000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) userfaultfd(0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000340)='/dev/fuse\x00', 0x2, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r2) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r3 = open(0x0, 0x0, 0x0) openat$cgroup_procs(r3, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f00000000c0)='./file0\x00') syz_open_procfs(0x0, &(0x7f0000000240)='fd/3\x00W\xf6Je|H\x10\x05\xf1\xab\xc4MJ\xcbP\xed@\xe8\xe39\xd2\xea\xaap\xf9\x1aTM\x1f\x8e\x86c\xb4T\xde\x10\xf6\xa1\x89\xea)6\xca\x00\xa2\x04\xe6}\xaa\xd4\xf6~\xd0\x04bq\xe5\xa2\x99t;zzV\x15t[f\x16\x9dL\xe3\xc9\xf8Q\xf3<\x98\x9a\x1b\xb9\x87@\xe9#\x99\xd6\xb8\xa4\xb1T\xdd\xe0\x93\xd0\xd5\xd8\x0f\x11y\xef\xf1R\v\xd6\x81\x97\xa96,q\xd053\x1a\x11VEG(\x93\x18\xf2\xbc\x17\x1f\xd7\x89F(G\x18S\xda\x99\xdb\xeb\xa0\xc9*\xbd\xb4=Y;\xa8\xed\xd2\xa9\xa2\x87\xa0\xfb\r\xf7I1]:\xd1;h\xc6\xe2M\xf2\x005\x96\x9b\xd1\x92\x048\xb2\x02\xf1C\xdf\xa6\xc2\xb2\x1d\n:mnO8\\\xa1\x7f\x92r\x95\x96\xda7\xea\x85\xc8\x8c\xa8^\xb7\x1f\x80\x05\x03\xbb\xef9C\xcb(\x9bF\vHFW\x04\x1d\xc7LkW\xb2\xe9\xdd\x17\xe8%\x86\xd1H\rR\xafX\x1f\xea') r4 = socket(0x40000000015, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(r4, 0x114, 0x8, &(0x7f00000008c0)=0x2, 0x4) syz_genetlink_get_family_id$fou(&(0x7f0000000140)='fou\x00') r5 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r5, &(0x7f0000000300)={0x2, 0x4e20, @local}, 0x10) sendto$inet(r5, 0x0, 0x100000351, 0x20020059, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) ioctl$int_in(r5, 0x5452, &(0x7f00000003c0)=0xe1) shutdown(r5, 0x1) accept4(r5, 0x0, &(0x7f0000000080), 0x80000) bind(0xffffffffffffffff, &(0x7f0000000100)=@xdp={0x2c, 0x0, 0x0, 0x2a}, 0x80) r6 = socket$inet_tcp(0x2, 0x1, 0x0) r7 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r8 = creat(&(0x7f0000000300)='./file0\x00', 0x0) ioctl$EXT4_IOC_MOVE_EXT(r7, 0xc028660f, &(0x7f0000000200)={0x0, r8}) r9 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x80500, 0x0) bind$inet(r9, &(0x7f0000000300)={0x2, 0x4e20, @local}, 0x10) sendto$inet(r6, 0x0, 0x100000351, 0x20020059, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) fcntl$dupfd(0xffffffffffffffff, 0x0, r5) ioctl$int_in(r1, 0x0, &(0x7f00000004c0)=0xe0) [ 950.400081][T14432] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. [ 950.724738][T14795] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.2'. 21:45:32 executing program 4: r0 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r1 = creat(&(0x7f0000000300)='./file0\x00', 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000200)={0x0, r1}) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x40001, 0x0) ioctl$KVM_SET_TSC_KHZ(r2, 0xaea2, 0xfffffffffffffffc) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x11, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b40500000000000000004605000000000000950000000000000000e6ff000000"], &(0x7f0000003ff6)='G\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) 21:45:32 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0}}], 0x4000000000001de, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='mountinfo\x00') preadv(r0, &(0x7f00000017c0), 0x3a8, 0x0) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r2 = creat(&(0x7f0000000300)='./file0\x00', 0x0) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000200)={0x0, r2}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r2, 0xc05c5340, &(0x7f0000000080)={0x8, 0x7, 0x8, {0x0, 0x989680}, 0x61, 0x7}) 21:45:32 executing program 5: creat(&(0x7f0000000040)='./bus\x00', 0x0) pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f00000003c0)=0x1) ioctl$TIOCGSID(r3, 0x5429, &(0x7f0000000000)) sendmsg$nl_netfilter(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)=ANY=[@ANYRESHEX], 0x64}}, 0x80) splice(r2, 0x0, r1, 0x0, 0x10000011001, 0x0) r4 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r5 = creat(&(0x7f0000000300)='./file0\x00', 0x0) ioctl$EXT4_IOC_MOVE_EXT(r4, 0xc028660f, &(0x7f0000000200)={0x0, r5}) r6 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setfsgid(r7) getgroups(0x7, &(0x7f0000000200)=[0xee00, 0xee00, 0x0, 0xee00, 0xee00, r7, 0x0]) write$FUSE_DIRENTPLUS(r4, &(0x7f0000000400)={0xc0, 0x0, 0x1, [{{0x0, 0x1, 0x1, 0xbcbf, 0x2, 0x1, {0x4, 0x9, 0x9, 0x3, 0x2, 0x7f, 0x0, 0x3, 0xff, 0x5, 0x80000000, 0xee01, r8, 0x3, 0x3}}, {0x4, 0x200, 0x11, 0x80, '/dev/vga_arbiter\x00'}}]}, 0xc0) r9 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) splice(r0, 0x0, r9, 0x0, 0xffffffff, 0x0) r10 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r10, 0x5423, &(0x7f00000003c0)=0x1) r11 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vga_arbiter\x00', 0x8000, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r11, 0xc0406619, &(0x7f0000000280)={{0x4, 0x0, @reserved="3231cc9706f89986b2c972e0ba938c93f245023e0b83b0af64a6c27860073f8e"}}) r12 = fcntl$dupfd(r10, 0xc0a, r2) ioctl$TIOCSLCKTRMIOS(r12, 0x5457, &(0x7f00000000c0)) r13 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r13, 0x5423, &(0x7f00000003c0)=0x1) ioctl$TIOCMSET(r13, 0x5418, &(0x7f0000000100)=0x3ff) 21:45:33 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000340)='cgroup.subtree_control\x00', 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$CAIFSO_LINK_SELECT(0xffffffffffffffff, 0x116, 0x7f, 0x0, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f00000003c0)=0x1) getsockopt$bt_l2cap_L2CAP_LM(r2, 0x6, 0x3, &(0x7f0000000100), &(0x7f0000000180)=0x4) ioctl$TCSETS2(r3, 0x402c542b, &(0x7f0000000040)={0x7f, 0x5f8, 0x7f9bae37, 0x2, 0x48, "4b21a5780b1f2819534a1c93f424ec09a4308f", 0xe27, 0x8001}) write$cgroup_subtree(r1, &(0x7f0000000280)=ANY=[@ANYBLOB="2d63707520ff92b2f197d86ad80547edb4cd282eaa6ef7ad6224d7b3ecb7b7a2436978ac3aad2814b44d3d3a4a9f842473a457206fcb95c665a50bd1a286b2445614306acda1963025e1dfa600a8713bc838b04a459a4600db8401f170d92ee34e1f04ea91df2bacb934a272caa68cb930f14608493b756c3d164ffa1f3c97a8728bf67e946ec1000000000000000035716ed0be9fb90437e907d4ee63c572a67fb888108744339e535a893509d12bb3d06a2e00"/189], 0x5) write$cgroup_subtree(r1, &(0x7f00000000c0)={[{0x2b, 'cpu'}]}, 0x5) 21:45:33 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f00000003c0)=0x1) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="000705005d8e0f1d21e095e1ea79c5125d11623f00000000de82f1f19a5f19f2116c8fbee4336500000000007b975df0530004000000", @ANYRES32=r1, @ANYPTR64=&(0x7f0000000040)=ANY=[@ANYRESHEX=r2, @ANYRESDEC, @ANYRES64=r1]], 0x3}, 0x1, 0x0, 0x0, 0x8000001}, 0x0) r3 = socket(0x10, 0x80002, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup2(r5, r4) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) sendmmsg$alg(r3, &(0x7f00000001c0)=[{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000100)="c5f87ac88c882f51421e1023a7e3231513", 0x100000020}], 0x1, &(0x7f0000000180)=[@op={0x18, 0x117, 0x3, 0x3}, @assoc={0x18, 0x117, 0x4, 0xa}], 0x30, 0x20000000}], 0x1, 0x0) 21:45:33 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000940)='tmpfs\x00', 0x0, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) syz_open_dev$ndb(&(0x7f0000000100)='/dev/nbd#\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) userfaultfd(0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000340)='/dev/fuse\x00', 0x2, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r2) mkdir(&(0x7f0000001340)='./file0\x00', 0x0) r3 = open(0x0, 0x0, 0x0) openat$cgroup_procs(r3, &(0x7f0000000200)='cgroup.procs\x00', 0x2, 0x0) rmdir(&(0x7f00000000c0)='./file0\x00') syz_open_procfs(0x0, &(0x7f0000000240)='fd/3\x00W\xf6Je|H\x10\x05\xf1\xab\xc4MJ\xcbP\xed@\xe8\xe39\xd2\xea\xaap\xf9\x1aTM\x1f\x8e\x86c\xb4T\xde\x10\xf6\xa1\x89\xea)6\xca\x00\xa2\x04\xe6}\xaa\xd4\xf6~\xd0\x04bq\xe5\xa2\x99t;zzV\x15t[f\x16\x9dL\xe3\xc9\xf8Q\xf3<\x98\x9a\x1b\xb9\x87@\xe9#\x99\xd6\xb8\xa4\xb1T\xdd\xe0\x93\xd0\xd5\xd8\x0f\x11y\xef\xf1R\v\xd6\x81\x97\xa96,q\xd053\x1a\x11VEG(\x93\x18\xf2\xbc\x17\x1f\xd7\x89F(G\x18S\xda\x99\xdb\xeb\xa0\xc9*\xbd\xb4=Y;\xa8\xed\xd2\xa9\xa2\x87\xa0\xfb\r\xf7I1]:\xd1;h\xc6\xe2M\xf2\x005\x96\x9b\xd1\x92\x048\xb2\x02\xf1C\xdf\xa6\xc2\xb2\x1d\n:mnO8\\\xa1\x7f\x92r\x95\x96\xda7\xea\x85\xc8\x8c\xa8^\xb7\x1f\x80\x05\x03\xbb\xef9C\xcb(\x9bF\vHFW\x04\x1d\xc7LkW\xb2\xe9\xdd\x17\xe8%\x86\xd1H\rR\xafX\x1f\xea') r4 = socket(0x40000000015, 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(r4, 0x114, 0x8, &(0x7f00000008c0)=0x2, 0x4) syz_genetlink_get_family_id$fou(&(0x7f0000000140)='fou\x00') r5 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r5, &(0x7f0000000300)={0x2, 0x4e20, @local}, 0x10) sendto$inet(r5, 0x0, 0x100000351, 0x20020059, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) ioctl$int_in(r5, 0x5452, &(0x7f00000003c0)=0xe1) shutdown(r5, 0x1) accept4(r5, 0x0, &(0x7f0000000080), 0x80000) bind(0xffffffffffffffff, &(0x7f0000000100)=@xdp={0x2c, 0x0, 0x0, 0x2a}, 0x80) r6 = socket$inet_tcp(0x2, 0x1, 0x0) r7 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r8 = creat(&(0x7f0000000300)='./file0\x00', 0x0) ioctl$EXT4_IOC_MOVE_EXT(r7, 0xc028660f, &(0x7f0000000200)={0x0, r8}) r9 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x80500, 0x0) bind$inet(r9, &(0x7f0000000300)={0x2, 0x4e20, @local}, 0x10) sendto$inet(r6, 0x0, 0x100000351, 0x20020059, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) fcntl$dupfd(0xffffffffffffffff, 0x0, r5) ioctl$int_in(r1, 0x0, &(0x7f00000004c0)=0xe0) 21:45:33 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r2, 0x40086607, &(0x7f0000000100)=0xfffffffffffff800) r3 = semget$private(0x0, 0x207, 0x0) semctl$SETALL(r3, 0x0, 0x11, &(0x7f0000000000)) semctl$GETPID(r3, 0x0, 0xb, &(0x7f0000000140)=""/4096) [ 952.244614][T15032] EXT4-fs warning (device sda1): ext4_group_extend:1791: will only finish group (524288 blocks, 256 new) [ 952.414202][T15032] EXT4-fs warning (device sda1): ext4_group_extend:1797: can't read last block, resize aborted 21:45:34 executing program 1: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r2 = creat(&(0x7f0000000300)='./file0\x00', 0x0) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000200)={0x0, r2}) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000380)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ENABLE(r2, &(0x7f0000000500)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x57000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000400)={0xb8, r3, 0x1, 0x70bd2b, 0x25dfdbff, {}, [@TIPC_NLA_LINK={0x6c, 0x4, [@TIPC_NLA_LINK_PROP={0x54, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x80000001}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x18}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3f}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x13}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfffff801}]}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}]}, @TIPC_NLA_MON={0x14, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x7fffffff}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x5}]}, @TIPC_NLA_NODE={0x24, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x2967}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x200}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x1}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}]}]}, 0xb8}, 0x1, 0x0, 0x0, 0x800}, 0x4000000) mkdir(&(0x7f0000000040)='./file1\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0xffdbc494) creat(&(0x7f0000000080)='./file1\x00', 0x100) link(&(0x7f0000000240)='./file0\x00', &(0x7f00000000c0)='./file1/file0\x00') creat(&(0x7f0000000000)='./file0\x00', 0x4) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r4, 0x5423, &(0x7f00000003c0)=0x1) fcntl$getflags(r4, 0xc17) r5 = syz_open_dev$vbi(&(0x7f0000000140)='/dev/vbi#\x00', 0x2, 0x2) sendmsg$IPVS_CMD_GET_SERVICE(r5, &(0x7f00000002c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000280)={&(0x7f00000001c0)={0x7c, 0x0, 0x200, 0x70bd29, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x5}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0xff}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x11}, @IPVS_CMD_ATTR_SERVICE={0x38, 0x1, [@IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x20, 0x31}}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'fo\x00'}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e23}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x32}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x3b}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x92ff}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0xa4}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x3}]}, 0x7c}, 0x1, 0x0, 0x0, 0x2000c040}, 0x80) sendmsg$IPVS_CMD_GET_INFO(r2, &(0x7f0000000640)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x400150}, 0xc, &(0x7f0000000600)={&(0x7f0000000580)={0x58, 0x0, 0x1, 0x70bd2c, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_DEST={0x3c, 0x2, [@IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x6}, @IPVS_DEST_ATTR_TUN_TYPE={0x8}, @IPVS_DEST_ATTR_TUN_TYPE={0x8, 0xd, 0x2}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x4}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x400}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x4f}, @IPVS_DEST_ATTR_TUN_TYPE={0x8}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8}]}, 0x58}, 0x1, 0x0, 0x0, 0x10}, 0x4006) 21:45:34 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, &(0x7f0000000180)=0x1, 0x4) r2 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r2, 0x40086607, &(0x7f0000000100)=0xfffffffffffff800) r3 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r4 = creat(&(0x7f0000000300)='./file0\x00', 0x0) ioctl$EXT4_IOC_MOVE_EXT(r3, 0xc028660f, &(0x7f0000000200)={0x0, r4}) ioctl$VIDIOC_TRY_EXT_CTRLS(r3, 0xc0205649, &(0x7f0000000140)={0xa30000, 0x0, 0x6, [], &(0x7f00000000c0)={0x990a7c, 0x5, [], @p_u8=&(0x7f0000000000)=0x3}}) r5 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r6 = creat(&(0x7f0000000300)='./file0\x00', 0x0) ioctl$EXT4_IOC_MOVE_EXT(r5, 0xc028660f, &(0x7f0000000200)={0x0, r6}) ioctl$VHOST_SET_VRING_CALL(r2, 0x4008af21, &(0x7f00000001c0)={0x3d765475a5decf1d, r5}) 21:45:34 executing program 4: unshare(0x40000a00) inotify_init1(0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x801c581f, &(0x7f0000000000)={0x10000, 0x7, 0x1, 0xffffffff, 0xffffffff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffb, 0x0, @perf_config_ext={0xfffffffffffff48a}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_AF_SPEC={0x8, 0x1a, [{0x4, 0x2}]}, @IFLA_GROUP={0x8}]}, 0x30}, 0x1, 0x0, 0x0, 0x600}, 0x0) [ 953.597242][T15242] EXT4-fs warning (device sda1): ext4_group_extend:1791: will only finish group (524288 blocks, 256 new) [ 953.749028][T15242] EXT4-fs warning (device sda1): ext4_group_extend:1797: can't read last block, resize aborted [ 954.129104][T15242] EXT4-fs warning (device sda1): ext4_group_extend:1791: will only finish group (524288 blocks, 256 new) [ 954.460759][T15242] EXT4-fs warning (device sda1): ext4_group_extend:1797: can't read last block, resize aborted [ 954.628875][T15255] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 954.840240][T15255] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 954.938210][T15255] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 21:45:37 executing program 3: syz_mount_image$ext4(&(0x7f0000000240)='ext2\x00', &(0x7f00000000c0)='./file0\x00', 0xfffffffffffffffd, 0x0, 0x0, 0x128681e, &(0x7f00000001c0)={[{@sb={'sb', 0x3d, 0xe6}, 0x7}], [{@measure='measure'}, {@fsname={'fsname', 0x3d, 'sb'}}]}) getrusage(0x0, &(0x7f0000000280)) r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000200)='/dav/ubi_ctrl\x00', 0x20400, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x4, 0x1, 0x1f, 0x1, "b86b1cd3ce4f6fd59bd45513926d4145e9d40fa0eb443618ed0c36df6bbbb082d24f8f89d7c3f1b83455a49de2e9cda1c715ff6f70e0f832cbbd20e064f480da", "b35f8dcebe097542b3b4d9582bbd8e86a6edfc3d2298f314c48c52d35459a6d3", [0x2f, 0xfff]}) socket$inet6_dccp(0xa, 0x6, 0x0) write$P9_RFLUSH(r0, &(0x7f0000000040)={0x7, 0x6d, 0x1}, 0x7) 21:45:37 executing program 1: r0 = open(&(0x7f0000000340)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/de\x8e/ptmx\x00', 0x803, 0x0) write$binfmt_aout(r1, &(0x7f00000002c0)=ANY=[], 0xae9d8214) getpeername(r0, &(0x7f0000000000)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @broadcast}}, &(0x7f00000000c0)=0x80) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)={0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x2000000}) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r2, &(0x7f0000000240)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @empty}, r3}}, 0x48) write$RDMA_USER_CM_CMD_LISTEN(r2, &(0x7f0000000040)={0x7, 0x8, 0xfa00, {r3}}, 0x10) write$RDMA_USER_CM_CMD_DESTROY_ID(r2, &(0x7f0000000200)={0x1, 