&(0x7f0000000680)=[r1]}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', 0x0, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) 09:22:43 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) bpf$BPF_MAP_FREEZE(0x16, 0x0, 0x0) 09:22:43 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r1]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00', 0x0}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', r5, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, 0x0, 0x4004083) 09:22:43 executing program 2: r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00'}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x0, 0x0, 0x0, 0x6}], 0x0, 0x0, 0xec, &(0x7f0000000100)=""/236, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r0]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xc, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x0, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x0, 0x4, 0x0, 0xfffffffffffffff0}, @ldst={0x0, 0x0, 0x2, 0x0, 0x1}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd}, @map_fd={0x18, 0x5}, @map_fd, @map_val={0x18, 0x1}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f00000040c0)) 09:22:43 executing program 4: openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) bpf$BPF_MAP_FREEZE(0x16, 0x0, 0x0) 09:22:43 executing program 5: r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00'}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x0, 0x0, 0x0, 0x6}], 0x0, 0x0, 0xec, &(0x7f0000000100)=""/236, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r0]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xc, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x0, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x0, 0x4, 0x0, 0xfffffffffffffff0}, @ldst={0x0, 0x0, 0x2, 0x0, 0x1}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd}, @map_fd={0x18, 0x5}, @map_fd, @map_val={0x18, 0x1}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f00000040c0)) 09:22:43 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r1]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', 0x0, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) 09:22:43 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r1]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00', 0x0}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', r5, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, 0x0, 0x4004083) 09:22:43 executing program 3: ioctl$VHOST_SET_VRING_KICK(0xffffffffffffffff, 0x4008af20, &(0x7f0000000040)={0x1}) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r1 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r0]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(0xffffffffffffffff, 0x8010af78, &(0x7f00000003c0)) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r2, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(0xffffffffffffffff, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r2}, @map_val={0x18, 0x1, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r3 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r3, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00'}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', 0x0, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r1}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) 09:22:43 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r1]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', 0x0, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) 09:22:43 executing program 4: bpf$BPF_MAP_FREEZE(0x16, 0x0, 0x0) 09:22:44 executing program 2: r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00'}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x0, 0x0, 0x0, 0x6}], 0x0, 0x0, 0xec, &(0x7f0000000100)=""/236, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r0]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xc, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x0, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x0, 0x4, 0x0, 0xfffffffffffffff0}, @ldst={0x0, 0x0, 0x2, 0x0, 0x1}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd}, @map_fd={0x18, 0x5}, @map_fd, @map_val={0x18, 0x1}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f00000040c0)) 09:22:44 executing program 4: ioctl$VHOST_SET_VRING_KICK(0xffffffffffffffff, 0x4008af20, &(0x7f0000000040)={0x1}) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r1 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r0]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(0xffffffffffffffff, 0x8010af78, &(0x7f00000003c0)) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r2, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(0xffffffffffffffff, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r2}, @map_val={0x18, 0x1, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r3 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r3, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00'}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', 0x0, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r1}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) 09:22:44 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r1]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00', 0x0}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', r5, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, 0x0, 0x4004083) 09:22:44 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r1]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00', 0x0}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', r5, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, 0x0, 0x4004083) 09:22:44 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r1]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', 0x0, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) 09:22:44 executing program 3: ioctl$VHOST_SET_VRING_KICK(0xffffffffffffffff, 0x4008af20, &(0x7f0000000040)={0x1}) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r1 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r0]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(0xffffffffffffffff, 0x8010af78, &(0x7f00000003c0)) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r2, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(0xffffffffffffffff, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r2}, @map_val={0x18, 0x1, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r3 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r3, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00'}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', 0x0, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r1}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) 09:22:44 executing program 2: r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00'}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x0, 0x0, 0x0, 0x6}], &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r0]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xc, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x0, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x0, 0x4, 0x0, 0xfffffffffffffff0}, @ldst={0x0, 0x0, 0x2, 0x0, 0x1}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd}, @map_fd={0x18, 0x5}, @map_fd, @map_val={0x18, 0x1}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f00000040c0)) 09:22:44 executing program 4: ioctl$VHOST_SET_VRING_KICK(0xffffffffffffffff, 0x4008af20, &(0x7f0000000040)={0x1}) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r1 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r0]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(0xffffffffffffffff, 0x8010af78, &(0x7f00000003c0)) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r2, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(0xffffffffffffffff, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r2}, @map_val={0x18, 0x1, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r3 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r3, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00'}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', 0x0, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r1}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) 09:22:44 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', 0x0, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff}, 0x80) 09:22:44 executing program 5: ioctl$VHOST_SET_VRING_KICK(0xffffffffffffffff, 0x4008af20, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={0x0, 0x0, 0x8}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x0, &(0x7f0000000080), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x0, 0xc, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x22}, @func, @map_val], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) r1 = socket$inet_mptcp(0x2, 0x1, 0x106) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f00000040c0)) sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, &(0x7f0000004240)={&(0x7f0000004180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000004200)={&(0x7f00000041c0)={0x14, 0x0, 0x200, 0x70bd29, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x4004083) 09:22:44 executing program 2: r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00'}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x0, 0x0, 0x0, 0x6}], &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r0]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xc, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x0, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x0, 0x4, 0x0, 0xfffffffffffffff0}, @ldst={0x0, 0x0, 0x2, 0x0, 0x1}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd}, @map_fd={0x18, 0x5}, @map_fd, @map_val={0x18, 0x1}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f00000040c0)) 09:22:44 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r1]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00'}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', 0x0, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) 09:22:44 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r1]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00', 0x0}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', r5, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, &(0x7f0000004240)={0x0, 0x0, &(0x7f0000004200)={&(0x7f00000041c0)={0x14, 0x0, 0x200, 0x70bd29, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x4004083) 09:22:44 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', 0x0, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff}, 0x80) 09:22:44 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r1]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00'}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00', 0x0}) r6 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000001880)='/sys/fs/f2fs', 0x280000, 0x82) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', r5, 0x38, r6, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) 09:22:44 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', 0x0, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff}, 0x80) 09:22:44 executing program 5: ioctl$VHOST_SET_VRING_KICK(0xffffffffffffffff, 0x4008af20, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x0, 0x0, 0x0, 0x6}], &(0x7f00000000c0)='GPL\x00', 0x0, 0xec, &(0x7f0000000100)=""/236, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r0]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xb, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @ldst={0x0, 0x0, 0x2, 0x0, 0x1}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd}, @map_fd={0x18, 0x5}, @map_fd, @map_val={0x18, 0x1}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) r1 = socket$inet_mptcp(0x2, 0x1, 0x106) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f00000040c0)) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NET_DM_CMD_STOP(r2, &(0x7f0000004240)={&(0x7f0000004180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000004200)={&(0x7f00000041c0)={0x14, 0x0, 0x200, 0x70bd29, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x4004083) 09:22:44 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r1]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00'}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', 0x0, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) 09:22:44 executing program 2: r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00'}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x0, 0x0, 0x0, 0x6}], &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r0]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xc, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x0, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x0, 0x4, 0x0, 0xfffffffffffffff0}, @ldst={0x0, 0x0, 0x2, 0x0, 0x1}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd}, @map_fd={0x18, 0x5}, @map_fd, @map_val={0x18, 0x1}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f00000040c0)) 09:22:44 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[0xffffffffffffffff]}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', 0x0, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff}, 0x80) 09:22:44 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r1]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00', 0x0}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', r5, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, &(0x7f0000004240)={0x0, 0x0, &(0x7f0000004200)={&(0x7f00000041c0)={0x14, 0x0, 0x200, 0x70bd29, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x4004083) 09:22:44 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r1]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00'}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', 0x0, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) 09:22:44 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r1]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00'}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', 0x0, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) 09:22:44 executing program 0: openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[0xffffffffffffffff]}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', 0x0, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff}, 0x80) 09:22:44 executing program 5: ioctl$VHOST_SET_VRING_KICK(0xffffffffffffffff, 0x4008af20, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x0, 0x0, 0x0, 0x6}], &(0x7f00000000c0)='GPL\x00', 0x0, 0xec, &(0x7f0000000100)=""/236, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r0]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xb, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @ldst={0x0, 0x0, 0x2, 0x0, 0x1}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd}, @map_fd={0x18, 0x5}, @map_fd, @map_val={0x18, 0x1}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) r1 = socket$inet_mptcp(0x2, 0x1, 0x106) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f00000040c0)) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NET_DM_CMD_STOP(r2, &(0x7f0000004240)={&(0x7f0000004180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000004200)={&(0x7f00000041c0)={0x14, 0x0, 0x200, 0x70bd29, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x4004083) 09:22:44 executing program 2: r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00'}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x0, 0x0, 0x0, 0x6}], &(0x7f00000000c0)='GPL\x00', 0x0, 0xec, &(0x7f0000000100)=""/236, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xc, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x0, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x0, 0x4, 0x0, 0xfffffffffffffff0}, @ldst={0x0, 0x0, 0x2, 0x0, 0x1}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd}, @map_fd={0x18, 0x5}, @map_fd, @map_val={0x18, 0x1}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f00000040c0)) 09:22:44 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r1]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00'}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', 0x0, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) 09:22:44 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[0xffffffffffffffff]}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', 0x0, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff}, 0x80) 09:22:45 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r1]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00', 0x0}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', r5, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, &(0x7f0000004240)={0x0, 0x0, &(0x7f0000004200)={&(0x7f00000041c0)={0x14, 0x0, 0x200, 0x70bd29, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x4004083) 09:22:45 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(0xffffffffffffffff, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r1]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00'}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', 0x0, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) 09:22:45 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', 0x0, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff}, 0x80) 09:22:45 executing program 2: r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00'}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x0, 0x0, 0x0, 0x6}], &(0x7f00000000c0)='GPL\x00', 0x0, 0xec, &(0x7f0000000100)=""/236, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xc, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x0, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x0, 0x4, 0x0, 0xfffffffffffffff0}, @ldst={0x0, 0x0, 0x2, 0x0, 0x1}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd}, @map_fd={0x18, 0x5}, @map_fd, @map_val={0x18, 0x1}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f00000040c0)) 09:22:45 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', 0x0, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff}, 0x80) 09:22:45 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r1]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00'}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', 0x0, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) 09:22:45 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r1]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00', 0x0}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', r5, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, &(0x7f0000004240)={0x0, 0x0, &(0x7f0000004200)={&(0x7f00000041c0)={0x14, 0x0, 0x200, 0x70bd29, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x4004083) 09:22:45 executing program 2: r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00'}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x0, 0x0, 0x0, 0x6}], &(0x7f00000000c0)='GPL\x00', 0x0, 0xec, &(0x7f0000000100)=""/236, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xc, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x0, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x0, 0x4, 0x0, 0xfffffffffffffff0}, @ldst={0x0, 0x0, 0x2, 0x0, 0x1}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd}, @map_fd={0x18, 0x5}, @map_fd, @map_val={0x18, 0x1}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f00000040c0)) 09:22:45 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', 0x0, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff}, 0x80) 09:22:45 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x0, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[0xffffffffffffffff]}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', 0x0, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff}, 0x80) 09:22:45 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(0xffffffffffffffff, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r1]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00'}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', 0x0, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) 09:22:45 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x0, 0x0, 0x0, &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[0xffffffffffffffff]}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', 0x0, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff}, 0x80) 09:22:45 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r1]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00', 0x0}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', r5, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, &(0x7f0000004240)={&(0x7f0000004180), 0xc, &(0x7f0000004200)={&(0x7f00000041c0)={0x14, 0x0, 0x200, 0x70bd29, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x4004083) 09:22:45 executing program 5: ioctl$VHOST_SET_VRING_KICK(0xffffffffffffffff, 0x4008af20, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x0, 0x0, 0x0, 0x6}], &(0x7f00000000c0)='GPL\x00', 0x0, 0xec, &(0x7f0000000100)=""/236, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r0]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xb, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @ldst={0x0, 0x0, 0x2, 0x0, 0x1}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd}, @map_fd={0x18, 0x5}, @map_fd, @map_val={0x18, 0x1}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) r1 = socket$inet_mptcp(0x2, 0x1, 0x106) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f00000040c0)) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NET_DM_CMD_STOP(r2, &(0x7f0000004240)={&(0x7f0000004180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000004200)={&(0x7f00000041c0)={0x14, 0x0, 0x200, 0x70bd29, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x4004083) 09:22:45 executing program 2: r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00'}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x0, 0x0, 0x0, 0x6}], &(0x7f00000000c0)='GPL\x00', 0x0, 0xec, &(0x7f0000000100)=""/236, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xc, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x0, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x0, 0x4, 0x0, 0xfffffffffffffff0}, @ldst={0x0, 0x0, 0x2, 0x0, 0x1}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd}, @map_fd={0x18, 0x5}, @map_fd, @map_val={0x18, 0x1}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f00000040c0)) 09:22:45 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x0, 0x0, 0x0, &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[0xffffffffffffffff]}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', 0x0, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff}, 0x80) 09:22:45 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(0xffffffffffffffff, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r1]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00'}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', 0x0, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) 09:22:45 executing program 4: openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7}, @jmp={0x5, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff0}, @ldst, @map_idx_val, @map_fd={0x18, 0x5, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd, @map_val], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) socket$inet_mptcp(0x2, 0x1, 0x106) 09:22:45 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r1]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00', 0x0}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', r5, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, &(0x7f0000004240)={&(0x7f0000004180), 0xc, &(0x7f0000004200)={&(0x7f00000041c0)={0x14, 0x0, 0x200, 0x70bd29, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x4004083) 09:22:45 executing program 2: r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00'}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x0, 0x0, 0x0, 0x6}], &(0x7f00000000c0)='GPL\x00', 0x0, 0xec, &(0x7f0000000100)=""/236, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xc, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x0, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x0, 0x4, 0x0, 0xfffffffffffffff0}, @ldst={0x0, 0x0, 0x2, 0x0, 0x1}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd}, @map_fd={0x18, 0x5}, @map_fd, @map_val={0x18, 0x1}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f00000040c0)) 09:22:45 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x0, 0x0, 0x0, &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[0xffffffffffffffff]}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', 0x0, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff}, 0x80) 09:22:45 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r1]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00', 0x0}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', r5, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, &(0x7f0000004240)={&(0x7f0000004180), 0xc, &(0x7f0000004200)={&(0x7f00000041c0)={0x14, 0x0, 0x200, 0x70bd29, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x4004083) 09:22:45 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x0, 0xc, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[0xffffffffffffffff]}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', 0x0, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff}, 0x80) 09:22:45 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, 0x0) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r1]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00'}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', 0x0, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) 09:22:45 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x0, 0xc, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[0xffffffffffffffff]}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', 0x0, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff}, 0x80) 09:22:45 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[r1]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00', 0x0}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', r5, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, &(0x7f0000004240)={&(0x7f0000004180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000004200)={&(0x7f00000041c0)={0x14, 0x0, 0x200, 0x70bd29, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x4004083) 09:22:45 executing program 2: r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00'}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x0, 0x0, 0x0, 0x6}], &(0x7f00000000c0)='GPL\x00', 0x0, 0xec, &(0x7f0000000100)=""/236, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xc, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x0, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x0, 0x4, 0x0, 0xfffffffffffffff0}, @ldst={0x0, 0x0, 0x2, 0x0, 0x1}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd}, @map_fd={0x18, 0x5}, @map_fd, @map_val={0x18, 0x1}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f00000040c0)) 09:22:45 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x0, 0xa, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[0xffffffffffffffff]}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', 0x0, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff}, 0x80) 09:22:45 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, 0x0) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r1]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00'}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', 0x0, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) 09:22:46 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x0, 0xa, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[0xffffffffffffffff]}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', 0x0, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff}, 0x80) 09:22:46 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r1]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00', 0x0}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', r5, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, &(0x7f0000004240)={&(0x7f0000004180), 0xc, &(0x7f0000004200)={&(0x7f00000041c0)={0x14, 0x0, 0x200, 0x70bd29, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x4004083) 09:22:46 executing program 5: r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00'}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x0, 0x0, 0x0, 0x6}], &(0x7f00000000c0)='GPL\x00', 0x0, 0xec, &(0x7f0000000100)=""/236, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xc, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x0, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x0, 0x4, 0x0, 0xfffffffffffffff0}, @ldst={0x0, 0x0, 0x2, 0x0, 0x1}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd}, @map_fd={0x18, 0x5}, @map_fd, @map_val={0x18, 0x1}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f00000040c0)) 09:22:46 executing program 2: r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00'}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x0, 0x0, 0x0, 0x6}], &(0x7f00000000c0)='GPL\x00', 0x0, 0xec, &(0x7f0000000100)=""/236, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, 0xffffffffffffffff]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xc, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x0, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x0, 0x4, 0x0, 0xfffffffffffffff0}, @ldst={0x0, 0x0, 0x2, 0x0, 0x1}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd}, @map_fd={0x18, 0x5}, @map_fd, @map_val={0x18, 0x1}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f00000040c0)) 09:22:46 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x0, 0x9, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5}, @call={0x85, 0x0, 0x0, 0x22}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[0xffffffffffffffff]}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', 0x0, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff}, 0x80) 09:22:46 executing program 4: r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00'}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x0, 0x0, 0x0, 0x6}], &(0x7f00000000c0)='GPL\x00', 0x0, 0xec, &(0x7f0000000100)=""/236, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xc, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x0, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x0, 0x4, 0x0, 0xfffffffffffffff0}, @ldst={0x0, 0x0, 0x2, 0x0, 0x1}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd}, @map_fd={0x18, 0x5}, @map_fd, @map_val={0x18, 0x1}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f00000040c0)) 09:22:46 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, 0x0) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r1]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00'}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', 0x0, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) 09:22:46 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x0, 0x8, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[0xffffffffffffffff]}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', 0x0, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff}, 0x80) 09:22:46 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, 0x0) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r1]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00'}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', 0x0, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) 09:22:46 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r1]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00', 0x0}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', r5, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, &(0x7f0000004240)={&(0x7f0000004180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4000005}, 0x4004083) 09:22:46 executing program 2: r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00'}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x0, 0x0, 0x0, 0x6}], &(0x7f00000000c0)='GPL\x00', 0x0, 0xec, &(0x7f0000000100)=""/236, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, 0xffffffffffffffff]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xc, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x0, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x0, 0x4, 0x0, 0xfffffffffffffff0}, @ldst={0x0, 0x0, 0x2, 0x0, 0x1}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd}, @map_fd={0x18, 0x5}, @map_fd, @map_val={0x18, 0x1}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f00000040c0)) 09:22:46 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x0, 0x6, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[0xffffffffffffffff]}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', 0x0, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff}, 0x80) 09:22:46 executing program 4: r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00'}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x0, 0x0, 0x0, 0x6}], &(0x7f00000000c0)='GPL\x00', 0x0, 0xec, &(0x7f0000000100)=""/236, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xc, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x0, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x0, 0x4, 0x0, 0xfffffffffffffff0}, @ldst={0x0, 0x0, 0x2, 0x0, 0x1}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd}, @map_fd={0x18, 0x5}, @map_fd, @map_val={0x18, 0x1}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f00000040c0)) 09:22:46 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r1]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00'}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', 0x0, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) 09:22:46 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x0, 0x4, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[0xffffffffffffffff]}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', 0x0, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff}, 0x80) 09:22:46 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[r1]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00', 0x0}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', r5, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, &(0x7f0000004240)={&(0x7f0000004180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000004200)={&(0x7f00000041c0)={0x14, 0x0, 0x200, 0x70bd29, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x4004083) 09:22:46 executing program 2: r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00'}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x0, 0x0, 0x0, 0x6}], &(0x7f00000000c0)='GPL\x00', 0x0, 0xec, &(0x7f0000000100)=""/236, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, 0xffffffffffffffff]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xc, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x0, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x0, 0x4, 0x0, 0xfffffffffffffff0}, @ldst={0x0, 0x0, 0x2, 0x0, 0x1}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd}, @map_fd={0x18, 0x5}, @map_fd, @map_val={0x18, 0x1}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f00000040c0)) 09:22:46 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x0, 0x3, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[0xffffffffffffffff]}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', 0x0, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff}, 0x80) 09:22:46 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x0, 0x3, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[0xffffffffffffffff]}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', 0x0, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff}, 0x80) 09:22:46 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r1]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00', 0x0}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', r5, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, &(0x7f0000004240)={&(0x7f0000004180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4000005}, 0x4004083) 09:22:46 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x0, 0x2, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[0xffffffffffffffff]}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', 