bd29, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x4004083) 09:22:58 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, 0xffffffffffffffff]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r1, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r2, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00'}) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) 09:22:58 executing program 2: r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00'}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x0, 0x0, 0x0, 0x6}], &(0x7f00000000c0)='GPL\x00', 0x0, 0xec, &(0x7f0000000100)=""/236, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r0]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0x8, &(0x7f0000000500)=@raw=[@btf_id, @map_idx_val={0x18, 0xcf17f431a521a788}, @map_fd={0x18, 0x5}, @map_fd], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f00000040c0)) 09:22:58 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[r1]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00', 0x0}) r6 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000001880)='/sys/fs/f2fs', 0x280000, 0x82) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', r5, 0x38, r6, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) 09:22:58 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r1 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) ioctl$VHOST_VDPA_GET_IOVA_RANGE(0xffffffffffffffff, 0x8010af78, &(0x7f00000003c0)) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480), 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', 0x0, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r1}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) 09:22:58 executing program 2: r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00'}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x0, 0x0, 0x0, 0x6}], &(0x7f00000000c0)='GPL\x00', 0x0, 0xec, &(0x7f0000000100)=""/236, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r0]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0x8, &(0x7f0000000500)=@raw=[@btf_id, @map_idx_val={0x18, 0xcf17f431a521a788}, @map_fd={0x18, 0x5}, @map_fd], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f00000040c0)) 09:22:58 executing program 4: openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x0, 0x0, 0x0, 0x1, 0xfffffffffffffff0}, @ldst, @map_idx_val, @map_fd={0x18, 0x5, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd, @map_val], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) socket$inet_mptcp(0x2, 0x1, 0x106) 09:22:58 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, 0xffffffffffffffff]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r2, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r2}, @map_val={0x18, 0x1, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r3 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r3, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00'}) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) 09:22:58 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r1]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00', 0x0}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', r5, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, &(0x7f0000004240)={&(0x7f0000004180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000004200)={&(0x7f00000041c0)={0x14, 0x0, 0x200, 0x70bd29, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x4004083) 09:22:58 executing program 2: r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00'}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x0, 0x0, 0x0, 0x6}], &(0x7f00000000c0)='GPL\x00', 0x0, 0xec, &(0x7f0000000100)=""/236, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r0]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0x8, &(0x7f0000000500)=@raw=[@btf_id, @map_idx_val={0x18, 0xcf17f431a521a788}, @map_fd={0x18, 0x5}, @map_fd], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f00000040c0)) 09:22:58 executing program 5: ioctl$VHOST_SET_VRING_KICK(0xffffffffffffffff, 0x4008af20, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={0x0, 0x0, 0x8}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x0, &(0x7f0000000080), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x0, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) r1 = socket$inet_mptcp(0x2, 0x1, 0x106) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f00000040c0)) sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, &(0x7f0000004240)={&(0x7f0000004180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000004200)={&(0x7f00000041c0)={0x14, 0x0, 0x200, 0x70bd29, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x4004083) 09:22:58 executing program 2: r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00'}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x0, 0x0, 0x0, 0x6}], &(0x7f00000000c0)='GPL\x00', 0x0, 0xec, &(0x7f0000000100)=""/236, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r0]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0x8, &(0x7f0000000500)=@raw=[@btf_id, @map_idx_val={0x18, 0xcf17f431a521a788}, @map_fd={0x18, 0x5}, @map_fd], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, 0x0) 09:22:58 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) ioctl$VHOST_VDPA_GET_IOVA_RANGE(0xffffffffffffffff, 0x8010af78, &(0x7f00000003c0)) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480), 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) 09:22:58 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, 0xffffffffffffffff]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r2, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r2}, @map_val={0x18, 0x1, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r3 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r3, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00'}) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) 09:22:58 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r1]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00', 0x0}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', r5, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, &(0x7f0000004240)={&(0x7f0000004180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000004200)={&(0x7f00000041c0)={0x14, 0x0, 0x200, 0x70bd29, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x14}}, 0x4004083) 09:22:58 executing program 5: ioctl$VHOST_SET_VRING_KICK(0xffffffffffffffff, 0x4008af20, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={0x0, 0x0, 0x8}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x0, &(0x7f0000000080), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x0, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) r1 = socket$inet_mptcp(0x2, 0x1, 0x106) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f00000040c0)) sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, &(0x7f0000004240)={&(0x7f0000004180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000004200)={&(0x7f00000041c0)={0x14, 0x0, 0x200, 0x70bd29, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x4004083) 09:22:58 executing program 4: ioctl$VHOST_SET_VRING_KICK(0xffffffffffffffff, 0x4008af20, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={0x0, 0x0, 0x8}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x0, &(0x7f0000000080), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) r1 = socket$inet_mptcp(0x2, 0x1, 0x106) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f00000040c0)) sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, &(0x7f0000004240)={&(0x7f0000004180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000004200)={&(0x7f00000041c0)={0x14, 0x0, 0x200, 0x70bd29, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x4004083) 09:22:59 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, 0xffffffffffffffff]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r2}, @map_val={0x18, 0x1, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r3 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r3, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00'}) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) 09:22:59 executing program 2: r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00'}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x0, 0x0, 0x0, 0x6}], &(0x7f00000000c0)='GPL\x00', 0x0, 0xec, &(0x7f0000000100)=""/236, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r0]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0x8, &(0x7f0000000500)=@raw=[@btf_id, @map_idx_val={0x18, 0xcf17f431a521a788}, @map_fd={0x18, 0x5}, @map_fd], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, 0x0) 09:22:59 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, 0xffffffffffffffff]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r2, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r2}, @map_val={0x18, 0x1, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r3 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r3, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00'}) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) 09:22:59 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) ioctl$VHOST_VDPA_GET_IOVA_RANGE(0xffffffffffffffff, 0x8010af78, &(0x7f00000003c0)) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480), 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) 09:22:59 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) ioctl$VHOST_VDPA_GET_IOVA_RANGE(0xffffffffffffffff, 0x8010af78, &(0x7f00000003c0)) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480), 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) 09:22:59 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r1]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00', 0x0}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', r5, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, &(0x7f0000004240)={&(0x7f0000004180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000004200)={&(0x7f00000041c0)={0x14, 0x0, 0x200, 0x70bd29, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x14}}, 0x4004083) 09:22:59 executing program 2: r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00'}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x0, 0x0, 0x0, 0x6}], &(0x7f00000000c0)='GPL\x00', 0x0, 0xec, &(0x7f0000000100)=""/236, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r0]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0x8, &(0x7f0000000500)=@raw=[@btf_id, @map_idx_val={0x18, 0xcf17f431a521a788}, @map_fd={0x18, 0x5}, @map_fd], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, 0x0) 09:22:59 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, 0xffffffffffffffff]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r2}, @map_val={0x18, 0x1, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r3 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r3, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00'}) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) 09:22:59 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) ioctl$VHOST_VDPA_GET_IOVA_RANGE(0xffffffffffffffff, 0x8010af78, &(0x7f00000003c0)) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480), 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) 09:22:59 executing program 4: ioctl$VHOST_SET_VRING_KICK(0xffffffffffffffff, 0x4008af20, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x0, 0x0, 0x0, 0x6}], &(0x7f00000000c0)='GPL\x00', 0x0, 0xec, &(0x7f0000000100)=""/236, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r0]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xc, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5}, @map_fd, @map_val={0x18, 0x1}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) r1 = socket$inet_mptcp(0x2, 0x1, 