0x10, 0xfa00, {&(0x7f0000000000), r3}}, 0x18) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r0, &(0x7f0000000100)={0x4, 0x8, 0xfa00, {r3, 0x3}}, 0x10) r4 = syz_open_pts(r1, 0x0) dup3(r4, r1, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r0, 0x0) 21:45:37 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = open(&(0x7f0000000080)='./bus\x00', 0x341042, 0x2) ioctl$EXT4_IOC_GROUP_EXTEND(r2, 0x40086607, &(0x7f0000000100)=0xfffffffffffff800) 21:45:37 executing program 2: r0 = socket$unix(0x1, 0x2, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) creat(&(0x7f0000000280)='./file0\x00', 0x0) r2 = syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='9p\x00', 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r1, @ANYBLOB=',wfdno=', @ANYRESHEX=r2, @ANYBLOB='T\x00']) open(&(0x7f0000000040)='./file0\x00', 0x800, 0x0) ioctl$BLKTRACESTART(r1, 0x1274, 0x0) 21:45:37 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, 0x0, 0x0) sched_setaffinity(0x0, 0x3d31, &(0x7f0000000200)=0xa000000000000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = getpgrp(0x0) setpriority(0x0, r1, 0xffff) socketpair$unix(0x1, 0x1, 0x0, 0x0) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000300)=ANY=[@ANYBLOB="5b643a3a5d2c303a3a363a0058b725cb3e0c64b648cbe0243149271cdaee82c12a08611ef908878965f61cecff28153dfcb51999163e42f7083cf5edd50c65cded03895307d23f182e2258d4df507f62b3ca355fa91c565285db1b125619823501d1572292c37bcf1430146d0d13f5fd8399f833d396d46d3707fd34b2d80e1a748c172f0c28f58d0de52e17b3a90ab243dcfb3add5e6929d9fa739e39b98ce57923cd4903aa22db27510fc59e2d4f47da7b3b19c92a9fb2a2edbb80"], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) dup(r0) ioctl$VIDIOC_ENUMAUDIO(0xffffffffffffffff, 0xc0345641, &(0x7f00000000c0)={0x0, "6db89f6c4f2a4515e55483340394d3014e8f94027b45973670359769b7902474", 0x0, 0x2}) socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 21:45:37 executing program 4: ioctl$EVIOCGPHYS(0xffffffffffffffff, 0x80404507, &(0x7f0000000340)=""/248) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) creat(&(0x7f00000006c0)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r3, &(0x7f0000000280)=ANY=[@ANYBLOB="1500000065ffff0180000008003950323030302e4cc74502f987c2cec6504df6ead74ed8a60ab563e98b4b2a3d27a7082dbb78abd55fba3da80b856445ab100621d6234555c08dc540473786cd89e9b08e3f5972fe9ca162b123e19268c89c9dd81c796f27f537cc5a3fb54aff8eaf5b96a6711d4679079d00"/131], 0x15) r4 = dup(r3) write$FUSE_BMAP(r4, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_NOTIFY_RETRIEVE(r4, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000580)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r3}}) r5 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/autofs\x00', 0x2c0100, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r5, 0x4008240b, &(0x7f0000000180)={0x0, 0x70, 0x88, 0x9, 0x6, 0x7, 0x0, 0x3f, 0x1000, 0x2, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x7, @perf_config_ext={0x1f, 0x2}, 0x38a0, 0x1, 0x2, 0x1, 0x0, 0x6923, 0xff}) [ 956.355218][T15292] 9pnet: Insufficient options for proto=fd 21:45:37 executing program 3: r0 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0x0, 0x0) r1 = socket(0x2, 0x1, 0x0) ioctl$NBD_SET_SOCK(r0, 0xab00, r1) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) mknodat(r2, &(0x7f0000000180)='./file0\x00', 0x4, 0x6) r3 = creat(&(0x7f0000000300)='./file0\x00', 0x0) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000000200)={0x0, r3}) ioctl$SIOCSIFMTU(r3, 0x8922, &(0x7f0000000040)={'bridge_slave_1\x00', 0x2}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) ioctl$KVM_GET_FPU(0xffffffffffffffff, 0x81a0ae8c, &(0x7f00000005c0)) pipe2$9p(0x0, 0x0) ioctl$EVIOCGMTSLOTS(0xffffffffffffffff, 0x8040450a, 0x0) write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0) ioctl$NBD_DO_IT(r0, 0xab03) r4 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r5 = creat(&(0x7f0000000300)='./file0\x00', 0x0) ioctl$EXT4_IOC_MOVE_EXT(r4, 0xc028660f, &(0x7f0000000200)={0x0, r5}) r6 = inotify_init1(0x80000) sendmsg$nl_generic(r4, &(0x7f00000003c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000780)=ANY=[@ANYBLOB="040200004000000425bd7000fddbdf25110000008800120056fb9f5d03c778f8e2ea24fc35c6bc84b02811ec5a6d5c443909a8357802e52c95b759dd3a705f5aacd34af943ef49956cbc4fd7cc556b92b61b712bc3b784c7e73bc67140f947f2d8bce0f27b4ab73df05561065405acf72e87c57557f22df6294cb570a445772c07a88d61b005cc13608b8fbcc87f46305352e49bdd62e2b5578d12b8080061004a1e3a043c9ea0793d70fb99b264b298b3a45b35ad0246cd0726156d73e85697b0d6e66e34ae31c45d2ed1882d5e887b7b76bbc1df100d87a4f4c5b713f55019cba761b899ddd16a943c5ce7c5c1e67fea5c2e7900", @ANYRES32=r6, @ANYBLOB="0c005a000800000000000000026dfe62a48129e896a3f7766ad288d69b914a12547edffc3cd2cc0273b5be405f2cbd9e0e2dff030000ba68d88402000000c9e76f2fcee49b6370358e34d5065e5e777e0bb2fa1b6e877332d61118bce2dd9c9d6e3da528c83df76e273f51db1edd8bedc21bc6f95294ba9b32f7481a56e18fb381f6992225aeedb272dd1116a94e03714bd7eb254890e10ec53bfa56829fa5880451d203280a100032000c002000262a402d29000000669a7cafd039f797b6ae7ae1d0e9f67869db3d0e8e8c0686d37fc867e1dca0406680352fe8ec51a29a9c6d5bd83dc1f4a17c7037fdf730bfd3fe367ab748587e496a792ee72dadf2287ecd43c10a3eeef1fe72cd77ed4f7e9f143228b65b0db00cb0b0686d5364317417a97839133a145c50882be660dd144dc0c8403203eea8201569f3cdebb5629d8e3260e3232b04a64a8e6396440901b98d26c833a4b1f21c7d48304285ab3b0000"], 0x204}, 0x1, 0x0, 0x0, 0x30b1c9e19e9a9a2b}, 0x1) r7 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x800, 0x0) setsockopt$TIPC_CONN_TIMEOUT(r7, 0x10f, 0x82, &(0x7f0000000100)=0x6, 0x4) 21:45:37 executing program 0: r0 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r1 = creat(&(0x7f0000000300)='./file0\x00', 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000200)={0x0, r1}) ioctl$IOC_PR_CLEAR(r0, 0x401070cd, &(0x7f0000000000)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r4, 0x40086607, &(0x7f0000000100)=0xfffffffffffff800) [ 956.639593][ T26] audit: type=1804 audit(1573681538.057:1218): pid=15326 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir367653147/syzkaller.va62Qi/336/file0" dev="sda1" ino=16748 res=1 [ 956.711745][T15401] 9pnet: Insufficient options for proto=fd 21:45:38 executing program 1: mmap(&(0x7f00002ea000/0x2000)=nil, 0x2000, 0x0, 0x392d6ad36ec2c8b2, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = accept4$netrom(0xffffffffffffffff, &(0x7f0000000140)={{0x3, @netrom}, [@remote, @default, @default, @default, @null, @null, @null]}, &(0x7f0000000080)=0x48, 0x800) pwritev(r1, &(0x7f0000001440)=[{&(0x7f00000001c0)="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", 0x1000}, {&(0x7f00000011c0)="8a5945d14f95a55148fd273bd4e91672689eacf5688aa45e66622a2c7b0325db7721e1c2e877ce5f79f7092ca26f6f5da30bb39ac2a5512ce15a4b86f4831ac3b832e3a95de4923a41d48030bb803979cc7d868902a8ef7d41bddd58feb62ced21fd9d3664d72fb81421a4b6bb9c02b0dbc58982c4088af5f3bd5734fbb1e953cfd54fe8cb7dc6c725201d0cb802ab5555c03fc02c22c773a1e55475776e758e73c0e0f08f2af94e30d26f78186f5d5e1810f981137966d148cce169ab413fb05557f47d61138ba1d728dee9", 0xcc}, {&(0x7f00000012c0)="c3de9f60631a30a2f737872f780cfab92965a532f6313d8292483695489ef8893e76137ebd85935317d23a37e111b759cf7abe3d5bc84e776e7b07f7e960f539ce539d5825d79b19159eaad23f2b02f94b591d1034ba5a941c8c9d17feecebc1540005ec8d0e243ef0c8cd2e540d8c9f06b48cbe7deb8a1d529fa97572094e4957943457f9241f32c9d8bb5fb571f42d7b7cbe17d0e016b5e846a3f3b924992e2e4b6d2a9d391e48c7344fd990ee8d6d639bb2bcaabc1b914a93d6be0431293d9dff5939e37da83dd03a450ce4ab5595fec02e3f", 0xd4}, {&(0x7f00000013c0)="8d97cf7fe569f9a90f85bf185393c8bb110b90b6c4b2285074d208bb5b13c57425fb2c68001db9d0270a2851ea7c575b55f41572588c4b522dd3b70b23b339220156a7c1d508aa1cf72c7125dc104a0fbdb4af953a6840ef8a16", 0x5a}], 0x4, 0x800000000) r2 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = userfaultfd(0x0) ioctl$UFFDIO_API(r3, 0xc018aa3f, &(0x7f00000000c0)) ioctl$UFFDIO_REGISTER(r3, 0xc020aa00, &(0x7f0000000040)={{&(0x7f000054f000/0x3000)=nil, 0x3000}, 0x1}) 21:45:38 executing program 2: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000000)) ioctl$SG_GET_ACCESS_COUNT(0xffffffffffffffff, 0x2289, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x0, 0x0) openat$mixer(0xffffffffffffff9c, 0x0, 0x2000, 0x0) ptrace$getsig(0x4202, 0xffffffffffffffff, 0xfffffffffffffffe, &(0x7f0000000240)) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000240)={0xa, 0x0, 0x0, @mcast1, 0x3}, 0x1c) r3 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000180)='/proc/capi/capi20ncci\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000000540)={{{@in=@initdev, @in6=@empty}}, {{@in6=@empty}, 0x0, @in=@local}}, &(0x7f00000002c0)=0xe8) setsockopt$SO_TIMESTAMPING(r2, 0x1, 0x25, &(0x7f0000000000)=0x576, 0x4) preadv(r1, 0x0, 0x100000064, 0xffffffffffffffff) connect(r2, &(0x7f00000001c0)=@in={0x2, 0x4e20, @remote}, 0x80) sendmmsg(r2, &(0x7f00000002c0), 0x4000000000000d7, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0x0) accept4$bt_l2cap(0xffffffffffffffff, 0x0, &(0x7f0000000100), 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) r4 = syz_open_dev$dmmidi(&(0x7f0000000080)='/dev/dmmidi#\x00', 0x6, 0x882) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x200000000000000, 0x0, 0x0) [ 957.193210][T15409] EXT4-fs warning (device sda1): ext4_group_extend:1791: will only finish group (524288 blocks, 256 new) [ 957.395995][T11065] block nbd3: Receive control failed (result -107) [ 957.516236][T15409] EXT4-fs warning (device sda1): ext4_group_extend:1797: can't read last block, resize aborted [ 957.638769][T15400] block nbd3: shutting down sockets [ 957.807616][T32159] libceph: connect (1)[d::]:6789 error -101 [ 957.910188][T32159] libceph: mon0 (1)[d::]:6789 connect error 21:45:39 executing program 1: r0 = syz_open_dev$sndtimer(&(0x7f0000000180)='/dev/snd/timer\x00', 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x82, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x1ff}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) open(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RWALK(0xffffffffffffffff, 0x0, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r2, 0x0) write$P9_RWALK(r2, &(0x7f00000003c0)=ANY=[@ANYRES64], 0x8) r3 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0xfffffff6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r2, r3) pipe(&(0x7f0000000300)={0xffffffffffffffff}) close(0xffffffffffffffff) r5 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000340)='/dev/qat_adf_ctl\x00', 0x442000, 0x0) r6 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r6, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r6, &(0x7f0000000240)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @empty}, r7}}, 0x48) write$RDMA_USER_CM_CMD_LISTEN(r6, &(0x7f0000000040)={0x7, 0x8, 0xfa00, {r7}}, 0x10) write$RDMA_USER_CM_CMD_DESTROY_ID(r6, &(0x7f0000000200)={0x1, 0x10, 0xfa00, {&(0x7f0000000000), r7}}, 0x18) write$RDMA_USER_CM_CMD_BIND_IP(r5, &(0x7f0000000380)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e23, 0x7, @local, 0xfffffe00}, r7}}, 0x30) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000080)='ip6_vti0\x00 \x00', 0x10) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) splice(r4, 0x0, 0xffffffffffffffff, 0x0, 0x10004, 0x0) ioctl$SNDRV_TIMER_IOCTL_START(r0, 0x80045400) r8 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000240)='/dev/dlm_plock\x00', 0x2440, 0x0) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000000700)={0x1, 0x3, 0x5, 0x8, 0x1, [{0x7, 0x400, 0xfffffffffffff194, 0x0, 0x0, 0x400}]}) ioctl$int_out(r8, 0x5462, &(0x7f00000002c0)) sendmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f00000000c0)=@l2={0x1f, 0x0, {0x8d, 0x79, 0x4f, 0x80, 0xf1, 0x7b}, 0x5, 0x3}, 0x80, &(0x7f0000000140)=[{&(0x7f0000000400)="707ac600f7339f8867951928b37f5a85741b4b71d06ebd4975a54f2c301215087ec1be3d7c7bff5eeb106e4f4c7f4f0d4873a4df5db2884cedf6d0e30296c710e27fa5ba76c765e5cf627c47b74112c1d7cf54add7e31f259730835d4fb76af773252c356d7f4f2a014f98913e1f1c506918b8849cfbcfa223f6df773ab6f91d237b14337e118ff7a88294f6cc50d60096a23bfc364d761fab6aec51156b3a435eed871f0e52d89e4ea327b309b432fc74d5938623a8f5d1f513fb3ea7f044aa196b2d9a1096f6461fbb", 0xca}, {&(0x7f0000000040)="30acdd697755bb57030b", 0xa}], 0x2, &(0x7f0000000500)=[{0xc0, 0x113, 0x40000, "0224d2ad7527e39b50fb233ab07480cc3c11bc058533b4bd6101ab92d7f2c6d41ba8556e720800dd41a8df0f24993f233599d4c0b22a5d6dd9efa101b9626fbc5a7e9e76aa3cba3f3654f8468fed9289079f64a09d2dcc38096c60e71c1a516600d2a3812b27dd27b5fad9ba3b0470e7bc92614b2093179857c8aa1e724866fc7d4e54e39eadfb89d5b3bea87505c65c0dbc8d9c02553bfa3bad9afdef7689ce250d3f234f185ab85e37"}, {0x80, 0x114, 0x0, "b1d3609eaa64986621216530f686a56a8340e4dd274b4eefa44bd136a24d70565e82c7cf2958f8a03d94a3dc781cdb1d65e6bafe4c999e2ede86275ce8241ad7c763184352ad3411382bc40120037930f078e7f0b836be78359bbbed9a8d3a8c3516e07a3fddc2c8f4"}, {0x78, 0x6, 0x0, "d334f50667ba449b382ff8475a1587843b5082766bed1baad2b89c8f796f2966e5a3301a5d65c56c094f92e1489cc1fa624b9fca34e64a724a7793665bf9913f5575213c5bc49040c0ee1aa6545c31ce6cf12675a0bb33370f7023277b74d313721dcce4"}, {0x20, 0x107, 0x0, "cfbf109153757ce6f181c5baf8cdfc"}], 0x1d8}, 0x4000) 21:45:39 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) openat$tun(0xffffffffffffff9c, &(0x7f0000000340)='/dev/net/tun\x00', 0x400000001, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f00000006c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6\xf23F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0_\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\xa9\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&k\x80K\xd1>\xa6\xff(\xb1\x01\xe7\xa5\xce-A\xb0\xec\x190r-q\x83\xb3mN\x91\'\xc5\xf8\xfe\x18\x16\xb7R6\xa9R\xf4H\xa7\x84\x98\xfc\xf9\xa6\xd6\x8d\xa7\xd5_\xc0\x93\xde\x1f`\xff\xcf\xe1)N\x85&\x8b\x06I\xa2\x13\x02\x00\x00\x00\x00\x00\x00\x00[\xae5\x82}\xb7h!\xd9\xce\xe9\x06\b\rs^\x8d\x14\xc1\x97m@6\x1d\xfc\x92@-\xb6\xe5N\x84\xbc\xc0\x1f\xfbI\'M\xdd\xc6*\x06&\f\b\xa6\x92)D}\x87\x80\xea\xb9l\x80H\xea\x82o6\xfa)\x15\xdc@\xf4\x86\xd6_\xf9+/Q\xd5\x8a;\x8b\xe1\x1d\xd0\xec\x8ek\xdb\xa8\xf3Ir\xdb1`B&\xe8A\xd1\xea\xb4$5%aL\xc1\xbd\x91\xc3\x90\x06i <1\xaa\"\xd5\xbb\xe9\xc7SX\xbfm{>\xd4\xc3(E[\xb0J13\xbbG\x8a\xb4\x8aMs\x9f\xcf\xb8g\xab\x12\x8cj\x95}\xb1\bc\xc4u\xf4\xe2\x88\xfa\xde\xec\xdf\xb9\x98\x84\x028\xd9_n\x9f\x86\x88\xe6\x15b\x01]\x01a\xe7\xb9\xb0\xbdk\xaa\xa1\xc1') pipe(&(0x7f00000000c0)) r2 = open(&(0x7f0000000000)='./bus\x00', 0x143042, 0x0) ftruncate(r2, 0x200004) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800007f, 0x0, 0x3049e9353b074268, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x80001d00c0d0) [ 958.037140][T32159] libceph: connect (1)[d::]:6789 error -101 [ 958.051201][T11065] block nbd3: Receive control failed (result -107) 21:45:39 executing program 0: perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x400000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) r1 = getpgrp(0x0) perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0x0, 0xffffffffffffffff, 0x0) setpgid(r0, r1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r2) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f00000003c0)=0x1) r4 = fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x10400202) r5 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r5, 0x40086607, &(0x7f0000000100)=0xfffffffffffff800) r6 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r7 = creat(&(0x7f0000000300)='./file0\x00', 0x0) ioctl$EXT4_IOC_MOVE_EXT(r6, 0xc028660f, &(0x7f0000000200)={0x0, r7}) getsockopt$inet_tcp_int(r7, 0x6, 0x8, &(0x7f0000000000), &(0x7f00000000c0)=0x4) [ 958.219907][T32159] libceph: mon0 (1)[d::]:6789 connect error [ 958.325543][T15405] block nbd3: shutting down sockets 21:45:40 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x400000001, 0x70, 0x2005, 0x0, 0x0, 0x0, 0x0, 0x1, 0x8090, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x7, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='projid_map\x00') r5 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r6 = creat(&(0x7f0000000300)='./file0\x00', 0x0) ioctl$EXT4_IOC_MOVE_EXT(r5, 0xc028660f, &(0x7f0000000200)={0x0, r6}) setsockopt$IP_VS_SO_SET_ZERO(r5, 0x0, 0x48f, &(0x7f00000000c0)={0x14e, @rand_addr=0x4, 0x4e23, 0x4, 'nq\x00', 0x8, 0x10000, 0xa}, 0x2c) write$P9_RFLUSH(r4, &(0x7f0000000080)={0x7, 0x6d, 0x2}, 0x7) bind$inet(r3, &(0x7f0000000040)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r3, 0x0, 0x0, 0x200007fe, &(0x7f0000000100)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xc}}, 0x10) sendto$inet(r3, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x1f4, 0x0, 0x0) 21:45:40 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'lo\x00'}) r1 = socket(0xa, 0x1, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) sendmsg$nl_route(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)=ANY=[@ANYBLOB="5c0000001408000100000000000000000a000000", @ANYRES32=r3, @ANYBLOB="080008000000000014000200000000000003000000000000000000011400017d1d51266d0000f7000000000006000500000000000000000600000000009d0900"/73], 0x5c}}, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'lo\x00\x00\x00\x00\x04\x00\x00\x00\x00\x06\x00', 0xfd}) 21:45:40 executing program 3: socket$inet_udplite(0x2, 0x2, 0x88) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0x19) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000003c0)=0x1) r2 = inotify_init1(0x0) ioctl(r2, 0x65d12e5a, &(0x7f0000000280)="08177ed3e1975d126296fcd47973feaa08e2e5052ef43e6d142e765eb09a5e23f7fbce4e77d95d2ada3bc679990e7ca075c827d6327794a98efc0cd25940e3fff643e54484ed7178645f56dfec2f4d9492c3c4e1d0254d74008ef0b5c86bfddd1eb005743e2629cf87a0719c17c00c20096b371981344e1326ba6cda6229838d9a81cff687ef7695e39711080a087130cfd6d6ce6ff337d4fd7db489854332731d") r3 = socket(0x2000000000000021, 0x2, 0x10000000000002) r4 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0xfffffffffffeffff, 0x50000) write$P9_RREADLINK(r4, &(0x7f0000000080)={0x10, 0x17, 0x1, {0x7, './file0'}}, 0x10) ioctl$NS_GET_OWNER_UID(r4, 0xb704, &(0x7f0000000040)) bind$rxrpc(r3, &(0x7f0000000240)=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @mcast2, 0x4}}, 0x24) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0xa25) [ 958.950781][T15649] EXT4-fs warning (device sda1): ext4_group_extend:1791: will only finish group (524288 blocks, 256 new) [ 959.196168][ T26] audit: type=1800 audit(1573681540.607:1219): pid=15664 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.4" name="bus" dev="sda1" ino=16522 res=0 [ 959.295239][T15649] EXT4-fs warning (device sda1): ext4_group_extend:1797: can't read last block, resize aborted 21:45:40 executing program 1: r0 = syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x4, 0x80000) getsockopt$inet_sctp_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000080)={0x8, [0x9, 0x6, 0x2, 0x9, 0xf2cf, 0x595e, 0x69c, 0xca9]}, &(0x7f00000000c0)=0x14) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x240, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000005700000bfa30000000000000702000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d420500000000006502faff000000000404000001007d60b7030000001000006a0a00fe000000008500000026000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) [ 959.410652][ T5] libceph: mon1 (1)[::6]:6789 socket closed (con state CONNECTING) 21:45:41 executing program 4: syz_read_part_table(0x0, 0x1036c3c195c7933, &(0x7f0000000500)=[{0x0, 0xfffffeb5, 0xffff}, {&(0x7f00000000c0)="c9ad8e12f847bc59151d148d1c494d92d785d450c90436a19860f18a974612fa5cc28e5014cb2b09c1854a85941a78ca1536fd9407e70d1c0dabc3daf8ac48b86096e18628fe525a03e1f1dc946a2d8d3c3e1cdd5a813dfbd315e59e2646f24d0d7e5034b5e0e6c486d007e61d33b6437e4890496b3321fa589e88b438ad139ca4312c98cf56ef921444f59bc1919aa1a3773c228823d8e8e5ba9b", 0x43}]) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r3 = creat(&(0x7f0000000300)='./file0\x00', 0x0) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000000200)={0x0, r3}) r4 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r5 = creat(&(0x7f0000000300)='./file0\x00', 0x0) r6 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r7 = creat(&(0x7f0000000300)='./file0\x00', 0x0) setxattr$trusted_overlay_opaque(&(0x7f0000000080)='./file0\x00', &(0x7f0000000240)='trusted.overlay.opaque\x00', &(0x7f0000000280)='y\x00', 0x2, 0x2) ioctl$EXT4_IOC_MOVE_EXT(r6, 0xc028660f, &(0x7f0000000200)={0x0, r7}) ioctl$RTC_WIE_OFF(r6, 0x7010) ioctl$EXT4_IOC_MOVE_EXT(r4, 0xc028660f, &(0x7f0000000200)={0x0, r5}) getsockopt$inet_sctp_SCTP_CONTEXT(r5, 0x84, 0x11, &(0x7f0000000000)={0x0, 0x2}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r2, 0x84, 0x1f, &(0x7f0000000180)={r8, @in6={{0xa, 0x4e22, 0x80000001, @remote, 0x7fffffff}}, 0x7, 0x6}, 0x90) 21:45:41 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@gid={'gid', 0x3d, 0xffffffffffffffff}}]}) r0 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r1 = creat(&(0x7f0000000300)='./file0\x00', 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000200)={0x0, r1}) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0x1) setreuid(0x0, r4) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x812460, &(0x7f0000000100)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r2}, 0x2c, {[{@nodevmap='nodevmap'}, {@access_any='access=any'}], [{@dont_hash='dont_hash'}, {@measure='measure'}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@subj_role={'subj_role', 0x3d, 'eth1&nodev'}}, {@fsmagic={'fsmagic', 0x3d, 0x7}}, {@uid_gt={'uid>', r4}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}]}}) [ 960.101529][T15649] EXT4-fs warning (device sda1): ext4_group_extend:1791: will only finish group (524288 blocks, 256 new) 21:45:41 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_delete(0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$team(&(0x7f00000003c0)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f00000000c0)={'team0\x00', 0x0}) sendmsg$TEAM_CMD_OPTIONS_SET(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000640)={0x58, r1, 0x1, 0x0, 0x0, {}, [{{0x8, 0x1, r2}, {0x3c, 0x2, [{0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8}}}]}}]}, 0x58}}, 0x0) bind(0xffffffffffffffff, 0x0, 0x0) bind(0xffffffffffffffff, 0x0, 0x0) getpeername(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) ioctl$SIOCSIFMTU(0xffffffffffffffff, 0x8922, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) socket(0x0, 0x0, 0x0) socket(0x0, 0x0, 0x0) [ 960.319108][T15649] EXT4-fs warning (device sda1): ext4_group_extend:1797: can't read last block, resize aborted 21:45:41 executing program 5: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x50, 0x0) r0 = creat(&(0x7f0000000200)='./file0/bus\x00', 0xbc9dc8fbd81cb4b1) fcntl$lock(r0, 0x7, &(0x7f00000003c0)={0x1, 0x0, 0x0, 0x4}) ftruncate(0xffffffffffffffff, 0x6) unshare(0x40600) ftruncate(r0, 0x81) write$P9_RLCREATE(r0, &(0x7f0000000080)={0x18}, 0xd) r1 = gettid() timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000fd7000)) timer_settime(0x0, 0x0, &(0x7f0000d07000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r1, 0x1000000000016) 21:45:42 executing program 3: r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0x1, 0x2) accept4$inet(r0, 0x0, &(0x7f0000000100), 0x80000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) syz_read_part_table(0x0, 0xaaaab82, &(0x7f0000000040)=[{&(0x7f0000000000)="0201a6ffffff00090000ff07000000000be5a9410000000000000100000000ffffff81000004800000000a0000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) [ 960.675814][T15817] netlink: 'syz-executor.1': attribute type 3 has an invalid length. 21:45:42 executing program 2: r0 = perf_event_open(&(0x7f000025c000)={0x400000001, 0x70, 0x2005, 0x0, 0x0, 0x0, 0x0, 0x1, 0x18090, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x11, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000040)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r2, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendto$inet(r2, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0x0) r3 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r4 = creat(&(0x7f0000000300)='./file0\x00', 0x0) ioctl$EXT4_IOC_MOVE_EXT(r3, 0xc028660f, &(0x7f0000000200)={0x0, r4}) r5 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000080)='/dev/cachefiles\x00', 0x400000, 0x0) r6 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r6, 0x29, 0x20, &(0x7f0000000080)={@loopback, 0x800, 0x0, 0x100000003, 0x1, 0x0, 0x0, 0x400000000}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r6, 0x29, 0x20, &(0x7f0000000300)={@mcast2, 0x10000, 0x0, 0x102, 0x8000003}, 0x20) connect$inet6(r6, &(0x7f0000000500)={0xa, 0x0, 0x40f7, @mcast2, 0x7ff}, 0x9) r7 = syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r6, r7, &(0x7f0000000240)=0x202, 0x4000000000dc) r8 = syz_genetlink_get_family_id$nbd(&(0x7f0000000140)) r9 = socket$netlink(0x10, 0x3, 0x80000000004) write(r9, &(0x7f000058bfe4)="290000001400c32408400000040860eb0100100006a40e076d3f00007f25ffffff0100002a00f3ff09", 0x29) sendmsg$NBD_CMD_RECONFIGURE(r7, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f00000000c0)={&(0x7f0000000b80)=ANY=[@ANYBLOB="14000000507aa818e3cacd2296b25eb1c031d6e34b9075569c93c4dc69c2f74a1828a11086d26c936a0508df4d05d147b4177436ecdfab73f7cd993dcb03f8c5950beffb770bd9828c9719d283a5062d94f7d2a95f278f28db34cd437cc1ab4d36575823cf1ea98f7bb974d9a823ed652cec25b2c8bad3d6b7af2d6f19ea8b622368b7e140419508261c813e884006c4ac30c801d27eaf5b946290289494", @ANYRES16=r8, @ANYBLOB="050c27bd7000ffdbdf2503000000e7401191a1d7da378753f18bb8db0c21d74b8c1994cb573ff0c5320e3fe397bd8a7c25799573fdffffffffffffff16ed2d05dfcd8089ed7cfcc53c2c4c19daee0a2449ee45439a1b546b1aba6dcc98"], 0x3}, 0x1, 0x0, 0x0, 0x4}, 0x8840) sendmsg$NBD_CMD_RECONFIGURE(r5, &(0x7f00000001c0)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)=ANY=[@ANYBLOB="74008000", @ANYRES16=r8, @ANYBLOB="000829bd7000fddbdf25030000000c00050020000000000000000c00030007000000000000000c00040008000000000000000c00080001000000000000000c0008006c000000000000000c000200f52c2f74000000000c00060000a666414e000000000000050100000000000000"], 0x3}, 0x1, 0x0, 0x0, 0x40000}, 0x20004811) r10 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r10, 0xc028660f, &(0x7f0000000200)) recvmsg$can_raw(0xffffffffffffffff, &(0x7f0000000600)={&(0x7f0000000380)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f00000005c0)=[{&(0x7f0000000400)=""/202, 0xca}, {&(0x7f0000000500)=""/161, 0xa1}], 0x2}, 0x10000) r11 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r12 = creat(&(0x7f0000000300)='./file0\x00', 0x0) ioctl$EXT4_IOC_MOVE_EXT(r11, 0xc028660f, &(0x7f0000000200)={0x0, r12}) [ 960.845755][ T2836] libceph: mon1 (1)[::6]:6789 socket closed (con state CONNECTING) 21:45:42 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x40, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000002c0)={{{@in, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in6=@dev}}, &(0x7f00000003c0)=0xe8) bind$packet(r2, &(0x7f0000000400)={0x11, 0x8, r3, 0x1, 0xe0, 0x6, @local}, 0x14) r4 = socket$inet_tcp(0x2, 0x1, 0x0) r5 = fcntl$dupfd(r1, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x4, &(0x7f0000000180)={&(0x7f00000001c0)=@newlink={0x48, 0x10, 0xe3b, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_MASTER={0x8, 0xa, 0x6}, @IFLA_LINKINFO={0x20, 0x12, @gre={{0x8, 0x1, 'gre\x00'}, {0x14, 0x2, [@IFLA_GRE_LOCAL={0x8, 0x6, @loopback}, @IFLA_GRE_REMOTE={0x8, 0x7, @multicast1}]}}}]}, 0x48}}, 0x0) 21:45:42 executing program 0: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$IMHOLD_L1(r1, 0x80044948, &(0x7f0000000000)=0x1875) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r2, 0x40086607, &(0x7f0000000100)=0xfffffffffffff800) 21:45:42 executing program 4: r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup3(r1, r2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmsg(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)}, 0x0) sendmmsg$alg(r0, &(0x7f0000000180)=[{0x2, 0x1000000000000, &(0x7f0000000080), 0x0, &(0x7f0000000100)}], 0x492492492492642, 0x0) 21:45:42 executing program 1: socket$inet_udp(0x2, 0x2, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) socket$key(0xf, 0x3, 0x2) ptrace$peekuser(0x3, 0x0, 0x1) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_DUMPABLE(0x4, 0x2) r0 = syz_open_dev$amidi(&(0x7f00000000c0)='/dev/amidi#\x00', 0xe7fe, 0x10000) ioctl$RTC_ALM_READ(r0, 0x80247008, &(0x7f0000000240)) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') mount(0x0, 0x0, &(0x7f0000000280)='tmpfs\x00', 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, 0x0, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000000640)='nbd\x00') r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r2 = creat(&(0x7f0000000300)='./file0\x00', 0x0) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000200)={0x0, r2}) setsockopt$inet_sctp6_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000040)={0x9, 0x6, 0x7f, 0xba43}, 0x8) r3 = creat(&(0x7f0000000180)='./bus\x00', 0x0) r4 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r5 = creat(&(0x7f0000000300)='./file0\x00', 0x0) ioctl$EXT4_IOC_MOVE_EXT(r4, 0xc028660f, &(0x7f0000000200)={0x0, r5}) ioctl$USBDEVFS_BULK(r4, 0xc0185502, &(0x7f0000000380)={{0xc}, 0x7, 0x2340, 0x38, 0x3, &(0x7f0000000340)="4c757ea21ea43900468d5a7cc13f1d63d323a4781cbb64992895a0db552daa5bd681986f4f64a2a560aaab2d05951b087d330988ae3ae838"}) ioctl$FS_IOC_GETFSMAP(r3, 0xc0c0583b, &(0x7f00000004c0)={0x0, 0x0, 0x1c7d9, 0x0, [], [{}, {0x801, 0x0, 0x80000001}]}) open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) getsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000002c0), 0x10) syz_genetlink_get_family_id$SEG6(&(0x7f00000001c0)='SEG6\x00') 21:45:43 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpu.stat\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x2343a726) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) [ 961.625318][T15953] EXT4-fs warning (device sda1): ext4_group_extend:1791: will only finish group (524288 blocks, 256 new) [ 961.738671][T15953] EXT4-fs warning (device sda1): ext4_group_extend:1797: can't read last block, resize aborted [ 961.791919][ T2836] libceph: connect (1)[d::]:6789 error -101 [ 961.797959][ T2836] libceph: mon0 (1)[d::]:6789 connect error 21:45:43 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) getsockopt$inet_dccp_int(r1, 0x21, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x4) r2 = timerfd_create(0x9, 0x80000) fallocate(r2, 0x6, 0x6, 0x8) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r3 = open(&(0x7f0000000080)='./bus\x00', 0x541042, 0x100) ioctl$EXT4_IOC_GROUP_EXTEND(r3, 0x40086607, &(0x7f0000000100)=0xfffffffffffff800) ioctl$DRM_IOCTL_GET_MAGIC(0xffffffffffffffff, 0x80046402, &(0x7f0000000000)) r4 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r5 = creat(&(0x7f0000000300)='./file0\x00', 0x0) ioctl$EXT4_IOC_MOVE_EXT(r4, 0xc028660f, &(0x7f0000000200)={0x0, r5}) getsockopt$inet_tcp_int(r4, 0x6, 0x3d, &(0x7f00000000c0), &(0x7f00000001c0)=0x4) r6 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r7 = creat(&(0x7f0000000300)='./bus\x00', 0x40) ioctl$EXT4_IOC_MOVE_EXT(r6, 0xc028660f, &(0x7f0000000200)={0x0, r7}) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r6, 0x40485404, &(0x7f0000000140)={{0x3, 0x3, 0x5, 0x3, 0x401}, 0x0, 0x7}) 21:45:43 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x2, 0xc) write(r0, &(0x7f0000000000)="1f0000000104ff00fd4354c007110000f305010008000100010423dcffdf00", 0x1f) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ubi_ctrl\x00', 0x303e00, 0x0) 21:45:43 executing program 1: pause() timer_create(0x7, &(0x7f0000000000)={0x0, 0x0, 0x1, @thr={0x0, 0x0}}, &(0x7f0000000040)) timer_settime(0x0, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) timer_gettime(0x0, &(0x7f0000000000)) 21:45:43 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=@newlink={0x3c, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_MODE={0x8, 0x11}]}}}]}, 0x3c}}, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000080)='/dev/vcs#\x00', 0x2, 0x200000) r2 = syz_open_dev$cec(&(0x7f00000000c0)='/dev/cec#\x00', 0x0, 0x2) close(r2) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @mcast1}], 0x1c) connect$inet6(r3, &(0x7f0000d83fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r4 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r5 = creat(&(0x7f0000000300)='./file0\x00', 0x0) ioctl$EXT4_IOC_MOVE_EXT(r4, 0xc028660f, &(0x7f0000000200)={0x0, r5}) ioctl$ASHMEM_SET_SIZE(r4, 0x40087703, 0x800) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f0000000240)=ANY=[@ANYBLOB="010000007e8e7741c473fee34a7ee5c244d4339d0884ef8276c7fc8853d17e6a8a0bf6dcea4deafa1c4fe5e55991193269adb2dddbe2b40d67b86ac5b8184354fdf818f4a28f242ada1a46a0479db00e7d202b9358813374e04f8806367be92c27579c1773884f1d3cb1377b12d53764e1f8152b97e1050da2e6b07ee22621d5054cf87282", @ANYRES32=0x0], &(0x7f0000000180)=0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r2, 0x84, 0x22, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, r6}, 0x10) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f00000000c0)={r6, @in={{0x2, 0x4e23, @multicast1}}}, 0x84) 21:45:43 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcs\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000000)={'n\x87M\x00\x00\x13\x00\x00\xf2\x00\x00\x00@\x00\x00\b', 0x400}) r3 = socket$kcm(0x29, 0x5, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') r4 = syz_open_dev$media(&(0x7f0000000040)='/dev/media#\x00', 0x400000, 0x10000) write$cgroup_subtree(r4, &(0x7f00000000c0)=ANY=[@ANYBLOB="c9810800ca"], 0x5) r5 = syz_open_dev$cec(&(0x7f00000000c0)='/dev/cec#\x00', 0x0, 0x2) close(r5) r6 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r7 = creat(&(0x7f0000000300)='./file0\x00', 0x0) ioctl$EXT4_IOC_MOVE_EXT(r6, 0xc028660f, &(0x7f0000000200)={0x0, r7}) r8 = socket$can_raw(0x1d, 0x3, 0x1) setsockopt$CAN_RAW_FD_FRAMES(r8, 0x65, 0x5, &(0x7f0000000100)=0x1, 0x4) r9 = socket(0x11, 0x800000003, 0x0) bind(r9, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2ac5000000012e0b3836005404b0e0301a060075f2e3ff5f163ee340b700000080000000000000fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c65400"}, 0x80) getsockname$packet(r9, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$can_raw(r8, &(0x7f0000000200)={&(0x7f0000000000)={0x1d, r10}, 0x10, &(0x7f0000000280)={0x0}}, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000a40)={'netdevsim0\x00', r10}) connect$packet(r6, &(0x7f0000000a80)={0x11, 0x9, r11, 0x1, 0x20, 0x6, @remote}, 0x14) r12 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r12, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r12, &(0x7f0000d83fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r12, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f0000000180)=0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r5, 0x84, 0x22, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, r13}, 0x10) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f00000001c0)={r13, @in={{0x2, 0x4e22, @multicast2}}, 0x6, 0x0, 0x1, 0x10001, 0x10}, &(0x7f0000000280)=0x98) setsockopt$inet_sctp_SCTP_ADD_STREAMS(r2, 0x84, 0x79, &(0x7f00000002c0)={r14, 0x1000, 0xfd}, 0x8) [ 962.362310][T16073] netlink: 3 bytes leftover after parsing attributes in process `syz-executor.3'. [ 962.453113][T16087] netlink: 'syz-executor.2': attribute type 17 has an invalid length. [ 962.474466][T16083] netlink: 3 bytes leftover after parsing attributes in process `syz-executor.3'. 