0x0, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff}, 0x80) 09:22:46 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r1]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00'}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', 0x0, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) 09:22:46 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r1]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00'}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', 0x0, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) 09:22:46 executing program 5: ioctl$VHOST_SET_VRING_KICK(0xffffffffffffffff, 0x4008af20, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={0x0, 0x0, 0x8}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x0, &(0x7f0000000080), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x0, 0xb, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x22}, @map_val], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) r1 = socket$inet_mptcp(0x2, 0x1, 0x106) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f00000040c0)) sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, &(0x7f0000004240)={&(0x7f0000004180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000004200)={&(0x7f00000041c0)={0x14, 0x0, 0x200, 0x70bd29, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x4004083) 09:22:46 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x0, 0x2, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[0xffffffffffffffff]}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', 0x0, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff}, 0x80) 09:22:46 executing program 2: r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00'}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x0, 0x0, 0x0, 0x6}], &(0x7f00000000c0)='GPL\x00', 0x0, 0xec, &(0x7f0000000100)=""/236, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[r0]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xc, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x0, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x0, 0x4, 0x0, 0xfffffffffffffff0}, @ldst={0x0, 0x0, 0x2, 0x0, 0x1}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd}, @map_fd={0x18, 0x5}, @map_fd, @map_val={0x18, 0x1}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f00000040c0)) 09:22:46 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r1]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00'}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', 0x0, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) 09:22:46 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x0, 0x2, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[0xffffffffffffffff]}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', 0x0, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff}, 0x80) 09:22:46 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r1]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00', 0x0}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', r5, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, &(0x7f0000004240)={&(0x7f0000004180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4000005}, 0x4004083) 09:22:46 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r1]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00', 0x0}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', r5, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, &(0x7f0000004240)={&(0x7f0000004180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4000005}, 0x4004083) 09:22:46 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x0, 0x3, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x0, 0x5, 0x4, 0x1, 0xfffffffffffffff0}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[0xffffffffffffffff]}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', 0x0, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff}, 0x80) 09:22:46 executing program 5: r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00'}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x0, 0x0, 0x0, 0x6}], &(0x7f00000000c0)='GPL\x00', 0x0, 0xec, &(0x7f0000000100)=""/236, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, 0xffffffffffffffff]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xc, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x0, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x0, 0x4, 0x0, 0xfffffffffffffff0}, @ldst={0x0, 0x0, 0x2, 0x0, 0x1}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd}, @map_fd={0x18, 0x5}, @map_fd, @map_val={0x18, 0x1}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f00000040c0)) 09:22:47 executing program 2: r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00'}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x0, 0x0, 0x0, 0x6}], &(0x7f00000000c0)='GPL\x00', 0x0, 0xec, &(0x7f0000000100)=""/236, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[r0]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xc, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x0, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x0, 0x4, 0x0, 0xfffffffffffffff0}, @ldst={0x0, 0x0, 0x2, 0x0, 0x1}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd}, @map_fd={0x18, 0x5}, @map_fd, @map_val={0x18, 0x1}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f00000040c0)) 09:22:47 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r1]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00'}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', 0x0, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) 09:22:47 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x0, 0x3, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x0, 0x5, 0x4, 0x1, 0xfffffffffffffff0}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[0xffffffffffffffff]}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', 0x0, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff}, 0x80) 09:22:47 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r1]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00'}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', 0x0, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) 09:22:47 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r1]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00', 0x0}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', r5, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, &(0x7f0000004240)={&(0x7f0000004180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000004200)={0x0}, 0x1, 0x0, 0x0, 0x4000005}, 0x4004083) 09:22:47 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r1]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00', 0x0}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', r5, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, &(0x7f0000004240)={&(0x7f0000004180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4000005}, 0x4004083) 09:22:47 executing program 2: r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00'}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x0, 0x0, 0x0, 0x6}], &(0x7f00000000c0)='GPL\x00', 0x0, 0xec, &(0x7f0000000100)=""/236, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[r0]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xc, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x0, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x0, 0x4, 0x0, 0xfffffffffffffff0}, @ldst={0x0, 0x0, 0x2, 0x0, 0x1}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd}, @map_fd={0x18, 0x5}, @map_fd, @map_val={0x18, 0x1}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f00000040c0)) 09:22:47 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x0, 0x3, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x0, 0x0, 0x4, 0x1, 0xfffffffffffffff0}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[0xffffffffffffffff]}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', 0x0, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff}, 0x80) 09:22:47 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r1]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00'}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', 0x0, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) 09:22:47 executing program 4: r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00'}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x0, 0x0, 0x0, 0x6}], &(0x7f00000000c0)='GPL\x00', 0x0, 0xec, &(0x7f0000000100)=""/236, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[r0]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xc, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x0, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x0, 0x4, 0x0, 0xfffffffffffffff0}, @ldst={0x0, 0x0, 0x2, 0x0, 0x1}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd}, @map_fd={0x18, 0x5}, @map_fd, @map_val={0x18, 0x1}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f00000040c0)) 09:22:47 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x0, 0x3, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x0, 0x0, 0x0, 0x1, 0xfffffffffffffff0}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[0xffffffffffffffff]}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', 0x0, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff}, 0x80) 09:22:47 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r1]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00', 0x0}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', r5, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, &(0x7f0000004240)={&(0x7f0000004180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000004200)={0x0}, 0x1, 0x0, 0x0, 0x4000005}, 0x4004083) 09:22:47 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r1]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00', 0x0}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', r5, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, &(0x7f0000004240)={&(0x7f0000004180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000004200)={0x0}, 0x1, 0x0, 0x0, 0x4000005}, 0x4004083) 09:22:47 executing program 2: r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00'}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x0, 0x0, 0x0, 0x6}], &(0x7f00000000c0)='GPL\x00', 0x0, 0xec, &(0x7f0000000100)=""/236, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r0]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f00000040c0)) 09:22:47 executing program 4: ioctl$VHOST_SET_VRING_KICK(0xffffffffffffffff, 0x4008af20, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={0x0, 0x0, 0x8}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x0, &(0x7f0000000080), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x0, 0xb, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x22}, @map_val], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) r1 = socket$inet_mptcp(0x2, 0x1, 0x106) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f00000040c0)) sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, &(0x7f0000004240)={&(0x7f0000004180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000004200)={&(0x7f00000041c0)={0x14, 0x0, 0x200, 0x70bd29, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x4004083) 09:22:47 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x0, 0x3, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff0}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[0xffffffffffffffff]}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', 0x0, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff}, 0x80) 09:22:47 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r1]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00'}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', 0x0, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) 09:22:47 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x0, 0x3, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff0}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[0xffffffffffffffff]}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', 0x0, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff}, 0x80) 09:22:47 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x0, 0x3, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff0}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[0xffffffffffffffff]}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', 0x0, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff}, 0x80) 09:22:47 executing program 2: r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00'}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x0, 0x0, 0x0, 0x6}], &(0x7f00000000c0)='GPL\x00', 0x0, 0xec, &(0x7f0000000100)=""/236, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r0]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f00000040c0)) 09:22:47 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r1]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00', 0x0}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', r5, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, &(0x7f0000004240)={&(0x7f0000004180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000004200)={0x0}, 0x1, 0x0, 0x0, 0x4000005}, 0x4004083) 09:22:47 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r1]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00', 0x0}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', r5, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, &(0x7f0000004240)={&(0x7f0000004180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000004200)={0x0}, 0x1, 0x0, 0x0, 0x4000005}, 0x4004083) 09:22:47 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r1]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={0x0, 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00', 0x0}) r6 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000001880)='/sys/fs/f2fs', 0x280000, 0x82) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', r5, 0x38, r6, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) 09:22:47 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={0x0, 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r1]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00'}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', 0x0, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) 09:22:47 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x0, 0x3, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x0, 0x0, 0x0, 0x1}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[0xffffffffffffffff]}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', 0x0, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff}, 0x80) 09:22:47 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x0, 0x3, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x0, 0x0, 0x0, 0x1}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[0xffffffffffffffff]}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', 0x0, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff}, 0x80) 09:22:47 executing program 2: r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00'}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x0, 0x0, 0x0, 0x6}], &(0x7f00000000c0)='GPL\x00', 0x0, 0xec, &(0x7f0000000100)=""/236, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r0]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f00000040c0)) 09:22:47 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x0, 0x3, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x0, 0x0, 0x0, 0x1}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[0xffffffffffffffff]}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', 0x0, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff}, 0x80) 09:22:47 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={0x0, 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r1]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00'}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', 0x0, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) 09:22:48 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x0, 0x1, &(0x7f0000000500)=@raw=[@jmp={0x5, 0x0, 0x0, 0x0, 0x1, 0xfffffffffffffff0}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[0xffffffffffffffff]}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', 0x0, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff}, 0x80) 09:22:48 executing program 4: ioctl$VHOST_SET_VRING_KICK(0xffffffffffffffff, 0x4008af20, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x0, 0x0, 0x0, 0x6}], &(0x7f00000000c0)='GPL\x00', 0x0, 0xec, &(0x7f0000000100)=""/236, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r0]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xb, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @ldst={0x0, 0x0, 0x2, 0x0, 0x1}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd}, @map_fd={0x18, 0x5}, @map_fd, @map_val={0x18, 0x1}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) r1 = socket$inet_mptcp(0x2, 0x1, 0x106) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f00000040c0)) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NET_DM_CMD_STOP(r2, &(0x7f0000004240)={&(0x7f0000004180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000004200)={&(0x7f00000041c0)={0x14, 0x0, 0x200, 0x70bd29, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x4004083) 09:22:48 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r1]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00', 0x0}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', r5, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, &(0x7f0000004240)={&(0x7f0000004180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000004200)={&(0x7f00000041c0)={0x14, 0x0, 0x0, 0x70bd29, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x4004083) 09:22:48 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r1]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00', 0x0}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', r5, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, &(0x7f0000004240)={&(0x7f0000004180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000004200)={0x0}, 0x1, 0x0, 0x0, 0x4000005}, 0x4004083) 09:22:48 executing program 2: r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00'}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x0, 0x0, 0x0, 0x6}], &(0x7f00000000c0)='GPL\x00', 0x0, 0xec, &(0x7f0000000100)=""/236, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r0]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x0, 0xc, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x0, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x0, 0x4, 0x0, 0xfffffffffffffff0}, @ldst={0x0, 0x0, 0x2, 0x0, 0x1}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd}, @map_fd={0x18, 0x5}, @map_fd, @map_val={0x18, 0x1}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f00000040c0)) 09:22:48 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x0, 0x1, &(0x7f0000000500)=@raw=[@jmp={0x5, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff0}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[0xffffffffffffffff]}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', 0x0, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff}, 0x80) 09:22:48 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={0x0, 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r1]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00'}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', 0x0, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) 09:22:48 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x0, 0x1, &(0x7f0000000500)=@raw=[@jmp], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[0xffffffffffffffff]}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', 0x0, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff}, 0x80) 09:22:48 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x0, 0x1, &(0x7f0000000500)=@raw=[@jmp], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[0xffffffffffffffff]}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', 0x0, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff}, 0x80) 09:22:48 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r1]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00', 0x0}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', r5, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, &(0x7f0000004240)={&(0x7f0000004180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000004200)={0x0}, 0x1, 0x0, 0x0, 0x4000005}, 0x4004083) 09:22:48 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r1]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00', 0x0}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', r5, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, &(0x7f0000004240)={&(0x7f0000004180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000004200)={&(0x7f00000041c0)={0x14, 0x0, 0x0, 0x70bd29, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x4004083) 09:22:48 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[r1]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00', 0x0}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', r5, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, &(0x7f0000004240)={&(0x7f0000004180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000004200)={&(0x7f00000041c0)={0x14, 0x0, 0x200, 0x70bd29, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x4004083) 09:22:48 executing program 2: r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00'}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x0, 0x0, 0x0, 0x6}], &(0x7f00000000c0)='GPL\x00', 0x0, 0xec, &(0x7f0000000100)=""/236, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r0]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x0, 0xc, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x0, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x0, 0x4, 0x0, 0xfffffffffffffff0}, @ldst={0x0, 0x0, 0x2, 0x0, 0x1}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd}, @map_fd={0x18, 0x5}, @map_fd, @map_val={0x18, 0x1}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f00000040c0)) 09:22:48 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00'}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r1]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00'}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', 0x0, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) 09:22:48 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x0, 0x1, &(0x7f0000000500)=@raw=[@jmp], 0x0, 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[0xffffffffffffffff]}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', 0x0, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff}, 0x80) 09:22:48 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x0, 0x1, &(0x7f0000000500)=@raw=[@jmp], 0x0, 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[0xffffffffffffffff]}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', 0x0, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff}, 0x80) 09:22:48 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r1]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00', 0x0}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', r5, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, &(0x7f0000004240)={&(0x7f0000004180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000004200)={&(0x7f00000041c0)={0x14, 0x0, 0x0, 0x70bd29, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x4004083) 09:22:48 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x0, 0x1, &(0x7f0000000500)=@raw=[@jmp], 0x0, 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[0xffffffffffffffff]}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', 0x0, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff}, 0x80) 09:22:48 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={0x0, 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r1]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00'}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', 0x0, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) 09:22:48 executing program 2: r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00'}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x0, 0x0, 0x0, 0x6}], &(0x7f00000000c0)='GPL\x00', 0x0, 0xec, &(0x7f0000000100)=""/236, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r0]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x0, 0xc, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x0, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x0, 0x4, 0x0, 0xfffffffffffffff0}, @ldst={0x0, 0x0, 0x2, 0x0, 0x1}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd}, @map_fd={0x18, 0x5}, @map_fd, @map_val={0x18, 0x1}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f00000040c0)) 09:22:48 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x0, 0x1, &(0x7f0000000500)=@raw=[@jmp], &(0x7f0000000580)='syzkaller\x00', 0x0, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[0xffffffffffffffff]}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', 0x0, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff}, 0x80) 09:22:48 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00'}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r1]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00'}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', 0x0, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) 09:22:48 executing program 5: ioctl$VHOST_SET_VRING_KICK(0xffffffffffffffff, 0x4008af20, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={0x0, 0x0, 0x8}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x0, &(0x7f0000000080), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x0, 0xb, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x22}, @map_val], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) r1 = socket$inet_mptcp(0x2, 0x1, 0x106) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f00000040c0)) sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, &(0x7f0000004240)={&(0x7f0000004180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000004200)={&(0x7f00000041c0)={0x14, 0x0, 0x200, 0x70bd29, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x4004083) 09:22:48 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x0, 0x1, &(0x7f0000000500)=@raw=[@jmp], &(0x7f0000000580)='syzkaller\x00', 0x0, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[0xffffffffffffffff]}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', 0x0, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff}, 0x80) 09:22:48 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r1]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00', 0x0}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', r5, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, &(0x7f0000004240)={&(0x7f0000004180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000004200)={&(0x7f00000041c0)={0x14, 0x0, 0x200, 0x0, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x4004083) 09:22:48 executing program 2: r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00'}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x0, 0x0, 0x0, 0x6}], &(0x7f00000000c0)='GPL\x00', 0x0, 0xec, &(0x7f0000000100)=""/236, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r0]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0x0, 0x0, &(0x7f0000000580)='syzkaller\x00', 0x9, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f00000040c0)) 09:22:48 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x0, 0x1, &(0x7f0000000500)=@raw=[@jmp], &(0x7f0000000580)='syzkaller\x00', 0x0, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[0xffffffffffffffff]}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', 0x0, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff}, 0x80) 09:22:48 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x0, 0x1, &(0x7f0000000500)=@raw=[@jmp], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[0xffffffffffffffff]}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', 0x0, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff}, 0x80) 09:22:48 executing program 4: ioctl$VHOST_SET_VRING_KICK(0xffffffffffffffff, 0x4008af20, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x0, 0x0, 0x0, 0x6}], &(0x7f00000000c0)='GPL\x00', 0x0, 0xec, &(0x7f0000000100)=""/236, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r0]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xc, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x0, 0x0, 0x2, 0x0, 0x1}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd}, @map_fd={0x18, 0x5}, @map_fd, @map_val={0x18, 0x1}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) r1 = socket$inet_mptcp(0x2, 0x1, 0x106) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f00000040c0)) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NET_DM_CMD_STOP(r2, &(0x7f0000004240)={&(0x7f0000004180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000004200)={&(0x7f00000041c0)={0x14, 0x0, 0x200, 0x70bd29, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x4004083) 09:22:48 executing program 2: r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00'}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x0, 0x0, 0x0, 0x6}], &(0x7f00000000c0)='GPL\x00', 0x0, 0xec, &(0x7f0000000100)=""/236, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r0]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0x0, 0x0, &(0x7f0000000580)='syzkaller\x00', 0x9, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f00000040c0)) 09:22:48 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00'}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r1]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00'}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', 0x0, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) 09:22:48 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x0, 0x1, &(0x7f0000000500)=@raw=[@jmp], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[0xffffffffffffffff]}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', 0x0, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff}, 0x80) 09:22:48 executing program 5: ioctl$VHOST_SET_VRING_KICK(0xffffffffffffffff, 0x4008af20, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={0x0, 0x0, 0x8}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x0, &(0x7f0000000080), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x0, 0xb, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x22}, @map_val], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) r1 = socket$inet_mptcp(0x2, 0x1, 0x106) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f00000040c0)) sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, &(0x7f0000004240)={&(0x7f0000004180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000004200)={&(0x7f00000041c0)={0x14, 0x0, 0x200, 0x70bd29, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x4004083) 09:22:49 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r1]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00', 0x0}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', r5, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, &(0x7f0000004240)={&(0x7f0000004180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000004200)={&(0x7f00000041c0)={0x14, 0x0, 0x200, 0x0, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x4004083) 09:22:49 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x0, 0x1, &(0x7f0000000500)=@raw=[@jmp], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[0xffffffffffffffff]}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', 0x0, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff}, 0x80) 09:22:49 executing program 4: ioctl$VHOST_SET_VRING_KICK(0xffffffffffffffff, 0x4008af20, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x0, 0x0, 0x0, 0x6}], &(0x7f00000000c0)='GPL\x00', 0x0, 0xec, &(0x7f0000000100)=""/236, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r0]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xc, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x0, 0x0, 0x2, 0x0, 0x1}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd}, @map_fd={0x18, 0x5}, @map_fd, @map_val={0x18, 0x1}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) r1 = socket$inet_mptcp(0x2, 0x1, 0x106) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f00000040c0)) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NET_DM_CMD_STOP(r2, &(0x7f0000004240)={&(0x7f0000004180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000004200)={&(0x7f00000041c0)={0x14, 0x0, 0x200, 0x70bd29, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x4004083) 09:22:49 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x0, 0x1, &(0x7f0000000500)=@raw=[@jmp], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[0xffffffffffffffff]}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', 0x0, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff}, 0x80) 09:22:49 executing program 2: r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00'}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x0, 0x0, 0x0, 0x6}], &(0x7f00000000c0)='GPL\x00', 0x0, 0xec, &(0x7f0000000100)=""/236, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r0]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0x0, 0x0, &(0x7f0000000580)='syzkaller\x00', 0x9, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f00000040c0)) 09:22:49 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x0, 0x1, &(0x7f0000000500)=@raw=[@jmp], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[0xffffffffffffffff]}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', 0x0, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff}, 0x80) 09:22:49 executing program 5: ioctl$VHOST_SET_VRING_KICK(0xffffffffffffffff, 0x4008af20, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={0x0, 0x0, 0x8}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x0, &(0x7f0000000080), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x0, 0xb, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x22}, @map_val], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) r1 = socket$inet_mptcp(0x2, 0x1, 0x106) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f00000040c0)) sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, &(0x7f0000004240)={&(0x7f0000004180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000004200)={&(0x7f00000041c0)={0x14, 0x0, 0x200, 0x70bd29, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x4004083) 09:22:49 executing program 2: r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00'}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x0, 0x0, 0x0, 0x6}], &(0x7f00000000c0)='GPL\x00', 0x0, 0xec, &(0x7f0000000100)=""/236, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r0]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xa, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x0, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x0, 0x4, 0x0, 0xfffffffffffffff0}, @ldst={0x0, 0x0, 0x2, 0x0, 0x1}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd}, @map_fd={0x18, 0x5}, @map_fd], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f00000040c0)) 09:22:49 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00'}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', 0x0, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) 09:22:49 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x0, 0x1, &(0x7f0000000500)=@raw=[@jmp], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000680)=[0xffffffffffffffff]}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', 0x0, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff}, 0x80) 09:22:49 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r1]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00', 0x0}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', r5, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, &(0x7f0000004240)={&(0x7f0000004180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000004200)={&(0x7f00000041c0)={0x14, 0x0, 0x200, 0x0, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x4004083) 