0x106) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f00000040c0)) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NET_DM_CMD_STOP(r2, &(0x7f0000004240)={&(0x7f0000004180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000004200)={&(0x7f00000041c0)={0x14, 0x0, 0x200, 0x70bd29, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x4004083) 09:22:59 executing program 5: ioctl$VHOST_SET_VRING_KICK(0xffffffffffffffff, 0x4008af20, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x0, 0x0, 0x0, 0x6}], &(0x7f00000000c0)='GPL\x00', 0x0, 0xec, &(0x7f0000000100)=""/236, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r0]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xc, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5}, @map_fd, @map_val={0x18, 0x1}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) r1 = socket$inet_mptcp(0x2, 0x1, 0x106) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f00000040c0)) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NET_DM_CMD_STOP(r2, &(0x7f0000004240)={&(0x7f0000004180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000004200)={&(0x7f00000041c0)={0x14, 0x0, 0x200, 0x70bd29, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x4004083) 09:22:59 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r1]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00', 0x0}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', r5, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, &(0x7f0000004240)={&(0x7f0000004180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000004200)={&(0x7f00000041c0)={0x14, 0x0, 0x200, 0x70bd29, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x14}}, 0x4004083) 09:22:59 executing program 2: r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00'}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x0, 0x0, 0x0, 0x6}], &(0x7f00000000c0)='GPL\x00', 0x0, 0xec, &(0x7f0000000100)=""/236, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r0]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0x8, &(0x7f0000000500)=@raw=[@btf_id, @map_idx_val={0x18, 0xcf17f431a521a788}, @map_fd={0x18, 0x5}, @map_fd], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, 0x0) 09:22:59 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r1 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) ioctl$VHOST_VDPA_GET_IOVA_RANGE(0xffffffffffffffff, 0x8010af78, &(0x7f00000003c0)) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480), 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x0, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', 0x0, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r1}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) 09:22:59 executing program 4: ioctl$VHOST_SET_VRING_KICK(0xffffffffffffffff, 0x4008af20, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x0, 0x0, 0x0, 0x6}], &(0x7f00000000c0)='GPL\x00', 0x0, 0xec, &(0x7f0000000100)=""/236, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r0]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xc, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5}, @map_fd, @map_val={0x18, 0x1}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) r1 = socket$inet_mptcp(0x2, 0x1, 0x106) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f00000040c0)) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NET_DM_CMD_STOP(r2, &(0x7f0000004240)={&(0x7f0000004180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000004200)={&(0x7f00000041c0)={0x14, 0x0, 0x200, 0x70bd29, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x4004083) 09:22:59 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, 0xffffffffffffffff]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r2, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00'}) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) 09:22:59 executing program 5: r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00'}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x0, 0x0, 0x0, 0x6}], &(0x7f00000000c0)='GPL\x00', 0x0, 0xec, &(0x7f0000000100)=""/236, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r0]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0x8, &(0x7f0000000500)=@raw=[@btf_id, @map_idx_val={0x18, 0xcf17f431a521a788}, @map_fd={0x18, 0x5}, @map_fd], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, 0x0) 09:22:59 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r1]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00', 0x0}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', r5, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, &(0x7f0000004240)={&(0x7f0000004180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000004200)={&(0x7f00000041c0)={0x14, 0x0, 0x200, 0x70bd29, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x0) 09:22:59 executing program 2: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r1]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00', 0x0}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', r5, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, &(0x7f0000004240)={&(0x7f0000004180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000004200)={&(0x7f00000041c0)={0x14, 0x0, 0x200, 0x70bd29, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x14}}, 0x4004083) 09:22:59 executing program 5: ioctl$VHOST_SET_VRING_KICK(0xffffffffffffffff, 0x4008af20, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x0, 0x0, 0x0, 0x6}], &(0x7f00000000c0)='GPL\x00', 0x0, 0xec, &(0x7f0000000100)=""/236, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r0]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xa, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_fd={0x18, 0x5}, @map_fd, @map_val={0x18, 0x1}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) socket$inet_mptcp(0x2, 0x1, 0x106) 09:22:59 executing program 4: ioctl$VHOST_SET_VRING_KICK(0xffffffffffffffff, 0x4008af20, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x0, 0x0, 0x0, 0x6}], &(0x7f00000000c0)='GPL\x00', 0x0, 0xec, &(0x7f0000000100)=""/236, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r0]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xa, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_fd={0x18, 0x5}, @map_fd, @map_val={0x18, 0x1}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) socket$inet_mptcp(0x2, 0x1, 0x106) 09:22:59 executing program 5: ioctl$VHOST_SET_VRING_KICK(0xffffffffffffffff, 0x4008af20, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={0x0, 0x0, 0x8}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x0, &(0x7f0000000080), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) r1 = socket$inet_mptcp(0x2, 0x1, 0x106) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f00000040c0)) sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, &(0x7f0000004240)={&(0x7f0000004180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000004200)={&(0x7f00000041c0)={0x14, 0x0, 0x200, 0x70bd29, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x4004083) 09:22:59 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r1 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) ioctl$VHOST_VDPA_GET_IOVA_RANGE(0xffffffffffffffff, 0x8010af78, &(0x7f00000003c0)) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480), 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x0, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', 0x0, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r1}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) 09:22:59 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, 0xffffffffffffffff]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r2, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00'}) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) 09:23:00 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r1]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00', 0x0}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', r5, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, &(0x7f0000004240)={&(0x7f0000004180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000004200)={&(0x7f00000041c0)={0x14, 0x0, 0x200, 0x70bd29, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x0) 09:23:00 executing program 5: ioctl$VHOST_SET_VRING_KICK(0xffffffffffffffff, 0x4008af20, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x0, 0x0, 0x0, 0x6}], &(0x7f00000000c0)='GPL\x00', 0x0, 0xec, &(0x7f0000000100)=""/236, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r0]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xc, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5}, @map_fd, @map_val={0x18, 0x1}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) r1 = socket$inet_mptcp(0x2, 0x1, 0x106) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f00000040c0)) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NET_DM_CMD_STOP(r2, &(0x7f0000004240)={&(0x7f0000004180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000004200)={&(0x7f00000041c0)={0x14, 0x0, 0x200, 0x70bd29, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x4004083) 09:23:00 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00', 0x0}) r6 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000001880)='/sys/fs/f2fs', 0x280000, 0x82) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', r5, 0x38, r6, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) 09:23:00 executing program 2: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00', 0x0}) r6 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000001880)='/sys/fs/f2fs', 0x280000, 0x82) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', r5, 0x38, r6, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) 09:23:00 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r1 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) ioctl$VHOST_VDPA_GET_IOVA_RANGE(0xffffffffffffffff, 0x8010af78, &(0x7f00000003c0)) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480), 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x0, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', 0x0, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r1}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) 09:23:00 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, 0xffffffffffffffff]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r2, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00'}) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) 09:23:00 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r1]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00', 0x0}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', r5, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, &(0x7f0000004240)={&(0x7f0000004180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000004200)={&(0x7f00000041c0)={0x14, 0x0, 0x200, 0x70bd29, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x0) 09:23:00 executing program 5: ioctl$VHOST_SET_VRING_KICK(0xffffffffffffffff, 0x4008af20, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x0, 0x0, 0x0, 0x6}], &(0x7f00000000c0)='GPL\x00', 0x0, 0xec, &(0x7f0000000100)=""/236, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r0]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xa, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_fd={0x18, 0x5}, @map_fd, @map_val={0x18, 0x1}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) socket$inet_mptcp(0x2, 0x1, 0x106) 09:23:00 executing program 4: ioctl$VHOST_SET_VRING_KICK(0xffffffffffffffff, 0x4008af20, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x0, 0x0, 0x0, 0x6}], &(0x7f00000000c0)='GPL\x00', 0x0, 0xec, &(0x7f0000000100)=""/236, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r0]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xc, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5}, @map_fd, @map_val={0x18, 