21:45:43 executing program 5: r0 = socket$kcm(0x2, 0x2, 0x73) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10) connect(r0, &(0x7f0000000000)=@pppol2tpv3={0x2, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80) getpeername$packet(r0, 0x0, &(0x7f0000000140)) ioctl$sock_SIOCGSKNS(r0, 0x894c, &(0x7f0000000000)=0x100) perf_event_open(&(0x7f000001d000)={0x1, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') ioctl$KVM_GET_TSC_KHZ(r1, 0xaea3) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r3 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={0x0, &(0x7f0000000280)=""/237, 0x0, 0xed, 0x1}, 0x20) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000003c0)={r3, 0x0, 0x0}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000040), 0x4) bpf$MAP_CREATE(0x1000000000000, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2}, 0x0) socket$inet6_sctp(0xa, 0x10000000005, 0x84) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) socket$inet(0x2, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f0000000140)=@assoc_value={0x0, 0x4b}, 0x0) r4 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r5 = creat(&(0x7f0000000300)='./file0\x00', 0x0) ioctl$EXT4_IOC_MOVE_EXT(r4, 0xc028660f, &(0x7f0000000200)={0x0, r5}) r6 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r7 = creat(&(0x7f0000000300)='./file0\x00', 0x0) ioctl$EXT4_IOC_MOVE_EXT(r6, 0xc028660f, &(0x7f0000000200)={0x0, r7}) r8 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r9 = creat(&(0x7f0000000300)='./file0\x00', 0x0) ioctl$EXT4_IOC_MOVE_EXT(r8, 0xc028660f, &(0x7f0000000200)={0x0, r9}) r10 = syz_open_dev$cec(&(0x7f00000000c0)='/dev/cec#\x00', 0x0, 0x2) close(r10) r11 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r11, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r11, &(0x7f0000d83fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r11, 0x84, 0x1d, &(0x7f000095dff8)=ANY=[@ANYBLOB="018006cf", @ANYRES32=0x0], &(0x7f0000000180)=0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r10, 0x84, 0x22, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, r12}, 0x10) r13 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r14 = creat(&(0x7f0000000300)='./file0\x00', 0x0) ioctl$EXT4_IOC_MOVE_EXT(r13, 0xc028660f, &(0x7f0000000200)={0x0, r14}) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000240)='/dev/dlm_plock\x00', 0x1, 0x0) r15 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r15, 0x5423, &(0x7f00000003c0)=0x1) r16 = dup(r15) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r16, 0x84, 0x13, &(0x7f0000000440)={r12, 0x3}, &(0x7f0000000400)=0xfffffffffffffeb5) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r4, 0x84, 0x72, &(0x7f00000001c0)={r17, 0x35, 0x10}, &(0x7f0000000200)=0xc) sendto$inet(0xffffffffffffffff, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) 21:45:44 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r3 = creat(&(0x7f0000000300)='./file0\x00', 0x0) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000000200)={0x0, r3}) ioctl$VIDIOC_TRY_ENCODER_CMD(r3, 0xc028564e, &(0x7f0000000000)={0x0, 0x0, [0x9, 0x4, 0x5, 0x7, 0x0, 0x8, 0x3ff, 0x31]}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r4 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r4, 0x40086607, &(0x7f0000000100)=0xfffffffffffff800) 21:45:44 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x1, &(0x7f00000000c0)) semget(0x2, 0x1, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) socket(0x0, 0x0, 0x0) r1 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r1, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @empty}, 0x3f) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpu.stat\x00', 0x275a, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x9) sendmmsg$inet_sctp(r1, &(0x7f00000003c0), 0x3a301e0909ff6cd, 0x934) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x1001000004e23, 0x0, @loopback}, 0x1c) listen(r0, 0x4) r4 = socket$inet6_sctp(0xa, 0x1, 0x84) socket$nl_xfrm(0x10, 0x3, 0x6) r5 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) fsetxattr$security_ima(r5, &(0x7f0000000180)='security.ima\x00', &(0x7f00000001c0)=@sha1={0x1, "564a6693e0c5a091bf618dc5c670005ed446c54f"}, 0x15, 0x0) r6 = getpgrp(0x0) rt_tgsigqueueinfo(r6, 0x0, 0x200000000000011, &(0x7f0000000100)={0x0, 0x0, 0x1}) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r4, 0x84, 0x6b, &(0x7f0000000000)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) accept(r0, 0x0, 0x0) r7 = openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x4401, 0x60) write$USERIO_CMD_SEND_INTERRUPT(r7, &(0x7f0000000200)={0x2, 0x1f}, 0x2) write(r4, &(0x7f0000000100), 0x1ede5) shutdown(r4, 0x2) 21:45:44 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x2, 0xc) write(r0, &(0x7f0000000000)="1f0000000104ff00fd4354c007110000f305010008000100010423dcffdf00", 0x1f) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ubi_ctrl\x00', 0x303e00, 0x0) [ 962.710868][T16087] netlink: 'syz-executor.2': attribute type 17 has an invalid length. [ 962.819016][ T2836] libceph: connect (1)[d::]:6789 error -101 [ 962.825045][ T2836] libceph: mon0 (1)[d::]:6789 connect error 21:45:44 executing program 4: socket$kcm(0x10, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x10610, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x4c0793d2ea6a4a52, 0x0, 0x8, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000780)) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffff801, 0x0, 0x0, 0x0, 0x68a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x4, 0x0, 0x100000, 0x0, @perf_config_ext, 0x2020}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0x1) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x401}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x1c, r1, 0x1, 0x70bd28, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xffff}]}, 0x1c}, 0x1, 0x0, 0x0, 0x6000}, 0x60000) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f00000003c0)=0x1) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000200)=ANY=[@ANYPTR64=&(0x7f0000000080)=ANY=[@ANYRESDEC=r2, @ANYPTR64=&(0x7f0000000000)=ANY=[@ANYPTR64, @ANYRESHEX=0x0, @ANYRES64, @ANYRES32, @ANYPTR], @ANYPTR64, @ANYBLOB="b96b4030be14e708b05155fa3883c735600f2e72493ad25e86"]], &(0x7f00000007c0)=""/4096, 0xffffffffffffff11, 0xa7, 0x1}, 0x20) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000180)={'nr0\x01\x00', 0x4009}) ioctl$KDDISABIO(r2, 0x4b37) r4 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r4) ioctl$TUNSETLINK(r3, 0x400454cd, 0x308) r5 = syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0xf6, 0x20000) ioctl$CAPI_SET_FLAGS(r5, 0x80044324, &(0x7f00000000c0)) socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') [ 962.954455][T16306] EXT4-fs warning (device sda1): ext4_group_extend:1791: will only finish group (524288 blocks, 256 new) 21:45:44 executing program 2: r0 = socket(0x10, 0x80002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)=ANY=[@ANYBLOB="280000005e0001429693b700000000000000072300308c98aa2746dd2cba9295a82a0100004000000000e3ef1eae20855532d7627e5ee148bddeb4b44989072d54a38c58188f9c3da536a00efa3b3af0979827bdecccdf0e6fef80fd3ec7129fadba10ae98e533cd57e5a165851ca9f42301af6f57b369c775d07f969eca6ac3fb0034c76456fcfe8a9fb9aee5d5444d85459efeb7243f43bbfcbb93d4479aa0b8444357de97dab1d47dd42b9ac1c26f193d28fe74b91465ae14f8168193792c3e"], 0x28}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x6, 0x0, &(0x7f0000000100), 0x6, &(0x7f0000000100)}], 0x492492492492805, 0x0) [ 963.018760][T16306] EXT4-fs warning (device sda1): ext4_group_extend:1797: can't read last block, resize aborted [ 963.027548][T16307] netlink: 3 bytes leftover after parsing attributes in process `syz-executor.3'. 21:45:44 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000400)=@broute={'\nroute\x00', 0x20, 0x2, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000580], 0x0, 0x0}, 0x78) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000200)="2c0271ca8b080aae3300bfa4def38003c21c104094", 0xfd5c}], 0x1}, 0xc100) sendmsg(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000400)}, 0x0) [ 963.179032][T16306] EXT4-fs warning (device sda1): ext4_group_extend:1791: will only finish group (524288 blocks, 256 new) 21:45:44 executing program 3: ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000040)) syz_mount_image$msdos(&(0x7f0000000ac0)='msdos\x00', &(0x7f0000000b00)='./file0\x00', 0x1, 0x0, 0x0, 0x0, &(0x7f0000000080)) open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r0 = creat(&(0x7f0000000300)='./file0\x00', 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x100000, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f00000003c0)=0x1) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000000200)={0x0, r1, 0x1, 0x0, 0x3, 0x2000000000}) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r0) 21:45:44 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r2 = creat(&(0x7f0000000300)='./file0\x00', 0x0) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000200)={0x0, r2}) mmap$binder(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1, 0x11, r2, 0x1) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0300a1695e1dcfe87b1071") r3 = socket$kcm(0xa, 0x2, 0x11) execve(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)=[&(0x7f0000000040)='selfuser\'/+bdevsecurityposix_acl_access\x00', &(0x7f0000000100)='\x00', &(0x7f0000000180)='selinuxem0wlan1\x00', &(0x7f00000001c0)='eth0]\x00', &(0x7f0000000200)='(+keyring\'{eth1self\x00', &(0x7f0000000240)='}eth1\x00'], &(0x7f0000000300)=[&(0x7f00000002c0)='\x00']) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x48c, &(0x7f00000003c0)={0x0, 'caif0\x00'}, 0x18) r4 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r5 = creat(&(0x7f0000000300)='./file0\x00', 0x0) ioctl$EXT4_IOC_MOVE_EXT(r4, 0xc028660f, &(0x7f0000000200)={0x0, r5}) accept4$packet(r5, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000380)=0x14, 0x180000) setsockopt$sock_attach_bpf(r3, 0x88, 0x67, &(0x7f0000000140)=r3, 0x4) sendmsg$kcm(r3, &(0x7f0000000480)={&(0x7f0000000080)=@in6={0x1000000a, 0x63, 0x0, @mcast2={0xff, 0x2, [0xe803, 0x7fffef55, 0xffffffff00000000]}, 0xd}, 0x80, &(0x7f0000000340), 0x2b, &(0x7f0000000180), 0x2}, 0x0) [ 963.344433][T16306] EXT4-fs warning (device sda1): ext4_group_extend:1797: can't read last block, resize aborted 21:45:45 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = accept(r0, &(0x7f00000002c0)=@ipx, &(0x7f0000000340)=0x80) setsockopt$RDS_GET_MR_FOR_DEST(r2, 0x114, 0x7, &(0x7f0000000440)={@ipx={0x4, 0x400, 0x7f9, "7dc916f83798", 0x7}, {&(0x7f0000000380)=""/71, 0x47}, &(0x7f0000000400), 0x1}, 0xa0) r3 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r4, 0x40086607, &(0x7f0000000100)=0x80) r5 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r6 = creat(&(0x7f0000000300)='./file0\x00', 0x0) ioctl$EXT4_IOC_MOVE_EXT(r5, 0xc028660f, &(0x7f0000000200)={0x0, r6}) getsockopt$inet_sctp_SCTP_NODELAY(r6, 0x84, 0x3, &(0x7f0000000640), 0xfffffffffffffffe) r7 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r7, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r7, &(0x7f0000000240)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @empty}, r8}}, 0x48) write$RDMA_USER_CM_CMD_LISTEN(r7, &(0x7f0000000040)={0x7, 0x8, 0xfa00, {r8}}, 0x10) write$RDMA_USER_CM_CMD_DESTROY_ID(r7, &(0x7f0000000200)={0x1, 0x10, 0xfa00, {&(0x7f0000000000), r8}}, 0x18) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r4, &(0x7f0000000500)={0x15, 0x110, 0xfa00, {r8, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x4e23, @empty}, @in={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x25}}}}, 0x118) setsockopt$bt_hci_HCI_DATA_DIR(r3, 0x0, 0x1, &(0x7f00000000c0)=0x1, 0x4) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r3, &(0x7f0000000140)="cad4f8f5ce0c8317e7244fce4dfa6b5dde84c7acc736bf769fa9dfb8d9af7f84f84b094c77f101c81e31431c685eb01fe23e5fd6c99f4f3c028e9633e6a52f5447cd9ecf1bfd22f0d22e47292dbbad1f2e8514d0f49f84ddd3f2e0481bba23da5c3dc5a8562250995c0b12b0d6ff8e00cf7285bad7564a8dd6af5480fd0925cd86930817692e4468e188810fb7c8b272719eaee113f477ebfa20531741afb6e13474f5f5f5e43453f260cfdf8a1307a18beb5c", &(0x7f0000000200)="f8f731c8d97fd1121161905d504fe806fadd98cba1626f85a8df68bfe4e9320635d17b6916ae8606efbc5c6b338c495be38cb3fe9d373ac069a090a9dea76009af6182ec4f21bf40513b01d3ccf4ee3dfc07d65d059c795f0af9decb503e3ef232a99e5aa36d56f78acd36cef9d1b198347df1b4abf3457ae36ce1d4a4bf05f3571d345821854903b793c7eda644899b36b7379fe4a6430b0c7754028fcac64173cccfd1a9e58e7338814c", 0x8}, 0x20) 21:45:45 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) r1 = inotify_init() inotify_add_watch(r1, 0x0, 0xc0000080) inotify_rm_watch(0xffffffffffffffff, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c) r2 = socket$inet(0x2, 0x4000020000000001, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f00000003c0)=0x1) signalfd(r3, &(0x7f0000000340)={0x80000001}, 0x8) getpeername$unix(0xffffffffffffffff, &(0x7f0000000240)=@abs, &(0x7f00000002c0)=0x6e) bind$inet(r2, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x20000800, &(0x7f0000000040)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_mtu(r2, 0x0, 0xa, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f00000001c0)='ip6_vti0\x00', 0x1000001d0) r4 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r5 = creat(&(0x7f0000000300)='./file0\x00', 0x0) ioctl$EXT4_IOC_MOVE_EXT(r4, 0xc028660f, &(0x7f0000000200)={0x0, r5}) ioctl$NS_GET_OWNER_UID(r0, 0xb704, &(0x7f0000000080)=0x0) setsockopt$inet_IP_IPSEC_POLICY(r4, 0x0, 0x10, &(0x7f00000000c0)={{{@in=@loopback, @in6=@rand_addr="c17a5082a056f5e9c50d10fae175cac9", 0x4e22, 0x2, 0x4e20, 0x7, 0x1c, 0x60, 0x20, 0x8, 0x0, r6}, {0x5, 0x0, 0x8, 0x24c, 0x0, 0x8, 0x60, 0x9}, {0x6, 0xfc, 0x9, 0x16ae}, 0x7fff, 0x0, 0x1, 0x3, 0x2}, {{@in=@empty, 0x4d5, 0x7d}, 0xa, @in=@broadcast, 0x0, 0x2, 0x2, 0xdd, 0x4, 0x70, 0x8}}, 0xe8) [ 963.765020][T16445] EXT4-fs warning (device sda1): ext4_group_extend:1768: can't shrink FS - resize aborted [ 963.778798][ T5] libceph: connect (1)[d::]:6789 error -101 [ 963.784840][ T5] libceph: mon0 (1)[d::]:6789 connect error 21:45:45 executing program 2: r0 = syz_genetlink_get_family_id$tipc(&(0x7f00000000c0)='TIPC\x00') sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x24, r0, 0x200, 0x70bd2c, 0x25dfdbfb, {{}, 0x0, 0x800b, 0x0, {0x8, 0x2, 0x6}}, ["", "", "", "", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x1}, 0x80) setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000000)="ff02040000eeff000000000000000000000000000002", 0x16) r1 = socket$kcm(0xa, 0x3, 0x87) sendmsg$kcm(r1, &(0x7f0000002780)={&(0x7f0000000000)=@un=@abs, 0x80, &(0x7f0000001380), 0x2ed, &(0x7f0000000100)}, 0x0) [ 965.878526][T32159] libceph: mon1 (1)[::6]:6789 socket error on write [ 966.848538][T32159] libceph: mon1 (1)[::6]:6789 socket closed (con state CONNECTING) 21:45:49 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r2, 0x40086607, &(0x7f0000000100)=0xfffffffffffff800) 21:45:49 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) epoll_wait(r0, &(0x7f0000000000), 0x0, 0x10000) r1 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x105082) r2 = memfd_create(&(0x7f0000000080)='\xfaIhFlK\x99F\x17\x16\xa5>\xd3\xc0\x93\xb5.