09:22:49 executing program 4: ioctl$VHOST_SET_VRING_KICK(0xffffffffffffffff, 0x4008af20, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x0, 0x0, 0x0, 0x6}], &(0x7f00000000c0)='GPL\x00', 0x0, 0xec, &(0x7f0000000100)=""/236, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r0]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xc, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x0, 0x0, 0x2, 0x0, 0x1}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd}, @map_fd={0x18, 0x5}, @map_fd, @map_val={0x18, 0x1}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) r1 = socket$inet_mptcp(0x2, 0x1, 0x106) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f00000040c0)) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NET_DM_CMD_STOP(r2, &(0x7f0000004240)={&(0x7f0000004180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000004200)={&(0x7f00000041c0)={0x14, 0x0, 0x200, 0x70bd29, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x4004083) 09:22:49 executing program 5: ioctl$VHOST_SET_VRING_KICK(0xffffffffffffffff, 0x4008af20, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={0x0, 0x0, 0x8}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x0, &(0x7f0000000080), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x0, 0xb, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x22}, @map_val], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) r1 = socket$inet_mptcp(0x2, 0x1, 0x106) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f00000040c0)) 09:22:49 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x0, 0x1, &(0x7f0000000500)=@raw=[@jmp], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000680)=[0xffffffffffffffff]}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', 0x0, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff}, 0x80) 09:22:49 executing program 2: r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00'}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x0, 0x0, 0x0, 0x6}], &(0x7f00000000c0)='GPL\x00', 0x0, 0xec, &(0x7f0000000100)=""/236, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r0]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xa, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x0, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x0, 0x4, 0x0, 0xfffffffffffffff0}, @ldst={0x0, 0x0, 0x2, 0x0, 0x1}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd}, @map_fd={0x18, 0x5}, @map_fd], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f00000040c0)) 09:22:49 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00'}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', 0x0, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) 09:22:49 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x0, 0x1, &(0x7f0000000500)=@raw=[@jmp], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', 0x0, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff}, 0x80) 09:22:49 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x0, 0x1, &(0x7f0000000500)=@raw=[@jmp], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$PROG_LOAD(0x5, 0x0, 0x0) 09:22:49 executing program 5: ioctl$VHOST_SET_VRING_KICK(0xffffffffffffffff, 0x4008af20, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={0x0, 0x0, 0x8}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x0, &(0x7f0000000080), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x0, 0xb, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x22}, @map_val], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f00000040c0)) 09:22:49 executing program 4: ioctl$VHOST_SET_VRING_KICK(0xffffffffffffffff, 0x4008af20, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x0, 0x0, 0x0, 0x6}], &(0x7f00000000c0)='GPL\x00', 0x0, 0xec, &(0x7f0000000100)=""/236, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r0]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xc, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x0, 0x0, 0x2, 0x0, 0x1}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd}, @map_fd={0x18, 0x5}, @map_fd, @map_val={0x18, 0x1}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) r1 = socket$inet_mptcp(0x2, 0x1, 0x106) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f00000040c0)) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) 09:22:49 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r1]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00', 0x0}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', r5, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, &(0x7f0000004240)={&(0x7f0000004180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000004200)={&(0x7f00000041c0)={0x14, 0x0, 0x200, 0x70bd29, 0x0, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x4004083) 09:22:49 executing program 2: r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00'}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x0, 0x0, 0x0, 0x6}], &(0x7f00000000c0)='GPL\x00', 0x0, 0xec, &(0x7f0000000100)=""/236, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r0]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0x8, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x0, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x0, 0x4, 0x0, 0xfffffffffffffff0}, @ldst={0x0, 0x0, 0x2, 0x0, 0x1}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd}, @map_fd={0x18, 0x5}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f00000040c0)) 09:22:49 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x0, 0x1, &(0x7f0000000500)=@raw=[@jmp], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000680)=[0xffffffffffffffff]}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', 0x0, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff}, 0x80) 09:22:49 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00'}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', 0x0, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) 09:22:49 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00'}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', 0x0, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) 09:22:49 executing program 5: ioctl$VHOST_SET_VRING_KICK(0xffffffffffffffff, 0x4008af20, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={0x0, 0x0, 0x8}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x0, &(0x7f0000000080), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x0, 0xb, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x22}, @map_val], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f00000040c0)) 09:22:49 executing program 2: r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00'}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x0, 0x0, 0x0, 0x6}], &(0x7f00000000c0)='GPL\x00', 0x0, 0xec, &(0x7f0000000100)=""/236, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r0]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0x8, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x0, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x0, 0x4, 0x0, 0xfffffffffffffff0}, @ldst={0x0, 0x0, 0x2, 0x0, 0x1}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd}, @map_fd={0x18, 0x5}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f00000040c0)) 09:22:49 executing program 4: ioctl$VHOST_SET_VRING_KICK(0xffffffffffffffff, 0x4008af20, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x0, 0x0, 0x0, 0x6}], &(0x7f00000000c0)='GPL\x00', 0x0, 0xec, &(0x7f0000000100)=""/236, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r0]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xc, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x0, 0x0, 0x2, 0x0, 0x1}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd}, @map_fd={0x18, 0x5}, @map_fd, @map_val={0x18, 0x1}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) r1 = socket$inet_mptcp(0x2, 0x1, 0x106) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f00000040c0)) 09:22:49 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r1]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00', 0x0}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', r5, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, &(0x7f0000004240)={&(0x7f0000004180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000004200)={&(0x7f00000041c0)={0x14, 0x0, 0x200, 0x70bd29, 0x0, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x4004083) 09:22:49 executing program 5: ioctl$VHOST_SET_VRING_KICK(0xffffffffffffffff, 0x4008af20, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={0x0, 0x0, 0x8}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x0, &(0x7f0000000080), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x0, 0xb, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x22}, @map_val], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f00000040c0)) 09:22:50 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) ioctl$VHOST_VDPA_GET_IOVA_RANGE(0xffffffffffffffff, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00'}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', 0x0, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) 09:22:50 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x0, 0x1, &(0x7f0000000500)=@raw=[@jmp], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[0xffffffffffffffff]}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', 0x0, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff}, 0x80) 09:22:50 executing program 2: r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00'}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x0, 0x0, 0x0, 0x6}], &(0x7f00000000c0)='GPL\x00', 0x0, 0xec, &(0x7f0000000100)=""/236, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r0]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0x8, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x0, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x0, 0x4, 0x0, 0xfffffffffffffff0}, @ldst={0x0, 0x0, 0x2, 0x0, 0x1}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd}, @map_fd={0x18, 0x5}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f00000040c0)) 09:22:50 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r1]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00', 0x0}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', r5, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, &(0x7f0000004240)={&(0x7f0000004180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000004200)={&(0x7f00000041c0)={0x14, 0x0, 0x200, 0x0, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x4004083) 09:22:50 executing program 4: ioctl$VHOST_SET_VRING_KICK(0xffffffffffffffff, 0x4008af20, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x0, 0x0, 0x0, 0x6}], &(0x7f00000000c0)='GPL\x00', 0x0, 0xec, &(0x7f0000000100)=""/236, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r0]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xc, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x0, 0x0, 0x2, 0x0, 0x1}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd}, @map_fd={0x18, 0x5}, @map_fd, @map_val={0x18, 0x1}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f00000040c0)) 09:22:50 executing program 2: r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00'}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x0, 0x0, 0x0, 0x6}], &(0x7f00000000c0)='GPL\x00', 0x0, 0xec, &(0x7f0000000100)=""/236, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r0]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0x8, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x0, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x0, 0x4, 0x0, 0xfffffffffffffff0}, @ldst={0x0, 0x0, 0x2, 0x0, 0x1}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd}, @map_fd], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f00000040c0)) 09:22:50 executing program 5: ioctl$VHOST_SET_VRING_KICK(0xffffffffffffffff, 0x4008af20, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={0x0, 0x0, 0x8}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x0, &(0x7f0000000080), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x0, 0xb, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x22}, @map_val], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet_mptcp(0x2, 0x1, 0x106) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f00000040c0)) 09:22:50 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r1]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00', 0x0}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', r5, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, &(0x7f0000004240)={&(0x7f0000004180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000004200)={&(0x7f00000041c0)={0x14, 0x0, 0x200, 0x70bd29, 0x0, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x4004083) 09:22:50 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) ioctl$VHOST_VDPA_GET_IOVA_RANGE(0xffffffffffffffff, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00'}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', 0x0, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) 09:22:50 executing program 4: ioctl$VHOST_SET_VRING_KICK(0xffffffffffffffff, 0x4008af20, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x0, 0x0, 0x0, 0x6}], &(0x7f00000000c0)='GPL\x00', 0x0, 0xec, &(0x7f0000000100)=""/236, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r0]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xc, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x0, 0x0, 0x2, 0x0, 0x1}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd}, @map_fd={0x18, 0x5}, @map_fd, @map_val={0x18, 0x1}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f00000040c0)) 09:22:50 executing program 5: ioctl$VHOST_SET_VRING_KICK(0xffffffffffffffff, 0x4008af20, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={0x0, 0x0, 0x8}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x0, &(0x7f0000000080), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x0, 0xb, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x22}, @map_val], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) r1 = socket$inet_mptcp(0x2, 0x1, 0x106) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f00000040c0)) 09:22:50 executing program 0: ioctl$VHOST_SET_VRING_KICK(0xffffffffffffffff, 0x4008af20, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x0, 0x0, 0x0, 0x6}], &(0x7f00000000c0)='GPL\x00', 0x0, 0xec, &(0x7f0000000100)=""/236, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r0]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xc, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x0, 0x0, 0x2, 0x0, 0x1}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd}, @map_fd={0x18, 0x5}, @map_fd, @map_val={0x18, 0x1}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f00000040c0)) 09:22:50 executing program 2: r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00'}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x0, 0x0, 0x0, 0x6}], &(0x7f00000000c0)='GPL\x00', 0x0, 0xec, &(0x7f0000000100)=""/236, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r0]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0x8, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x0, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x0, 0x4, 0x0, 0xfffffffffffffff0}, @ldst={0x0, 0x0, 0x2, 0x0, 0x1}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd}, @map_fd], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f00000040c0)) 09:22:50 executing program 5: ioctl$VHOST_SET_VRING_KICK(0xffffffffffffffff, 0x4008af20, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={0x0, 0x0, 0x8}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x0, &(0x7f0000000080), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1]}, 0x80) r0 = socket$inet_mptcp(0x2, 0x1, 0x106) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f00000040c0)) 09:22:50 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r1]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00', 0x0}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', r5, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, &(0x7f0000004240)={&(0x7f0000004180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000004200)={&(0x7f00000041c0)={0x14, 0x0, 0x200, 0x70bd29, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x4004083) 09:22:50 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) ioctl$VHOST_VDPA_GET_IOVA_RANGE(0xffffffffffffffff, 0x8010af78, 0x0) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00'}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', 0x0, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) 09:22:50 executing program 5: ioctl$VHOST_SET_VRING_KICK(0xffffffffffffffff, 0x4008af20, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={0x0, 0x0, 0x8}, 0x10) r0 = socket$inet_mptcp(0x2, 0x1, 0x106) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f00000040c0)) 09:22:50 executing program 4: ioctl$VHOST_SET_VRING_KICK(0xffffffffffffffff, 0x4008af20, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x0, 0x0, 0x0, 0x6}], &(0x7f00000000c0)='GPL\x00', 0x0, 0xec, &(0x7f0000000100)=""/236, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r0]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xc, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x0, 0x0, 0x2, 0x0, 0x1}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd}, @map_fd={0x18, 0x5}, @map_fd, @map_val={0x18, 0x1}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f00000040c0)) 09:22:50 executing program 5: ioctl$VHOST_SET_VRING_KICK(0xffffffffffffffff, 0x4008af20, 0x0) r0 = socket$inet_mptcp(0x2, 0x1, 0x106) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f00000040c0)) 09:22:50 executing program 2: r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00'}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x0, 0x0, 0x0, 0x6}], &(0x7f00000000c0)='GPL\x00', 0x0, 0xec, &(0x7f0000000100)=""/236, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r0]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0x8, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x0, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x0, 0x4, 0x0, 0xfffffffffffffff0}, @ldst={0x0, 0x0, 0x2, 0x0, 0x1}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd}, @map_fd], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f00000040c0)) 09:22:50 executing program 4: ioctl$VHOST_SET_VRING_KICK(0xffffffffffffffff, 0x4008af20, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x0, 0x0, 0x0, 0x6}], &(0x7f00000000c0)='GPL\x00', 0x0, 0xec, &(0x7f0000000100)=""/236, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r0]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xc, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x0, 0x0, 0x2, 0x0, 0x1}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd}, @map_fd={0x18, 0x5}, @map_fd, @map_val={0x18, 0x1}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) r1 = socket$inet_mptcp(0x2, 0x1, 0x106) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f00000040c0)) 09:22:50 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) ioctl$VHOST_VDPA_GET_IOVA_RANGE(0xffffffffffffffff, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00'}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', 0x0, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) 09:22:50 executing program 5: r0 = socket$inet_mptcp(0x2, 0x1, 0x106) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f00000040c0)) 09:22:50 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) ioctl$VHOST_VDPA_GET_IOVA_RANGE(0xffffffffffffffff, 0x8010af78, 0x0) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00'}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', 0x0, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) 09:22:50 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r1]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00', 0x0}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', r5, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, &(0x7f0000004240)={&(0x7f0000004180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000004200)={&(0x7f00000041c0)={0x14, 0x0, 0x200, 0x70bd29, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x4004083) 09:22:50 executing program 5: socket$inet_mptcp(0x2, 0x1, 0x106) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f00000040c0)) 09:22:50 executing program 2: r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00'}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x0, 0x0, 0x0, 0x6}], &(0x7f00000000c0)='GPL\x00', 0x0, 0xec, &(0x7f0000000100)=""/236, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r0]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xa, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x0, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x0, 0x4, 0x0, 0xfffffffffffffff0}, @ldst={0x0, 0x0, 0x2, 0x0, 0x1}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd}, @map_fd, @map_fd], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f00000040c0)) 09:22:50 executing program 5: socket$inet_mptcp(0x2, 0x1, 0x106) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f00000040c0)) 09:22:50 executing program 4: ioctl$VHOST_SET_VRING_KICK(0xffffffffffffffff, 0x4008af20, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x0, 0x0, 0x0, 0x6}], &(0x7f00000000c0)='GPL\x00', 0x0, 0xec, &(0x7f0000000100)=""/236, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r0]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xc, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x0, 0x0, 0x2, 0x0, 0x1}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd}, @map_fd={0x18, 0x5}, @map_fd, @map_val={0x18, 0x1}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet_mptcp(0x2, 0x1, 0x106) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f00000040c0)) 09:22:50 executing program 4: ioctl$VHOST_SET_VRING_KICK(0xffffffffffffffff, 0x4008af20, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x0, 0x0, 0x0, 0x6}], &(0x7f00000000c0)='GPL\x00', 0x0, 0xec, &(0x7f0000000100)=""/236, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r0]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xc, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x0, 0x0, 0x2, 0x0, 0x1}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd}, @map_fd={0x18, 0x5}, @map_fd, @map_val={0x18, 0x1}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) r1 = socket$inet_mptcp(0x2, 0x1, 0x106) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f00000040c0)) 09:22:51 executing program 4: ioctl$VHOST_SET_VRING_KICK(0xffffffffffffffff, 0x4008af20, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x0, 0x0, 0x0, 0x6}], &(0x7f00000000c0)='GPL\x00', 0x0, 0xec, &(0x7f0000000100)=""/236, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r0]}, 0x80) r1 = socket$inet_mptcp(0x2, 0x1, 0x106) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f00000040c0)) 09:22:51 executing program 5: socket$inet_mptcp(0x2, 0x1, 0x106) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f00000040c0)) 09:22:51 executing program 4: ioctl$VHOST_SET_VRING_KICK(0xffffffffffffffff, 0x4008af20, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r0 = socket$inet_mptcp(0x2, 0x1, 0x106) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f00000040c0)) 09:22:51 executing program 0: ioctl$VHOST_SET_VRING_KICK(0xffffffffffffffff, 0x4008af20, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x0, 0x0, 0x0, 0x6}], &(0x7f00000000c0)='GPL\x00', 0x0, 0xec, &(0x7f0000000100)=""/236, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r0]}, 0x80) r1 = socket$inet_mptcp(0x2, 0x1, 0x106) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f00000040c0)) 09:22:51 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) ioctl$VHOST_VDPA_GET_IOVA_RANGE(0xffffffffffffffff, 0x8010af78, 0x0) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00'}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', 0x0, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) 09:22:51 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) ioctl$VHOST_VDPA_GET_IOVA_RANGE(0xffffffffffffffff, 0x8010af78, 0x0) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00'}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', 0x0, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) 09:22:51 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r1]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00', 0x0}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', r5, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, &(0x7f0000004240)={&(0x7f0000004180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000004200)={&(0x7f00000041c0)={0x14, 0x0, 0x200, 0x70bd29, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x4004083) 09:22:51 executing program 2: r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00'}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x0, 0x0, 0x0, 0x6}], &(0x7f00000000c0)='GPL\x00', 0x0, 0xec, &(0x7f0000000100)=""/236, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r0]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xa, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x0, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x0, 0x4, 0x0, 0xfffffffffffffff0}, @ldst={0x0, 0x0, 0x2, 0x0, 0x1}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd}, @map_fd, @map_fd], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f00000040c0)) 09:22:51 executing program 4: ioctl$VHOST_SET_VRING_KICK(0xffffffffffffffff, 0x4008af20, 0x0) r0 = socket$inet_mptcp(0x2, 0x1, 0x106) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f00000040c0)) 09:22:51 executing program 5: r0 = socket$inet_mptcp(0x2, 0x1, 0x106) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, 0x0) 09:22:51 executing program 4: r0 = socket$inet_mptcp(0x2, 0x1, 0x106) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f00000040c0)) 09:22:51 executing program 5: r0 = socket$inet_mptcp(0x2, 0x1, 0x106) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, 0x0) 09:22:51 executing program 5: r0 = socket$inet_mptcp(0x2, 0x1, 0x106) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, 0x0) 09:22:51 executing program 4: socket$inet_mptcp(0x2, 0x1, 0x106) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f00000040c0)) 09:22:51 executing program 2: r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00'}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x0, 0x0, 0x0, 0x6}], &(0x7f00000000c0)='GPL\x00', 0x0, 0xec, &(0x7f0000000100)=""/236, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r0]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xa, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x0, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x0, 0x4, 0x0, 0xfffffffffffffff0}, @ldst={0x0, 0x0, 0x2, 0x0, 0x1}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd}, @map_fd, @map_fd], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f00000040c0)) 09:22:51 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) ioctl$VHOST_VDPA_GET_IOVA_RANGE(0xffffffffffffffff, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00'}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', 0x0, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) 09:22:51 executing program 0: socket$inet_mptcp(0x2, 0x1, 0x106) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f00000040c0)) 09:22:51 executing program 4: socket$inet_mptcp(0x2, 0x1, 0x106) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f00000040c0)) 09:22:51 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r1]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00', 0x0}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', r5, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, &(0x7f0000004240)={&(0x7f0000004180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000004200)={&(0x7f00000041c0)={0x14, 0x0, 0x200, 0x70bd29, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x4004083) 09:22:51 executing program 5: socket$inet_mptcp(0x2, 0x1, 0x106) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f00000040c0)) 09:22:51 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r1]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00', 0x0}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', r5, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, &(0x7f0000004240)={&(0x7f0000004180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000004200)={&(0x7f00000041c0)={0x14, 0x0, 0x200, 0x70bd29, 0x0, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x4004083) 09:22:51 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00'}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r1]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00'}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', 0x0, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) 09:22:51 executing program 2: r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00'}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x0, 0x0, 0x0, 0x6}], &(0x7f00000000c0)='GPL\x00', 0x0, 0xec, &(0x7f0000000100)=""/236, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r0]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0x8, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x0, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x0, 0x4, 0x0, 0xfffffffffffffff0}, @ldst={0x0, 0x0, 0x2, 0x0, 0x1}, @map_fd={0x18, 0x5}, @map_fd], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f00000040c0)) 09:22:51 executing program 4: socket$inet_mptcp(0x2, 0x1, 0x106) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f00000040c0)) 09:22:51 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) ioctl$VHOST_VDPA_GET_IOVA_RANGE(0xffffffffffffffff, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00'}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', 0x0, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) 09:22:51 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r1]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00', 0x0}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', r5, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, &(0x7f0000004240)={&(0x7f0000004180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000004200)={&(0x7f00000041c0)={0x14, 0x0, 0x200, 0x70bd29, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x4004083) 09:22:51 executing program 4: r0 = socket$inet_mptcp(0x2, 0x1, 0x106) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, 0x0) 09:22:51 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, 0xffffffffffffffff]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00', 0x0}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', r5, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, &(0x7f0000004240)={&(0x7f0000004180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000004200)={&(0x7f00000041c0)={0x14, 0x0, 0x200, 0x70bd29, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x4004083) 09:22:51 executing program 2: r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00'}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x0, 0x0, 0x0, 0x6}], &(0x7f00000000c0)='GPL\x00', 0x0, 0xec, &(0x7f0000000100)=""/236, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r0]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0x8, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x0, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x0, 0x4, 0x0, 0xfffffffffffffff0}, @ldst={0x0, 0x0, 0x2, 0x0, 0x1}, @map_fd={0x18, 0x5}, @map_fd], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f00000040c0)) 09:22:51 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r2, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r2}, @map_val={0x18, 0x1, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r3 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r3, 0x0, &(0x7f0000000780)) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) 09:22:51 executing program 4: r0 = socket$inet_mptcp(0x2, 0x1, 0x106) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, 0x0) 09:22:51 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) ioctl$VHOST_VDPA_GET_IOVA_RANGE(0xffffffffffffffff, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00'}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', 0x0, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) 09:22:51 executing program 4: r0 = socket$inet_mptcp(0x2, 0x1, 0x106) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, 0x0) 09:22:51 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r1]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00', 0x0}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', r5, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, &(0x7f0000004240)={&(0x7f0000004180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000004200)={&(0x7f00000041c0)={0x14, 0x0, 0x200, 0x70bd29, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x4004083) 09:22:51 executing program 2: r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00'}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x0, 0x0, 0x0, 0x6}], &(0x7f00000000c0)='GPL\x00', 0x0, 0xec, &(0x7f0000000100)=""/236, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r0]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0x8, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x0, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x0, 0x4, 0x0, 0xfffffffffffffff0}, @ldst={0x0, 0x0, 0x2, 0x0, 0x1}, @map_fd={0x18, 0x5}, @map_fd], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f00000040c0)) 09:22:51 executing program 4: r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00'}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x0, 0x0, 0x0, 0x6}], &(0x7f00000000c0)='GPL\x00', 0x0, 0xec, &(0x7f0000000100)=""/236, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r0]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0x8, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x0, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x0, 0x4, 0x0, 0xfffffffffffffff0}, @ldst={0x0, 0x0, 0x2, 0x0, 0x1}, @map_fd={0x18, 0x5}, @map_fd], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f00000040c0)) 09:22:52 executing program 0: ioctl$VHOST_SET_VRING_KICK(0xffffffffffffffff, 0x4008af20, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x0, 0x0, 0x0, 0x6}], &(0x7f00000000c0)='GPL\x00', 0x0, 0xec, &(0x7f0000000100)=""/236, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r0]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xc, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x0, 0x0, 0x2, 0x0, 0x1}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd}, @map_fd={0x18, 0x5}, @map_fd, @map_val={0x18, 0x1}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) r1 = socket$inet_mptcp(0x2, 0x1, 0x106) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f00000040c0)) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NET_DM_CMD_STOP(r2, &(0x7f0000004240)={&(0x7f0000004180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000004200)={&(0x7f00000041c0)={0x14, 0x0, 0x200, 0x70bd29, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x4004083) 09:22:52 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, 0xffffffffffffffff]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00', 0x0}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', r5, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, &(0x7f0000004240)={&(0x7f0000004180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000004200)={&(0x7f00000041c0)={0x14, 0x0, 0x200, 0x70bd29, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x4004083) 09:22:52 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) ioctl$VHOST_VDPA_GET_IOVA_RANGE(0xffffffffffffffff, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={0x0, 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00'}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', 0x0, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) 09:22:52 executing program 2: r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00'}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x0, 0x0, 0x0, 0x6}], &(0x7f00000000c0)='GPL\x00', 0x0, 