0x1}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) r1 = socket$inet_mptcp(0x2, 0x1, 0x106) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f00000040c0)) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NET_DM_CMD_STOP(r2, &(0x7f0000004240)={&(0x7f0000004180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000004200)={&(0x7f00000041c0)={0x14, 0x0, 0x200, 0x70bd29, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x4004083) 09:23:00 executing program 2: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x0, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r1]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00', 0x0}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', r5, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, &(0x7f0000004240)={&(0x7f0000004180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000004200)={&(0x7f00000041c0)={0x14, 0x0, 0x200, 0x70bd29, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x4004083) 09:23:00 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r1 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) ioctl$VHOST_VDPA_GET_IOVA_RANGE(0xffffffffffffffff, 0x8010af78, &(0x7f00000003c0)) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480), 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x0, 0x0, &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', 0x0, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r1}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) 09:23:00 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, 0xffffffffffffffff]}, 0x80) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r2}, @map_val={0x18, 0x1, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r3 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r3, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00'}) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) 09:23:00 executing program 5: ioctl$VHOST_SET_VRING_KICK(0xffffffffffffffff, 0x4008af20, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={0x0, 0x0, 0x8}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x0, &(0x7f0000000080), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) r1 = socket$inet_mptcp(0x2, 0x1, 0x106) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f00000040c0)) sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, &(0x7f0000004240)={&(0x7f0000004180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000004200)={&(0x7f00000041c0)={0x14, 0x0, 0x200, 0x70bd29, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x4004083) 09:23:00 executing program 4: ioctl$VHOST_SET_VRING_KICK(0xffffffffffffffff, 0x4008af20, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x0, 0x0, 0x0, 0x6}], &(0x7f00000000c0)='GPL\x00', 0x0, 0xec, &(0x7f0000000100)=""/236, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r0]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xa, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_fd={0x18, 0x5}, @map_fd, @map_val={0x18, 0x1}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) r1 = socket$inet_mptcp(0x2, 0x1, 0x106) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f00000040c0)) 09:23:00 executing program 1: ioctl$VHOST_SET_VRING_KICK(0xffffffffffffffff, 0x4008af20, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x0, 0x0, 0x0, 0x6}], &(0x7f00000000c0)='GPL\x00', 0x0, 0xec, &(0x7f0000000100)=""/236, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r0]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xa, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_fd={0x18, 0x5}, @map_fd, @map_val={0x18, 0x1}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) r1 = socket$inet_mptcp(0x2, 0x1, 0x106) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f00000040c0)) 09:23:00 executing program 2: openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst, @map_idx_val, @map_fd={0x18, 0x5, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd, @map_val], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) socket$inet_mptcp(0x2, 0x1, 0x106) 09:23:00 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r1 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) ioctl$VHOST_VDPA_GET_IOVA_RANGE(0xffffffffffffffff, 0x8010af78, &(0x7f00000003c0)) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480), 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x0, 0x0, &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', 0x0, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r1}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) 09:23:00 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r1 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) ioctl$VHOST_VDPA_GET_IOVA_RANGE(0xffffffffffffffff, 0x8010af78, &(0x7f00000003c0)) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480), 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x0, 0x0, &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', 0x0, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r1}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) 09:23:00 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, 0xffffffffffffffff]}, 0x80) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r2}, @map_val={0x18, 0x1, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r3 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r3, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00'}) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) 09:23:00 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, 0xffffffffffffffff]}, 0x80) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r2}, @map_val={0x18, 0x1, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r3 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r3, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00'}) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) 09:23:00 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, 0xffffffffffffffff]}, 0x80) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r2}, @map_val={0x18, 0x1, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r3 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r3, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00'}) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) 09:23:01 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r1 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) ioctl$VHOST_VDPA_GET_IOVA_RANGE(0xffffffffffffffff, 0x8010af78, &(0x7f00000003c0)) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480), 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x0, 0x0, &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', 0x0, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r1}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) 09:23:01 executing program 2: openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst, @map_idx_val, @map_fd={0x18, 0x5, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd, @map_val], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) socket$inet_mptcp(0x2, 0x1, 0x106) 09:23:01 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r1 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) ioctl$VHOST_VDPA_GET_IOVA_RANGE(0xffffffffffffffff, 0x8010af78, &(0x7f00000003c0)) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480), 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x0, 0x0, &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', 0x0, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r1}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) 09:23:01 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, 0xffffffffffffffff]}, 0x80) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r2}, @map_val={0x18, 0x1, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r3 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r3, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00'}) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) 09:23:01 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, 0xffffffffffffffff]}, 0x80) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r2}, @map_val={0x18, 0x1, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r3 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r3, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00'}) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) 09:23:01 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r1 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) ioctl$VHOST_VDPA_GET_IOVA_RANGE(0xffffffffffffffff, 0x8010af78, &(0x7f00000003c0)) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480), 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x0, 0x0, 0x0, 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', 0x0, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r1}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) 09:23:01 executing program 1: ioctl$VHOST_SET_VRING_KICK(0xffffffffffffffff, 0x4008af20, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={0x0, 0x0, 0x8}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x0, &(0x7f0000000080), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) r1 = socket$inet_mptcp(0x2, 0x1, 0x106) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f00000040c0)) sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, &(0x7f0000004240)={&(0x7f0000004180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000004200)={&(0x7f00000041c0)={0x14, 0x0, 0x200, 0x70bd29, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x4004083) 09:23:01 executing program 2: ioctl$VHOST_SET_VRING_KICK(0xffffffffffffffff, 0x4008af20, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={0x0, 0x0, 0x8}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x0, &(0x7f0000000080), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) r1 = socket$inet_mptcp(0x2, 0x1, 0x106) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f00000040c0)) sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, &(0x7f0000004240)={&(0x7f0000004180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000004200)={&(0x7f00000041c0)={0x14, 0x0, 0x200, 0x70bd29, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x4004083) 09:23:01 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r1 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) ioctl$VHOST_VDPA_GET_IOVA_RANGE(0xffffffffffffffff, 0x8010af78, &(0x7f00000003c0)) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480), 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x0, 0x0, 0x0, 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', 0x0, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r1}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) 09:23:01 executing program 5: ioctl$VHOST_SET_VRING_KICK(0xffffffffffffffff, 0x4008af20, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={0x0, 0x0, 0x8}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x0, &(0x7f0000000080), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) r1 = socket$inet_mptcp(0x2, 0x1, 0x106) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f00000040c0)) sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, &(0x7f0000004240)={&(0x7f0000004180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000004200)={&(0x7f00000041c0)={0x14, 0x0, 0x200, 0x70bd29, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x4004083) 09:23:01 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r2}, @map_val={0x18, 0x1, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r3 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r3, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00'}) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) 09:23:01 