\xda\x06_bT\x1cB\xdb\xf8y1\xe7,\x03\x98h\x86(\xa0m\x87+x\x14i\x88\xcd\x89\x81\xfb\x86', 0x0) pwritev(r2, &(0x7f0000f50f90)=[{&(0x7f00000000c0)='S', 0x1}], 0x1, 0x4081003) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) prctl$PR_GET_TSC(0x19, &(0x7f0000000140)) r3 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r3, &(0x7f0000000240)={0x2, 0x4e20, @empty}, 0x10) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000400)={&(0x7f0000000180), 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x2c, 0x0, 0x0, 0x70bd27, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x81}, @SEG6_ATTR_DSTLEN={0x8}]}, 0x2c}, 0x1, 0x0, 0x0, 0x800}, 0x10) r4 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$inet_udp_encap(r4, 0x11, 0x64, &(0x7f0000000000), 0x4) bind$inet(r4, &(0x7f0000000180)={0x2, 0x4e21, @multicast1}, 0x10) setsockopt$inet_udp_encap(r4, 0x11, 0x64, &(0x7f0000000080)=0x3, 0x4) r5 = dup(0xffffffffffffffff) ioctl$TUNSETOFFLOAD(r5, 0x400454d0, 0x12) sendto$inet(r3, 0x0, 0x0, 0x1000000020000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) syz_emit_ethernet(0x72, &(0x7f0000000200)=ANY=[@ANYBLOB="ffffffffffffffffffffffff080045000064000000000001906999c10d759d78ac2314bbac1414110bf39094334ee3b1420000000000000000290004ac2314aaac141400000000e000000100000000000000007f00000100000000bcb3aa3a8e4357ffffffff00000000e020000100"], 0x0) sendto$inet(0xffffffffffffffff, &(0x7f00000005c0), 0x29806c5fa86ed4a, 0x0, 0x0, 0xffffffffffffff82) shutdown(r3, 0x1) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000000500)={0x0, {{0xa, 0x4e20, 0xfffffffffffffff8, @rand_addr="440e06e3d07da913e0bf83acf2418443", 0x3ff}}}, 0x88) r6 = creat(&(0x7f0000000040)='./file1\x00', 0x0) r7 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_int(r7, 0x1, 0x5, &(0x7f000059dffc), &(0x7f0000000000)=0x4) getsockopt$inet_mtu(r7, 0x0, 0xa, &(0x7f0000000100), &(0x7f00000005c0)=0x4) write$binfmt_script(r6, &(0x7f00000001c0)=ANY=[], 0xff63) fallocate(r6, 0x10, 0x0, 0x8000) fallocate(r1, 0x11, 0x0, 0x100000001) 21:45:49 executing program 1: io_setup(0x1, &(0x7f00000001c0)=0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x101a06, 0x0) r2 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x2386, 0x80200) r3 = syz_open_dev$cec(&(0x7f00000000c0)='/dev/cec#\x00', 0x0, 0x2) close(r3) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r4, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r4, &(0x7f0000d83fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, &(0x7f000095dff8)=ANY=[@ANYBLOB="01000001", @ANYRES32=0x0], &(0x7f0000000180)=0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r3, 0x84, 0x22, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, r5}, 0x10) setsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r2, 0x84, 0x1f, &(0x7f0000000200)={r5, @in6={{0xa, 0x4e22, 0x0, @mcast1, 0x2}}, 0x0, 0x8}, 0x90) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r7 = dup(r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000004c0)={'\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\r', 0x20000005002}) ioctl$TUNSETVNETBE(r1, 0x400454de, &(0x7f0000000040)=0x1) r8 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x0, 0x0) r9 = syz_open_dev$amidi(&(0x7f0000000080)='/dev/amidi#\x00', 0xa3b2, 0x200000) ioctl$KVM_HYPERV_EVENTFD(r9, 0x4018aebd, &(0x7f0000000100)={0x0, r7, 0x1}) ioctl$TIOCSETD(r8, 0x5423, &(0x7f00000003c0)=0x1) io_submit(r0, 0x1, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x800000000001, 0x80, r8, &(0x7f0000000040), 0x0, 0x1000000000000002}]) 21:45:49 executing program 5: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000005c0), 0x8}, 0x2001}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x10600, 0x0) socket$pptp(0x18, 0x1, 0x2) r2 = syz_open_dev$radio(0x0, 0x0, 0x2) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000640)='/proc/self/net/pfkey\x00', 0x410a00, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_PARAMS(0xffffffffffffffff, 0xc0305710, &(0x7f0000000000)={0x1, 0x3, 0x81, 0x10001}) r3 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r4 = creat(&(0x7f0000000300)='./file0\x00', 0x0) ioctl$EXT4_IOC_MOVE_EXT(r3, 0xc028660f, &(0x7f0000000200)={0x0, r4}) connect$rose(r4, &(0x7f0000000680)=@short={0xb, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x1, @bcast}, 0x1c) ioctl$VIDIOC_QUERYCAP(r2, 0x80685600, &(0x7f0000000040)) r5 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000240)='/dev/autofs\x00', 0x10000, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000008c0)=[@text32={0x20, &(0x7f0000000140)="b805000000b9510000000f01c10f46a78900000066ba2100b067ee66ba4100edb9800000c00f3235004000000f30c4c271de9d0000000066b808008ed0660f38806f000f011c2666b8bf008ee0", 0x4d}], 0x1, 0x0, 0x0, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r5, 0xae60) r6 = ioctl$KVM_CREATE_VCPU(r5, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r5, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_CREATE_PIT2(r5, 0x4040ae77, &(0x7f00000000c0)) ioctl$KVM_SET_REGS(r6, 0x4090ae82, &(0x7f0000000380)={[0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x4cb]}) r7 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0xd6d1bfe75bc71d29) ioctl$ASHMEM_SET_PROT_MASK(r7, 0x40087705, &(0x7f00000001c0)={0x2, 0x9ba7}) ioctl$KVM_RUN(r6, 0xae80, 0x0) ioctl$KVM_RUN(r6, 0xae80, 0x0) [ 967.779828][ T5] libceph: connect (1)[d::]:6789 error -101 [ 967.785871][ T5] libceph: mon0 (1)[d::]:6789 connect error 21:45:49 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cpuacct.stat\x00', 0x0, 0x0) ptrace$setsig(0x4203, 0x0, 0x0, &(0x7f00000002c0)={0x0, 0x1}) write(0xffffffffffffffff, &(0x7f0000000040)="0f42", 0x2) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000580)=""/143, &(0x7f0000000340)=0xfee5) prctl$PR_SET_MM_AUXV(0x23, 0xc, &(0x7f00000004c0)="f21d", 0x2) socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r0, r2) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000780)={{{@in=@local, @in6=@mcast2}}, {{@in6=@empty}, 0x0, @in6=@mcast2}}, &(0x7f0000000640)=0xffffffffffffffdd) setsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000480)={0x0, @rand_addr=0x20000, @empty}, 0xfffffffffffffd8d) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000000000/0x1000)=nil}) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(0xffffffffffffffff, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0xfb]}) ioctl$KVM_S390_UCAS_MAP(0xffffffffffffffff, 0x4018ae50, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000500)=0xff) socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r3) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f0000000540)={0x0, 0x0, r4}) sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYRES16=0x0], 0x1}}, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) ioctl$KVM_SET_REGS(0xffffffffffffffff, 0x4090ae82, &(0x7f0000000380)) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) [ 967.848520][T16606] EXT4-fs warning (device sda1): ext4_group_extend:1791: will only finish group (524288 blocks, 256 new) [ 967.899976][T16606] EXT4-fs warning (device sda1): ext4_group_extend:1797: can't read last block, resize aborted 21:45:49 executing program 3: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x2000, 0x0) write$UHID_CREATE(0xffffffffffffffff, &(0x7f0000001100)={0x0, 'syz0\x00', 'syz0\x00', 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xff\x00', 0x0, 0x0, 0x805, 0x9e, 0x8, 0x0, 0x8}, 0x120) fsetxattr$security_evm(0xffffffffffffffff, &(0x7f0000000080)='security.evm\x00', &(0x7f0000000a00)=ANY=[@ANYBLOB="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"], 0x1, 0x4) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) syz_genetlink_get_family_id$tipc(0x0) getsockopt$X25_QBITINCL(r0, 0x106, 0x1, &(0x7f0000000300), &(0x7f0000000340)=0x4) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000400)=ANY=[@ANYBLOB="02000000010000000000000002000000", @ANYRES32=0x0, @ANYBLOB="020000", @ANYRES32=0x0, @ANYBLOB="040000000000000008", @ANYRES32=0x0, @ANYBLOB='\b\x00', @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB, @ANYRES32=0x0, @ANYBLOB="01000000c23d5403d4d2bd3bda8e35a634744352264c13fb8ce4a45635d884959df20257bce6dfe8006b0d7e18f6cc36", @ANYBLOB="1000000000000000200000"], 0xe, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000840)) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) memfd_create(&(0x7f00000003c0)='workdir', 0x0) epoll_wait(0xffffffffffffffff, &(0x7f0000000280)=[{}, {}, {}], 0x3, 0x3887) mount$overlay(0x400008, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@metacopy_on='metacopy=on'}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000840)=0x0) bind$bt_l2cap(0xffffffffffffffff, &(0x7f00000002c0)={0x1f, 0x3, {0x4, 0x1, 0x5, 0x39, 0x3}, 0x3ff, 0xff}, 0xe) open_tree(0xffffffffffffff9c, &(0x7f0000000540)='./file1\x00', 0x2) r2 = syz_open_procfs(r1, &(0x7f0000000380)='net/netfilter\x00') fcntl$dupfd(r2, 0x406, 0xffffffffffffffff) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000200)) accept4$nfc_llcp(r0, &(0x7f0000000600), &(0x7f0000000140)=0x60, 0x80800) r3 = openat$proc_capi20ncci(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCGIFBRDADDR(r3, 0x8919, 0x0) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(r3, 0xc01064b5, &(0x7f0000000740)={&(0x7f0000000700)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r4, 0x5423, &(0x7f00000003c0)=0x1) fsetxattr$security_selinux(r4, &(0x7f0000000480)='security.selinux\x00', &(0x7f0000000500)='system_u:object_r:apt_var_lib_t:s0\x00', 0x23, 0x2) r5 = getgid() chown(&(0x7f00000004c0)='./file1\x00', 0x0, r5) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) 21:45:49 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r2, 0x40086607, &(0x7f0000000100)=0xfffffffffffff800) syz_genetlink_get_family_id$SEG6(&(0x7f0000000000)='SEG6\x00') 21:45:49 executing program 1: write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89a0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89a1, 0x0) mkdirat$cgroup(r0, 0x0, 0x1ff) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = syz_open_dev$cec(&(0x7f0000000180)='/dev/cec#\x00', 0x0, 0x2) dup3(0xffffffffffffffff, r3, 0x0) r4 = syz_open_dev$amidi(&(0x7f0000000100)='/dev/amidi#\x00', 0x20, 0x282400) getsockopt$EBT_SO_GET_ENTRIES(r4, 0x0, 0x81, &(0x7f0000000340)={'nat\x00', 0x0, 0x3, 0x8f, [], 0x2, &(0x7f00000001c0)=[{}, {}], &(0x7f0000000240)=""/143}, &(0x7f00000003c0)=0x78) ioctl$SG_GET_RESERVED_SIZE(0xffffffffffffffff, 0x2272, 0x0) r5 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r6 = creat(&(0x7f0000000300)='./file0\x00', 0x0) ioctl$EXT4_IOC_MOVE_EXT(r5, 0xc028660f, &(0x7f0000000200)={0x0, r6}) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r5, 0x84, 0x72, &(0x7f0000000080)={0x0, 0x8, 0x30}, 0xc) r7 = gettid() recvmsg$can_raw(r5, &(0x7f0000000800)={&(0x7f0000000400)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff}}, 0x80, &(0x7f0000000780)=[{&(0x7f0000000480)=""/128, 0x80}, {&(0x7f0000000500)=""/31, 0x1f}, {&(0x7f0000000540)=""/25, 0x19}, {&(0x7f0000000580)=""/5, 0x5}, {&(0x7f00000005c0)=""/145, 0x91}, {&(0x7f0000000680)=""/68, 0x44}], 0x6}, 0x2026) r9 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r10 = creat(&(0x7f0000000300)='./file0\x00', 0x0) ioctl$EXT4_IOC_MOVE_EXT(r9, 0xc028660f, &(0x7f0000000200)={0x0, r10}) ioctl$UI_END_FF_ERASE(r9, 0x400c55cb, &(0x7f0000000880)={0x6, 0x8, 0x7}) ioctl$sock_inet_tcp_SIOCOUTQNSD(r8, 0x894b, &(0x7f0000000840)) perf_event_open(0x0, r7, 0xc, 0xffffffffffffffff, 0x3) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYPTR64], 0xff39) write$cgroup_pid(r2, &(0x7f0000000000), 0x10000000d) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TUNSETFILTEREBPF(r0, 0x6609, 0x0) 21:45:49 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x12, 0x107, 0x4, 0x400}, 0x3c) socket$rxrpc(0x21, 0x2, 0x2) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000040)=0x1, 0x4) r1 = creat(&(0x7f0000000100)='./file0\x00', 0x10) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_CALL(r1, 0x4008af21, &(0x7f0000000180)={0x0, r2}) connect$inet6(r0, &(0x7f0000000080), 0x1c) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x0, 0x0, 0x1}, 0x3c) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f00000003c0)=0x1) ioctl$EXT4_IOC_SETFLAGS(r3, 0x40086602, &(0x7f00000000c0)=0x100140df) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) [ 968.495074][T16631] EXT4-fs warning (device sda1): ext4_group_extend:1791: will only finish group (524288 blocks, 256 new) [ 968.592779][T16627] overlayfs: option "workdir=./file1\" is useless in a non-upper mount, ignore [ 968.622512][T16631] EXT4-fs warning (device sda1): ext4_group_extend:1797: can't read last block, resize aborted [ 968.634186][T16627] overlayfs: at least 2 lowerdir are needed while upperdir nonexistent [ 968.655942][T16637] EXT4-fs warning (device sda1): ext4_group_extend:1791: will only finish group (524288 blocks, 256 new) [ 968.711715][T16663] overlayfs: option "workdir=./file1\" is useless in a non-upper mount, ignore [ 968.717450][T16637] EXT4-fs warning (device sda1): ext4_group_extend:1797: can't read last block, resize aborted [ 968.768924][T16663] overlayfs: at least 2 lowerdir are needed while upperdir nonexistent 21:45:50 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000003c0)=0x1) socket$inet_udp(0x2, 0x2, 0x0) r2 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f00000003c0)=0x1) ioctl$EXT4_IOC_GROUP_EXTEND(r2, 0x40086607, &(0x7f00000000c0)=0x3) [ 968.818916][ T5] libceph: connect (1)[d::]:6789 error -101 [ 968.839218][ T5] libceph: mon0 (1)[d::]:6789 connect error 21:45:50 executing program 3: socket(0x200000000010, 0x2, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0xa1493c1701022a07) socket$inet6_udp(0xa, 0x2, 0x0) pipe(&(0x7f0000000700)={0xffffffffffffffff}) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0x0, 0x0, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r0, 0xc0106403, &(0x7f0000000240)={0x0, 0xfffffffe, 0x7ff, 0x3f}) recvfrom$x25(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000700)='rpc_pipefs\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x20, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f00000001c0), 0x4}, 0x200, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000540)='TIPCv2\x00') r1 = syz_open_dev$midi(&(0x7f0000000380)='/dev/midi#\x00', 0x3, 0x1) getsockopt$inet_mreqn(r1, 0x0, 0x0, &(0x7f0000000340)={@loopback, @initdev}, &(0x7f0000000900)=0xa) add_key(0x0, &(0x7f0000000480)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, 0x0, 0x0) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, 0x0, 0x0) request_key(&(0x7f00000004c0)='cifs.spnego\x00', &(0x7f00000005c0)={'syz', 0x0}, 0x0, 0xffffffffffffffff) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f00000003c0)=0x1) ioctl$TCSETX(r2, 0x5433, &(0x7f0000000200)={0xff, 0xf181, [0x200, 0xfff8, 0x80, 0xff, 0x9], 0x1}) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet_sctp_SCTP_AUTOCLOSE(0xffffffffffffffff, 0x84, 0x4, 0x0, 0x0) ppoll(0x0, 0x0, &(0x7f0000000080), &(0x7f0000000300), 0x8) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x3f, 0x1, 0x0, 0x0, 0x3, 0x1dcc11275f852e7e, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x5, @perf_bp={&(0x7f0000000140), 0x8}, 0x20000a01c, 0x2, 0x2, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0xf24e96747c77a447) mount(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f00000002c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x700, &(0x7f0000000000)) r3 = socket(0x1, 0x5, 0x0) fsetxattr(r3, &(0x7f00000000c0)=@known='system.sockprotoname\x00', &(0x7f0000000600)='wlan1#wlan0!