0xec, &(0x7f0000000100)=""/236, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r0]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xa, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x0, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x0, 0x4, 0x0, 0xfffffffffffffff0}, @ldst={0x0, 0x0, 0x2, 0x0, 0x1}, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0xd}, @map_fd={0x18, 0x5}, @map_fd], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f00000040c0)) 09:22:52 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r1]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00', 0x0}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', r5, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, &(0x7f0000004240)={&(0x7f0000004180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000004200)={&(0x7f00000041c0)={0x14, 0x0, 0x200, 0x70bd29, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x4004083) 09:22:52 executing program 4: r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00'}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x0, 0x0, 0x0, 0x6}], &(0x7f00000000c0)='GPL\x00', 0x0, 0xec, &(0x7f0000000100)=""/236, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r0]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0x8, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x0, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x0, 0x4, 0x0, 0xfffffffffffffff0}, @ldst={0x0, 0x0, 0x2, 0x0, 0x1}, @map_fd={0x18, 0x5}, @map_fd], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f00000040c0)) 09:22:52 executing program 2: r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00'}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x0, 0x0, 0x0, 0x6}], &(0x7f00000000c0)='GPL\x00', 0x0, 0xec, &(0x7f0000000100)=""/236, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r0]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xa, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x0, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x0, 0x4, 0x0, 0xfffffffffffffff0}, @ldst={0x0, 0x0, 0x2, 0x0, 0x1}, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0xd}, @map_fd={0x18, 0x5}, @map_fd], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f00000040c0)) 09:22:52 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, 0xffffffffffffffff]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00', 0x0}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', r5, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, &(0x7f0000004240)={&(0x7f0000004180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000004200)={&(0x7f00000041c0)={0x14, 0x0, 0x200, 0x70bd29, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x4004083) 09:22:52 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) ioctl$VHOST_VDPA_GET_IOVA_RANGE(0xffffffffffffffff, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={0x0, 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00'}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', 0x0, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) 09:22:52 executing program 4: ioctl$VHOST_SET_VRING_KICK(0xffffffffffffffff, 0x4008af20, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x0, 0x0, 0x0, 0x6}], &(0x7f00000000c0)='GPL\x00', 0x0, 0xec, &(0x7f0000000100)=""/236, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r0]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xc, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x0, 0x0, 0x2, 0x0, 0x0, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd}, @map_fd={0x18, 0x5}, @map_fd, @map_val={0x18, 0x1}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) r1 = socket$inet_mptcp(0x2, 0x1, 0x106) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f00000040c0)) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NET_DM_CMD_STOP(r2, &(0x7f0000004240)={&(0x7f0000004180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000004200)={&(0x7f00000041c0)={0x14, 0x0, 0x200, 0x70bd29, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x4004083) 09:22:52 executing program 5: openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xc, &(0x7f0000000500)=@raw=[@jmp={0x5, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff0}, @ldst, @map_idx_val, @map_fd={0x18, 0x5, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd, @map_val], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) socket$inet_mptcp(0x2, 0x1, 0x106) 09:22:52 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r1]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00', 0x0}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', r5, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, &(0x7f0000004240)={&(0x7f0000004180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000004200)={&(0x7f00000041c0)={0x14, 0x0, 0x200, 0x70bd29, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x4004083) 09:22:52 executing program 2: r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00'}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x0, 0x0, 0x0, 0x6}], &(0x7f00000000c0)='GPL\x00', 0x0, 0xec, &(0x7f0000000100)=""/236, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r0]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xa, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x0, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x0, 0x4, 0x0, 0xfffffffffffffff0}, @ldst={0x0, 0x0, 0x2, 0x0, 0x1}, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0xd}, @map_fd={0x18, 0x5}, @map_fd], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f00000040c0)) 09:22:52 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) ioctl$VHOST_VDPA_GET_IOVA_RANGE(0xffffffffffffffff, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={0x0, 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00'}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', 0x0, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) 09:22:52 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, 0xffffffffffffffff]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00', 0x0}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', r5, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, &(0x7f0000004240)={&(0x7f0000004180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000004200)={&(0x7f00000041c0)={0x14, 0x0, 0x200, 0x70bd29, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x4004083) 09:22:52 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r1]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, 0x0) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00', 0x0}) r6 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000001880)='/sys/fs/f2fs', 0x280000, 0x82) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', r5, 0x38, r6, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) 09:22:52 executing program 4: ioctl$VHOST_SET_VRING_KICK(0xffffffffffffffff, 0x4008af20, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x0, 0x0, 0x0, 0x6}], &(0x7f00000000c0)='GPL\x00', 0x0, 0xec, &(0x7f0000000100)=""/236, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r0]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xc, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x0, 0x0, 0x2, 0x0, 0x0, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd}, @map_fd={0x18, 0x5}, @map_fd, @map_val={0x18, 0x1}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) r1 = socket$inet_mptcp(0x2, 0x1, 0x106) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f00000040c0)) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NET_DM_CMD_STOP(r2, &(0x7f0000004240)={&(0x7f0000004180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000004200)={&(0x7f00000041c0)={0x14, 0x0, 0x200, 0x70bd29, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x4004083) 09:22:52 executing program 2: r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00'}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x0, 0x0, 0x0, 0x6}], &(0x7f00000000c0)='GPL\x00', 0x0, 0xec, &(0x7f0000000100)=""/236, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r0]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xa, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x0, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x0, 0x4, 0x0, 0xfffffffffffffff0}, @ldst={0x0, 0x0, 0x2, 0x0, 0x1}, @map_idx_val={0x18, 0xcf17f431a521a788}, @map_fd={0x18, 0x5}, @map_fd], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f00000040c0)) 09:22:52 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r1]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00', 0x0}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', r5, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, &(0x7f0000004240)={&(0x7f0000004180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000004200)={&(0x7f00000041c0)={0x14, 0x0, 0x200, 0x70bd29, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x4004083) 09:22:52 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, 0xffffffffffffffff]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00', 0x0}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', r5, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, &(0x7f0000004240)={&(0x7f0000004180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000004200)={&(0x7f00000041c0)={0x14, 0x0, 0x200, 0x70bd29, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x4004083) 09:22:52 executing program 2: r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00'}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x0, 0x0, 0x0, 0x6}], &(0x7f00000000c0)='GPL\x00', 0x0, 0xec, &(0x7f0000000100)=""/236, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r0]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xa, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x0, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x0, 0x4, 0x0, 0xfffffffffffffff0}, @ldst={0x0, 0x0, 0x2, 0x0, 0x1}, @map_idx_val={0x18, 0xcf17f431a521a788}, @map_fd={0x18, 0x5}, @map_fd], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f00000040c0)) 09:22:52 executing program 5: ioctl$VHOST_SET_VRING_KICK(0xffffffffffffffff, 0x4008af20, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x0, 0x0, 0x0, 0x6}], &(0x7f00000000c0)='GPL\x00', 0x0, 0xec, &(0x7f0000000100)=""/236, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r0]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xc, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x0, 0x0, 0x2, 0x0, 0x0, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd}, @map_fd={0x18, 0x5}, @map_fd, @map_val={0x18, 0x1}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) r1 = socket$inet_mptcp(0x2, 0x1, 0x106) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f00000040c0)) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NET_DM_CMD_STOP(r2, &(0x7f0000004240)={&(0x7f0000004180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000004200)={&(0x7f00000041c0)={0x14, 0x0, 0x200, 0x70bd29, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x4004083) 09:22:52 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) ioctl$VHOST_VDPA_GET_IOVA_RANGE(0xffffffffffffffff, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00'}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00'}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', 0x0, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) 09:22:52 executing program 4: ioctl$VHOST_SET_VRING_KICK(0xffffffffffffffff, 0x4008af20, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={0x0, 0x0, 0x8}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x0, &(0x7f0000000080), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x0, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9}, @map_val], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) r1 = socket$inet_mptcp(0x2, 0x1, 0x106) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f00000040c0)) sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, &(0x7f0000004240)={&(0x7f0000004180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000004200)={&(0x7f00000041c0)={0x14, 0x0, 0x200, 0x70bd29, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x4004083) 09:22:53 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r1]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00', 0x0}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', r5, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, &(0x7f0000004240)={&(0x7f0000004180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000004200)={&(0x7f00000041c0)={0x14, 0x0, 0x200, 0x70bd29, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x4004083) 09:22:53 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, 0xffffffffffffffff]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00', 0x0}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', r5, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) 09:22:53 executing program 5: ioctl$VHOST_SET_VRING_KICK(0xffffffffffffffff, 0x4008af20, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x0, 0x0, 0x0, 0x6}], &(0x7f00000000c0)='GPL\x00', 0x0, 0xec, &(0x7f0000000100)=""/236, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r0]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xc, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x0, 0x0, 0x2, 0x0, 0x0, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd}, @map_fd={0x18, 0x5}, @map_fd, @map_val={0x18, 0x1}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) r1 = socket$inet_mptcp(0x2, 0x1, 0x106) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f00000040c0)) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NET_DM_CMD_STOP(r2, &(0x7f0000004240)={&(0x7f0000004180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000004200)={&(0x7f00000041c0)={0x14, 0x0, 0x200, 0x70bd29, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x4004083) 09:22:53 executing program 2: r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00'}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x0, 0x0, 0x0, 0x6}], &(0x7f00000000c0)='GPL\x00', 0x0, 0xec, &(0x7f0000000100)=""/236, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r0]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0x9, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x0, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x0, 0x4, 0x0, 0xfffffffffffffff0}, @map_idx_val={0x18, 0xcf17f431a521a788}, @map_fd={0x18, 0x5}, @map_fd], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f00000040c0)) 09:22:53 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) ioctl$VHOST_VDPA_GET_IOVA_RANGE(0xffffffffffffffff, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00'}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00'}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', 0x0, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) 09:22:53 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) ioctl$VHOST_VDPA_GET_IOVA_RANGE(0xffffffffffffffff, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00'}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00'}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', 0x0, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) 09:22:53 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r1]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00', 0x0}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', r5, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, &(0x7f0000004240)={&(0x7f0000004180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000004200)={&(0x7f00000041c0)={0x14, 0x0, 0x200, 0x70bd29, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x4004083) 09:22:53 executing program 2: r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00'}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x0, 0x0, 0x0, 0x6}], &(0x7f00000000c0)='GPL\x00', 0x0, 0xec, &(0x7f0000000100)=""/236, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r0]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0x9, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x0, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x0, 0x4, 0x0, 0xfffffffffffffff0}, @map_idx_val={0x18, 0xcf17f431a521a788}, @map_fd={0x18, 0x5}, @map_fd], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f00000040c0)) 09:22:53 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) ioctl$VHOST_VDPA_GET_IOVA_RANGE(0xffffffffffffffff, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00'}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00'}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', 0x0, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) 09:22:53 executing program 5: ioctl$VHOST_SET_VRING_KICK(0xffffffffffffffff, 0x4008af20, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x0, 0x0, 0x0, 0x6}], &(0x7f00000000c0)='GPL\x00', 0x0, 0xec, &(0x7f0000000100)=""/236, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r0]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xc, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x0, 0x0, 0x2, 0x0, 0x0, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd}, @map_fd={0x18, 0x5}, @map_fd, @map_val={0x18, 0x1}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) r1 = socket$inet_mptcp(0x2, 0x1, 0x106) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f00000040c0)) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NET_DM_CMD_STOP(r2, &(0x7f0000004240)={&(0x7f0000004180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000004200)={&(0x7f00000041c0)={0x14, 0x0, 0x200, 0x70bd29, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x4004083) 09:22:53 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, 0xffffffffffffffff]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00', 0x0}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', r5, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) 09:22:53 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, 0xffffffffffffffff]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00', 0x0}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', r5, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) 09:22:53 executing program 2: r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00'}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x0, 0x0, 0x0, 0x6}], &(0x7f00000000c0)='GPL\x00', 0x0, 0xec, &(0x7f0000000100)=""/236, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r0]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0x9, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x0, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x0, 0x4, 0x0, 0xfffffffffffffff0}, @map_idx_val={0x18, 0xcf17f431a521a788}, @map_fd={0x18, 0x5}, @map_fd], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f00000040c0)) 09:22:53 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r1]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00', 0x0}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', r5, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, &(0x7f0000004240)={&(0x7f0000004180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000004200)={&(0x7f00000041c0)={0x14, 0x0, 0x200, 0x70bd29, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x4004083) 09:22:53 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) ioctl$VHOST_VDPA_GET_IOVA_RANGE(0xffffffffffffffff, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, 0x0, 0x0) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00'}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', 0x0, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) 09:22:53 executing program 2: r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00'}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x0, 0x0, 0x0, 0x6}], &(0x7f00000000c0)='GPL\x00', 0x0, 0xec, &(0x7f0000000100)=""/236, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r0]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0x9, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x0, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x0, 0x4, 0x0, 0xfffffffffffffff0}, @map_idx_val, @map_fd={0x18, 0x5}, @map_fd], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f00000040c0)) 09:22:53 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, 0xffffffffffffffff]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00', 0x0}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', r5, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) 09:22:53 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, 0xffffffffffffffff]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00', 0x0}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', r5, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) 09:22:53 executing program 5: ioctl$VHOST_SET_VRING_KICK(0xffffffffffffffff, 0x4008af20, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x0, 0x0, 0x0, 0x6}], &(0x7f00000000c0)='GPL\x00', 0x0, 0xec, &(0x7f0000000100)=""/236, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r0]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xc, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x0, 0x0, 0x2, 0x0, 0x0, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd}, @map_fd={0x18, 0x5}, @map_fd, @map_val={0x18, 0x1}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) r1 = socket$inet_mptcp(0x2, 0x1, 0x106) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f00000040c0)) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) 09:22:53 executing program 2: r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00'}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x0, 0x0, 0x0, 0x6}], &(0x7f00000000c0)='GPL\x00', 0x0, 0xec, &(0x7f0000000100)=""/236, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r0]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0x9, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x0, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x0, 0x4, 0x0, 0xfffffffffffffff0}, @map_idx_val, @map_fd={0x18, 0x5}, @map_fd], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f00000040c0)) 09:22:53 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) ioctl$VHOST_VDPA_GET_IOVA_RANGE(0xffffffffffffffff, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, 0x0, 0x0) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00'}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', 0x0, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) 09:22:53 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r1]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00', 0x0}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', r5, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, &(0x7f0000004240)={&(0x7f0000004180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000004200)={&(0x7f00000041c0)={0x14, 0x0, 0x200, 0x70bd29, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x4004083) 09:22:54 executing program 5: ioctl$VHOST_SET_VRING_KICK(0xffffffffffffffff, 0x4008af20, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x0, 0x0, 0x0, 0x6}], &(0x7f00000000c0)='GPL\x00', 0x0, 0xec, &(0x7f0000000100)=""/236, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r0]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xc, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x0, 0x0, 0x2, 0x0, 0x0, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd}, @map_fd={0x18, 0x5}, @map_fd, @map_val={0x18, 0x1}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) socket$inet_mptcp(0x2, 0x1, 0x106) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) 09:22:54 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, 0xffffffffffffffff]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00', 0x0}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', r5, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) 09:22:54 executing program 2: r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00'}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x0, 0x0, 0x0, 0x6}], &(0x7f00000000c0)='GPL\x00', 0x0, 0xec, &(0x7f0000000100)=""/236, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r0]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0x9, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x0, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x0, 0x4, 0x0, 0xfffffffffffffff0}, @map_idx_val, @map_fd={0x18, 0x5}, @map_fd], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f00000040c0)) 09:22:54 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) ioctl$VHOST_VDPA_GET_IOVA_RANGE(0xffffffffffffffff, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, 0x0, 0x0) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00'}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', 0x0, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) 09:22:54 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, 0xffffffffffffffff]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00', 0x0}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', r5, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) 09:22:54 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r1]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00', 0x0}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', r5, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, &(0x7f0000004240)={&(0x7f0000004180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000004200)={&(0x7f00000041c0)={0x14, 0x0, 0x200, 0x70bd29, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x4004083) 09:22:54 executing program 5: ioctl$VHOST_SET_VRING_KICK(0xffffffffffffffff, 0x4008af20, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x0, 0x0, 0x0, 0x6}], &(0x7f00000000c0)='GPL\x00', 0x0, 0xec, &(0x7f0000000100)=""/236, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r0]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xc, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x0, 0x0, 0x2, 0x0, 0x0, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd}, @map_fd={0x18, 0x5}, @map_fd, @map_val={0x18, 0x1}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) 09:22:54 executing program 2: r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00'}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x0, 0x0, 0x0, 0x6}], &(0x7f00000000c0)='GPL\x00', 0x0, 0xec, &(0x7f0000000100)=""/236, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r0]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0x8, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x0, 0x3, 0x0, 0x5}, @map_idx_val={0x18, 0xcf17f431a521a788}, @map_fd={0x18, 0x5}, @map_fd], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f00000040c0)) 09:22:54 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, 0xffffffffffffffff]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00', 0x0}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', r5, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) 09:22:54 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) ioctl$VHOST_VDPA_GET_IOVA_RANGE(0xffffffffffffffff, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480), 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00'}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', 0x0, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) 09:22:54 executing program 4: r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00'}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x0, 0x0, 0x0, 0x6}], &(0x7f00000000c0)='GPL\x00', 0x0, 0xec, &(0x7f0000000100)=""/236, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r0]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0x9, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x0, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x0, 0x4, 0x0, 0xfffffffffffffff0}, @map_idx_val, @map_fd={0x18, 0x5}, @map_fd], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f00000040c0)) 09:22:54 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r1]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00', 0x0}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', r5, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, &(0x7f0000004240)={&(0x7f0000004180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000004200)={&(0x7f00000041c0)={0x14, 0x0, 0x200, 0x70bd29, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x4004083) 09:22:54 executing program 5: ioctl$VHOST_SET_VRING_KICK(0xffffffffffffffff, 0x4008af20, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x0, 0x0, 0x0, 0x6}], &(0x7f00000000c0)='GPL\x00', 0x0, 0xec, &(0x7f0000000100)=""/236, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r0]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xc, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x0, 0x0, 0x2, 0x0, 0x0, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd}, @map_fd={0x18, 0x5}, @map_fd, @map_val={0x18, 0x1}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) 09:22:54 executing program 2: r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00'}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x0, 0x0, 0x0, 0x6}], &(0x7f00000000c0)='GPL\x00', 0x0, 0xec, &(0x7f0000000100)=""/236, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r0]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0x8, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x0, 0x3, 0x0, 0x5}, @map_idx_val={0x18, 0xcf17f431a521a788}, @map_fd={0x18, 0x5}, @map_fd], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f00000040c0)) 09:22:54 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, 0xffffffffffffffff]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00', 0x0}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', r5, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) 09:22:54 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, 0xffffffffffffffff]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00', 0x0}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', r5, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) 09:22:54 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) ioctl$VHOST_VDPA_GET_IOVA_RANGE(0xffffffffffffffff, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480), 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00'}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', 0x0, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) 09:22:54 executing program 5: ioctl$VHOST_SET_VRING_KICK(0xffffffffffffffff, 0x4008af20, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x0, 0x0, 0x0, 0x6}], &(0x7f00000000c0)='GPL\x00', 0x0, 0xec, &(0x7f0000000100)=""/236, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r0]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xc, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x0, 0x0, 0x2, 0x0, 0x0, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd}, @map_fd={0x18, 0x5}, @map_fd, @map_val={0x18, 0x1}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) 09:22:54 executing program 2: r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00'}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x0, 0x0, 0x0, 0x6}], &(0x7f00000000c0)='GPL\x00', 0x0, 0xec, &(0x7f0000000100)=""/236, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r0]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0x8, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x0, 0x3, 0x0, 0x5}, @map_idx_val, @map_fd={0x18, 0x5}, @map_fd], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f00000040c0)) 09:22:54 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) ioctl$VHOST_VDPA_GET_IOVA_RANGE(0xffffffffffffffff, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480), 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(0xffffffffffffffff, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00'}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', 0x0, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) 09:22:54 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r1]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00', 0x0}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', r5, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, &(0x7f0000004240)={&(0x7f0000004180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000004200)={&(0x7f00000041c0)={0x14, 0x0, 0x200, 0x70bd29, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x4004083) 09:22:54 executing program 5: ioctl$VHOST_SET_VRING_KICK(0xffffffffffffffff, 0x4008af20, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x0, 0x0, 0x0, 0x6}], &(0x7f00000000c0)='GPL\x00', 0x0, 0xec, &(0x7f0000000100)=""/236, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r0]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xc, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x0, 0x0, 0x2, 0x0, 0x0, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd}, @map_fd={0x18, 0x5}, @map_fd, @map_val={0x18, 0x1}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) 09:22:54 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, 0xffffffffffffffff]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00', 0x0}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', r5, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) 09:22:54 executing program 4: ioctl$VHOST_SET_VRING_KICK(0xffffffffffffffff, 0x4008af20, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x0, 0x0, 0x0, 0x6}], &(0x7f00000000c0)='GPL\x00', 0x0, 0xec, &(0x7f0000000100)=""/236, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r0]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xc, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x0, 0x0, 0x2, 0x0, 0x0, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd}, @map_fd={0x18, 0x5}, @map_fd, @map_val={0x18, 0x1}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) 09:22:54 executing program 2: r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00'}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x0, 0x0, 0x0, 0x6}], &(0x7f00000000c0)='GPL\x00', 0x0, 0xec, &(0x7f0000000100)=""/236, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r0]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0x8, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x0, 0x3, 0x0, 0x5}, @map_idx_val, @map_fd={0x18, 0x5}, @map_fd], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f00000040c0)) 09:22:54 executing program 5: ioctl$VHOST_SET_VRING_KICK(0xffffffffffffffff, 0x4008af20, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x0, 0x0, 0x0, 0x6}], &(0x7f00000000c0)='GPL\x00', 0x0, 0xec, &(0x7f0000000100)=""/236, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r0]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xc, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x0, 0x0, 0x2, 0x0, 0x0, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd}, @map_fd={0x18, 0x5}, @map_fd, @map_val={0x18, 0x1}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) 09:22:55 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r1]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00', 0x0}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', r5, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, &(0x7f0000004240)={&(0x7f0000004180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000004200)={&(0x7f00000041c0)={0x14, 0x0, 0x200, 0x70bd29, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x4004083) 09:22:55 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r1]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00', 0x0}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', r5, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, &(0x7f0000004240)={&(0x7f0000004180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000004200)={&(0x7f00000041c0)={0x14, 0x0, 0x200, 0x70bd29, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x4004083) 09:22:55 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) ioctl$VHOST_VDPA_GET_IOVA_RANGE(0xffffffffffffffff, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480), 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(0xffffffffffffffff, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00'}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', 0x0, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) 09:22:55 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, 