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r1]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00', 0x0}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', r5, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, &(0x7f0000004240)={&(0x7f0000004180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000004200)={&(0x7f00000041c0)={0x14, 0x0, 0x200, 0x70bd29, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x4004083) 09:23:01 executing program 2: ioctl$VHOST_SET_VRING_KICK(0xffffffffffffffff, 0x4008af20, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={0x0, 0x0, 0x8}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x0, &(0x7f0000000080), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) r1 = socket$inet_mptcp(0x2, 0x1, 0x106) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f00000040c0)) sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, &(0x7f0000004240)={&(0x7f0000004180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000004200)={&(0x7f00000041c0)={0x14, 0x0, 0x200, 0x70bd29, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x4004083) 09:23:01 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r1]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00', 0x0}) r6 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000001880)='/sys/fs/f2fs', 0x280000, 0x82) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', r5, 0x38, r6, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) 09:23:01 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r1 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) ioctl$VHOST_VDPA_GET_IOVA_RANGE(0xffffffffffffffff, 0x8010af78, &(0x7f00000003c0)) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480), 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x0, 0x0, 0x0, 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', 0x0, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r1}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) 09:23:01 executing program 5: ioctl$VHOST_SET_VRING_KICK(0xffffffffffffffff, 0x4008af20, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={0x0, 0x0, 0x8}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x0, &(0x7f0000000080), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) r1 = socket$inet_mptcp(0x2, 0x1, 0x106) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f00000040c0)) sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, &(0x7f0000004240)={&(0x7f0000004180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000004200)={&(0x7f00000041c0)={0x14, 0x0, 0x200, 0x70bd29, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x4004083) 09:23:01 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r2}, @map_val={0x18, 0x1, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r3 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r3, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00'}) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) 09:23:01 executing program 4: ioctl$VHOST_SET_VRING_KICK(0xffffffffffffffff, 0x4008af20, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x0, 0x0, 0x0, 0x6}], &(0x7f00000000c0)='GPL\x00', 0x0, 0xec, &(0x7f0000000100)=""/236, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r0]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xa, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_fd={0x18, 0x5}, @map_fd, @map_val={0x18, 0x1}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) r1 = socket$inet_mptcp(0x2, 0x1, 0x106) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f00000040c0)) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NET_DM_CMD_STOP(r2, &(0x7f0000004240)={&(0x7f0000004180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000004200)={&(0x7f00000041c0)={0x14, 0x0, 0x200, 0x70bd29, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x4004083) 09:23:01 executing program 2: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x0, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r1]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00', 0x0}) r6 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000001880)='/sys/fs/f2fs', 0x280000, 0x82) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', r5, 0x38, r6, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) 09:23:01 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r1 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) ioctl$VHOST_VDPA_GET_IOVA_RANGE(0xffffffffffffffff, 0x8010af78, &(0x7f00000003c0)) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480), 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x0, 0x0, &(0x7f0000000800)='syzkaller\x00', 0x0, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', 0x0, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r1}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) 09:23:01 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x0, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r1]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00', 0x0}) r6 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000001880)='/sys/fs/f2fs', 0x280000, 0x82) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', r5, 0x38, r6, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) 09:23:01 executing program 5: ioctl$VHOST_SET_VRING_KICK(0xffffffffffffffff, 0x4008af20, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x0, 0x0, 0x0, 0x6}], &(0x7f00000000c0)='GPL\x00', 0x0, 0xec, &(0x7f0000000100)=""/236, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r0]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xa, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_fd={0x18, 0x5}, @map_fd, @map_val={0x18, 0x1}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) r1 = socket$inet_mptcp(0x2, 0x1, 0x106) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f00000040c0)) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NET_DM_CMD_STOP(r2, &(0x7f0000004240)={&(0x7f0000004180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000004200)={&(0x7f00000041c0)={0x14, 0x0, 0x200, 0x70bd29, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x4004083) 09:23:01 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r2}, @map_val={0x18, 0x1, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r3 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r3, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00'}) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) 09:23:01 executing program 4: ioctl$VHOST_SET_VRING_KICK(0xffffffffffffffff, 0x4008af20, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x0, 0x0, 0x0, 0x6}], &(0x7f00000000c0)='GPL\x00', 0x0, 0xec, &(0x7f0000000100)=""/236, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r0]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xa, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_fd={0x18, 0x5}, @map_fd, @map_val={0x18, 0x1}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) r1 = socket$inet_mptcp(0x2, 0x1, 0x106) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f00000040c0)) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NET_DM_CMD_STOP(r2, &(0x7f0000004240)={&(0x7f0000004180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000004200)={&(0x7f00000041c0)={0x14, 0x0, 0x200, 0x70bd29, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x4004083) 09:23:01 executing program 2: openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x0, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val, @map_fd={0x18, 0x5, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd, @map_val], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) socket$inet_mptcp(0x2, 0x1, 0x106) 09:23:02 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r1 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) ioctl$VHOST_VDPA_GET_IOVA_RANGE(0xffffffffffffffff, 0x8010af78, &(0x7f00000003c0)) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480), 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x0, 0x0, &(0x7f0000000800)='syzkaller\x00', 0x0, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', 0x0, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r1}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) 09:23:02 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x0, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r1]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00', 0x0}) r6 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000001880)='/sys/fs/f2fs', 0x280000, 0x82) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', r5, 0x38, r6, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) 09:23:02 executing program 4: ioctl$VHOST_SET_VRING_KICK(0xffffffffffffffff, 0x4008af20, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x0, 0x0, 0x0, 0x6}], &(0x7f00000000c0)='GPL\x00', 0x0, 0xec, &(0x7f0000000100)=""/236, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r0]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xc, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5}, @map_fd, @map_val={0x18, 0x1}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) r1 = socket$inet_mptcp(0x2, 0x1, 0x106) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f00000040c0)) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NET_DM_CMD_STOP(r2, &(0x7f0000004240)={&(0x7f0000004180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000004200)={&(0x7f00000041c0)={0x14, 0x0, 0x200, 0x70bd29, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x4004083) 09:23:02 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x0, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r1]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00', 0x0}) r6 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000001880)='/sys/fs/f2fs', 0x280000, 0x82) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', r5, 0x38, r6, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) 09:23:02 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, 0xffffffffffffffff]}, 0x80) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r1}, @map_val={0x18, 0x1, 0x2, 0x0, r1, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[0xffffffffffffffff]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r2, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00'}) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) 09:23:02 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r1 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) ioctl$VHOST_VDPA_GET_IOVA_RANGE(0xffffffffffffffff, 0x8010af78, &(0x7f00000003c0)) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480), 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x0, 0x0, &(0x7f0000000800)='syzkaller\x00', 0x0, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', 0x0, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r1}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) 09:23:02 executing program 2: openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xd, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @map_idx_val, @map_fd={0x18, 0x5, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd, @map_val], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) socket$inet_mptcp(0x2, 0x1, 0x106) 09:23:02 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x0, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r1]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00', 0x0}) r6 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000001880)='/sys/fs/f2fs', 0x280000, 0x82) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', r5, 0x38, r6, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) 09:23:02 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, 0xffffffffffffffff]}, 0x80) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r1}, @map_val={0x18, 0x1, 0x2, 