(nodevppp0vboxnet1wlan1[posix_acl_accessmd5sum\x00', 0x3b, 0x1) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_INTERVAL(0xffffffffffffffff, 0xc040564b, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r4, 0x5423, &(0x7f00000003c0)=0x1) ioctl$PIO_FONT(r4, 0x4b61, &(0x7f0000000280)="75b772b9b55ff1937049bdf7c0c07c6ea9a50b8dad2e017a0b405ee6499f4de837f9703b") 21:45:50 executing program 5: r0 = socket$inet6(0xa, 0x80002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @remote, 0x6}, 0x1c) r3 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x80000000, 0x800) r4 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r5 = creat(&(0x7f0000000300)='./file0\x00', 0x0) ioctl$EXT4_IOC_MOVE_EXT(r4, 0xc028660f, &(0x7f0000000200)={0x0, r5}) getsockopt$TIPC_SOCK_RECVQ_DEPTH(r3, 0x10f, 0x84, &(0x7f0000000080), &(0x7f00000002c0)=0xfffffffffffffe53) pipe2(&(0x7f0000000100), 0x80000) r6 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r7 = creat(&(0x7f0000000300)='./file0\x00', 0x0) ioctl$EXT4_IOC_MOVE_EXT(r6, 0xc028660f, &(0x7f0000000200)={0x0, r7}) r8 = accept$inet6(0xffffffffffffffff, 0x0, &(0x7f00000001c0)) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r8, 0x29, 0x42, &(0x7f0000000040)={@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa4ffffff]}, 0x0, 0x3, 0x3, 0x0, 0x0, 0x1fd}, 0x20) 21:45:50 executing program 1: utimes(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={{0x77359400}, {0x77359400}}) perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000002c0)='./file0/file0\x00', 0x0) r0 = openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/attr/current\x00', 0x2, 0x0) r1 = accept4$bt_l2cap(0xffffffffffffffff, &(0x7f00000001c0), &(0x7f0000000240)=0xe, 0xc0400) getsockopt$bt_BT_FLUSHABLE(r1, 0x112, 0x8, &(0x7f0000000280)=0x9, &(0x7f0000000340)=0x4) syncfs(r0) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r3 = creat(&(0x7f0000000300)='./file0\x00', 0x0) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000000200)={0x0, r3}) ioctl$USBDEVFS_RELEASEINTERFACE(r2, 0x80045510, &(0x7f0000000100)=0xff00000) [ 969.778838][ T5] libceph: connect (1)[d::]:6789 error -101 [ 969.784968][ T5] libceph: mon0 (1)[d::]:6789 connect error 21:45:51 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) epoll_wait(r0, &(0x7f0000000000), 0x0, 0x10000) r1 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x105082) r2 = memfd_create(&(0x7f0000000080)='\xfaIhFlK\x99F\x17\x16\xa5>\xd3\xc0\x93\xb5.\xda\x06_bT\x1cB\xdb\xf8y1\xe7,\x03\x98h\x86(\xa0m\x87+x\x14i\x88\xcd\x89\x81\xfb\x86', 0x0) pwritev(r2, &(0x7f0000f50f90)=[{&(0x7f00000000c0)='S', 0x1}], 0x1, 0x4081003) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) prctl$PR_GET_TSC(0x19, &(0x7f0000000140)) r3 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r3, &(0x7f0000000240)={0x2, 0x4e20, @empty}, 0x10) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000400)={&(0x7f0000000180), 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x2c, 0x0, 0x0, 0x70bd27, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x81}, @SEG6_ATTR_DSTLEN={0x8}]}, 0x2c}, 0x1, 0x0, 0x0, 0x800}, 0x10) r4 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$inet_udp_encap(r4, 0x11, 0x64, &(0x7f0000000000), 0x4) bind$inet(r4, &(0x7f0000000180)={0x2, 0x4e21, @multicast1}, 0x10) setsockopt$inet_udp_encap(r4, 0x11, 0x64, &(0x7f0000000080)=0x3, 0x4) r5 = dup(0xffffffffffffffff) ioctl$TUNSETOFFLOAD(r5, 0x400454d0, 0x12) sendto$inet(r3, 0x0, 0x0, 0x1000000020000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) syz_emit_ethernet(0x72, &(0x7f0000000200)=ANY=[@ANYBLOB="ffffffffffffffffffffffff080045000064000000000001906999c10d759d78ac2314bbac1414110bf39094334ee3b1420000000000000000290004ac2314aaac141400000000e000000100000000000000007f00000100000000bcb3aa3a8e4357ffffffff00000000e020000100"], 0x0) sendto$inet(0xffffffffffffffff, &(0x7f00000005c0), 0x29806c5fa86ed4a, 0x0, 0x0, 0xffffffffffffff82) shutdown(r3, 0x1) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000000500)={0x0, {{0xa, 0x4e20, 0xfffffffffffffff8, @rand_addr="440e06e3d07da913e0bf83acf2418443", 0x3ff}}}, 0x88) r6 = creat(&(0x7f0000000040)='./file1\x00', 0x0) r7 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_int(r7, 0x1, 0x5, &(0x7f000059dffc), &(0x7f0000000000)=0x4) getsockopt$inet_mtu(r7, 0x0, 0xa, &(0x7f0000000100), &(0x7f00000005c0)=0x4) write$binfmt_script(r6, &(0x7f00000001c0)=ANY=[], 0xff63) fallocate(r6, 0x10, 0x0, 0x8000) fallocate(r1, 0x11, 0x0, 0x100000001) 21:45:51 executing program 4: socket$nl_route(0x10, 0x3, 0x0) 21:45:51 executing program 5: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x2d, &(0x7f0000000000)='-$em0eth1(bdevcgroup]$(,$.selinux\'eth1]wlan0\x00', 0xffffffffffffffff}, 0x30) ptrace$cont(0x18, r0, 0x8001, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x201, 0x0) write$P9_RWRITE(r1, &(0x7f00000000c0)={0xb, 0x77, 0x1, 0x4}, 0xb) r2 = socket$inet6(0xa, 0x808, 0x4) getsockopt$inet6_mtu(r2, 0x29, 0x17, &(0x7f0000000100), &(0x7f0000000140)=0x4) setpriority(0x1, 0x0, 0x3ff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000180)=0x0) fcntl$setown(r2, 0x8, r3) r4 = accept$inet6(r2, &(0x7f00000001c0)={0xa, 0x0, 0x0, @dev}, &(0x7f0000000200)=0x1c) setsockopt$inet6_int(r4, 0x29, 0xc9, &(0x7f0000000240)=0x28986e1c, 0x4) bind$inet6(0xffffffffffffffff, &(0x7f0000000280)={0xa, 0x4e21, 0x3af, @dev={0xfe, 0x80, [], 0xd}, 0x7}, 0x1c) r5 = syz_open_dev$audion(&(0x7f00000002c0)='/dev/audio#\x00', 0x9, 0x2f67254a5a69fe29) ioctl$KDSKBSENT(r5, 0x4b49, &(0x7f0000000300)="e156425c3ea953c41c27dbbc5637ac2785e06bae2c416e57df3629db043940edbcbd9f0ca7a2cadef34f37c49a5dc6b14d14a6e34f84df17e459f196f6b9ccbf3edc5107f419560971908f81b748b26104aac1d819ecd918f87547342b212cc9f5edc0ffd04a85cfb0277050b1b3239a5dba576353067bd5f9f47d4a94754033fc05d0a139") r6 = socket$rds(0x15, 0x5, 0x0) fcntl$setpipe(r6, 0x407, 0x7) r7 = request_key(&(0x7f00000003c0)='user\x00', &(0x7f0000000400)={'syz', 0x1}, &(0x7f0000000440)='lo\x00', 0xfffffffffffffffd) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000480)={{{@in=@dev, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@mcast1}}, &(0x7f0000000580)=0xe8) getresgid(&(0x7f00000005c0), &(0x7f0000000600), &(0x7f0000000640)=0x0) keyctl$chown(0x4, r7, r8, r9) connect$ax25(0xffffffffffffffff, &(0x7f0000000680)={{0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, 0x4}, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}, 0x48) open(&(0x7f0000000700)='./file0\x00', 0x802, 0x111) r10 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000740)='/dev/mixer\x00', 0x2000, 0x0) ioctl$UI_SET_PROPBIT(r10, 0x4004556e, 0x2) r11 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000780)='/dev/sequencer\x00', 0x40000, 0x0) ioctl$TIOCLINUX6(r11, 0x541c, &(0x7f00000007c0)={0x6, 0xf9}) r12 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000008c0)=0xffffffffffffffff, 0x4) signalfd4(r12, &(0x7f0000000900), 0x8, 0x80c00) ioctl$TIOCEXCL(r10, 0x540c) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) 21:45:51 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) r2 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x5, 0x80000) getsockopt$IP6T_SO_GET_REVISION_TARGET(r2, 0x29, 0x45, &(0x7f00000000c0)={'icmp6\x00'}, &(0x7f0000000140)=0x1e) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r3 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r3, 0x40086607, &(0x7f0000000100)=0xfffffffffffff800) 21:45:51 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0xfc) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000003c0)=0x1) ioctl$KDSIGACCEPT(r1, 0x4b4e, 0xe) io_setup(0x7, &(0x7f0000000240)=0x0) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) io_submit(r2, 0x1e09328e, &(0x7f0000000040)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1000800000000001, 0x0, r0, 0x0, 0xff2b}]) 21:45:51 executing program 3: write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000540), 0x12) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x0, 0x0) r1 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_MCAST_LEAVE_GROUP(r1, 0x0, 0x2d, &(0x7f00000001c0)={0x3, {{0x2, 0x4e23, @multicast2}}}, 0x88) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0x1) ioctl$FS_IOC_GETFLAGS(r0, 0x80086601, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000040dc", 0xff0f}], 0x2, 0x0) [ 970.310439][T16896] EXT4-fs warning (device sda1): ext4_group_extend:1791: will only finish group (524288 blocks, 256 new) [ 970.368802][T16896] EXT4-fs warning (device sda1): ext4_group_extend:1797: can't read last block, resize aborted 21:45:51 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) epoll_wait(r0, &(0x7f0000000000), 0x0, 0x10000) r1 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x105082) r2 = memfd_create(&(0x7f0000000080)='\xfaIhFlK\x99F\x17\x16\xa5>\xd3\xc0\x93\xb5.\xda\x06_bT\x1cB\xdb\xf8y1\xe7,\x03\x98h\x86(\xa0m\x87+x\x14i\x88\xcd\x89\x81\xfb\x86', 0x0) pwritev(r2, &(0x7f0000f50f90)=[{&(0x7f00000000c0)='S', 0x1}], 0x1, 0x4081003) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) prctl$PR_GET_TSC(0x19, &(0x7f0000000140)) r3 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r3, &(0x7f0000000240)={0x2, 0x4e20, @empty}, 0x10) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000400)={&(0x7f0000000180), 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x2c, 0x0, 0x0, 0x70bd27, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x81}, @SEG6_ATTR_DSTLEN={0x8}]}, 0x2c}, 0x1, 0x0, 0x0, 0x800}, 0x10) r4 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$inet_udp_encap(r4, 0x11, 0x64, &(0x7f0000000000), 0x4) bind$inet(r4, &(0x7f0000000180)={0x2, 0x4e21, @multicast1}, 0x10) setsockopt$inet_udp_encap(r4, 0x11, 0x64, &(0x7f0000000080)=0x3, 0x4) r5 = dup(0xffffffffffffffff) ioctl$TUNSETOFFLOAD(r5, 0x400454d0, 0x12) sendto$inet(r3, 0x0, 0x0, 0x1000000020000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) syz_emit_ethernet(0x72, &(0x7f0000000200)=ANY=[@ANYBLOB="ffffffffffffffffffffffff080045000064000000000001906999c10d759d78ac2314bbac1414110bf39094334ee3b1420000000000000000290004ac2314aaac141400000000e000000100000000000000007f00000100000000bcb3aa3a8e4357ffffffff00000000e020000100"], 0x0) sendto$inet(0xffffffffffffffff, &(0x7f00000005c0), 0x29806c5fa86ed4a, 0x0, 0x0, 0xffffffffffffff82) shutdown(r3, 0x1) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000000500)={0x0, {{0xa, 0x4e20, 0xfffffffffffffff8, @rand_addr="440e06e3d07da913e0bf83acf2418443", 0x3ff}}}, 0x88) r6 = creat(&(0x7f0000000040)='./file1\x00', 0x0) r7 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_int(r7, 0x1, 0x5, &(0x7f000059dffc), &(0x7f0000000000)=0x4) getsockopt$inet_mtu(r7, 0x0, 0xa, &(0x7f0000000100), &(0x7f00000005c0)=0x4) write$binfmt_script(r6, &(0x7f00000001c0)=ANY=[], 0xff63) fallocate(r6, 0x10, 0x0, 0x8000) fallocate(r1, 0x11, 0x0, 0x100000001) 21:45:52 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r2, 0x40086607, &(0x7f0000000100)=0xfffffffffffff800) setxattr$security_evm(&(0x7f0000000000)='./bus\x00', &(0x7f00000000c0)='security.evm\x00', &(0x7f0000000140)=@sha1={0x1, "1ac203f9646785e5b9f207fb27450604c39231a7"}, 0x15, 0x0) [ 970.871108][ T5] libceph: mon1 (1)[::6]:6789 socket closed (con state CONNECTING) [ 970.996807][T17025] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 21:45:52 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xa8) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz0\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f0000000380)='memory.events\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='cgroup.controllers\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000340)={0x0, 0xffffffffffffffff, 0x0, 0x2, &(0x7f00000002c0)=':\x00', 0xffffffffffffffff}, 0x30) r4 = perf_event_open(0x0, r3, 0x0, 0xffffffffffffffff, 0x0) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000000)='wls\x00\x00\x00\x00\x00\x00', r2}, 0x10) recvmsg(r4, 0x0, 0x40000000) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x12e, 0x0, 0x0, 0x1, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0xfd77, 0x10, 0x0}, 0x70) socket$kcm(0xa, 0x100000006, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x12}, 0x14) socket$kcm(0xa, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r5, 0x541b, &(0x7f0000000000)) r6 = socket$kcm(0xa, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r6, 0x890b, &(0x7f0000000000)) r7 = socket$kcm(0xa, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r7, 0x890b, &(0x7f0000000000)) r8 = socket$kcm(0xa, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r8, 0x890b, &(0x7f0000000000)) r9 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000400)='hugetlb.2MB.usage_in_Rytes\x00', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r9, 0x4030582a, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMCLONE(r9, 0x890b, &(0x7f0000000280)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x14, &(0x7f0000000080), 0x301) socket$kcm(0xa, 0x2, 0x11) recvmsg$kcm(r8, &(0x7f0000007640)={&(0x7f0000007380)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f0000007500), 0x0, &(0x7f0000007540)=""/217, 0xd9}, 0x3) recvmsg(0xffffffffffffffff, &(0x7f000000c0c0)={&(0x7f000000a880)=@xdp={0x2c, 0x0, 0x0}, 0xffffffad, &(0x7f000000c000)}, 0x1) r12 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x2da8020000100000, 0x500001c) openat$cgroup_ro(r12, 0x0, 0x0, 0x0) r13 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r13, 0x400454ca, &(0x7f0000000300)={'ip6gretap0\x00', 0x1132}) ioctl$SIOCSIFHWADDR(r13, 0x8924, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000c1c0)={0x16, 0x1, &(0x7f00000004c0)=ANY=[@ANYPTR64=&(0x7f00000003c0)=ANY=[@ANYRESDEC=r13, @ANYRESOCT=r10, @ANYRES16=0x0]], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], r11, 0x0, r12, 0x8, &(0x7f000000c140)={0x6}, 0x8, 0x10, &(0x7f000000c180)={0x4, 0x7, 0x0, 0x9}, 0x10}, 0x70) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x17, 0x0, &(0x7f0000000500)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x4, 0x0, 0x0, 0x41000, 0x2, [], r11, 0x13, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0x0, 0x3}, 0x8, 0x10, &(0x7f0000000280)={0x3, 0xe, 0xfff, 0x7fff}, 0xff7d}, 0x1) r14 = socket$kcm(0xa, 0x5, 0x0) sendmsg$kcm(r14, &(0x7f0000000240)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @dev, 0x14}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000040)='\f', 0x1}], 0x1}, 0xfec0) [ 971.062415][T17029] EXT4-fs warning (device sda1): ext4_group_extend:1791: will only finish group (524288 blocks, 256 new) [ 971.118647][T17029] EXT4-fs warning (device sda1): ext4_group_extend:1797: can't read last block, resize aborted 21:45:52 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) io_setup(0x5cc8, &(0x7f0000000000)=0x0) io_submit(r1, 0x1, &(0x7f0000000180)=[&(0x7f0000000140)={0x0, 0x0, 0x0, 0x5, 0x40, 0xffffffffffffffff, &(0x7f00000000c0)="c7692e85324faf6d6113c18e", 0xc, 0x0, 0x0, 0x2}]) r2 = dup(r0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r2, 0x29, 0x44, &(0x7f0000000040)={'IDLETIMER\x00'}, &(0x7f00000001c0)=0x1e) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r3, 0x40086607, &(0x7f0000000100)=0xfffffffffffff800) 21:45:53 executing program 5: r0 = socket(0x10, 0x803, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) r3 = socket$kcm(0x2, 0x2, 0x73) bind$inet(r3, &(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10) connect(r3, &(0x7f0000000000)=@pppol2tpv3={0x2, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80) getpeername$packet(r3, 0x0, &(0x7f0000000140)) ioctl$sock_SIOCDELDLCI(r3, 0x8981, &(0x7f0000000000)={'veth1_to_bridge\x00', 0xcb4}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f0000000280)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000b00)=""/95, 0x134}, {&(0x7f00000000c0)=""/85, 0xb}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/120, 0x6c}, {&(0x7f0000000480)=""/60, 0x3dd}, {&(0x7f0000000200)=""/77, 0x4d}, {&(0x7f0000000540)=""/154, 0x40d}, {&(0x7f0000000340)=""/22, 0x16}], 0x161, &(0x7f0000000600)=""/191, 0xbf}}], 0x40000000000020a, 0x0, &(0x7f0000003700)={0x77359400}) 21:45:53 executing program 4: socket$kcm(0x2, 0x1, 0x84) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000900)=ANY=[@ANYBLOB="9f0d343f8f3672b246c5e3575e3bad29af7a982e5093be13037bae5e55d3901efcbad02c798684968abd7cd0f3463233c58a4171b61d275264b0c25a86770e422769c2240915668f9c27dcb8caa76b6b52bcf7f0234471abd5fa470b20eff96ea602ca594f7f1a08a7b251002c49eac4221ab3012d6c7c4d8505140e10"], 0x0, 0x7d}, 0x20) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz0\x00', 0x200002, 0x0) r2 = openat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) sendmsg$kcm(r3, 0x0, 0xfffffffffffffffc) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup/syz1\x00', 0x200002, 0x0) gettid() r4 = socket$kcm(0x11, 0x2, 0x0) sendmsg$kcm(r4, &(0x7f0000000200)={&(0x7f0000000040)=@nfc, 0x80, 0x0}, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) mkdirat$cgroup(r5, 0x0, 0x1ff) socket$kcm(0x11, 0x2, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r2, 0xc, 0x1, 0xd8, 0x0}, 0x20) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x2, 0x1c, &(0x7f0000000980)=ANY=[@ANYBLOB="8500000f7d00b7e1ff9724002ac8991601ad814eeb7b4fd5ee25ba83a72ba28f97cb0c9ad407e03f98a2f54eaabb372d8199ad6306ede43a67863593c59251df04459fa354dc3b820501f3ffb58bc4730f78e709652743498eae4839051b2c3d0510147acda9508c01c6dbdaf0a0ee718e67d02249d4d17ee4bbb35ba26fe4aba8fbbcc6d66b645c1671ebadcb84b4fe35d132e5f9a948606f334c3886bfbaf2a0bc045aa7f78f20f94bd9f0658ade293b596d237ddc80d851ec788ba03bdf1a552e3dff57c71a71f10e65802308ac57ae9ab961c16910be5f00c31095d821339125"], &(0x7f0000000340)='syzkaller\x00', 0x1, 0x82, &(0x7f0000000480)=""/130, 0x40f00, 0x4, [], 0x0, 0x10, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000000580)={0x4, 0x7, 0x6, 0xffffffff}, 0x10}, 0x70) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r6, 0xc0, &(0x7f0000000800)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)=0x4, 0x0, 0x0, 0x0, &(0x7f0000000440)={0x1, 0x4}, 0x0, 0x0, &(0x7f0000000740)={0x4, 0x3, 0x3, 0x553}, &(0x7f0000000780)=0x5, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=0x100000001}}, 0x10) r7 = syz_open_dev$adsp(&(0x7f0000000300)='/dev/adsp#\x00', 0x0, 0x10080) write$FUSE_INTERRUPT(r7, &(0x7f0000000400)={0x10, 0x0, 0x5}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0xffffffffffffffcf) close(r3) socketpair$unix(0x1, 0x4, 0x0, &(0x7f0000000240)) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0}, 0x28) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r9 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r9, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) [ 972.483760][T17060] netlink: 22 bytes leftover after parsing attributes in process `syz-executor.4'. [ 972.685678][T17060] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 972.822806][ T5] libceph: mon1 (1)[::6]:6789 socket error on write 21:45:54 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) epoll_wait(r0, &(0x7f0000000000), 0x0, 0x10000) r1 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x105082) r2 = memfd_create(&(0x7f0000000080)='\xfaIhFlK\x99F\x17\x16\xa5>\xd3\xc0\x93\xb5.