0xffffffffffffffff]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r2, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r2}, @map_val={0x18, 0x1, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r3 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r3, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00'}) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) 09:22:55 executing program 5: ioctl$VHOST_SET_VRING_KICK(0xffffffffffffffff, 0x4008af20, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x0, 0x0, 0x0, 0x6}], &(0x7f00000000c0)='GPL\x00', 0x0, 0xec, &(0x7f0000000100)=""/236, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r0]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xc, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x0, 0x0, 0x2, 0x0, 0x0, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd}, @map_fd={0x18, 0x5}, @map_fd, @map_val={0x18, 0x1}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) 09:22:55 executing program 2: r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00'}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x0, 0x0, 0x0, 0x6}], &(0x7f00000000c0)='GPL\x00', 0x0, 0xec, &(0x7f0000000100)=""/236, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r0]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0x8, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x0, 0x3, 0x0, 0x5}, @map_idx_val, @map_fd={0x18, 0x5}, @map_fd], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f00000040c0)) 09:22:55 executing program 5: ioctl$VHOST_SET_VRING_KICK(0xffffffffffffffff, 0x4008af20, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x0, 0x0, 0x0, 0x6}], &(0x7f00000000c0)='GPL\x00', 0x0, 0xec, &(0x7f0000000100)=""/236, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) 09:22:55 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r1]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00', 0x0}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', r5, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, &(0x7f0000004240)={&(0x7f0000004180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000004200)={&(0x7f00000041c0)={0x14, 0x0, 0x200, 0x70bd29, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x4004083) 09:22:55 executing program 4: r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00'}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x0, 0x0, 0x0, 0x6}], &(0x7f00000000c0)='GPL\x00', 0x0, 0xec, &(0x7f0000000100)=""/236, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r0]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0x8, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x0, 0x3, 0x0, 0x5}, @map_idx_val, @map_fd={0x18, 0x5}, @map_fd], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f00000040c0)) 09:22:55 executing program 5: ioctl$VHOST_SET_VRING_KICK(0xffffffffffffffff, 0x4008af20, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) 09:22:55 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, 0xffffffffffffffff]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r2, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r2}, @map_val={0x18, 0x1, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r3 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r3, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00'}) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) 09:22:55 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) ioctl$VHOST_VDPA_GET_IOVA_RANGE(0xffffffffffffffff, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480), 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(0xffffffffffffffff, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00'}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', 0x0, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) 09:22:55 executing program 5: ioctl$VHOST_SET_VRING_KICK(0xffffffffffffffff, 0x4008af20, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) 09:22:55 executing program 2: r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00'}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x0, 0x0, 0x0, 0x6}], &(0x7f00000000c0)='GPL\x00', 0x0, 0xec, &(0x7f0000000100)=""/236, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r0]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0x6, &(0x7f0000000500)=@raw=[@map_idx_val={0x18, 0xcf17f431a521a788}, @map_fd={0x18, 0x5}, @map_fd], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f00000040c0)) 09:22:55 executing program 5: syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) 09:22:55 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) ioctl$VHOST_VDPA_GET_IOVA_RANGE(0xffffffffffffffff, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480), 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(0xffffffffffffffff, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00'}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', 0x0, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) 09:22:55 executing program 5: r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00'}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x0, 0x0, 0x0, 0x6}], &(0x7f00000000c0)='GPL\x00', 0x0, 0xec, &(0x7f0000000100)=""/236, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r0]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0x9, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x0, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x0, 0x4, 0x0, 0xfffffffffffffff0}, @map_idx_val={0x18, 0xcf17f431a521a788}, @map_fd={0x18, 0x5}, @map_fd], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f00000040c0)) 09:22:55 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) ioctl$VHOST_VDPA_GET_IOVA_RANGE(0xffffffffffffffff, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480), 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00'}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', 0x0, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) 09:22:55 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r1]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00', 0x0}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', r5, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, &(0x7f0000004240)={&(0x7f0000004180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000004200)={&(0x7f00000041c0)={0x14, 0x0, 0x200, 0x70bd29, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x4004083) 09:22:55 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, 0xffffffffffffffff]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r2, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r2}, @map_val={0x18, 0x1, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r3 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r3, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00'}) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) 09:22:55 executing program 2: r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00'}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x0, 0x0, 0x0, 0x6}], &(0x7f00000000c0)='GPL\x00', 0x0, 0xec, &(0x7f0000000100)=""/236, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r0]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0x6, &(0x7f0000000500)=@raw=[@map_idx_val={0x18, 0xcf17f431a521a788}, @map_fd={0x18, 0x5}, @map_fd], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f00000040c0)) 09:22:55 executing program 4: r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00'}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x0, 0x0, 0x0, 0x6}], &(0x7f00000000c0)='GPL\x00', 0x0, 0xec, &(0x7f0000000100)=""/236, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r0]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0x9, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x0, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x0, 0x4, 0x0, 0xfffffffffffffff0}, @map_idx_val={0x18, 0xcf17f431a521a788}, @map_fd={0x18, 0x5}, @map_fd], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f00000040c0)) 09:22:55 executing program 5: ioctl$VHOST_SET_VRING_KICK(0xffffffffffffffff, 0x4008af20, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={0x0, 0x0, 0x8}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x0, &(0x7f0000000080), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x0, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9}, @map_val], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) r1 = socket$inet_mptcp(0x2, 0x1, 0x106) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f00000040c0)) sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, &(0x7f0000004240)={&(0x7f0000004180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000004200)={&(0x7f00000041c0)={0x14, 0x0, 0x200, 0x70bd29, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x4004083) 09:22:55 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, 0xffffffffffffffff]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r2, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r2}, @map_val={0x18, 0x1, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r3 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r3, 0x0, &(0x7f0000000780)) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) 09:22:55 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) ioctl$VHOST_VDPA_GET_IOVA_RANGE(0xffffffffffffffff, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480), 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00'}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', 0x0, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) 09:22:55 executing program 2: r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00'}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x0, 0x0, 0x0, 0x6}], &(0x7f00000000c0)='GPL\x00', 0x0, 0xec, &(0x7f0000000100)=""/236, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r0]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0x6, &(0x7f0000000500)=@raw=[@map_idx_val={0x18, 0xcf17f431a521a788}, @map_fd={0x18, 0x5}, @map_fd], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f00000040c0)) 09:22:55 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) ioctl$VHOST_VDPA_GET_IOVA_RANGE(0xffffffffffffffff, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480), 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00'}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', 0x0, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) 09:22:55 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00', 0x0}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', r5, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) 09:22:55 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r1]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00', 0x0}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', r5, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, &(0x7f0000004240)={&(0x7f0000004180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000004200)={&(0x7f00000041c0)={0x14, 0x0, 0x200, 0x70bd29, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x4004083) 09:22:56 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, 0xffffffffffffffff]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r2, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r2}, @map_val={0x18, 0x1, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r3 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r3, 0x0, &(0x7f0000000780)) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) 09:22:56 executing program 2: r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00'}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x0, 0x0, 0x0, 0x6}], &(0x7f00000000c0)='GPL\x00', 0x0, 0xec, &(0x7f0000000100)=""/236, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r0]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0x8, &(0x7f0000000500)=@raw=[@btf_id, @map_idx_val={0x18, 0xcf17f431a521a788}, @map_fd={0x18, 0x5}, @map_fd], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f00000040c0)) 09:22:56 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) ioctl$VHOST_VDPA_GET_IOVA_RANGE(0xffffffffffffffff, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480), 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00'}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', 0x0, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) 09:22:56 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) ioctl$VHOST_VDPA_GET_IOVA_RANGE(0xffffffffffffffff, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480), 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00'}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', 0x0, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) 09:22:56 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00', 0x0}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', r5, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, &(0x7f0000004240)={&(0x7f0000004180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000004200)={&(0x7f00000041c0)={0x14, 0x0, 0x200, 0x70bd29, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x4004083) 09:22:56 executing program 2: r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00'}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x0, 0x0, 0x0, 0x6}], &(0x7f00000000c0)='GPL\x00', 0x0, 0xec, &(0x7f0000000100)=""/236, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r0]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0x8, &(0x7f0000000500)=@raw=[@btf_id, @map_idx_val={0x18, 0xcf17f431a521a788}, @map_fd={0x18, 0x5}, @map_fd], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f00000040c0)) 09:22:56 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r1]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00', 0x0}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', r5, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, &(0x7f0000004240)={&(0x7f0000004180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000004200)={&(0x7f00000041c0)={0x14, 0x0, 0x200, 0x70bd29, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x4004083) 09:22:56 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, 0xffffffffffffffff]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r2, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r2}, @map_val={0x18, 0x1, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r3 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r3, 0x0, &(0x7f0000000780)) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) 09:22:56 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r1 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) ioctl$VHOST_VDPA_GET_IOVA_RANGE(0xffffffffffffffff, 0x8010af78, &(0x7f00000003c0)) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480), 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r2, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00'}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', 0x0, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r1}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) 09:22:56 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r1]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(0xffffffffffffffff, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00', 0x0}) r6 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000001880)='/sys/fs/f2fs', 0x280000, 0x82) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', r5, 0x38, r6, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) 09:22:56 executing program 4: openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp, @ldst, @map_idx_val, @map_fd={0x18, 0x5, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd, @map_val], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) socket$inet_mptcp(0x2, 0x1, 0x106) 09:22:56 executing program 2: r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00'}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x0, 0x0, 0x0, 0x6}], &(0x7f00000000c0)='GPL\x00', 0x0, 0xec, &(0x7f0000000100)=""/236, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r0]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0x8, &(0x7f0000000500)=@raw=[@btf_id, @map_idx_val={0x18, 0xcf17f431a521a788}, @map_fd={0x18, 0x5}, @map_fd], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f00000040c0)) 09:22:56 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, 0xffffffffffffffff]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r2, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r2}, @map_val={0x18, 0x1, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$IOCTL_GET_NCIDEV_IDX(0xffffffffffffffff, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00'}) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) 09:22:56 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r1]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00', 0x0}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', r5, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, &(0x7f0000004240)={&(0x7f0000004180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000004200)={&(0x7f00000041c0)={0x14, 0x0, 0x200, 0x70bd29, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x4004083) 09:22:56 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r1 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) ioctl$VHOST_VDPA_GET_IOVA_RANGE(0xffffffffffffffff, 0x8010af78, &(0x7f00000003c0)) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480), 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r2, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00'}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', 0x0, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r1}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) 09:22:56 executing program 5: ioctl$VHOST_SET_VRING_KICK(0xffffffffffffffff, 0x4008af20, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={0x0, 0x0, 0x8}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x0, &(0x7f0000000080), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x0, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9}, @map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) r1 = socket$inet_mptcp(0x2, 0x1, 0x106) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f00000040c0)) sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, &(0x7f0000004240)={&(0x7f0000004180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000004200)={&(0x7f00000041c0)={0x14, 0x0, 0x200, 0x70bd29, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x4004083) 09:22:56 executing program 2: r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00'}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x0, 0x0, 0x0, 0x6}], &(0x7f00000000c0)='GPL\x00', 0x0, 0xec, &(0x7f0000000100)=""/236, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r0]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0x8, &(0x7f0000000500)=@raw=[@btf_id, @map_idx_val={0x18, 0xcf17f431a521a788}, @map_fd={0x18, 0x5}, @map_fd], 0x0, 0x9, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f00000040c0)) 09:22:56 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, 0xffffffffffffffff]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r2, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r2}, @map_val={0x18, 0x1, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$IOCTL_GET_NCIDEV_IDX(0xffffffffffffffff, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00'}) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) 09:22:56 executing program 5: ioctl$VHOST_SET_VRING_KICK(0xffffffffffffffff, 0x4008af20, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x0, 0x0, 0x0, 0x6}], &(0x7f00000000c0)='GPL\x00', 0x0, 0xec, &(0x7f0000000100)=""/236, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r0]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xc, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x0, 0x0, 0x0, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd}, @map_fd={0x18, 0x5}, @map_fd, @map_val={0x18, 0x1}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) r1 = socket$inet_mptcp(0x2, 0x1, 0x106) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f00000040c0)) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NET_DM_CMD_STOP(r2, &(0x7f0000004240)={&(0x7f0000004180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000004200)={&(0x7f00000041c0)={0x14, 0x0, 0x200, 0x70bd29, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x4004083) 09:22:56 executing program 4: ioctl$VHOST_SET_VRING_KICK(0xffffffffffffffff, 0x4008af20, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={0x0, 0x0, 0x8}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x0, &(0x7f0000000080), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x0, 0xc, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) r1 = socket$inet_mptcp(0x2, 0x1, 0x106) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f00000040c0)) sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, &(0x7f0000004240)={&(0x7f0000004180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000004200)={&(0x7f00000041c0)={0x14, 0x0, 0x200, 0x70bd29, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x4004083) 09:22:56 executing program 2: r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00'}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x0, 0x0, 0x0, 0x6}], &(0x7f00000000c0)='GPL\x00', 0x0, 0xec, &(0x7f0000000100)=""/236, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r0]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0x8, &(0x7f0000000500)=@raw=[@btf_id, @map_idx_val={0x18, 0xcf17f431a521a788}, @map_fd={0x18, 0x5}, @map_fd], 0x0, 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f00000040c0)) 09:22:56 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r1 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) ioctl$VHOST_VDPA_GET_IOVA_RANGE(0xffffffffffffffff, 0x8010af78, &(0x7f00000003c0)) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480), 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = openat$nci(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r2, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00'}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', 0x0, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r1}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) 09:22:56 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r1]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00', 0x0}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', r5, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, &(0x7f0000004240)={&(0x7f0000004180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000004200)={&(0x7f00000041c0)={0x14, 0x0, 0x200, 0x70bd29, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x4004083) 09:22:56 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r1]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00', 0x0}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', r5, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, &(0x7f0000004240)={&(0x7f0000004180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000004200)={&(0x7f00000041c0)={0x14, 0x0, 0x200, 0x70bd29, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x4004083) 09:22:56 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, 0xffffffffffffffff]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r2, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r2}, @map_val={0x18, 0x1, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$IOCTL_GET_NCIDEV_IDX(0xffffffffffffffff, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00'}) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) 09:22:57 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00', 0x0}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', r5, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, &(0x7f0000004240)={&(0x7f0000004180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000004200)={&(0x7f00000041c0)={0x14, 0x0, 0x200, 0x70bd29, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x4004083) 09:22:57 executing program 2: r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00'}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x0, 0x0, 0x0, 0x6}], &(0x7f00000000c0)='GPL\x00', 0x0, 0xec, &(0x7f0000000100)=""/236, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r0]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0x8, &(0x7f0000000500)=@raw=[@btf_id, @map_idx_val={0x18, 0xcf17f431a521a788}, @map_fd={0x18, 0x5}, @map_fd], 0x0, 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f00000040c0)) 09:22:57 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r1 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) ioctl$VHOST_VDPA_GET_IOVA_RANGE(0xffffffffffffffff, 0x8010af78, &(0x7f00000003c0)) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480), 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = openat$nci(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r2, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00'}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', 0x0, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r1}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) 09:22:57 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, 0xffffffffffffffff]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r2, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r2}, @map_val={0x18, 0x1, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) r3 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r3, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00'}) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) 09:22:57 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r1]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00', 0x0}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', r5, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, &(0x7f0000004240)={&(0x7f0000004180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000004200)={&(0x7f00000041c0)={0x14, 0x0, 0x200, 0x70bd29, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x4004083) 09:22:57 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, 0xffffffffffffffff]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r2, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r2}, @map_val={0x18, 0x1, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$IOCTL_GET_NCIDEV_IDX(0xffffffffffffffff, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00'}) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) 09:22:57 executing program 2: r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00'}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x0, 0x0, 0x0, 0x6}], &(0x7f00000000c0)='GPL\x00', 0x0, 0xec, &(0x7f0000000100)=""/236, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r0]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0x8, &(0x7f0000000500)=@raw=[@btf_id, @map_idx_val={0x18, 0xcf17f431a521a788}, @map_fd={0x18, 0x5}, @map_fd], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f00000040c0)) 09:22:57 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00', 0x0}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', r5, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, &(0x7f0000004240)={&(0x7f0000004180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000004200)={&(0x7f00000041c0)={0x14, 0x0, 0x200, 0x70bd29, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x4004083) 09:22:57 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r1 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) ioctl$VHOST_VDPA_GET_IOVA_RANGE(0xffffffffffffffff, 0x8010af78, &(0x7f00000003c0)) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480), 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = openat$nci(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r2, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00'}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', 0x0, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r1}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) 09:22:57 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r1]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00', 0x0}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', r5, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, &(0x7f0000004240)={&(0x7f0000004180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000004200)={&(0x7f00000041c0)={0x14, 0x0, 0x200, 0x70bd29, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x4004083) 09:22:57 executing program 4: openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff0}, @ldst, @map_idx_val, @map_fd={0x18, 0x5, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd, @map_val], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) socket$inet_mptcp(0x2, 0x1, 0x106) 09:22:57 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r1 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) ioctl$VHOST_VDPA_GET_IOVA_RANGE(0xffffffffffffffff, 0x8010af78, &(0x7f00000003c0)) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480), 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(0xffffffffffffffff, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00'}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', 0x0, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r1}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) 09:22:57 executing program 2: r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00'}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x0, 0x0, 0x0, 0x6}], &(0x7f00000000c0)='GPL\x00', 0x0, 0xec, &(0x7f0000000100)=""/236, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r0]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0x8, &(0x7f0000000500)=@raw=[@btf_id, @map_idx_val={0x18, 0xcf17f431a521a788}, @map_fd={0x18, 0x5}, @map_fd], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f00000040c0)) 09:22:57 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, 0xffffffffffffffff]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r2, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r2}, @map_val={0x18, 0x1, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) r3 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r3, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00'}) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) 09:22:57 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[r1]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00', 0x0}) r6 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000001880)='/sys/fs/f2fs', 0x280000, 0x82) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', r5, 0x38, r6, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) 09:22:57 executing program 4: openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff0}, @ldst, @map_idx_val, @map_fd={0x18, 0x5, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd, @map_val], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) socket$inet_mptcp(0x2, 0x1, 0x106) 09:22:57 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r1 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) ioctl$VHOST_VDPA_GET_IOVA_RANGE(0xffffffffffffffff, 0x8010af78, &(0x7f00000003c0)) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480), 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(0xffffffffffffffff, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00'}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', 0x0, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r1}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) 09:22:57 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r1]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00', 0x0}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', r5, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, &(0x7f0000004240)={&(0x7f0000004180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000004200)={&(0x7f00000041c0)={0x14, 0x0, 0x200, 0x70bd29, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x4004083) 09:22:57 executing program 2: r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00'}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x0, 0x0, 0x0, 0x6}], &(0x7f00000000c0)='GPL\x00', 0x0, 0xec, &(0x7f0000000100)=""/236, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r0]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0x8, &(0x7f0000000500)=@raw=[@btf_id, @map_idx_val={0x18, 0xcf17f431a521a788}, @map_fd={0x18, 0x5}, @map_fd], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f00000040c0)) 09:22:57 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, 0xffffffffffffffff]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r2, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r2}, @map_val={0x18, 0x1, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) r3 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r3, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00'}) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) 09:22:57 executing program 5: r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00'}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x0, 0x0, 0x0, 0x6}], &(0x7f00000000c0)='GPL\x00', 0x0, 0xec, &(0x7f0000000100)=""/236, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r0]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0x8, &(0x7f0000000500)=@raw=[@btf_id, @map_idx_val={0x18, 0xcf17f431a521a788}, @map_fd={0x18, 0x5}, @map_fd], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f00000040c0)) 09:22:57 executing program 2: r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00'}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x0, 0x0, 0x0, 0x6}], &(0x7f00000000c0)='GPL\x00', 0x0, 0xec, &(0x7f0000000100)=""/236, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r0]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0x8, &(0x7f0000000500)=@raw=[@btf_id, @map_idx_val={0x18, 0xcf17f431a521a788}, @map_fd={0x18, 0x5}, @map_fd], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f00000040c0)) 09:22:57 executing program 4: ioctl$VHOST_SET_VRING_KICK(0xffffffffffffffff, 0x4008af20, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={0x0, 0x0, 0x8}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x0, &(0x7f0000000080), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x0, 0x0, 0x0, &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) r1 = socket$inet_mptcp(0x2, 0x1, 0x106) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f00000040c0)) sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, &(0x7f0000004240)={&(0x7f0000004180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000004200)={&(0x7f00000041c0)={0x14, 0x0, 0x200, 0x70bd29, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x4004083) 09:22:57 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r1]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00', 0x0}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', r5, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, &(0x7f0000004240)={&(0x7f0000004180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000004200)={&(0x7f00000041c0)={0x14, 0x0, 0x200, 0x70bd29, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x4004083) 09:22:57 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r1 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) ioctl$VHOST_VDPA_GET_IOVA_RANGE(0xffffffffffffffff, 0x8010af78, &(0x7f00000003c0)) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480), 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(0xffffffffffffffff, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00'}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', 0x0, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r1}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) 09:22:57 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, 0xffffffffffffffff]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r1, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r2, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00'}) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) 09:22:57 executing program 5: ioctl$VHOST_SET_VRING_KICK(0xffffffffffffffff, 0x4008af20, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x0, 0x0, 0x0, 