0x0, r1, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[0xffffffffffffffff]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r2, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00'}) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) 09:23:02 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r1 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) ioctl$VHOST_VDPA_GET_IOVA_RANGE(0xffffffffffffffff, 0x8010af78, &(0x7f00000003c0)) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480), 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x0, 0x0, &(0x7f0000000800)='syzkaller\x00', 0x5, 0x0, 0x0, 0x41000, 0xa, '\x00', 0x0, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r1}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) 09:23:02 executing program 5: ioctl$VHOST_SET_VRING_KICK(0xffffffffffffffff, 0x4008af20, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) 09:23:02 executing program 2: openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xd, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @map_idx_val, @map_fd={0x18, 0x5, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd, @map_val], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) socket$inet_mptcp(0x2, 0x1, 0x106) 09:23:02 executing program 1: openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xd, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @map_idx_val, @map_fd={0x18, 0x5, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd, @map_val], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) socket$inet_mptcp(0x2, 0x1, 0x106) 09:23:02 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, 0xffffffffffffffff]}, 0x80) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r1}, @map_val={0x18, 0x1, 0x2, 0x0, r1, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[0xffffffffffffffff]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r2, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00'}) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) 09:23:02 executing program 4: ioctl$VHOST_SET_VRING_KICK(0xffffffffffffffff, 0x4008af20, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={0x0, 0x0, 0x8}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x0, 0x0, &(0x7f00000000c0)='GPL\x00', 0x0, 0xec, &(0x7f0000000100)=""/236, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, 0xffffffffffffffff]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) r1 = socket$inet_mptcp(0x2, 0x1, 0x106) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f00000040c0)) sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, &(0x7f0000004240)={&(0x7f0000004180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000004200)={&(0x7f00000041c0)={0x14, 0x0, 0x200, 0x70bd29, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x4004083) 09:23:02 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r1 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) ioctl$VHOST_VDPA_GET_IOVA_RANGE(0xffffffffffffffff, 0x8010af78, &(0x7f00000003c0)) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480), 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x0, 0x0, &(0x7f0000000800)='syzkaller\x00', 0x5, 0x0, 0x0, 0x41000, 0xa, '\x00', 0x0, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r1}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) 09:23:02 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x0, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r1]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00', 0x0}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', r5, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, &(0x7f0000004240)={&(0x7f0000004180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000004200)={&(0x7f00000041c0)={0x14, 0x0, 0x200, 0x70bd29, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x4004083) 09:23:02 executing program 1: ioctl$VHOST_SET_VRING_KICK(0xffffffffffffffff, 0x4008af20, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x0, 0x0, 0x0, 0x6}], &(0x7f00000000c0)='GPL\x00', 0x0, 0xec, &(0x7f0000000100)=""/236, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r0]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xa, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd, @map_val={0x18, 0x1}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) r1 = socket$inet_mptcp(0x2, 0x1, 0x106) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f00000040c0)) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NET_DM_CMD_STOP(r2, &(0x7f0000004240)={&(0x7f0000004180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000004200)={&(0x7f00000041c0)={0x14, 0x0, 0x200, 0x70bd29, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x4004083) 09:23:02 executing program 4: openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val, @map_fd={0x18, 0x5, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd, @map_val], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) socket$inet_mptcp(0x2, 0x1, 0x106) 09:23:02 executing program 0: openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, 0xffffffffffffffff]}, 0x80) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r1}, @map_val={0x18, 0x1, 0x2, 0x0, r1, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r2, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00'}) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) 09:23:02 executing program 2: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x0, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r1]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00', 0x0}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', r5, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, &(0x7f0000004240)={&(0x7f0000004180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000004200)={&(0x7f00000041c0)={0x14, 0x0, 0x200, 0x70bd29, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x4004083) 09:23:02 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r1 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) ioctl$VHOST_VDPA_GET_IOVA_RANGE(0xffffffffffffffff, 0x8010af78, &(0x7f00000003c0)) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480), 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x0, 0x0, &(0x7f0000000800)='syzkaller\x00', 0x5, 0x0, 0x0, 0x41000, 0xa, '\x00', 0x0, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r1}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) 09:23:03 executing program 4: ioctl$VHOST_SET_VRING_KICK(0xffffffffffffffff, 0x4008af20, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x0, 0x0, 0x0, 0x6}], &(0x7f00000000c0)='GPL\x00', 0x0, 0xec, &(0x7f0000000100)=""/236, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r0]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xa, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd, @map_val={0x18, 0x1}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) r1 = socket$inet_mptcp(0x2, 0x1, 0x106) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f00000040c0)) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NET_DM_CMD_STOP(r2, &(0x7f0000004240)={&(0x7f0000004180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000004200)={&(0x7f00000041c0)={0x14, 0x0, 0x200, 0x70bd29, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x4004083) 09:23:03 executing program 1: ioctl$VHOST_SET_VRING_KICK(0xffffffffffffffff, 0x4008af20, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x0, 0x0, 0x0, 0x6}], &(0x7f00000000c0)='GPL\x00', 0x0, 0xec, &(0x7f0000000100)=""/236, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, 0xffffffffffffffff]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) 09:23:03 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r1]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00', 0x0}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', r5, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, &(0x7f0000004240)={&(0x7f0000004180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000004200)={&(0x7f00000041c0)={0x14, 0x0, 0x200, 0x70bd29, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x4004083) 09:23:03 executing program 0: openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, 0xffffffffffffffff]}, 0x80) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r1}, @map_val={0x18, 0x1, 0x2, 0x0, r1, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r2, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00'}) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) 09:23:03 executing program 2: openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, 0xffffffffffffffff]}, 0x80) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r1}, @map_val={0x18, 0x1, 0x2, 0x0, r1, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r2, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00'}) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) 09:23:03 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r1 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) ioctl$VHOST_VDPA_GET_IOVA_RANGE(0xffffffffffffffff, 0x8010af78, &(0x7f00000003c0)) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480), 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x0, 0x0, &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x0, 0xa, '\x00', 0x0, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r1}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) 09:23:03 executing program 1: openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd, @map_val], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) socket$inet_mptcp(0x2, 0x1, 0x106) 09:23:03 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r1]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00', 0x0}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', r5, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, &(0x7f0000004240)={&(0x7f0000004180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000004200)={&(0x7f00000041c0)={0x14, 0x0, 0x200, 0x70bd29, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x4004083) 09:23:03 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r1]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00', 0x0}) r6 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000001880)='/sys/fs/f2fs', 0x280000, 0x82) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', r5, 0x38, r6, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) 09:23:03 executing program 2: ioctl$VHOST_SET_VRING_KICK(0xffffffffffffffff, 0x4008af20, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x0, 0x0, 0x0, 0x6}], &(0x7f00000000c0)='GPL\x00', 0x0, 0xec, &(0x7f0000000100)=""/236, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r0]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xc, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r0}, @map_fd, @map_val={0x18, 0x1}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) r1 = socket$inet_mptcp(0x2, 0x1, 0x106) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f00000040c0)) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NET_DM_CMD_STOP(r2, &(0x7f0000004240)={&(0x7f0000004180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000004200)={&(0x7f00000041c0)={0x14, 0x0, 0x200, 0x70bd29, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x4004083) 09:23:03 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r1 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) ioctl$VHOST_VDPA_GET_IOVA_RANGE(0xffffffffffffffff, 0x8010af78, &(0x7f00000003c0)) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480), 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x0, 0x0, &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x0, 0xa, '\x00', 0x0, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r1}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) 09:23:03 executing program 0: openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, 0xffffffffffffffff]}, 0x80) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r1}, @map_val={0x18, 0x1, 0x2, 0x0, r1, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r2, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00'}) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) 09:23:03 executing program 1: ioctl$VHOST_SET_VRING_KICK(0xffffffffffffffff, 0x4008af20, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x0, 0x0, 0x0, 0x6}], &(0x7f00000000c0)='GPL\x00', 0x0, 0xec, &(0x7f0000000100)=""/236, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r0]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xc, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r0}, @map_fd, @map_val={0x18, 0x1}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) r1 = socket$inet_mptcp(0x2, 0x1, 0x106) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f00000040c0)) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NET_DM_CMD_STOP(r2, &(0x7f0000004240)={&(0x7f0000004180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000004200)={&(0x7f00000041c0)={0x14, 0x0, 0x200, 0x70bd29, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x4004083) 09:23:03 executing program 4: openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd, @map_val], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) socket$inet_mptcp(0x2, 0x1, 0x106) 09:23:03 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r1]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00', 0x0}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', r5, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, &(0x7f0000004240)={&(0x7f0000004180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000004200)={&(0x7f00000041c0)={0x14, 0x0, 0x200, 0x70bd29, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x4004083) 09:23:03 executing program 0: r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, 0xffffffffffffffff]}, 0x80) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r1}, @map_val={0x18, 0x1, 0x2, 0x0, r1, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r2, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00'}) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) 09:23:03 executing program 2: openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, 0xffffffffffffffff]}, 0x80) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r1}, @map_val={0x18, 0x1, 0x2, 0x0, r1, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r2, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00'}) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) 09:23:03 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r1 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) ioctl$VHOST_VDPA_GET_IOVA_RANGE(0xffffffffffffffff, 0x8010af78, &(0x7f00000003c0)) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480), 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x0, 0x0, &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x0, 0xa, '\x00', 0x0, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r1}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) 09:23:03 executing program 0: r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, 0xffffffffffffffff]}, 0x80) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r1}, @map_val={0x18, 0x1, 0x2, 0x0, r1, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r2, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00'}) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) 09:23:03 executing program 4: r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, 0xffffffffffffffff]}, 0x80) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r1}, @map_val={0x18, 0x1, 0x2, 0x0, r1, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r2, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00'}) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) 09:23:03 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r1]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00', 0x0}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', r5, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, &(0x7f0000004240)={&(0x7f0000004180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000004200)={&(0x7f00000041c0)={0x14, 0x0, 0x200, 0x70bd29, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x4004083) 09:23:03 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x0, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r1]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00', 0x0}) r6 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000001880)='/sys/fs/f2fs', 0x280000, 0x82) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', r5, 0x38, r6, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) 09:23:03 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r1 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) ioctl$VHOST_VDPA_GET_IOVA_RANGE(0xffffffffffffffff, 0x8010af78, &(0x7f00000003c0)) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480), 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x0, 0x0, &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0x0, '\x00', 0x0, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r1}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) 09:23:03 executing program 2: openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xc, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_fd={0x18, 0x5, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd, @map_val], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) socket$inet_mptcp(0x2, 0x1, 0x106) 09:23:03 executing program 5: ioctl$VHOST_SET_VRING_KICK(0xffffffffffffffff, 0x4008af20, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x0, 0x0, 0x0, 0x6}], &(0x7f00000000c0)='GPL\x00', 0x0, 0xec, &(0x7f0000000100)=""/236, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r0]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xd, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x22}, @map_fd, @map_val={0x18, 0x1}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) r1 = socket$inet_mptcp(0x2, 0x1, 0x106) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f00000040c0)) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NET_DM_CMD_STOP(r2, &(0x7f0000004240)={&(0x7f0000004180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000004200)={&(0x7f00000041c0)={0x14, 0x0, 0x200, 0x70bd29, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x4004083) 09:23:04 executing program 0: r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, 0xffffffffffffffff]}, 0x80) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r1}, @map_val={0x18, 0x1, 0x2, 0x0, r1, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r2, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00'}) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) 09:23:04 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r1 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) ioctl$VHOST_VDPA_GET_IOVA_RANGE(0xffffffffffffffff, 0x8010af78, &(0x7f00000003c0)) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480), 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x0, 0x0, &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0x0, '\x00', 0x0, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r1}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) 09:23:04 executing program 4: openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd, @map_val], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) socket$inet_mptcp(0x2, 0x1, 0x106) 09:23:04 executing program 2: ioctl$VHOST_SET_VRING_KICK(0xffffffffffffffff, 0x4008af20, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x0, 0x0, 0x0, 0x6}], &(0x7f00000000c0)='GPL\x00', 0x0, 0xec, &(0x7f0000000100)=""/236, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r0]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xd, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x22}, @map_fd, @map_val={0x18, 0x1}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) r1 = socket$inet_mptcp(0x2, 0x1, 0x106) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f00000040c0)) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NET_DM_CMD_STOP(r2, &(0x7f0000004240)={&(0x7f0000004180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000004200)={&(0x7f00000041c0)={0x14, 0x0, 0x200, 0x70bd29, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x4004083) 09:23:04 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r1]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00', 0x0}) r6 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000001880)='/sys/fs/f2fs', 0x280000, 0x82) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', r5, 0x38, r6, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) 09:23:04 executing program 0: openat$vnet(0xffffffffffffff9c, 0x0, 0x2, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, 0xffffffffffffffff]}, 0x80) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r1}, @map_val={0x18, 0x1, 0x2, 0x0, r1, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r2, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00'}) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) 09:23:04 executing program 1: openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd, @map_val], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) socket$inet_mptcp(0x2, 0x1, 0x106) 09:23:04 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0x0, 0x0, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r1]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00', 0x0}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', r5, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, &(0x7f0000004240)={&(0x7f0000004180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000004200)={&(0x7f00000041c0)={0x14, 0x0, 0x200, 0x70bd29, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x4004083) 09:23:04 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r1 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) ioctl$VHOST_VDPA_GET_IOVA_RANGE(0xffffffffffffffff, 0x8010af78, &(0x7f00000003c0)) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480), 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x0, 0x0, &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0x0, '\x00', 0x0, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r1}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) 09:23:04 executing program 5: ioctl$VHOST_SET_VRING_KICK(0xffffffffffffffff, 0x4008af20, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x0, 0x0, 0x0, 0x6}], &(0x7f00000000c0)='GPL\x00', 0x0, 0xec, &(0x7f0000000100)=""/236, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r0]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd, @map_val={0x18, 0x1}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) r1 = socket$inet_mptcp(0x2, 0x1, 0x106) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f00000040c0)) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NET_DM_CMD_STOP(r2, &(0x7f0000004240)={&(0x7f0000004180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000004200)={&(0x7f00000041c0)={0x14, 0x0, 0x200, 0x70bd29, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x4004083) 09:23:04 executing program 2: ioctl$VHOST_VDPA_GET_AS_NUM(0xffffffffffffffff, 0x8004af7a, 0x0) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(0xffffffffffffffff, 0x0, &(0x7f0000000780)) 09:23:04 executing program 0: openat$vnet(0xffffffffffffff9c, 0x0, 0x2, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, 0xffffffffffffffff]}, 0x80) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r1}, @map_val={0x18, 0x1, 0x2, 0x0, r1, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r2, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00'}) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) 