\xda\x06_bT\x1cB\xdb\xf8y1\xe7,\x03\x98h\x86(\xa0m\x87+x\x14i\x88\xcd\x89\x81\xfb\x86', 0x0) pwritev(r2, &(0x7f0000f50f90)=[{&(0x7f00000000c0)='S', 0x1}], 0x1, 0x4081003) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) prctl$PR_GET_TSC(0x19, &(0x7f0000000140)) r3 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r3, &(0x7f0000000240)={0x2, 0x4e20, @empty}, 0x10) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000400)={&(0x7f0000000180), 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x2c, 0x0, 0x0, 0x70bd27, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x81}, @SEG6_ATTR_DSTLEN={0x8}]}, 0x2c}, 0x1, 0x0, 0x0, 0x800}, 0x10) r4 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$inet_udp_encap(r4, 0x11, 0x64, &(0x7f0000000000), 0x4) bind$inet(r4, &(0x7f0000000180)={0x2, 0x4e21, @multicast1}, 0x10) setsockopt$inet_udp_encap(r4, 0x11, 0x64, &(0x7f0000000080)=0x3, 0x4) r5 = dup(0xffffffffffffffff) ioctl$TUNSETOFFLOAD(r5, 0x400454d0, 0x12) sendto$inet(r3, 0x0, 0x0, 0x1000000020000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) syz_emit_ethernet(0x72, &(0x7f0000000200)=ANY=[@ANYBLOB="ffffffffffffffffffffffff080045000064000000000001906999c10d759d78ac2314bbac1414110bf39094334ee3b1420000000000000000290004ac2314aaac141400000000e000000100000000000000007f00000100000000bcb3aa3a8e4357ffffffff00000000e020000100"], 0x0) sendto$inet(0xffffffffffffffff, &(0x7f00000005c0), 0x29806c5fa86ed4a, 0x0, 0x0, 0xffffffffffffff82) shutdown(r3, 0x1) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000000500)={0x0, {{0xa, 0x4e20, 0xfffffffffffffff8, @rand_addr="440e06e3d07da913e0bf83acf2418443", 0x3ff}}}, 0x88) r6 = creat(&(0x7f0000000040)='./file1\x00', 0x0) r7 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_int(r7, 0x1, 0x5, &(0x7f000059dffc), &(0x7f0000000000)=0x4) getsockopt$inet_mtu(r7, 0x0, 0xa, &(0x7f0000000100), &(0x7f00000005c0)=0x4) write$binfmt_script(r6, &(0x7f00000001c0)=ANY=[], 0xff63) fallocate(r6, 0x10, 0x0, 0x8000) fallocate(r1, 0x11, 0x0, 0x100000001) 21:45:54 executing program 1: r0 = socket$kcm(0x2, 0x2, 0x73) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10) connect(r0, &(0x7f0000000000)=@pppol2tpv3={0x2, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80) getpeername$packet(r0, 0x0, &(0x7f0000000140)) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000000)=0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x413ca4fb691359f9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x58f3335ad6de003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r2, 0x1, 0x22, &(0x7f0000f59ffc), 0xaf46a793734f1d26) 21:45:54 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) lsetxattr$security_smack_entry(&(0x7f0000000000)='./bus\x00', &(0x7f00000000c0)='security.SMACK64MMAP\x00', &(0x7f0000000140)='\x00', 0x1, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r3 = creat(&(0x7f0000000300)='./file0\x00', 0x0) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000000200)={0x0, r3}) perf_event_open(&(0x7f00000001c0)={0x5, 0x70, 0x8, 0x2, 0x9, 0x83, 0x0, 0x2, 0x5002, 0x4, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x4, @perf_bp={&(0x7f0000000180), 0x2}, 0x80, 0x20, 0x5, 0x9, 0x1, 0x0, 0x800}, 0xffffffffffffffff, 0xe, r3, 0x4f344b6977b696a4) r4 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r4, 0x40086607, &(0x7f0000000100)=0xfffffffffffff800) 21:45:54 executing program 5: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setfsgid(r1) syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000200)='./bus\x00', 0x0, 0x3, &(0x7f0000001700)=[{&(0x7f00000015c0)="52b5cb377aec80e700e6a6476d583262a1c1b6015e97a616b4eb6c9ba80d348e3696c1111e082f6159847e15e341e84049690e773adaf1e6812ad9ec0debef41c77606d1cfae99483cea953db8e2b8c71c37e1455320b35dcf599875b2729950428005ad66a151936d1a45343c6dcd654b17fd0a0dddf4b65c8a7d5486b465c0c9f2a2cacb3bd4baa312fe9351039b2525209ce886948194eb0dbbc2c2473cbbc820524b483c5ae15f73d4da998a5224", 0xb0, 0x4}, {&(0x7f0000001680)="a4af62367badac79a9d050c9497a4d15c33b82ec228094a1430e", 0x1a, 0x8}, {&(0x7f00000016c0)="e7e6273fa45a90568af9c644f491c7e3ff", 0x11}], 0x10, &(0x7f0000001780)={[{@errors_recover='errors=recover'}, {@case_sensitive_yes='case_sensitive=yes'}, {@gid={'gid', 0x3d, r1}}], [{@func={'func', 0x3d, 'POLICY_CHECK'}}, {@subj_user={'subj_user'}}, {@seclabel='seclabel'}, {@smackfsdef={'smackfsdef'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '\x8d'}}, {@obj_user={'obj_user', 0x3d, 'o\xc3\x00\xff\x03\x00\x00\x04'}}]}) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setfsuid(r3) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='o\xc3\x00\xff\x03\x00\x00\x04', 0x100000, &(0x7f00000015c0)=ANY=[]) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) recvmsg$can_raw(r4, &(0x7f0000000140)={&(0x7f0000000080)=@ethernet={0x0, @random}, 0x80, &(0x7f0000001540)=[{&(0x7f00000002c0)=""/167, 0xa7}, {&(0x7f0000000380)=""/111, 0x6f}, {&(0x7f0000000400)=""/4096, 0x1000}, {&(0x7f0000001400)=""/162, 0xa2}, {&(0x7f00000014c0)=""/70, 0x46}], 0x5}, 0x21) 21:45:54 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x408402, 0x211c2532093ee102) getdents64(r0, &(0x7f0000000180)=""/72, 0x48) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) bind$inet(r1, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f00000003c0), 0x4) ioctl$EVIOCGABS0(0xffffffffffffffff, 0x80184540, &(0x7f0000000080)=""/39) keyctl$get_security(0x11, 0x0, &(0x7f0000000140)=""/32, 0x20) write$binfmt_elf64(r1, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0x2bcf) shutdown(r1, 0x1) recvmsg(r1, &(0x7f0000001440)={0x0, 0xa, &(0x7f00000015c0)=[{&(0x7f0000001600)=""/4096, 0xf99e}], 0x1, 0x0, 0xff96ce4aaaa47475, 0x7115}, 0x100) 21:45:54 executing program 4: socket$kcm(0x2, 0x1, 0x84) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000900)=ANY=[@ANYBLOB="9f0d343f8f3672b246c5e3575e3bad29af7a982e5093be13037bae5e55d3901efcbad02c798684968abd7cd0f3463233c58a4171b61d275264b0c25a86770e422769c2240915668f9c27dcb8caa76b6b52bcf7f0234471abd5fa470b20eff96ea602ca594f7f1a08a7b251002c49eac4221ab3012d6c7c4d8505140e10"], 0x0, 0x7d}, 0x20) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz0\x00', 0x200002, 0x0) r2 = openat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) sendmsg$kcm(r3, 0x0, 0xfffffffffffffffc) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup/syz1\x00', 0x200002, 0x0) gettid() r4 = socket$kcm(0x11, 0x2, 0x0) sendmsg$kcm(r4, &(0x7f0000000200)={&(0x7f0000000040)=@nfc, 0x80, 0x0}, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) mkdirat$cgroup(r5, 0x0, 0x1ff) socket$kcm(0x11, 0x2, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r2, 0xc, 0x1, 0xd8, 0x0}, 0x20) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x2, 0x1c, &(0x7f0000000980)=ANY=[@ANYBLOB="8500000f7d00b7e1ff9724002ac8991601ad814eeb7b4fd5ee25ba83a72ba28f97cb0c9ad407e03f98a2f54eaabb372d8199ad6306ede43a67863593c59251df04459fa354dc3b820501f3ffb58bc4730f78e709652743498eae4839051b2c3d0510147acda9508c01c6dbdaf0a0ee718e67d02249d4d17ee4bbb35ba26fe4aba8fbbcc6d66b645c1671ebadcb84b4fe35d132e5f9a948606f334c3886bfbaf2a0bc045aa7f78f20f94bd9f0658ade293b596d237ddc80d851ec788ba03bdf1a552e3dff57c71a71f10e65802308ac57ae9ab961c16910be5f00c31095d821339125"], &(0x7f0000000340)='syzkaller\x00', 0x1, 0x82, &(0x7f0000000480)=""/130, 0x40f00, 0x4, [], 0x0, 0x10, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000000580)={0x4, 0x7, 0x6, 0xffffffff}, 0x10}, 0x70) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r6, 0xc0, &(0x7f0000000800)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)=0x4, 0x0, 0x0, 0x0, &(0x7f0000000440)={0x1, 0x4}, 0x0, 0x0, &(0x7f0000000740)={0x4, 0x3, 0x3, 0x553}, &(0x7f0000000780)=0x5, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=0x100000001}}, 0x10) r7 = syz_open_dev$adsp(&(0x7f0000000300)='/dev/adsp#\x00', 0x0, 0x10080) write$FUSE_INTERRUPT(r7, &(0x7f0000000400)={0x10, 0x0, 0x5}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0xffffffffffffffcf) close(r3) socketpair$unix(0x1, 0x4, 0x0, &(0x7f0000000240)) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0}, 0x28) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r9 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r9, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) [ 973.321753][T17075] EXT4-fs warning (device sda1): ext4_group_extend:1791: will only finish group (524288 blocks, 256 new) [ 973.358582][T17075] EXT4-fs warning (device sda1): ext4_group_extend:1797: can't read last block, resize aborted [ 973.373507][T17073] ntfs: (device loop5): parse_options(): Unrecognized mount option func. [ 973.439918][T17073] ntfs: (device loop5): parse_options(): Unrecognized mount option subj_user. [ 973.503375][T17079] netlink: 22 bytes leftover after parsing attributes in process `syz-executor.4'. [ 973.536049][T17073] ntfs: (device loop5): parse_options(): Unrecognized mount option seclabel. [ 973.568417][T17079] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 973.602153][T17073] ntfs: (device loop5): parse_options(): Unrecognized mount option smackfsdef. 21:45:55 executing program 1: socket$kcm(0x2, 0x1, 0x84) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000900)=ANY=[@ANYBLOB="9f0d343f8f3672b246c5e3575e3bad29af7a982e5093be13037bae5e55d3901efcbad02c798684968abd7cd0f3463233c58a4171b61d275264b0c25a86770e422769c2240915668f9c27dcb8caa76b6b52bcf7f0234471abd5fa470b20eff96ea602ca594f7f1a08a7b251002c49eac4221ab3012d6c7c4d8505140e10"], 0x0, 0x7d}, 0x20) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz0\x00', 0x200002, 0x0) r2 = openat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) sendmsg$kcm(r3, 0x0, 0xfffffffffffffffc) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup/syz1\x00', 0x200002, 0x0) gettid() r4 = socket$kcm(0x11, 0x2, 0x0) sendmsg$kcm(r4, &(0x7f0000000200)={&(0x7f0000000040)=@nfc, 0x80, 0x0}, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) mkdirat$cgroup(r5, 0x0, 0x1ff) socket$kcm(0x11, 0x2, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r2, 0xc, 0x1, 0xd8, 0x0}, 0x20) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x2, 0x1c, &(0x7f0000000980)=ANY=[@ANYBLOB="8500000f7d00b7e1ff9724002ac8991601ad814eeb7b4fd5ee25ba83a72ba28f97cb0c9ad407e03f98a2f54eaabb372d8199ad6306ede43a67863593c59251df04459fa354dc3b820501f3ffb58bc4730f78e709652743498eae4839051b2c3d0510147acda9508c01c6dbdaf0a0ee718e67d02249d4d17ee4bbb35ba26fe4aba8fbbcc6d66b645c1671ebadcb84b4fe35d132e5f9a948606f334c3886bfbaf2a0bc045aa7f78f20f94bd9f0658ade293b596d237ddc80d851ec788ba03bdf1a552e3dff57c71a71f10e65802308ac57ae9ab961c16910be5f00c31095d821339125"], &(0x7f0000000340)='syzkaller\x00', 0x1, 0x82, &(0x7f0000000480)=""/130, 0x40f00, 0x4, [], 0x0, 0x10, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000000580)={0x4, 0x7, 0x6, 0xffffffff}, 0x10}, 0x70) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r6, 0xc0, &(0x7f0000000800)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)=0x4, 0x0, 0x0, 0x0, &(0x7f0000000440)={0x1, 0x4}, 0x0, 0x0, &(0x7f0000000740)={0x4, 0x3, 0x3, 0x553}, &(0x7f0000000780)=0x5, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=0x100000001}}, 0x10) r7 = syz_open_dev$adsp(&(0x7f0000000300)='/dev/adsp#\x00', 0x0, 0x10080) write$FUSE_INTERRUPT(r7, &(0x7f0000000400)={0x10, 0x0, 0x5}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0xffffffffffffffcf) close(r3) socketpair$unix(0x1, 0x4, 0x0, &(0x7f0000000240)) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0}, 0x28) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r9 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r9, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) 21:45:55 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) r2 = openat(r1, &(0x7f0000000000)='./bus\x00', 0x2100, 0x8) socket$vsock_dgram(0x28, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x4001fe) r3 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r3, 0x40086607, &(0x7f0000000100)=0xfffffffffffff800) [ 973.676979][T17073] ntfs: (device loop5): parse_options(): Unrecognized mount option smackfsfloor. [ 973.779904][ T5] libceph: connect (1)[d::]:6789 error -101 [ 973.780290][T17073] ntfs: (device loop5): parse_options(): Unrecognized mount option obj_user. [ 973.822583][ T5] libceph: mon0 (1)[d::]:6789 connect error 21:45:55 executing program 4: socket$kcm(0x2, 0x1, 0x84) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000900)=ANY=[@ANYBLOB="9f0d343f8f3672b246c5e3575e3bad29af7a982e5093be13037bae5e55d3901efcbad02c798684968abd7cd0f3463233c58a4171b61d275264b0c25a86770e422769c2240915668f9c27dcb8caa76b6b52bcf7f0234471abd5fa470b20eff96ea602ca594f7f1a08a7b251002c49eac4221ab3012d6c7c4d8505140e10"], 0x0, 0x7d}, 0x20) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz0\x00', 0x200002, 0x0) r2 = openat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) sendmsg$kcm(r3, 0x0, 0xfffffffffffffffc) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup/syz1\x00', 0x200002, 0x0) gettid() r4 = socket$kcm(0x11, 0x2, 0x0) sendmsg$kcm(r4, &(0x7f0000000200)={&(0x7f0000000040)=@nfc, 0x80, 0x0}, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) mkdirat$cgroup(r5, 0x0, 0x1ff) socket$kcm(0x11, 0x2, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r2, 0xc, 0x1, 0xd8, 0x0}, 0x20) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x2, 0x1c, &(0x7f0000000980)=ANY=[@ANYBLOB="8500000f7d00b7e1ff9724002ac8991601ad814eeb7b4fd5ee25ba83a72ba28f97cb0c9ad407e03f98a2f54eaabb372d8199ad6306ede43a67863593c59251df04459fa354dc3b820501f3ffb58bc4730f78e709652743498eae4839051b2c3d0510147acda9508c01c6dbdaf0a0ee718e67d02249d4d17ee4bbb35ba26fe4aba8fbbcc6d66b645c1671ebadcb84b4fe35d132e5f9a948606f334c3886bfbaf2a0bc045aa7f78f20f94bd9f0658ade293b596d237ddc80d851ec788ba03bdf1a552e3dff57c71a71f10e65802308ac57ae9ab961c16910be5f00c31095d821339125"], &(0x7f0000000340)='syzkaller\x00', 0x1, 0x82, &(0x7f0000000480)=""/130, 0x40f00, 0x4, [], 0x0, 0x10, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000000580)={0x4, 0x7, 0x6, 0xffffffff}, 0x10}, 0x70) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r6, 0xc0, &(0x7f0000000800)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)=0x4, 0x0, 0x0, 0x0, &(0x7f0000000440)={0x1, 0x4}, 0x0, 0x0, &(0x7f0000000740)={0x4, 0x3, 0x3, 0x553}, &(0x7f0000000780)=0x5, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=0x100000001}}, 0x10) r7 = syz_open_dev$adsp(&(0x7f0000000300)='/dev/adsp#\x00', 0x0, 0x10080) write$FUSE_INTERRUPT(r7, &(0x7f0000000400)={0x10, 0x0, 0x5}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0xffffffffffffffcf) close(r3) socketpair$unix(0x1, 0x4, 