0x6}], &(0x7f00000000c0)='GPL\x00', 0x0, 0xec, &(0x7f0000000100)=""/236, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r0]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xc, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x0, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd}, @map_fd={0x18, 0x5}, @map_fd, @map_val={0x18, 0x1}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) r1 = socket$inet_mptcp(0x2, 0x1, 0x106) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f00000040c0)) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NET_DM_CMD_STOP(r2, &(0x7f0000004240)={&(0x7f0000004180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000004200)={&(0x7f00000041c0)={0x14, 0x0, 0x200, 0x70bd29, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x4004083) 09:22:58 executing program 4: ioctl$VHOST_SET_VRING_KICK(0xffffffffffffffff, 0x4008af20, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={0x0, 0x0, 0x8}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x0, &(0x7f0000000080), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x0, 0x0, 0x0, &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) r1 = socket$inet_mptcp(0x2, 0x1, 0x106) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f00000040c0)) sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, &(0x7f0000004240)={&(0x7f0000004180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000004200)={&(0x7f00000041c0)={0x14, 0x0, 0x200, 0x70bd29, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x4004083) 09:22:58 executing program 2: r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00'}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x0, 0x0, 0x0, 0x6}], &(0x7f00000000c0)='GPL\x00', 0x0, 0xec, &(0x7f0000000100)=""/236, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r0]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0x8, &(0x7f0000000500)=@raw=[@btf_id, @map_idx_val={0x18, 0xcf17f431a521a788}, @map_fd={0x18, 0x5}, @map_fd], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f00000040c0)) 09:22:58 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r1 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) ioctl$VHOST_VDPA_GET_IOVA_RANGE(0xffffffffffffffff, 0x8010af78, &(0x7f00000003c0)) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480), 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00'}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', 0x0, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r1}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) 09:22:58 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r1]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00', 0x0}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', r5, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, &(0x7f0000004240)={&(0x7f0000004180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000004200)={&(0x7f00000041c0)={0x14, 0x0, 0x200, 0x70bd29, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x4004083) 09:22:58 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r1 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) ioctl$VHOST_VDPA_GET_IOVA_RANGE(0xffffffffffffffff, 0x8010af78, &(0x7f00000003c0)) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480), 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(0xffffffffffffffff, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00'}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', 0x0, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r1}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) 09:22:58 executing program 5: r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00'}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x0, 0x0, 0x0, 0x6}], &(0x7f00000000c0)='GPL\x00', 0x0, 0xec, &(0x7f0000000100)=""/236, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r0]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0x8, &(0x7f0000000500)=@raw=[@btf_id, @map_idx_val={0x18, 0xcf17f431a521a788}, @map_fd={0x18, 0x5}, @map_fd], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f00000040c0)) 09:22:58 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, 0xffffffffffffffff]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r1, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r2, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00'}) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) 09:22:58 executing program 2: r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00'}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x0, 0x0, 0x0, 0x6}], &(0x7f00000000c0)='GPL\x00', 0x0, 0xec, &(0x7f0000000100)=""/236, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r0]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0x8, &(0x7f0000000500)=@raw=[@btf_id, @map_idx_val={0x18, 0xcf17f431a521a788}, @map_fd={0x18, 0x5}, @map_fd], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f00000040c0)) 09:22:58 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r1 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) ioctl$VHOST_VDPA_GET_IOVA_RANGE(0xffffffffffffffff, 0x8010af78, &(0x7f00000003c0)) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480), 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00'}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', 0x0, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r1}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) 09:22:58 executing program 5: ioctl$VHOST_SET_VRING_KICK(0xffffffffffffffff, 0x4008af20, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x0, 0x0, 0x0, 0x6}], &(0x7f00000000c0)='GPL\x00', 0x0, 0xec, &(0x7f0000000100)=""/236, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r0]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xc, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x0, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd}, @map_fd={0x18, 0x5}, @map_fd, @map_val={0x18, 0x1}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) r1 = socket$inet_mptcp(0x2, 0x1, 0x106) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f00000040c0)) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NET_DM_CMD_STOP(r2, &(0x7f0000004240)={&(0x7f0000004180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000004200)={&(0x7f00000041c0)={0x14, 0x0, 0x200, 0x70bd29, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x4004083) 09:22:58 executing program 4: openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x0, 0x0, 0x0, 0x1, 0xfffffffffffffff0}, @ldst, @map_idx_val, @map_fd={0x18, 0x5, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd, @map_val], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) socket$inet_mptcp(0x2, 0x1, 0x106) 09:22:58 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r1]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00', 0x0}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', r5, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, &(0x7f0000004240)={&(0x7f0000004180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000004200)={&(0x7f00000041c0)={0x14, 0x0, 0x200, 0x70bd29, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x4004083) 09:22:58 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, 0xffffffffffffffff]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r1, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r2, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00'}) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) 09:22:58 executing program 2: r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00'}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x0, 0x0, 0x0, 0x6}], &(0x7f00000000c0)='GPL\x00', 0x0, 0xec, &(0x7f0000000100)=""/236, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r0]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0x8, &(0x7f0000000500)=@raw=[@btf_id, @map_idx_val={0x18, 0xcf17f431a521a788}, @map_fd={0x18, 0x5}, @map_fd], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f00000040c0)) 09:22:58 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[r1]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00', 0x0}) r6 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000001880)='/sys/fs/f2fs', 0x280000, 0x82) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', r5, 0x38, r6, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) 09:22:58 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r1 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) ioctl$VHOST_VDPA_GET_IOVA_RANGE(0xffffffffffffffff, 0x8010af78, &(0x7f00000003c0)) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480), 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', 0x0, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r1}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) 09:22:58 executing program 2: r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00'}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x0, 0x0, 0x0, 0x6}], &(0x7f00000000c0)='GPL\x00', 0x0, 0xec, &(0x7f0000000100)=""/236, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r0]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0x8, &(0x7f0000000500)=@raw=[@btf_id, @map_idx_val={0x18, 0xcf17f431a521a788}, @map_fd={0x18, 0x5}, @map_fd], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f00000040c0)) 09:22:58 executing program 4: openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x0, 0x0, 0x0, 0x1, 0xfffffffffffffff0}, @ldst, @map_idx_val, @map_fd={0x18, 0x5, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd, @map_val], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) socket$inet_mptcp(0x2, 0x1, 0x106) 09:22:58 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, 0xffffffffffffffff]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r2, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r2}, @map_val={0x18, 0x1, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r3 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r3, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00'}) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) 09:22:58 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r1]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00', 0x0}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', r5, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, &(0x7f0000004240)={&(0x7f0000004180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000004200)={&(0x7f00000041c0)={0x14, 0x0, 0x200, 0x70bd29, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x4004083) 09:22:58 executing program 2: r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00'}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x0, 0x0, 0x0, 0x6}], &(0x7f00000000c0)='GPL\x00', 0x0, 0xec, &(0x7f0000000100)=""/236, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r0]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0x8, &(0x7f0000000500)=@raw=[@btf_id, @map_idx_val={0x18, 0xcf17f431a521a788}, @map_fd={0x18, 0x5}, @map_fd], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f00000040c0)) 09:22:58 executing program 5: ioctl$VHOST_SET_VRING_KICK(0xffffffffffffffff, 0x4008af20, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={0x0, 0x0, 0x8}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x0, &(0x7f0000000080), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x0, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) r1 = socket$inet_mptcp(0x2, 0x1, 0x106) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f00000040c0)) sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, &(0x7f0000004240)={&(0x7f0000004180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000004200)={&(0x7f00000041c0)={0x14, 0x0, 0x200, 0x70bd29, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x4004083) 09:22:58 executing program 2: r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00'}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x0, 0x0, 0x0, 0x6}], &(0x7f00000000c0)='GPL\x00', 0x0, 0xec, &(0x7f0000000100)=""/236, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r0]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0x8, &(0x7f0000000500)=@raw=[@btf_id, @map_idx_val={0x18, 0xcf17f431a521a788}, @map_fd={0x18, 0x5}, @map_fd], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, 0x0) 09:22:58 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) ioctl$VHOST_VDPA_GET_IOVA_RANGE(0xffffffffffffffff, 0x8010af78, &(0x7f00000003c0)) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480), 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) 09:22:58 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, 0xffffffffffffffff]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r2, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r2}, @map_val={0x18, 0x1, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r3 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r3, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00'}) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) 09:22:58 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r1]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00', 0x0}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', r5, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, &(0x7f0000004240)={&(0x7f0000004180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000004200)={&(0x7f00000041c0)={0x14, 0x0, 0x200, 0x70bd29, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x14}}, 0x4004083) 09:22:58 executing program 5: ioctl$VHOST_SET_VRING_KICK(0xffffffffffffffff, 0x4008af20, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={0x0, 0x0, 0x8}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x0, &(0x7f0000000080), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x0, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) r1 = socket$inet_mptcp(0x2, 0x1, 0x106) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f00000040c0)) sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, &(0x7f0000004240)={&(0x7f0000004180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000004200)={&(0x7f00000041c0)={0x14, 0x0, 0x200, 0x70bd29, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x4004083) 09:22:58 executing program 4: ioctl$VHOST_SET_VRING_KICK(0xffffffffffffffff, 0x4008af20, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={0x0, 0x0, 0x8}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x0, &(0x7f0000000080), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) r1 = socket$inet_mptcp(0x2, 0x1, 0x106) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f00000040c0)) sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, &(0x7f0000004240)={&(0x7f0000004180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000004200)={&(0x7f00000041c0)={0x14, 0x0, 0x200, 0x70bd29, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x4004083) 09:22:59 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, 0xffffffffffffffff]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r2}, @map_val={0x18, 0x1, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r3 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r3, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00'}) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) 09:22:59 executing program 2: r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00'}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x0, 0x0, 0x0, 0x6}], &(0x7f00000000c0)='GPL\x00', 0x0, 0xec, &(0x7f0000000100)=""/236, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r0]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0x8, &(0x7f0000000500)=@raw=[@btf_id, @map_idx_val={0x18, 0xcf17f431a521a788}, @map_fd={0x18, 0x5}, @map_fd], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, 0x0) 09:22:59 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, 0xffffffffffffffff]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r2, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r2}, @map_val={0x18, 0x1, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r3 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r3, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00'}) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) 09:22:59 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) ioctl$VHOST_VDPA_GET_IOVA_RANGE(0xffffffffffffffff, 0x8010af78, &(0x7f00000003c0)) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480), 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) 09:22:59 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) ioctl$VHOST_VDPA_GET_IOVA_RANGE(0xffffffffffffffff, 0x8010af78, &(0x7f00000003c0)) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480), 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) 09:22:59 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r1]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00', 0x0}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', r5, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, &(0x7f0000004240)={&(0x7f0000004180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000004200)={&(0x7f00000041c0)={0x14, 0x0, 0x200, 0x70bd29, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x14}}, 0x4004083) 09:22:59 executing program 2: r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00'}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x0, 0x0, 0x0, 0x6}], &(0x7f00000000c0)='GPL\x00', 0x0, 0xec, &(0x7f0000000100)=""/236, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r0]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0x8, &(0x7f0000000500)=@raw=[@btf_id, @map_idx_val={0x18, 0xcf17f431a521a788}, @map_fd={0x18, 0x5}, @map_fd], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, 0x0) 09:22:59 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, 0xffffffffffffffff]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r2}, @map_val={0x18, 0x1, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r3 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r3, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00'}) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) 09:22:59 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) ioctl$VHOST_VDPA_GET_IOVA_RANGE(0xffffffffffffffff, 0x8010af78, &(0x7f00000003c0)) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480), 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) 09:22:59 executing program 4: ioctl$VHOST_SET_VRING_KICK(0xffffffffffffffff, 0x4008af20, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x0, 0x0, 0x0, 0x6}], &(0x7f00000000c0)='GPL\x00', 0x0, 0xec, &(0x7f0000000100)=""/236, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r0]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xc, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5}, @map_fd, @map_val={0x18, 0x1}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) r1 = socket$inet_mptcp(0x2, 0x1, 0x106) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f00000040c0)) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NET_DM_CMD_STOP(r2, &(0x7f0000004240)={&(0x7f0000004180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000004200)={&(0x7f00000041c0)={0x14, 0x0, 0x200, 0x70bd29, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x4004083) 09:22:59 executing program 5: ioctl$VHOST_SET_VRING_KICK(0xffffffffffffffff, 0x4008af20, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x0, 0x0, 0x0, 0x6}], &(0x7f00000000c0)='GPL\x00', 0x0, 0xec, &(0x7f0000000100)=""/236, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r0]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xc, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5}, @map_fd, @map_val={0x18, 0x1}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) r1 = socket$inet_mptcp(0x2, 0x1, 0x106) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f00000040c0)) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NET_DM_CMD_STOP(r2, &(0x7f0000004240)={&(0x7f0000004180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000004200)={&(0x7f00000041c0)={0x14, 0x0, 0x200, 0x70bd29, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x4004083) 09:22:59 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r1]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00', 0x0}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', r5, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, &(0x7f0000004240)={&(0x7f0000004180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000004200)={&(0x7f00000041c0)={0x14, 0x0, 0x200, 0x70bd29, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x14}}, 0x4004083) 09:22:59 executing program 2: r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00'}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x0, 0x0, 0x0, 0x6}], &(0x7f00000000c0)='GPL\x00', 0x0, 0xec, &(0x7f0000000100)=""/236, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r0]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0x8, &(0x7f0000000500)=@raw=[@btf_id, @map_idx_val={0x18, 0xcf17f431a521a788}, @map_fd={0x18, 0x5}, @map_fd], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, 0x0) 09:22:59 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r1 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) ioctl$VHOST_VDPA_GET_IOVA_RANGE(0xffffffffffffffff, 0x8010af78, &(0x7f00000003c0)) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480), 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x0, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', 0x0, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r1}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) 09:22:59 executing program 4: ioctl$VHOST_SET_VRING_KICK(0xffffffffffffffff, 0x4008af20, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x0, 0x0, 0x0, 0x6}], &(0x7f00000000c0)='GPL\x00', 0x0, 0xec, &(0x7f0000000100)=""/236, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r0]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xc, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5}, @map_fd, @map_val={0x18, 0x1}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) r1 = socket$inet_mptcp(0x2, 0x1, 0x106) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f00000040c0)) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NET_DM_CMD_STOP(r2, &(0x7f0000004240)={&(0x7f0000004180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000004200)={&(0x7f00000041c0)={0x14, 0x0, 0x200, 0x70bd29, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x4004083) 09:22:59 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, 0xffffffffffffffff]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r2, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00'}) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) 09:22:59 executing program 5: r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00'}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x0, 0x0, 0x0, 0x6}], &(0x7f00000000c0)='GPL\x00', 0x0, 0xec, &(0x7f0000000100)=""/236, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r0]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0x8, &(0x7f0000000500)=@raw=[@btf_id, @map_idx_val={0x18, 0xcf17f431a521a788}, @map_fd={0x18, 0x5}, @map_fd], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, 0x0) 09:22:59 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r1]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00', 0x0}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', r5, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, &(0x7f0000004240)={&(0x7f0000004180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000004200)={&(0x7f00000041c0)={0x14, 0x0, 0x200, 0x70bd29, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x0) 09:22:59 executing program 2: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r1]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00', 0x0}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', r5, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, &(0x7f0000004240)={&(0x7f0000004180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000004200)={&(0x7f00000041c0)={0x14, 0x0, 0x200, 0x70bd29, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x14}}, 0x4004083) 09:22:59 executing program 5: ioctl$VHOST_SET_VRING_KICK(0xffffffffffffffff, 0x4008af20, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x0, 0x0, 0x0, 0x6}], &(0x7f00000000c0)='GPL\x00', 0x0, 0xec, &(0x7f0000000100)=""/236, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r0]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xa, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_fd={0x18, 0x5}, @map_fd, @map_val={0x18, 0x1}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) socket$inet_mptcp(0x2, 0x1, 0x106) 09:22:59 executing program 4: ioctl$VHOST_SET_VRING_KICK(0xffffffffffffffff, 0x4008af20, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x0, 0x0, 0x0, 0x6}], &(0x7f00000000c0)='GPL\x00', 0x0, 0xec, &(0x7f0000000100)=""/236, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r0]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xa, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_fd={0x18, 0x5}, @map_fd, @map_val={0x18, 0x1}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) socket$inet_mptcp(0x2, 0x1, 0x106) 09:22:59 executing program 5: ioctl$VHOST_SET_VRING_KICK(0xffffffffffffffff, 0x4008af20, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={0x0, 0x0, 0x8}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x0, &(0x7f0000000080), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) r1 = socket$inet_mptcp(0x2, 0x1, 0x106) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f00000040c0)) sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, &(0x7f0000004240)={&(0x7f0000004180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000004200)={&(0x7f00000041c0)={0x14, 0x0, 0x200, 0x70bd29, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x4004083) 09:22:59 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r1 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) ioctl$VHOST_VDPA_GET_IOVA_RANGE(0xffffffffffffffff, 0x8010af78, &(0x7f00000003c0)) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480), 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x0, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', 0x0, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r1}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) 09:22:59 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, 0xffffffffffffffff]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r2, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00'}) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) 09:23:00 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r1]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00', 0x0}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', r5, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, &(0x7f0000004240)={&(0x7f0000004180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000004200)={&(0x7f00000041c0)={0x14, 0x0, 0x200, 0x70bd29, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x0) 09:23:00 executing program 5: ioctl$VHOST_SET_VRING_KICK(0xffffffffffffffff, 0x4008af20, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x0, 0x0, 0x0, 0x6}], &(0x7f00000000c0)='GPL\x00', 0x0, 0xec, &(0x7f0000000100)=""/236, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r0]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xc, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5}, @map_fd, @map_val={0x18, 0x1}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) r1 = socket$inet_mptcp(0x2, 0x1, 0x106) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f00000040c0)) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NET_DM_CMD_STOP(r2, &(0x7f0000004240)={&(0x7f0000004180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000004200)={&(0x7f00000041c0)={0x14, 0x0, 0x200, 0x70bd29, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x4004083) 09:23:00 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00', 0x0}) r6 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000001880)='/sys/fs/f2fs', 0x280000, 0x82) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', r5, 0x38, r6, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) 09:23:00 executing program 2: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00', 0x0}) r6 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000001880)='/sys/fs/f2fs', 0x280000, 0x82) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', r5, 0x38, r6, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) 09:23:00 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r1 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) ioctl$VHOST_VDPA_GET_IOVA_RANGE(0xffffffffffffffff, 0x8010af78, &(0x7f00000003c0)) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480), 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x0, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', 0x0, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r1}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) 09:23:00 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, 0xffffffffffffffff]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r2, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00'}) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) 09:23:00 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r1]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00', 0x0}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', r5, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, &(0x7f0000004240)={&(0x7f0000004180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000004200)={&(0x7f00000041c0)={0x14, 0x0, 0x200, 0x70bd29, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x0) 09:23:00 executing program 5: ioctl$VHOST_SET_VRING_KICK(0xffffffffffffffff, 0x4008af20, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x0, 0x0, 0x0, 0x6}], &(0x7f00000000c0)='GPL\x00', 0x0, 0xec, &(0x7f0000000100)=""/236, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r0]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xa, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_fd={0x18, 0x5}, @map_fd, @map_val={0x18, 0x1}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) socket$inet_mptcp(0x2, 0x1, 0x106) 09:23:00 executing program 4: ioctl$VHOST_SET_VRING_KICK(0xffffffffffffffff, 0x4008af20, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x0, 0x0, 0x0, 0x6}], &(0x7f00000000c0)='GPL\x00', 0x0, 0xec, &(0x7f0000000100)=""/236, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r0]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xc, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5}, @map_fd, @map_val={0x18, 0x1}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) r1 = socket$inet_mptcp(0x2, 0x1, 0x106) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f00000040c0)) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NET_DM_CMD_STOP(r2, &(0x7f0000004240)={&(0x7f0000004180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000004200)={&(0x7f00000041c0)={0x14, 0x0, 0x200, 0x70bd29, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x4004083) 09:23:00 executing program 2: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x0, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r1]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00', 0x0}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', r5, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, &(0x7f0000004240)={&(0x7f0000004180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000004200)={&(0x7f00000041c0)={0x14, 0x0, 0x200, 0x70bd29, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x4004083) 09:23:00 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r1 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) ioctl$VHOST_VDPA_GET_IOVA_RANGE(0xffffffffffffffff, 0x8010af78, &(0x7f00000003c0)) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480), 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x0, 0x0, &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', 0x0, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r1}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) 09:23:00 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, 0xffffffffffffffff]}, 0x80) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r2}, @map_val={0x18, 0x1, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r3 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r3, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00'}) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) 09:23:00 executing program 5: ioctl$VHOST_SET_VRING_KICK(0xffffffffffffffff, 0x4008af20, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={0x0, 0x0, 0x8}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x0, &(0x7f0000000080), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) r1 = socket$inet_mptcp(0x2, 0x1, 0x106) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f00000040c0)) sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, &(0x7f0000004240)={&(0x7f0000004180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000004200)={&(0x7f00000041c0)={0x14, 0x0, 0x200, 0x70bd29, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x4004083) 09:23:00 executing program 4: ioctl$VHOST_SET_VRING_KICK(0xffffffffffffffff, 0x4008af20, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x0, 0x0, 0x0, 0x6}], &(0x7f00000000c0)='GPL\x00', 0x0, 0xec, &(0x7f0000000100)=""/236, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r0]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xa, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_fd={0x18, 0x5}, @map_fd, @map_val={0x18, 0x1}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) r1 = socket$inet_mptcp(0x2, 0x1, 0x106) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f00000040c0)) 09:23:00 executing program 1: ioctl$VHOST_SET_VRING_KICK(0xffffffffffffffff, 0x4008af20, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x0, 0x0, 0x0, 0x6}], &(0x7f00000000c0)='GPL\x00', 0x0, 0xec, &(0x7f0000000100)=""/236, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r0]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xa, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_fd={0x18, 0x5}, @map_fd, @map_val={0x18, 0x1}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) r1 = socket$inet_mptcp(0x2, 0x1, 0x106) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f00000040c0)) 09:23:00 executing program 2: openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst, @map_idx_val, @map_fd={0x18, 0x5, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd, @map_val], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) socket$inet_mptcp(0x2, 0x1, 0x106) 09:23:00 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r1 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) ioctl$VHOST_VDPA_GET_IOVA_RANGE(0xffffffffffffffff, 0x8010af78, &(0x7f00000003c0)) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480), 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x0, 0x0, &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', 0x0, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r1}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) 09:23:00 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r1 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) ioctl$VHOST_VDPA_GET_IOVA_RANGE(0xffffffffffffffff, 0x8010af78, &(0x7f00000003c0)) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480), 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x0, 0x0, &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', 0x0, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r1}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) 09:23:00 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, 0xffffffffffffffff]}, 0x80) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r2}, @map_val={0x18, 0x1, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r3 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r3, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00'}) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) 