09:23:04 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r1 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) ioctl$VHOST_VDPA_GET_IOVA_RANGE(0xffffffffffffffff, 0x8010af78, &(0x7f00000003c0)) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480), 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x0, 0x0, &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r1}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) 09:23:04 executing program 2: openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x0, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd, @map_val], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) socket$inet_mptcp(0x2, 0x1, 0x106) 09:23:04 executing program 1: ioctl$VHOST_SET_VRING_KICK(0xffffffffffffffff, 0x4008af20, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x0, 0x0, 0x0, 0x6}], &(0x7f00000000c0)='GPL\x00', 0x0, 0xec, &(0x7f0000000100)=""/236, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r0]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd, @map_val={0x18, 0x1}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) r1 = socket$inet_mptcp(0x2, 0x1, 0x106) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f00000040c0)) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NET_DM_CMD_STOP(r2, &(0x7f0000004240)={&(0x7f0000004180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000004200)={&(0x7f00000041c0)={0x14, 0x0, 0x200, 0x70bd29, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x4004083) 09:23:04 executing program 4: r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x0, 0x0, 0x0, 0x6}], &(0x7f00000000c0)='GPL\x00', 0x0, 0xec, &(0x7f0000000100)=""/236, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, 0xffffffffffffffff]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) r1 = socket$inet_mptcp(0x2, 0x1, 0x106) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f00000040c0)) sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, &(0x7f0000004240)={&(0x7f0000004180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000004200)={&(0x7f00000041c0)={0x14, 0x0, 0x200, 0x70bd29, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x4004083) 09:23:04 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r1]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00', 0x0}) r6 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000001880)='/sys/fs/f2fs', 0x280000, 0x82) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', r5, 0x38, r6, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) 09:23:04 executing program 0: openat$vnet(0xffffffffffffff9c, 0x0, 0x2, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, 0xffffffffffffffff]}, 0x80) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r1}, @map_val={0x18, 0x1, 0x2, 0x0, r1, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r2, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00'}) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) 09:23:04 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x0, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r1]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00', 0x0}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', r5, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, &(0x7f0000004240)={&(0x7f0000004180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000004200)={&(0x7f00000041c0)={0x14, 0x0, 0x200, 0x70bd29, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x4004083) 09:23:04 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x0, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r1]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00', 0x0}) r6 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000001880)='/sys/fs/f2fs', 0x280000, 0x82) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', r5, 0x38, r6, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) 09:23:04 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r1 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) ioctl$VHOST_VDPA_GET_IOVA_RANGE(0xffffffffffffffff, 0x8010af78, &(0x7f00000003c0)) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480), 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x0, 0x0, &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r1}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) 09:23:04 executing program 2: ioctl$VHOST_SET_VRING_KICK(0xffffffffffffffff, 0x4008af20, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x0, 0x0, 0x0, 0x6}], &(0x7f00000000c0)='GPL\x00', 0x0, 0xec, &(0x7f0000000100)=""/236, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, 0xffffffffffffffff]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[0xffffffffffffffff]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) r0 = socket$inet_mptcp(0x2, 0x1, 0x106) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f00000040c0)) sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, &(0x7f0000004240)={&(0x7f0000004180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000004200)={&(0x7f00000041c0)={0x14, 0x0, 0x200, 0x70bd29, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x4004083) 09:23:04 executing program 0: openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, 0xffffffffffffffff]}, 0x80) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r1}, @map_val={0x18, 0x1, 0x2, 0x0, r1, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r2, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00'}) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) 09:23:04 executing program 5: ioctl$VHOST_SET_VRING_KICK(0xffffffffffffffff, 0x4008af20, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x0, 0x0, 0x0, 0x6}], &(0x7f00000000c0)='GPL\x00', 0x0, 0xec, &(0x7f0000000100)=""/236, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r0]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xc, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_val={0x18, 0x1}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) r1 = socket$inet_mptcp(0x2, 0x1, 0x106) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f00000040c0)) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NET_DM_CMD_STOP(r2, &(0x7f0000004240)={&(0x7f0000004180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000004200)={&(0x7f00000041c0)={0x14, 0x0, 0x200, 0x70bd29, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x4004083) 09:23:04 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r1 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) ioctl$VHOST_VDPA_GET_IOVA_RANGE(0xffffffffffffffff, 0x8010af78, &(0x7f00000003c0)) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480), 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x0, 0x0, &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r1}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) 09:23:05 executing program 1: ioctl$VHOST_SET_VRING_KICK(0xffffffffffffffff, 0x4008af20, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x0, 0x0, 0x0, 0x6}], &(0x7f00000000c0)='GPL\x00', 0x0, 0xec, &(0x7f0000000100)=""/236, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r0]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xc, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_val={0x18, 0x1}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) r1 = socket$inet_mptcp(0x2, 0x1, 0x106) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f00000040c0)) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NET_DM_CMD_STOP(r2, &(0x7f0000004240)={&(0x7f0000004180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000004200)={&(0x7f00000041c0)={0x14, 0x0, 0x200, 0x70bd29, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x4004083) 09:23:05 executing program 2: ioctl$VHOST_SET_VRING_KICK(0xffffffffffffffff, 0x4008af20, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x0, 0x0, 0x0, 0x6}], &(0x7f00000000c0)='GPL\x00', 0x0, 0xec, &(0x7f0000000100)=""/236, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r0]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xc, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_val={0x18, 0x1}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) r1 = socket$inet_mptcp(0x2, 0x1, 0x106) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f00000040c0)) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NET_DM_CMD_STOP(r2, &(0x7f0000004240)={&(0x7f0000004180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000004200)={&(0x7f00000041c0)={0x14, 0x0, 0x200, 0x70bd29, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x4004083) 09:23:05 executing program 4: ioctl$VHOST_SET_VRING_KICK(0xffffffffffffffff, 0x4008af20, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) r1 = socket$inet_mptcp(0x2, 0x1, 0x106) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f00000040c0)) sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, &(0x7f0000004240)={&(0x7f0000004180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000004200)={&(0x7f00000041c0)={0x14, 0x0, 0x200, 0x70bd29, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x4004083) 09:23:05 executing program 0: openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, 0xffffffffffffffff]}, 0x80) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r1}, @map_val={0x18, 0x1, 0x2, 0x0, r1, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r2, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00'}) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) 09:23:05 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r1 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) ioctl$VHOST_VDPA_GET_IOVA_RANGE(0xffffffffffffffff, 0x8010af78, &(0x7f00000003c0)) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480), 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x0, 0x0, &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', 0x0, 0x38, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r1}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) 09:23:05 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) r1 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f0000000780)) 09:23:05 executing program 1: ioctl$VHOST_SET_VRING_KICK(0xffffffffffffffff, 0x4008af20, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x0, 0x0, 0x0, 0x6}], &(0x7f00000000c0)='GPL\x00', 0x0, 0xec, &(0x7f0000000100)=""/236, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r0]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xc, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_val={0x18, 0x1}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) r1 = socket$inet_mptcp(0x2, 0x1, 0x106) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f00000040c0)) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NET_DM_CMD_STOP(r2, &(0x7f0000004240)={&(0x7f0000004180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000004200)={&(0x7f00000041c0)={0x14, 0x0, 0x200, 0x70bd29, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x4004083) 09:23:05 executing program 4: ioctl$VHOST_SET_VRING_KICK(0xffffffffffffffff, 0x4008af20, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x0, 0x0, 0x0, 0x6}], &(0x7f00000000c0)='GPL\x00', 0x0, 0xec, &(0x7f0000000100)=""/236, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, 0xffffffffffffffff]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) r0 = socket$inet_mptcp(0x2, 0x1, 0x106) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f00000040c0)) sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, &(0x7f0000004240)={&(0x7f0000004180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000004200)={&(0x7f00000041c0)={0x14, 0x0, 0x200, 0x70bd29, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x4004083) 09:23:05 executing program 