09:23:00 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, 0xffffffffffffffff]}, 0x80) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r2}, @map_val={0x18, 0x1, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r3 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r3, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00'}) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) 09:23:00 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, 0xffffffffffffffff]}, 0x80) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r2}, @map_val={0x18, 0x1, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r3 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r3, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00'}) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) 09:23:01 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r1 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) ioctl$VHOST_VDPA_GET_IOVA_RANGE(0xffffffffffffffff, 0x8010af78, &(0x7f00000003c0)) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480), 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x0, 0x0, &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', 0x0, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r1}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) 09:23:01 executing program 2: openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst, @map_idx_val, @map_fd={0x18, 0x5, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd, @map_val], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) socket$inet_mptcp(0x2, 0x1, 0x106) 09:23:01 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r1 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) ioctl$VHOST_VDPA_GET_IOVA_RANGE(0xffffffffffffffff, 0x8010af78, &(0x7f00000003c0)) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480), 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x0, 0x0, &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', 0x0, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r1}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) 09:23:01 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, 0xffffffffffffffff]}, 0x80) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r2}, @map_val={0x18, 0x1, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r3 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r3, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00'}) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) 09:23:01 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, 0xffffffffffffffff]}, 0x80) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r2}, @map_val={0x18, 0x1, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r3 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r3, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00'}) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) 09:23:01 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r1 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) ioctl$VHOST_VDPA_GET_IOVA_RANGE(0xffffffffffffffff, 0x8010af78, &(0x7f00000003c0)) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480), 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x0, 0x0, 0x0, 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', 0x0, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r1}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) 09:23:01 executing program 1: ioctl$VHOST_SET_VRING_KICK(0xffffffffffffffff, 0x4008af20, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={0x0, 0x0, 0x8}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x0, &(0x7f0000000080), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) r1 = socket$inet_mptcp(0x2, 0x1, 0x106) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f00000040c0)) sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, &(0x7f0000004240)={&(0x7f0000004180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000004200)={&(0x7f00000041c0)={0x14, 0x0, 0x200, 0x70bd29, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x4004083) 09:23:01 executing program 2: ioctl$VHOST_SET_VRING_KICK(0xffffffffffffffff, 0x4008af20, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={0x0, 0x0, 0x8}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x0, &(0x7f0000000080), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) r1 = socket$inet_mptcp(0x2, 0x1, 0x106) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f00000040c0)) sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, &(0x7f0000004240)={&(0x7f0000004180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000004200)={&(0x7f00000041c0)={0x14, 0x0, 0x200, 0x70bd29, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x4004083) 09:23:01 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r1 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) ioctl$VHOST_VDPA_GET_IOVA_RANGE(0xffffffffffffffff, 0x8010af78, &(0x7f00000003c0)) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480), 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x0, 0x0, 0x0, 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', 0x0, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r1}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) 09:23:01 executing program 5: ioctl$VHOST_SET_VRING_KICK(0xffffffffffffffff, 0x4008af20, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={0x0, 0x0, 0x8}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x0, &(0x7f0000000080), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) r1 = socket$inet_mptcp(0x2, 0x1, 0x106) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f00000040c0)) sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, &(0x7f0000004240)={&(0x7f0000004180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000004200)={&(0x7f00000041c0)={0x14, 0x0, 0x200, 0x70bd29, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x4004083) 09:23:01 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r2}, @map_val={0x18, 0x1, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r3 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r3, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00'}) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) 09:23:01 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r1]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00', 0x0}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', r5, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, &(0x7f0000004240)={&(0x7f0000004180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000004200)={&(0x7f00000041c0)={0x14, 0x0, 0x200, 0x70bd29, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x4004083) 09:23:01 executing program 2: ioctl$VHOST_SET_VRING_KICK(0xffffffffffffffff, 0x4008af20, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={0x0, 0x0, 0x8}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x0, &(0x7f0000000080), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) r1 = socket$inet_mptcp(0x2, 0x1, 0x106) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f00000040c0)) sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, &(0x7f0000004240)={&(0x7f0000004180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000004200)={&(0x7f00000041c0)={0x14, 0x0, 0x200, 0x70bd29, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x4004083) 09:23:01 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r1]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00', 0x0}) r6 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000001880)='/sys/fs/f2fs', 0x280000, 0x82) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', r5, 0x38, r6, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) 09:23:01 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r1 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) ioctl$VHOST_VDPA_GET_IOVA_RANGE(0xffffffffffffffff, 0x8010af78, &(0x7f00000003c0)) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480), 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x0, 0x0, 0x0, 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', 0x0, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r1}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) 09:23:01 executing program 5: ioctl$VHOST_SET_VRING_KICK(0xffffffffffffffff, 0x4008af20, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={0x0, 0x0, 0x8}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x0, &(0x7f0000000080), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) r1 = socket$inet_mptcp(0x2, 0x1, 0x106) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f00000040c0)) sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, &(0x7f0000004240)={&(0x7f0000004180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000004200)={&(0x7f00000041c0)={0x14, 0x0, 0x200, 0x70bd29, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x4004083) 09:23:01 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r2}, @map_val={0x18, 0x1, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r3 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r3, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00'}) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) 09:23:01 executing program 4: ioctl$VHOST_SET_VRING_KICK(0xffffffffffffffff, 0x4008af20, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x0, 0x0, 0x0, 0x6}], &(0x7f00000000c0)='GPL\x00', 0x0, 0xec, &(0x7f0000000100)=""/236, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r0]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xa, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_fd={0x18, 0x5}, @map_fd, @map_val={0x18, 0x1}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) r1 = socket$inet_mptcp(0x2, 0x1, 0x106) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f00000040c0)) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NET_DM_CMD_STOP(r2, &(0x7f0000004240)={&(0x7f0000004180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000004200)={&(0x7f00000041c0)={0x14, 0x0, 0x200, 0x70bd29, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x4004083) 09:23:01 executing program 2: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x0, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r1]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00', 0x0}) r6 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000001880)='/sys/fs/f2fs', 0x280000, 0x82) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', r5, 0x38, r6, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) 09:23:01 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r1 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) ioctl$VHOST_VDPA_GET_IOVA_RANGE(0xffffffffffffffff, 0x8010af78, &(0x7f00000003c0)) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480), 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x0, 0x0, &(0x7f0000000800)='syzkaller\x00', 0x0, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', 0x0, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r1}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) 09:23:01 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x0, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r1]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00', 0x0}) r6 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000001880)='/sys/fs/f2fs', 0x280000, 0x82) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', r5, 0x38, r6, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) 09:23:01 executing program 5: ioctl$VHOST_SET_VRING_KICK(0xffffffffffffffff, 0x4008af20, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x0, 0x0, 0x0, 0x6}], &(0x7f00000000c0)='GPL\x00', 0x0, 0xec, &(0x7f0000000100)=""/236, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r0]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xa, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_fd={0x18, 0x5}, @map_fd, @map_val={0x18, 0x1}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) r1 = socket$inet_mptcp(0x2, 0x1, 0x106) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f00000040c0)) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NET_DM_CMD_STOP(r2, &(0x7f0000004240)={&(0x7f0000004180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000004200)={&(0x7f00000041c0)={0x14, 0x0, 0x200, 0x70bd29, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x4004083) 09:23:01 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r2}, @map_val={0x18, 0x1, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r3 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r3, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00'}) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) 09:23:01 executing program 4: ioctl$VHOST_SET_VRING_KICK(0xffffffffffffffff, 0x4008af20, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x0, 0x0, 0x0, 0x6}], &(0x7f00000000c0)='GPL\x00', 0x0, 0xec, &(0x7f0000000100)=""/236, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r0]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xa, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_fd={0x18, 0x5}, @map_fd, @map_val={0x18, 0x1}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) r1 = socket$inet_mptcp(0x2, 0x1, 0x106) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f00000040c0)) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NET_DM_CMD_STOP(r2, &(0x7f0000004240)={&(0x7f0000004180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000004200)={&(0x7f00000041c0)={0x14, 0x0, 0x200, 0x70bd29, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x4004083) 09:23:01 executing program 2: openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x0, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val, @map_fd={0x18, 0x5, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd, @map_val], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) socket$inet_mptcp(0x2, 0x1, 0x106) 09:23:02 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r1 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) ioctl$VHOST_VDPA_GET_IOVA_RANGE(0xffffffffffffffff, 0x8010af78, &(0x7f00000003c0)) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480), 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x0, 0x0, &(0x7f0000000800)='syzkaller\x00', 0x0, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', 0x0, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r1}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) 09:23:02 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x0, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r1]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00', 0x0}) r6 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000001880)='/sys/fs/f2fs', 0x280000, 0x82) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', r5, 0x38, r6, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) 09:23:02 executing program 4: ioctl$VHOST_SET_VRING_KICK(0xffffffffffffffff, 0x4008af20, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x0, 0x0, 0x0, 0x6}], &(0x7f00000000c0)='GPL\x00', 0x0, 0xec, &(0x7f0000000100)=""/236, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r0]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xc, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5}, @map_fd, @map_val={0x18, 0x1}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) r1 = socket$inet_mptcp(0x2, 0x1, 0x106) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f00000040c0)) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NET_DM_CMD_STOP(r2, &(0x7f0000004240)={&(0x7f0000004180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000004200)={&(0x7f00000041c0)={0x14, 0x0, 0x200, 0x70bd29, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x4004083) 09:23:02 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x0, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r1]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00', 0x0}) r6 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000001880)='/sys/fs/f2fs', 0x280000, 0x82) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', r5, 0x38, r6, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) 09:23:02 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, 0xffffffffffffffff]}, 0x80) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r1}, @map_val={0x18, 0x1, 0x2, 0x0, r1, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[0xffffffffffffffff]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r2, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00'}) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) 09:23:02 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r1 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) ioctl$VHOST_VDPA_GET_IOVA_RANGE(0xffffffffffffffff, 0x8010af78, &(0x7f00000003c0)) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480), 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x0, 0x0, &(0x7f0000000800)='syzkaller\x00', 0x0, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', 0x0, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r1}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) 09:23:02 executing program 2: openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xd, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @map_idx_val, @map_fd={0x18, 0x5, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd, @map_val], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) socket$inet_mptcp(0x2, 0x1, 0x106) 09:23:02 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x0, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r1]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00', 0x0}) r6 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000001880)='/sys/fs/f2fs', 0x280000, 0x82) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', r5, 0x38, r6, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) 09:23:02 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, 0xffffffffffffffff]}, 0x80) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r1}, @map_val={0x18, 0x1, 0x2, 0x0, r1, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[0xffffffffffffffff]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r2, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00'}) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) 09:23:02 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r1 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) ioctl$VHOST_VDPA_GET_IOVA_RANGE(0xffffffffffffffff, 0x8010af78, &(0x7f00000003c0)) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480), 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x0, 0x0, &(0x7f0000000800)='syzkaller\x00', 0x5, 0x0, 0x0, 0x41000, 0xa, '\x00', 0x0, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r1}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) 09:23:02 executing program 5: ioctl$VHOST_SET_VRING_KICK(0xffffffffffffffff, 0x4008af20, 0x0) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) 09:23:02 executing program 2: openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xd, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @map_idx_val, @map_fd={0x18, 0x5, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd, @map_val], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) socket$inet_mptcp(0x2, 0x1, 0x106) 09:23:02 executing program 1: openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xd, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @map_idx_val, @map_fd={0x18, 0x5, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd, @map_val], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) socket$inet_mptcp(0x2, 0x1, 0x106) 09:23:02 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, 0xffffffffffffffff]}, 0x80) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r1}, @map_val={0x18, 0x1, 0x2, 0x0, r1, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[0xffffffffffffffff]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r2, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00'}) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) 09:23:02 executing program 4: ioctl$VHOST_SET_VRING_KICK(0xffffffffffffffff, 0x4008af20, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={0x0, 0x0, 0x8}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x0, 0x0, &(0x7f00000000c0)='GPL\x00', 0x0, 0xec, &(0x7f0000000100)=""/236, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, 0xffffffffffffffff]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) r1 = socket$inet_mptcp(0x2, 0x1, 0x106) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f00000040c0)) sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, &(0x7f0000004240)={&(0x7f0000004180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000004200)={&(0x7f00000041c0)={0x14, 0x0, 0x200, 0x70bd29, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x4004083) 09:23:02 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r1 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) ioctl$VHOST_VDPA_GET_IOVA_RANGE(0xffffffffffffffff, 0x8010af78, &(0x7f00000003c0)) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480), 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x0, 0x0, &(0x7f0000000800)='syzkaller\x00', 0x5, 0x0, 0x0, 0x41000, 0xa, '\x00', 0x0, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r1}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) 09:23:02 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x0, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r1]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00', 0x0}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', r5, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, &(0x7f0000004240)={&(0x7f0000004180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000004200)={&(0x7f00000041c0)={0x14, 0x0, 0x200, 0x70bd29, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x4004083) 09:23:02 executing program 1: ioctl$VHOST_SET_VRING_KICK(0xffffffffffffffff, 0x4008af20, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x0, 0x0, 0x0, 0x6}], &(0x7f00000000c0)='GPL\x00', 0x0, 0xec, &(0x7f0000000100)=""/236, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r0]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xa, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd, @map_val={0x18, 0x1}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) r1 = socket$inet_mptcp(0x2, 0x1, 0x106) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f00000040c0)) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NET_DM_CMD_STOP(r2, &(0x7f0000004240)={&(0x7f0000004180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000004200)={&(0x7f00000041c0)={0x14, 0x0, 0x200, 0x70bd29, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x4004083) 09:23:02 executing program 4: openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val, @map_fd={0x18, 0x5, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd, @map_val], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) socket$inet_mptcp(0x2, 0x1, 0x106) 09:23:02 executing program 0: openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, 0xffffffffffffffff]}, 0x80) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r1}, @map_val={0x18, 0x1, 0x2, 0x0, r1, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r2, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00'}) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) 09:23:02 executing program 2: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x0, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r1]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00', 0x0}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', r5, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, &(0x7f0000004240)={&(0x7f0000004180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000004200)={&(0x7f00000041c0)={0x14, 0x0, 0x200, 0x70bd29, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x4004083) 09:23:02 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r1 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) ioctl$VHOST_VDPA_GET_IOVA_RANGE(0xffffffffffffffff, 0x8010af78, &(0x7f00000003c0)) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480), 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x0, 0x0, &(0x7f0000000800)='syzkaller\x00', 0x5, 0x0, 0x0, 0x41000, 0xa, '\x00', 0x0, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r1}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) 09:23:03 executing program 4: ioctl$VHOST_SET_VRING_KICK(0xffffffffffffffff, 0x4008af20, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x0, 0x0, 0x0, 0x6}], &(0x7f00000000c0)='GPL\x00', 0x0, 0xec, &(0x7f0000000100)=""/236, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r0]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xa, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd, @map_val={0x18, 0x1}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) r1 = socket$inet_mptcp(0x2, 0x1, 0x106) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f00000040c0)) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NET_DM_CMD_STOP(r2, &(0x7f0000004240)={&(0x7f0000004180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000004200)={&(0x7f00000041c0)={0x14, 0x0, 0x200, 0x70bd29, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x4004083) 09:23:03 executing program 1: ioctl$VHOST_SET_VRING_KICK(0xffffffffffffffff, 0x4008af20, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x0, 0x0, 0x0, 0x6}], &(0x7f00000000c0)='GPL\x00', 0x0, 0xec, &(0x7f0000000100)=""/236, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, 0xffffffffffffffff]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) 09:23:03 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r1]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00', 0x0}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', r5, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, &(0x7f0000004240)={&(0x7f0000004180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000004200)={&(0x7f00000041c0)={0x14, 0x0, 0x200, 0x70bd29, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x4004083) 09:23:03 executing program 0: openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, 0xffffffffffffffff]}, 0x80) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r1}, @map_val={0x18, 0x1, 0x2, 0x0, r1, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r2, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00'}) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) 09:23:03 executing program 2: openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, 0xffffffffffffffff]}, 0x80) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r1}, @map_val={0x18, 0x1, 0x2, 0x0, r1, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r2, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00'}) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) 09:23:03 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r1 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) ioctl$VHOST_VDPA_GET_IOVA_RANGE(0xffffffffffffffff, 0x8010af78, &(0x7f00000003c0)) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480), 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x0, 0x0, &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x0, 0xa, '\x00', 0x0, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r1}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) 09:23:03 executing program 1: openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd, @map_val], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) socket$inet_mptcp(0x2, 0x1, 0x106) 09:23:03 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r1]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00', 0x0}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', r5, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, &(0x7f0000004240)={&(0x7f0000004180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000004200)={&(0x7f00000041c0)={0x14, 0x0, 0x200, 0x70bd29, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x4004083) 09:23:03 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r1]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00', 0x0}) r6 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000001880)='/sys/fs/f2fs', 0x280000, 0x82) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', r5, 0x38, r6, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) 09:23:03 executing program 2: ioctl$VHOST_SET_VRING_KICK(0xffffffffffffffff, 0x4008af20, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x0, 0x0, 0x0, 0x6}], &(0x7f00000000c0)='GPL\x00', 0x0, 0xec, &(0x7f0000000100)=""/236, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r0]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xc, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r0}, @map_fd, @map_val={0x18, 0x1}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) r1 = socket$inet_mptcp(0x2, 0x1, 0x106) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f00000040c0)) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NET_DM_CMD_STOP(r2, &(0x7f0000004240)={&(0x7f0000004180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000004200)={&(0x7f00000041c0)={0x14, 0x0, 0x200, 0x70bd29, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x4004083) 09:23:03 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r1 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) ioctl$VHOST_VDPA_GET_IOVA_RANGE(0xffffffffffffffff, 0x8010af78, &(0x7f00000003c0)) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480), 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x0, 0x0, &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x0, 0xa, '\x00', 0x0, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r1}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) 09:23:03 executing program 0: openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, 0xffffffffffffffff]}, 0x80) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r1}, @map_val={0x18, 0x1, 0x2, 0x0, r1, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r2, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00'}) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) 09:23:03 executing program 1: ioctl$VHOST_SET_VRING_KICK(0xffffffffffffffff, 0x4008af20, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x0, 0x0, 0x0, 0x6}], &(0x7f00000000c0)='GPL\x00', 0x0, 0xec, &(0x7f0000000100)=""/236, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r0]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xc, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r0}, @map_fd, @map_val={0x18, 0x1}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) r1 = socket$inet_mptcp(0x2, 0x1, 0x106) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f00000040c0)) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NET_DM_CMD_STOP(r2, &(0x7f0000004240)={&(0x7f0000004180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000004200)={&(0x7f00000041c0)={0x14, 0x0, 0x200, 0x70bd29, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x4004083) 09:23:03 executing program 4: openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd, @map_val], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) socket$inet_mptcp(0x2, 0x1, 0x106) 09:23:03 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r1]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00', 0x0}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', r5, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, &(0x7f0000004240)={&(0x7f0000004180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000004200)={&(0x7f00000041c0)={0x14, 0x0, 0x200, 0x70bd29, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x4004083) 09:23:03 executing program 0: r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, 0xffffffffffffffff]}, 0x80) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r1}, @map_val={0x18, 0x1, 0x2, 0x0, r1, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r2, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00'}) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) 09:23:03 executing program 2: openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, 0xffffffffffffffff]}, 0x80) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r1}, @map_val={0x18, 0x1, 0x2, 0x0, r1, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r2, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00'}) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) 09:23:03 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r1 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) ioctl$VHOST_VDPA_GET_IOVA_RANGE(0xffffffffffffffff, 0x8010af78, &(0x7f00000003c0)) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480), 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x0, 0x0, &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x0, 0xa, '\x00', 0x0, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r1}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) 09:23:03 executing program 0: r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, 0xffffffffffffffff]}, 0x80) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r1}, @map_val={0x18, 0x1, 0x2, 0x0, r1, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r2, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00'}) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) 09:23:03 executing program 4: r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, 0xffffffffffffffff]}, 0x80) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r1}, @map_val={0x18, 0x1, 0x2, 0x0, r1, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r2, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00'}) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) 09:23:03 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r1]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00', 0x0}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', r5, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, &(0x7f0000004240)={&(0x7f0000004180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000004200)={&(0x7f00000041c0)={0x14, 0x0, 0x200, 0x70bd29, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x4004083) 09:23:03 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x0, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r1]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00', 0x0}) r6 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000001880)='/sys/fs/f2fs', 0x280000, 0x82) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', r5, 0x38, r6, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) 09:23:03 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r1 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) ioctl$VHOST_VDPA_GET_IOVA_RANGE(0xffffffffffffffff, 0x8010af78, &(0x7f00000003c0)) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480), 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x0, 0x0, &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0x0, '\x00', 0x0, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r1}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) 09:23:03 executing program 2: openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xc, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_fd={0x18, 0x5, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd, @map_val], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) socket$inet_mptcp(0x2, 0x1, 0x106) 09:23:03 executing program 5: ioctl$VHOST_SET_VRING_KICK(0xffffffffffffffff, 0x4008af20, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x0, 0x0, 0x0, 0x6}], &(0x7f00000000c0)='GPL\x00', 0x0, 0xec, &(0x7f0000000100)=""/236, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r0]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xd, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x22}, @map_fd, @map_val={0x18, 0x1}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) r1 = socket$inet_mptcp(0x2, 0x1, 0x106) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f00000040c0)) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NET_DM_CMD_STOP(r2, &(0x7f0000004240)={&(0x7f0000004180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000004200)={&(0x7f00000041c0)={0x14, 0x0, 0x200, 0x70bd29, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x4004083) 09:23:04 executing program 0: r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, 0xffffffffffffffff]}, 0x80) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r1}, @map_val={0x18, 0x1, 0x2, 0x0, r1, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r2, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00'}) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) 09:23:04 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r1 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) ioctl$VHOST_VDPA_GET_IOVA_RANGE(0xffffffffffffffff, 0x8010af78, &(0x7f00000003c0)) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480), 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x0, 0x0, &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0x0, '\x00', 0x0, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r1}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) 09:23:04 executing program 4: openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd, @map_val], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) socket$inet_mptcp(0x2, 0x1, 0x106) 09:23:04 executing program 2: ioctl$VHOST_SET_VRING_KICK(0xffffffffffffffff, 0x4008af20, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x0, 0x0, 0x0, 0x6}], &(0x7f00000000c0)='GPL\x00', 0x0, 0xec, &(0x7f0000000100)=""/236, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r0]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xd, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x22}, @map_fd, @map_val={0x18, 0x1}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) r1 = socket$inet_mptcp(0x2, 0x1, 0x106) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f00000040c0)) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NET_DM_CMD_STOP(r2, &(0x7f0000004240)={&(0x7f0000004180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000004200)={&(0x7f00000041c0)={0x14, 0x0, 0x200, 0x70bd29, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x4004083) 09:23:04 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r1]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00', 0x0}) r6 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000001880)='/sys/fs/f2fs', 0x280000, 0x82) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', r5, 0x38, r6, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) 09:23:04 executing program 0: openat$vnet(0xffffffffffffff9c, 0x0, 0x2, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, 0xffffffffffffffff]}, 0x80) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r1}, @map_val={0x18, 0x1, 0x2, 0x0, r1, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r2, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00'}) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) 09:23:04 executing program 1: openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd, @map_val], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) socket$inet_mptcp(0x2, 0x1, 0x106) 09:23:04 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0x0, 0x0, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r1]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00', 0x0}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', r5, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, &(0x7f0000004240)={&(0x7f0000004180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000004200)={&(0x7f00000041c0)={0x14, 0x0, 0x200, 0x70bd29, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x4004083) 09:23:04 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r1 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) ioctl$VHOST_VDPA_GET_IOVA_RANGE(0xffffffffffffffff, 0x8010af78, &(0x7f00000003c0)) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480), 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x0, 0x0, &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0x0, '\x00', 0x0, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r1}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) 09:23:04 executing program 5: ioctl$VHOST_SET_VRING_KICK(0xffffffffffffffff, 0x4008af20, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x0, 0x0, 0x0, 0x6}], &(0x7f00000000c0)='GPL\x00', 0x0, 0xec, &(0x7f0000000100)=""/236, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r0]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd, @map_val={0x18, 0x1}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) r1 = socket$inet_mptcp(0x2, 0x1, 0x106) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f00000040c0)) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NET_DM_CMD_STOP(r2, &(0x7f0000004240)={&(0x7f0000004180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000004200)={&(0x7f00000041c0)={0x14, 0x0, 0x200, 0x70bd29, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x4004083) 09:23:04 executing program 2: ioctl$VHOST_VDPA_GET_AS_NUM(0xffffffffffffffff, 0x8004af7a, 0x0) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(0xffffffffffffffff, 0x0, &(0x7f0000000780)) 09:23:04 executing program 0: openat$vnet(0xffffffffffffff9c, 0x0, 0x2, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, 0xffffffffffffffff]}, 0x80) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r1}, @map_val={0x18, 0x1, 0x2, 0x0, r1, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r2, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00'}) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) 09:23:04 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r1 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) ioctl$VHOST_VDPA_GET_IOVA_RANGE(0xffffffffffffffff, 0x8010af78, &(0x7f00000003c0)) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480), 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x0, 0x0, &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r1}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) 09:23:04 executing program 2: openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x0, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd, @map_val], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) socket$inet_mptcp(0x2, 0x1, 0x106) 09:23:04 executing program 1: ioctl$VHOST_SET_VRING_KICK(0xffffffffffffffff, 0x4008af20, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x0, 0x0, 0x0, 0x6}], &(0x7f00000000c0)='GPL\x00', 0x0, 0xec, &(0x7f0000000100)=""/236, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r0]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd, @map_val={0x18, 0x1}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) r1 = socket$inet_mptcp(0x2, 0x1, 0x106) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f00000040c0)) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NET_DM_CMD_STOP(r2, &(0x7f0000004240)={&(0x7f0000004180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000004200)={&(0x7f00000041c0)={0x14, 0x0, 0x200, 0x70bd29, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x4004083) 09:23:04 executing program 4: r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x0, 0x0, 0x0, 0x6}], &(0x7f00000000c0)='GPL\x00', 0x0, 0xec, &(0x7f0000000100)=""/236, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, 0xffffffffffffffff]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) r1 = socket$inet_mptcp(0x2, 0x1, 0x106) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f00000040c0)) sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, &(0x7f0000004240)={&(0x7f0000004180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000004200)={&(0x7f00000041c0)={0x14, 0x0, 0x200, 0x70bd29, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x4004083) 09:23:04 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r1]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00', 0x0}) r6 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000001880)='/sys/fs/f2fs', 0x280000, 0x82) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', r5, 0x38, r6, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) 09:23:04 executing program 0: openat$vnet(0xffffffffffffff9c, 0x0, 0x2, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, 0xffffffffffffffff]}, 0x80) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r1}, @map_val={0x18, 0x1, 0x2, 0x0, r1, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r2, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00'}) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) 09:23:04 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x0, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r1]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00', 0x0}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', r5, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, &(0x7f0000004240)={&(0x7f0000004180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000004200)={&(0x7f00000041c0)={0x14, 0x0, 0x200, 0x70bd29, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x4004083) 09:23:04 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x0, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r1]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00', 0x0}) r6 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000001880)='/sys/fs/f2fs', 0x280000, 0x82) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', r5, 0x38, r6, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) 09:23:04 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r1 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) ioctl$VHOST_VDPA_GET_IOVA_RANGE(0xffffffffffffffff, 0x8010af78, &(0x7f00000003c0)) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480), 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x0, 0x0, &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r1}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) 09:23:04 executing program 2: ioctl$VHOST_SET_VRING_KICK(0xffffffffffffffff, 0x4008af20, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x0, 0x0, 0x0, 0x6}], &(0x7f00000000c0)='GPL\x00', 0x0, 0xec, &(0x7f0000000100)=""/236, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, 0xffffffffffffffff]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[0xffffffffffffffff]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) r0 = socket$inet_mptcp(0x2, 0x1, 0x106) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f00000040c0)) sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, &(0x7f0000004240)={&(0x7f0000004180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000004200)={&(0x7f00000041c0)={0x14, 0x0, 0x200, 0x70bd29, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x4004083) 09:23:04 executing program 0: openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, 0xffffffffffffffff]}, 0x80) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r1}, @map_val={0x18, 0x1, 0x2, 0x0, r1, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r2, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00'}) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) 09:23:04 executing program 5: ioctl$VHOST_SET_VRING_KICK(0xffffffffffffffff, 0x4008af20, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x0, 0x0, 0x0, 0x6}], &(0x7f00000000c0)='GPL\x00', 0x0, 0xec, &(0x7f0000000100)=""/236, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r0]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xc, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_val={0x18, 0x1}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) r1 = socket$inet_mptcp(0x2, 0x1, 0x106) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f00000040c0)) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NET_DM_CMD_STOP(r2, &(0x7f0000004240)={&(0x7f0000004180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000004200)={&(0x7f00000041c0)={0x14, 0x0, 0x200, 0x70bd29, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x4004083) 09:23:04 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r1 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) ioctl$VHOST_VDPA_GET_IOVA_RANGE(0xffffffffffffffff, 0x8010af78, &(0x7f00000003c0)) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480), 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x0, 0x0, &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r1}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) 09:23:05 executing program 1: ioctl$VHOST_SET_VRING_KICK(0xffffffffffffffff, 0x4008af20, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x0, 0x0, 0x0, 0x6}], &(0x7f00000000c0)='GPL\x00', 0x0, 0xec, &(0x7f0000000100)=""/236, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r0]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xc, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_val={0x18, 0x1}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) r1 = socket$inet_mptcp(0x2, 0x1, 0x106) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f00000040c0)) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NET_DM_CMD_STOP(r2, &(0x7f0000004240)={&(0x7f0000004180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000004200)={&(0x7f00000041c0)={0x14, 0x0, 0x200, 0x70bd29, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x4004083) 09:23:05 executing program 2: ioctl$VHOST_SET_VRING_KICK(0xffffffffffffffff, 0x4008af20, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x0, 0x0, 0x0, 0x6}], &(0x7f00000000c0)='GPL\x00', 0x0, 0xec, &(0x7f0000000100)=""/236, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r0]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xc, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_val={0x18, 0x1}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) r1 = socket$inet_mptcp(0x2, 0x1, 0x106) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f00000040c0)) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NET_DM_CMD_STOP(r2, &(0x7f0000004240)={&(0x7f0000004180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000004200)={&(0x7f00000041c0)={0x14, 0x0, 0x200, 0x70bd29, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x4004083) 09:23:05 executing program 4: ioctl$VHOST_SET_VRING_KICK(0xffffffffffffffff, 0x4008af20, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) r1 = socket$inet_mptcp(0x2, 0x1, 0x106) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f00000040c0)) sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, &(0x7f0000004240)={&(0x7f0000004180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000004200)={&(0x7f00000041c0)={0x14, 0x0, 0x200, 0x70bd29, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x4004083) 09:23:05 executing program 0: openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, 0xffffffffffffffff]}, 0x80) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r1}, @map_val={0x18, 0x1, 0x2, 0x0, r1, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r2, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00'}) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) 09:23:05 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r1 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) ioctl$VHOST_VDPA_GET_IOVA_RANGE(0xffffffffffffffff, 0x8010af78, &(0x7f00000003c0)) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480), 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x0, 0x0, &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', 0x0, 0x38, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r1}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) 09:23:05 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) r1 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f0000000780)) 09:23:05 executing program 1: ioctl$VHOST_SET_VRING_KICK(0xffffffffffffffff, 0x4008af20, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x0, 0x0, 0x0, 0x6}], &(0x7f00000000c0)='GPL\x00', 0x0, 0xec, &(0x7f0000000100)=""/236, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r0]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xc, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_val={0x18, 0x1}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) r1 = socket$inet_mptcp(0x2, 0x1, 0x106) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f00000040c0)) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NET_DM_CMD_STOP(r2, &(0x7f0000004240)={&(0x7f0000004180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000004200)={&(0x7f00000041c0)={0x14, 0x0, 0x200, 0x70bd29, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x4004083) 09:23:05 executing program 4: ioctl$VHOST_SET_VRING_KICK(0xffffffffffffffff, 0x4008af20, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x0, 0x0, 0x0, 0x6}], &(0x7f00000000c0)='GPL\x00', 0x0, 0xec, &(0x7f0000000100)=""/236, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, 0xffffffffffffffff]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) r0 = socket$inet_mptcp(0x2, 0x1, 0x106) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f00000040c0)) sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, &(0x7f0000004240)={&(0x7f0000004180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000004200)={&(0x7f00000041c0)={0x14, 0x0, 0x200, 0x70bd29, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x4004083) 09:23:05 executing program 2: ioctl$VHOST_SET_VRING_KICK(0xffffffffffffffff, 0x4008af20, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x0, 0x0, 0x0, 0x6}], &(0x7f00000000c0)='GPL\x00', 0x0, 0xec, &(0x7f0000000100)=""/236, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r0]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9}, @map_val={0x18, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) r1 = socket$inet_mptcp(0x2, 0x1, 0x106) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f00000040c0)) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NET_DM_CMD_STOP(r2, &(0x7f0000004240)={&(0x7f0000004180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000004200)={&(0x7f00000041c0)={0x14, 0x0, 0x200, 0x70bd29, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x4004083) 09:23:05 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) r1 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f0000000780)) 09:23:05 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r1 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) ioctl$VHOST_VDPA_GET_IOVA_RANGE(0xffffffffffffffff, 0x8010af78, &(0x7f00000003c0)) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480), 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x0, 0x0, &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', 0x0, 0x38, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r1}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) 09:23:05 executing program 0: openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, 0xffffffffffffffff]}, 0x80) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r1}, @map_val={0x18, 0x1, 0x2, 0x0, r1, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r2, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00'}) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) 09:23:05 executing program 4: ioctl$VHOST_SET_VRING_KICK(0xffffffffffffffff, 0x4008af20, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x0, 0x0, 0x0, 0x6}], &(0x7f00000000c0)='GPL\x00', 0x0, 0xec, &(0x7f0000000100)=""/236, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, 0xffffffffffffffff]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) r0 = socket$inet_mptcp(0x2, 0x1, 0x106) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f00000040c0)) sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, &(0x7f0000004240)={&(0x7f0000004180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000004200)={&(0x7f00000041c0)={0x14, 0x0, 0x200, 0x70bd29, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x4004083) 09:23:05 executing program 2: ioctl$VHOST_SET_VRING_KICK(0xffffffffffffffff, 0x4008af20, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x0, 0x0, 0x0, 0x6}], &(0x7f00000000c0)='GPL\x00', 0x0, 0xec, &(0x7f0000000100)=""/236, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r0]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xc, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) r1 = socket$inet_mptcp(0x2, 0x1, 0x106) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f00000040c0)) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NET_DM_CMD_STOP(r2, &(0x7f0000004240)={&(0x7f0000004180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000004200)={&(0x7f00000041c0)={0x14, 0x0, 0x200, 0x70bd29, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x4004083) 09:23:05 executing program 1: ioctl$VHOST_SET_VRING_KICK(0xffffffffffffffff, 0x4008af20, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x0, 0x0, 0x0, 0x6}], &(0x7f00000000c0)='GPL\x00', 0x0, 0xec, &(0x7f0000000100)=""/236, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r0]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xc, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) r1 = socket$inet_mptcp(0x2, 0x1, 0x106) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f00000040c0)) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NET_DM_CMD_STOP(r2, &(0x7f0000004240)={&(0x7f0000004180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000004200)={&(0x7f00000041c0)={0x14, 0x0, 0x200, 0x70bd29, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x4004083) 09:23:05 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x0, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r1]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00', 0x0}) r6 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000001880)='/sys/fs/f2fs', 0x280000, 0x82) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', r5, 0x38, r6, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) 09:23:05 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r1 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) ioctl$VHOST_VDPA_GET_IOVA_RANGE(0xffffffffffffffff, 0x8010af78, &(0x7f00000003c0)) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480), 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x0, 0x0, &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', 0x0, 0x38, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r1}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) 09:23:05 executing program 0: openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={0x0, 0x0, 0x8}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, 0xffffffffffffffff]}, 0x80) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r1}, @map_val={0x18, 0x1, 0x2, 0x0, r1, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r2, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00'}) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) 09:23:05 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x0, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r1]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00', 0x0}) r6 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000001880)='/sys/fs/f2fs', 0x280000, 0x82) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', r5, 0x38, r6, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) 09:23:05 executing program 2: ioctl$VHOST_SET_VRING_KICK(0xffffffffffffffff, 0x4008af20, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x0, 0x0, 0x0, 0x6}], &(0x7f00000000c0)='GPL\x00', 0x0, 0xec, &(0x7f0000000100)=""/236, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, 0xffffffffffffffff]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) r1 = socket$inet_mptcp(0x2, 0x1, 0x106) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f00000040c0)) sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, &(0x7f0000004240)={&(0x7f0000004180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000004200)={&(0x7f00000041c0)={0x14, 0x0, 0x200, 0x70bd29, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x4004083) 09:23:05 executing program 1: ioctl$VHOST_SET_VRING_KICK(0xffffffffffffffff, 0x4008af20, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x0, 0x0, 0x0, 0x6}], &(0x7f00000000c0)='GPL\x00', 0x0, 0xec, &(0x7f0000000100)=""/236, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, 0xffffffffffffffff]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) r1 = socket$inet_mptcp(0x2, 0x1, 0x106) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f00000040c0)) sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, &(0x7f0000004240)={&(0x7f0000004180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000004200)={&(0x7f00000041c0)={0x14, 0x0, 0x200, 0x70bd29, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x4004083) 09:23:05 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r1]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00', 0x0}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', r5, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, &(0x7f0000004240)={&(0x7f0000004180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000004200)={&(0x7f00000041c0)={0x14, 0x0, 0x200, 0x70bd29, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x4004083) 09:23:05 executing program 2: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], 0x0, 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r1]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00', 0x0}) r6 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000001880)='/sys/fs/f2fs', 0x280000, 0x82) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', r5, 0x38, r6, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) 09:23:05 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r1 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) ioctl$VHOST_VDPA_GET_IOVA_RANGE(0xffffffffffffffff, 0x8010af78, &(0x7f00000003c0)) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480), 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x0, 0x0, &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', 0x0, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x0, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r1}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) 09:23:06 executing program 4: openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xd, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r0}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd, @map_val], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) socket$inet_mptcp(0x2, 0x1, 0x106) 09:23:06 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r1 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) ioctl$VHOST_VDPA_GET_IOVA_RANGE(0xffffffffffffffff, 0x8010af78, &(0x7f00000003c0)) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480), 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x0, 0x0, &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', 0x0, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x0, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r1}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) 09:23:06 executing program 0: openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={0x0}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, 0xffffffffffffffff]}, 0x80) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r1}, @map_val={0x18, 0x1, 0x2, 0x0, r1, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r2, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00'}) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) 09:23:06 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, r1]}, 0x80) ioctl$VHOST_VDPA_GET_IOVA_RANGE(r0, 0x8010af78, &(0x7f00000003c0)) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480)=r3, 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r3}, @map_val={0x18, 0x1, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r1]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00', 0x0}) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x6, &(0x7f00000007c0)=@raw=[@alu={0x7, 0x1, 0x3, 0x0, 0x5, 0x18, 0x4}, @generic={0x4, 0xe, 0x3, 0x6, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @func, @jmp={0x5, 0x0, 0xf, 0x1, 0x0, 0x1, 0x8}, @jmp={0x5, 0x0, 0x8, 0x6, 0x2, 0xfffffffffffffff0, 0x1}], &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', r5, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r2}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, &(0x7f0000004240)={&(0x7f0000004180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000004200)={&(0x7f00000041c0)={0x14, 0x0, 0x200, 0x70bd29, 0x25dfdbfd, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x4004083) 09:23:06 executing program 2: openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={0x0, 0x0, 0x8}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000080)=@raw=[@generic={0x4, 0x5, 0x4, 0x6, 0x800}], &(0x7f00000000c0)='GPL\x00', 0x5, 0xec, &(0x7f0000000100)=""/236, 0x1e00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x0, 0x800, 0x36fdd702}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)=[0x1, 0xffffffffffffffff]}, 0x80) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xe, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x22}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd={0x18, 0x9, 0x1, 0x0, r1}, @map_val={0x18, 0x1, 0x2, 0x0, r1, 0x0, 0x0, 0x0, 0x1000}], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r2, 0x0, &(0x7f0000000780)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001840)={'bridge0\x00'}) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) [ 233.162943][T26945] list_del corruption. next->prev should be ffff888075990000, but was dead000000000122. (next=ffff88807626d000) 09:23:06 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1}) bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x8}, 0x10) r1 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) ioctl$VHOST_VDPA_GET_IOVA_RANGE(0xffffffffffffffff, 0x8010af78, &(0x7f00000003c0)) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000480), 0x4) ioctl$VHOST_VDPA_GET_AS_NUM(r0, 0x8004af7a, &(0x7f00000004c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001940)={0x5, 0x0, 0x0, &(0x7f0000000800)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000840)=""/4096, 0x41000, 0xa, '\x00', 0x0, 0x38, 0xffffffffffffffff, 0x8, &(0x7f00000018c0)={0x0, 0x5}, 0x8, 0x10, &(0x7f0000001900)={0x2, 0x5, 0x2, 0xeab8}, 0x10, 0xffffffffffffffff, r1}, 0x80) syz_genetlink_get_family_id$batadv(&(0x7f0000001a00), 0xffffffffffffffff) [ 233.242484][T26945] ------------[ cut here ]------------ [ 233.248258][T26945] kernel BUG at lib/list_debug.c:64! [ 233.270762][T26945] invalid opcode: 0000 [#1] PREEMPT SMP KASAN [ 233.276874][T26945] CPU: 1 PID: 26945 Comm: syz-executor.1 Not tainted 6.2.0-syzkaller-13413-g0a3f9a6b0265 #0 [ 233.286950][T26945] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/16/2023 [ 233.297020][T26945] RIP: 0010:__list_del_entry_valid+0x122/0x130 [ 233.303223][T26945] Code: 72 06 0f 0b 48 c7 c7 80 7d 58 8b 4c 89 fe 48 89 d9 e8 62 24 72 06 0f 0b 48 c7 c7 00 7e 58 8b 4c 89 fe 4c 89 f1 e8 4e 24 72 06 <0f> 0b 66 2e 0f 1f 84 00 00 00 00 00 66 90 f3 0f 1e fa 80 3d c5 65 [ 233.322887][T26945] RSP: 0018:ffffc90005d7fc98 EFLAGS: 00010246 [ 233.328950][T26945] RAX: 000000000000006d RBX: ffff88807626d008 RCX: 125f0154a9caa300 [ 233.336916][T26945] RDX: 0000000000000000 RSI: 0000000080000000 RDI: 0000000000000000 [ 233.344875][T26945] RBP: 0000000000000001 R08: ffffffff816fd91c R09: fffff52000baff4d [ 233.352855][T26945] R10: 0000000000000000 R11: dffffc0000000001 R12: dffffc0000000000 [ 233.360815][T26945] R13: dffffc0000000000 R14: ffff88807626d000 R15: ffff888075990000 [ 233.368775][T26945] FS: 0000555555adf400(0000) GS:ffff8880b9900000(0000) knlGS:0000000000000000 [ 233.377692][T26945] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 233.384260][T26945] CR2: 0000001b31422000 CR3: 0000000021deb000 CR4: 00000000003506e0 [ 233.392219][T26945] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 233.400178][T26945] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 233.408152][T26945] Call Trace: [ 233.411418][T26945] [ 233.414341][T26945] nfc_llcp_local_put+0x5f/0x180 [ 233.419277][T26945] nfc_unregister_device+0x167/0x2a0 [ 233.424559][T26945] virtual_ncidev_close+0x59/0x90 [ 233.429578][T26945] ? virtual_ncidev_open+0x1b0/0x1b0 [ 233.434856][T26945] __fput+0x3b7/0x890 [ 233.438843][T26945] task_work_run+0x24a/0x300 [ 233.443427][T26945] ? task_work_cancel+0x2b0/0x2b0 [ 233.448445][T26945] ? rcu_read_lock_sched_held+0x8d/0x130 [ 233.454081][T26945] ? exit_to_user_mode_loop+0x39/0x100 [ 233.459534][T26945] exit_to_user_mode_loop+0xd9/0x100 [ 233.464815][T26945] exit_to_user_mode_prepare+0xb1/0x140 [ 233.470354][T26945] syscall_exit_to_user_mode+0x64/0x2e0 [ 233.475892][T26945] do_syscall_64+0x4d/0xc0 [ 233.480302][T26945] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 233.486193][T26945] RIP: 0033:0x7fb2ad03dfab [ 233.490605][T26945] Code: 0f 05 48 3d 00 f0 ff ff 77 45 c3 0f 1f 40 00 48 83 ec 18 89 7c 24 0c e8 63 fc ff ff 8b 7c 24 0c 41 89 c0 b8 03 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 35 44 89 c7 89 44 24 0c e8 a1 fc ff ff 8b 44 [ 233.510199][T26945] RSP: 002b:00007ffc9bd1cf90 EFLAGS: 00000293 ORIG_RAX: 0000000000000003 [ 233.518601][T26945] RAX: 0000000000000000 RBX: 0000000000000004 RCX: 00007fb2ad03dfab [ 233.526570][T26945] RDX: 00007fb2acc01c18 RSI: ffffffffffffffff RDI: 0000000000000003 [ 233.534536][T26945] RBP: 00007fb2ad1ad980 R08: 0000000000000000 R09: 00007fb2acc00000 [ 233.542496][T26945] R10: 00007fb2acc01c20 R11: 0000000000000293 R12: 0000000000038855 [ 233.550470][T26945] R13: 00007ffc9bd1d090 R14: 00007fb2ad1abf80 R15: 0000000000000032 [ 233.558435][T26945] [ 233.561532][T26945] Modules linked in: 09:23:06 executing program 4: openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xd, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r0}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd, @map_val], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) socket$inet_mptcp(0x2, 0x1, 0x106) 09:23:06 executing program 2: openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xd, &(0x7f0000000500)=@raw=[@btf_id={0x18, 0x7, 0x3, 0x0, 0x5}, @jmp={0x5, 0x1, 0x5, 0x4, 0x1, 0xfffffffffffffff0}, @ldst={0x2, 0x0, 0x2, 0x9, 0x1, 0x10}, @map_idx_val={0x18, 0xcf17f431a521a788, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x5}, @map_fd={0x18, 0x5, 0x1, 0x0, r0}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @map_fd, @map_val], &(0x7f0000000580)='syzkaller\x00', 0x9, 0x2, &(0x7f00000005c0)=""/2, 0x0, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000680)=[r0]}, 0x80) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000740), 0x2, 0x0) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001b40), 0x2, 0x0) socket$inet_mptcp(0x2, 0x1, 0x106) [ 233.586676][T26945] ---[ end trace 0000000000000000 ]--- [ 233.593281][T26945] RIP: 0010:__list_del_entry_valid+0x122/0x130 [ 233.641937][T26945] Code: 72 06 0f 0b 48 c7 c7 80 7d 58 8b 4c 89 fe 48 89 d9 e8 62 24 72 06 0f 0b 48 c7 c7 00 7e 58 8b 4c 89 fe 4c 89 f1 e8 4e 24 72 06 <0f> 0b 66 2e 0f 1f 84 00 00 00 00 00 66 90 f3 0f 1e fa 80 3d c5 65 [ 233.667524][T26945] RSP: 0018:ffffc90005d7fc98 EFLAGS: 00010246 [ 233.681095][T26945] RAX: 000000000000006d RBX: ffff88807626d008 RCX: 125f0154a9caa300 [ 233.692564][T26945] RDX: 0000000000000000 RSI: 0000000080000000 RDI: 0000000000000000 [ 233.701685][T26945] RBP: 0000000000000001 R08: ffffffff816fd91c R09: fffff52000baff4d [ 233.712793][T26945] R10: 0000000000000000 R11: dffffc0000000001 R12: dffffc0000000000 [ 233.721123][T26945] R13: dffffc0000000000 R14: ffff88807626d000 R15: ffff888075990000 [ 233.731277][T26945] FS: 0000555555adf400(0000) GS:ffff8880b9900000(0000) knlGS:0000000000000000 [ 233.757654][T26945] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 233.766350][T26945] CR2: 00007ffaa5f35718 CR3: 0000000021deb000 CR4: 00000000003506e0 [ 233.775155][T26945] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 233.783248][T26945] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 233.795250][T26945] Kernel panic - not syncing: Fatal exception [ 233.801489][T26945] Kernel Offset: disabled [ 233.805829][T26945] Rebooting in 86400 seconds..