2: ioctl$VHOST_SET_VRING_KICK(0xffffffffffffffff, 0x4008af20, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x0, 0x0, 0x0, 0x6}], &(0x7f00000000c0)='GPL\x00', 0x0, 0xec, &(0x7f0000000100)=""/236, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r0]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9}, @map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) r1 = socket$inet_mptcp(0x2, 0x1, 0x106) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f00000040c0)) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NET_DM_CMD_STOP(r2, &(0x7f0000004240)={&(0x7f0000004180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000004200)={&(0x7f00000041c0)={0x14, 0x0, 0x200, 0x70bd29, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x4004083) 09:23:05 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) r1 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f0000000780)) 09:23:05 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r1 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) ioctl$VHOST_VDPA_GET_IOVA_RANGE(0xffffffffffffffff, 0x8010af78, &(0x7f00000003c0)) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480), 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x0, 0x0, &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', 0x0, 0x38, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r1}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) 09:23:05 executing program 0: openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, 0xffffffffffffffff]}, 0x80) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r1}, @map_val={0x18, 0x1, 0x2, 0x0, r1, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r2, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00'}) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) 09:23:05 executing program 4: ioctl$VHOST_SET_VRING_KICK(0xffffffffffffffff, 0x4008af20, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x0, 0x0, 0x0, 0x6}], &(0x7f00000000c0)='GPL\x00', 0x0, 0xec, &(0x7f0000000100)=""/236, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, 0xffffffffffffffff]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) r0 = socket$inet_mptcp(0x2, 0x1, 0x106) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f00000040c0)) sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, &(0x7f0000004240)={&(0x7f0000004180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000004200)={&(0x7f00000041c0)={0x14, 0x0, 0x200, 0x70bd29, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x4004083) 09:23:05 executing program 2: ioctl$VHOST_SET_VRING_KICK(0xffffffffffffffff, 0x4008af20, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x0, 0x0, 0x0, 0x6}], &(0x7f00000000c0)='GPL\x00', 0x0, 0xec, &(0x7f0000000100)=""/236, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r0]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xc, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) r1 = socket$inet_mptcp(0x2, 0x1, 0x106) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f00000040c0)) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NET_DM_CMD_STOP(r2, &(0x7f0000004240)={&(0x7f0000004180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000004200)={&(0x7f00000041c0)={0x14, 0x0, 0x200, 0x70bd29, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x4004083) 09:23:05 executing program 1: ioctl$VHOST_SET_VRING_KICK(0xffffffffffffffff, 0x4008af20, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x0, 0x0, 0x0, 0x6}], &(0x7f00000000c0)='GPL\x00', 0x0, 0xec, &(0x7f0000000100)=""/236, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r0]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xc, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) r1 = socket$inet_mptcp(0x2, 0x1, 0x106) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f00000040c0)) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NET_DM_CMD_STOP(r2, &(0x7f0000004240)={&(0x7f0000004180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000004200)={&(0x7f00000041c0)={0x14, 0x0, 0x200, 0x70bd29, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x4004083) 09:23:05 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x0, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r1]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00', 0x0}) r6 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000001880)='/sys/fs/f2fs', 0x280000, 0x82) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', r5, 0x38, r6, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) 09:23:05 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r1 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) ioctl$VHOST_VDPA_GET_IOVA_RANGE(0xffffffffffffffff, 0x8010af78, &(0x7f00000003c0)) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480), 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x0, 0x0, &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', 0x0, 0x38, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r1}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) 09:23:05 executing program 0: openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={0x0, 0x0, 0x8}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, 0xffffffffffffffff]}, 0x80) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r1}, @map_val={0x18, 0x1, 0x2, 0x0, r1, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r2, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00'}) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) 09:23:05 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x0, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r1]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00', 0x0}) r6 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000001880)='/sys/fs/f2fs', 0x280000, 0x82) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', r5, 0x38, r6, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) 09:23:05 executing program 2: ioctl$VHOST_SET_VRING_KICK(0xffffffffffffffff, 0x4008af20, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x0, 0x0, 0x0, 0x6}], &(0x7f00000000c0)='GPL\x00', 0x0, 0xec, &(0x7f0000000100)=""/236, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, 0xffffffffffffffff]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) r1 = socket$inet_mptcp(0x2, 0x1, 0x106) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f00000040c0)) sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, &(0x7f0000004240)={&(0x7f0000004180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000004200)={&(0x7f00000041c0)={0x14, 0x0, 0x200, 0x70bd29, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x4004083) 09:23:05 executing program 1: ioctl$VHOST_SET_VRING_KICK(0xffffffffffffffff, 0x4008af20, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x0, 0x0, 0x0, 0x6}], &(0x7f00000000c0)='GPL\x00', 0x0, 0xec, &(0x7f0000000100)=""/236, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, 0xffffffffffffffff]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) r1 = socket$inet_mptcp(0x2, 0x1, 0x106) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f00000040c0)) sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, &(0x7f0000004240)={&(0x7f0000004180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000004200)={&(0x7f00000041c0)={0x14, 0x0, 0x200, 0x70bd29, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x4004083) 09:23:05 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r1]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00', 0x0}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', r5, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, &(0x7f0000004240)={&(0x7f0000004180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000004200)={&(0x7f00000041c0)={0x14, 0x0, 0x200, 0x70bd29, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x4004083) 09:23:05 executing program 2: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], 0x0, 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r1]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00', 0x0}) r6 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000001880)='/sys/fs/f2fs', 0x280000, 0x82) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', r5, 0x38, r6, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) 09:23:05 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r1 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) ioctl$VHOST_VDPA_GET_IOVA_RANGE(0xffffffffffffffff, 0x8010af78, &(0x7f00000003c0)) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480), 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x0, 0x0, &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', 0x0, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x0, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r1}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) 09:23:06 executing program 4: openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xd, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r0}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd, @map_val], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) socket$inet_mptcp(0x2, 0x1, 0x106) 09:23:06 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r1 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) ioctl$VHOST_VDPA_GET_IOVA_RANGE(0xffffffffffffffff, 0x8010af78, &(0x7f00000003c0)) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480), 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x0, 0x0, &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', 0x0, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x0, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r1}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) 09:23:06 executing program 0: openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={0x0}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, 0xffffffffffffffff]}, 0x80) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r1}, @map_val={0x18, 0x1, 0x2, 0x0, r1, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r2, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00'}) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) 09:23:06 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r1]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00', 0x0}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', r5, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, &(0x7f0000004240)={&(0x7f0000004180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000004200)={&(0x7f00000041c0)={0x14, 0x0, 0x200, 0x70bd29, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x4004083) 09:23:06 executing program 2: openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={0x0, 0x0, 0x8}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, 0xffffffffffffffff]}, 0x80) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r1}, @map_val={0x18, 0x1, 0x2, 0x0, r1, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r2, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00'}) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) [ 233.162943][T26945] list_del corruption. next->prev should be ffff888075990000, but was dead000000000122. (next=ffff88807626d000) 09:23:06 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r1 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) ioctl$VHOST_VDPA_GET_IOVA_RANGE(0xffffffffffffffff, 0x8010af78, &(0x7f00000003c0)) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480), 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x0, 0x0, &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', 0x0, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x0, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r1}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) [ 233.242484][T26945] ------------[ cut here ]------------