0x0, &(0x7f0000000240)) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0}, 0x28) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r9 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r9, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) [ 974.116901][T17199] EXT4-fs warning (device sda1): ext4_group_extend:1791: will only finish group (524288 blocks, 256 new) [ 974.186409][T17199] EXT4-fs warning (device sda1): ext4_group_extend:1797: can't read last block, resize aborted [ 974.241368][T17240] EXT4-fs warning (device sda1): ext4_group_extend:1791: will only finish group (524288 blocks, 256 new) 21:45:55 executing program 5: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setfsgid(r1) syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000200)='./bus\x00', 0x0, 0x3, &(0x7f0000001700)=[{&(0x7f00000015c0)="52b5cb377aec80e700e6a6476d583262a1c1b6015e97a616b4eb6c9ba80d348e3696c1111e082f6159847e15e341e84049690e773adaf1e6812ad9ec0debef41c77606d1cfae99483cea953db8e2b8c71c37e1455320b35dcf599875b2729950428005ad66a151936d1a45343c6dcd654b17fd0a0dddf4b65c8a7d5486b465c0c9f2a2cacb3bd4baa312fe9351039b2525209ce886948194eb0dbbc2c2473cbbc820524b483c5ae15f73d4da998a5224", 0xb0, 0x4}, {&(0x7f0000001680)="a4af62367badac79a9d050c9497a4d15c33b82ec228094a1430e", 0x1a, 0x8}, {&(0x7f00000016c0)="e7e6273fa45a90568af9c644f491c7e3ff", 0x11}], 0x10, &(0x7f0000001780)={[{@errors_recover='errors=recover'}, {@case_sensitive_yes='case_sensitive=yes'}, {@gid={'gid', 0x3d, r1}}], [{@func={'func', 0x3d, 'POLICY_CHECK'}}, {@subj_user={'subj_user'}}, {@seclabel='seclabel'}, {@smackfsdef={'smackfsdef'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '\x8d'}}, {@obj_user={'obj_user', 0x3d, 'o\xc3\x00\xff\x03\x00\x00\x04'}}]}) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setfsuid(r3) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='o\xc3\x00\xff\x03\x00\x00\x04', 0x100000, &(0x7f00000015c0)=ANY=[]) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) recvmsg$can_raw(r4, &(0x7f0000000140)={&(0x7f0000000080)=@ethernet={0x0, @random}, 0x80, &(0x7f0000001540)=[{&(0x7f00000002c0)=""/167, 0xa7}, {&(0x7f0000000380)=""/111, 0x6f}, {&(0x7f0000000400)=""/4096, 0x1000}, {&(0x7f0000001400)=""/162, 0xa2}, {&(0x7f00000014c0)=""/70, 0x46}], 0x5}, 0x21) [ 974.319305][T17240] EXT4-fs warning (device sda1): ext4_group_extend:1797: can't read last block, resize aborted 21:45:55 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x408402, 0x211c2532093ee102) getdents64(r0, &(0x7f0000000180)=""/72, 0x48) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) bind$inet(r1, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f00000003c0), 0x4) ioctl$EVIOCGABS0(0xffffffffffffffff, 0x80184540, &(0x7f0000000080)=""/39) keyctl$get_security(0x11, 0x0, &(0x7f0000000140)=""/32, 0x20) write$binfmt_elf64(r1, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0x2bcf) shutdown(r1, 0x1) recvmsg(r1, &(0x7f0000001440)={0x0, 0xa, &(0x7f00000015c0)=[{&(0x7f0000001600)=""/4096, 0xf99e}], 0x1, 0x0, 0xff96ce4aaaa47475, 0x7115}, 0x100) 21:45:55 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f00000003c0)=0x1) ioctl$FS_IOC_GETFSLABEL(r2, 0x81009431, &(0x7f0000000140)) r3 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) chmod(&(0x7f0000000000)='./bus\x00', 0x8) ioctl$EXT4_IOC_GROUP_EXTEND(r3, 0x40086607, &(0x7f0000000100)=0xfffffffffffff800) [ 974.503330][T17311] ntfs: (device loop5): parse_options(): Unrecognized mount option func. [ 974.680318][T17311] ntfs: (device loop5): parse_options(): Unrecognized mount option subj_user. [ 974.720699][T17311] ntfs: (device loop5): parse_options(): Unrecognized mount option seclabel. [ 974.768872][T17321] netlink: 22 bytes leftover after parsing attributes in process `syz-executor.4'. [ 974.783512][T17311] ntfs: (device loop5): parse_options(): Unrecognized mount option smackfsdef. [ 974.819288][ T5] libceph: connect (1)[d::]:6789 error -101 [ 974.825313][ T5] libceph: mon0 (1)[d::]:6789 connect error [ 974.854770][T17321] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 975.116906][T17324] EXT4-fs warning (device sda1): ext4_group_extend:1791: will only finish group (524288 blocks, 256 new) [ 975.165424][T17324] EXT4-fs warning (device sda1): ext4_group_extend:1797: can't read last block, resize aborted 21:45:56 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) epoll_wait(r0, &(0x7f0000000000), 0x0, 0x10000) r1 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x105082) r2 = memfd_create(&(0x7f0000000080)='\xfaIhFlK\x99F\x17\x16\xa5>\xd3\xc0\x93\xb5.\xda\x06_bT\x1cB\xdb\xf8y1\xe7,\x03\x98h\x86(\xa0m\x87+x\x14i\x88\xcd\x89\x81\xfb\x86', 0x0) pwritev(r2, &(0x7f0000f50f90)=[{&(0x7f00000000c0)='S', 0x1}], 0x1, 0x4081003) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) prctl$PR_GET_TSC(0x19, &(0x7f0000000140)) r3 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r3, &(0x7f0000000240)={0x2, 0x4e20, @empty}, 0x10) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000400)={&(0x7f0000000180), 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x2c, 0x0, 0x0, 0x70bd27, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRET={0x8, 0x4, [0x0]}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x81}, @SEG6_ATTR_DSTLEN={0x8}]}, 0x2c}, 0x1, 0x0, 0x0, 0x800}, 0x10) r4 = socket$inet(0x2, 0x200000002, 0x0) setsockopt$inet_udp_encap(r4, 0x11, 0x64, &(0x7f0000000000), 0x4) bind$inet(r4, &(0x7f0000000180)={0x2, 0x4e21, @multicast1}, 0x10) setsockopt$inet_udp_encap(r4, 0x11, 0x64, &(0x7f0000000080)=0x3, 0x4) r5 = dup(0xffffffffffffffff) ioctl$TUNSETOFFLOAD(r5, 0x400454d0, 0x12) sendto$inet(r3, 0x0, 0x0, 0x1000000020000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) syz_emit_ethernet(0x72, &(0x7f0000000200)=ANY=[@ANYBLOB="ffffffffffffffffffffffff080045000064000000000001906999c10d759d78ac2314bbac1414110bf39094334ee3b1420000000000000000290004ac2314aaac141400000000e000000100000000000000007f00000100000000bcb3aa3a8e4357ffffffff00000000e020000100"], 0x0) sendto$inet(0xffffffffffffffff, &(0x7f00000005c0), 0x29806c5fa86ed4a, 0x0, 0x0, 0xffffffffffffff82) shutdown(r3, 0x1) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000000500)={0x0, {{0xa, 0x4e20, 0xfffffffffffffff8, @rand_addr="440e06e3d07da913e0bf83acf2418443", 0x3ff}}}, 0x88) r6 = creat(&(0x7f0000000040)='./file1\x00', 0x0) r7 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_int(r7, 0x1, 0x5, &(0x7f000059dffc), &(0x7f0000000000)=0x4) getsockopt$inet_mtu(r7, 0x0, 0xa, &(0x7f0000000100), &(0x7f00000005c0)=0x4) write$binfmt_script(r6, &(0x7f00000001c0)=ANY=[], 0xff63) fallocate(r6, 0x10, 0x0, 0x8000) fallocate(r1, 0x11, 0x0, 0x100000001) 21:45:56 executing program 1: socket$kcm(0x2, 0x1, 0x84) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000900)=ANY=[@ANYBLOB="9f0d343f8f3672b246c5e3575e3bad29af7a982e5093be13037bae5e55d3901efcbad02c798684968abd7cd0f3463233c58a4171b61d275264b0c25a86770e422769c2240915668f9c27dcb8caa76b6b52bcf7f0234471abd5fa470b20eff96ea602ca594f7f1a08a7b251002c49eac4221ab3012d6c7c4d8505140e10"], 0x0, 0x7d}, 0x20) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz0\x00', 0x200002, 0x0) r2 = openat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) sendmsg$kcm(r3, 0x0, 0xfffffffffffffffc) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup/syz1\x00', 0x200002, 0x0) gettid() r4 = socket$kcm(0x11, 0x2, 0x0) sendmsg$kcm(r4, &(0x7f0000000200)={&(0x7f0000000040)=@nfc, 0x80, 0x0}, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) mkdirat$cgroup(r5, 0x0, 0x1ff) socket$kcm(0x11, 0x2, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r2, 0xc, 0x1, 0xd8, 0x0}, 0x20) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x2, 0x1c, &(0x7f0000000980)=ANY=[@ANYBLOB="8500000f7d00b7e1ff9724002ac8991601ad814eeb7b4fd5ee25ba83a72ba28f97cb0c9ad407e03f98a2f54eaabb372d8199ad6306ede43a67863593c59251df04459fa354dc3b820501f3ffb58bc4730f78e709652743498eae4839051b2c3d0510147acda9508c01c6dbdaf0a0ee718e67d02249d4d17ee4bbb35ba26fe4aba8fbbcc6d66b645c1671ebadcb84b4fe35d132e5f9a948606f334c3886bfbaf2a0bc045aa7f78f20f94bd9f0658ade293b596d237ddc80d851ec788ba03bdf1a552e3dff57c71a71f10e65802308ac57ae9ab961c16910be5f00c31095d821339125"], &(0x7f0000000340)='syzkaller\x00', 0x1, 0x82, &(0x7f0000000480)=""/130, 0x40f00, 0x4, [], 0x0, 0x10, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000000580)={0x4, 0x7, 0x6, 0xffffffff}, 0x10}, 0x70) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r6, 0xc0, &(0x7f0000000800)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)=0x4, 0x0, 0x0, 0x0, &(0x7f0000000440)={0x1, 0x4}, 0x0, 0x0, &(0x7f0000000740)={0x4, 0x3, 0x3, 0x553}, &(0x7f0000000780)=0x5, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=0x100000001}}, 0x10) r7 = syz_open_dev$adsp(&(0x7f0000000300)='/dev/adsp#\x00', 0x0, 0x10080) write$FUSE_INTERRUPT(r7, &(0x7f0000000400)={0x10, 0x0, 0x5}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0xffffffffffffffcf) close(r3) socketpair$unix(0x1, 0x4, 0x0, &(0x7f0000000240)) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0}, 0x28) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r9 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r9, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) 21:45:56 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x408402, 0x211c2532093ee102) getdents64(r0, &(0x7f0000000180)=""/72, 0x48) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) bind$inet(r1, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f00000003c0), 0x4) ioctl$EVIOCGABS0(0xffffffffffffffff, 0x80184540, &(0x7f0000000080)=""/39) keyctl$get_security(0x11, 0x0, &(0x7f0000000140)=""/32, 0x20) write$binfmt_elf64(r1, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0x2bcf) shutdown(r1, 0x1) recvmsg(r1, &(0x7f0000001440)={0x0, 0xa, &(0x7f00000015c0)=[{&(0x7f0000001600)=""/4096, 0xf99e}], 0x1, 0x0, 0xff96ce4aaaa47475, 0x7115}, 0x100) 21:45:56 executing program 4: socket$kcm(0x2, 0x1, 0x84) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000900)=ANY=[@ANYBLOB="9f0d343f8f3672b246c5e3575e3bad29af7a982e5093be13037bae5e55d3901efcbad02c798684968abd7cd0f3463233c58a4171b61d275264b0c25a86770e422769c2240915668f9c27dcb8caa76b6b52bcf7f0234471abd5fa470b20eff96ea602ca594f7f1a08a7b251002c49eac4221ab3012d6c7c4d8505140e10"], 0x0, 0x7d}, 0x20) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz0\x00', 0x200002, 0x0) r2 = openat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) sendmsg$kcm(r3, 0x0, 0xfffffffffffffffc) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup/syz1\x00', 0x200002, 0x0) gettid() r4 = socket$kcm(0x11, 0x2, 0x0) sendmsg$kcm(r4, &(0x7f0000000200)={&(0x7f0000000040)=@nfc, 0x80, 0x0}, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) mkdirat$cgroup(r5, 0x0, 0x1ff) socket$kcm(0x11, 0x2, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r2, 0xc, 0x1, 0xd8, 0x0}, 0x20) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x2, 0x1c, &(0x7f0000000980)=ANY=[@ANYBLOB="8500000f7d00b7e1ff9724002ac8991601ad814eeb7b4fd5ee25ba83a72ba28f97cb0c9ad407e03f98a2f54eaabb372d8199ad6306ede43a67863593c59251df04459fa354dc3b820501f3ffb58bc4730f78e709652743498eae4839051b2c3d0510147acda9508c01c6dbdaf0a0ee718e67d02249d4d17ee4bbb35ba26fe4aba8fbbcc6d66b645c1671ebadcb84b4fe35d132e5f9a948606f334c3886bfbaf2a0bc045aa7f78f20f94bd9f0658ade293b596d237ddc80d851ec788ba03bdf1a552e3dff57c71a71f10e65802308ac57ae9ab961c16910be5f00c31095d821339125"], &(0x7f0000000340)='syzkaller\x00', 0x1, 0x82, &(0x7f0000000480)=""/130, 0x40f00, 0x4, [], 0x0, 0x10, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000000580)={0x4, 0x7, 0x6, 0xffffffff}, 0x10}, 0x70) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r6, 0xc0, &(0x7f0000000800)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)=0x4, 0x0, 0x0, 0x0, &(0x7f0000000440)={0x1, 0x4}, 0x0, 0x0, &(0x7f0000000740)={0x4, 0x3, 0x3, 0x553}, &(0x7f0000000780)=0x5, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=0x100000001}}, 0x10) r7 = syz_open_dev$adsp(&(0x7f0000000300)='/dev/adsp#\x00', 0x0, 0x10080) write$FUSE_INTERRUPT(r7, &(0x7f0000000400)={0x10, 0x0, 0x5}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0xffffffffffffffcf) close(r3) socketpair$unix(0x1, 0x4, 0x0, &(0x7f0000000240)) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0}, 0x28) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r9 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r9, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) 21:45:56 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$TIOCGLCKTRMIOS(r1, 0x5456, &(0x7f0000000000)={0x383, 0x7ff, 0xff, 0x100, 0x11, 0x9f, 0x9, 0x2, 0x8, 0x8001, 0xab, 0x20}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r2, 0x40086607, &(0x7f00000000c0)=0xfffffffffffff800) 21:45:57 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) lsetxattr$security_smack_entry(&(0x7f0000000000)='./bus\x00', &(0x7f00000000c0)='security.SMACK64MMAP\x00', &(0x7f0000000140)='\x00', 0x1, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r3 = creat(&(0x7f0000000300)='./file0\x00', 0x0) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000000200)={0x0, r3}) perf_event_open(&(0x7f00000001c0)={0x5, 0x70, 0x8, 0x2, 0x9, 0x83, 0x0, 0x2, 0x5002, 0x4, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x4, @perf_bp={&(0x7f0000000180), 0x2}, 0x80, 0x20, 0x5, 0x9, 0x1, 0x0, 0x800}, 0xffffffffffffffff, 0xe, r3, 0x4f344b6977b696a4) r4 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r4, 0x40086607, &(0x7f0000000100)=0xfffffffffffff800) [ 975.696763][T17356] EXT4-fs warning (device sda1): ext4_group_extend:1791: will only finish group (524288 blocks, 256 new) [ 975.779005][ T5] libceph: connect (1)[d::]:6789 error -101 [ 975.785074][ T5] libceph: mon0 (1)[d::]:6789 connect error [ 975.816057][T17356] EXT4-fs warning (device sda1): ext4_group_extend:1797: can't read last block, resize aborted [ 975.975315][T17354] netlink: 22 bytes leftover after parsing attributes in process `syz-executor.4'. 21:45:57 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r3 = creat(&(0x7f0000000300)='./file0\x00', 0x0) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000000200)={0x0, r3}) ioctl$VIDIOC_S_EDID(r2, 0xc0285629, &(0x7f00000000c0)={0x0, 0x20, 0x2, [], &(0x7f0000000000)=0x54}) r4 = open(&(0x7f0000000080)='./bus\x00', 0x48a42, 0x20) ioctl$EXT4_IOC_GROUP_EXTEND(r4, 0x40086607, &(0x7f0000000100)=0xfffffffffffff800) [ 976.059570][T17354] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 21:45:57 executing program 3: r0 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f00001bf000/0x1000)=nil, 0x1000, 0x0, 0x6011, r0, 0x0) r1 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0x400000, 0x0) setsockopt$netrom_NETROM_IDLE(r1, 0x103, 0x7, &(0x7f0000000040)=0x80, 0x4) perf_event_open(&(0x7f000025c000)={0x1, 0x70, 0x800005, 0x0, 0x0, 0x0, 0x0, 0x1, 0x41363, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x800000, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f00000002c0)={0x0, 0x9, 0xffa4, 0x3, 0x4, 0x4}, &(0x7f00000004c0)=0x14) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000500)={r4, 0x400}, &(0x7f0000000540)=0x8) r5 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rseq(&(0x7f0000000040), 0x20, 0x0, 0x0) r6 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r6, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r6, 0x84, 0x13, &(0x7f00000000c0)={0x0, 0x7}, &(0x7f0000000100)=0x8) getsockopt$inet_sctp6_SCTP_STATUS(r1, 0x84, 0xe, &(0x7f0000000200)={0x0, 0x2, 0x9cf, 0x7fff, 0x69, 0x8, 0x3, 0x8, {r7, @in={{0x2, 0x4e23}}, 0x4, 0x2, 0x7, 0x101, 0x4}}, &(0x7f0000000140)=0xb0) r8 = geteuid() mount$overlay(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000380)='overlay\x00', 0x4000, &(0x7f00000003c0)={[{@lowerdir={'lowerdir', 0x3d, './file0'}}, {@default_permissions='default_permissions'}, {@xino_off='xino=off'}, {@upperdir={'upperdir', 0x3d, './file0'}}, {@index_on='index=on'}, {@index_on='index=on'}], [{@euid_gt={'euid>', r8}}, {@appraise='appraise'}]}) ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x3) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r5, &(0x7f0000003000/0x18000)=nil, 0x0, 0xae, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000300)={0x400000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)) 21:45:57 executing program 1: socket$kcm(0x2, 0x1, 0x84) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000900)=ANY=[@ANYBLOB="9f0d343f8f3672b246c5e3575e3bad29af7a982e5093be13037bae5e55d3901efcbad02c798684968abd7cd0f3463233c58a4171b61d275264b0c25a86770e422769c2240915668f9c27dcb8caa76b6b52bcf7f0234471abd5fa470b20eff96ea602ca594f7f1a08a7b251002c49eac4221ab3012d6c7c4d8505140e10"], 0x0, 0x7d}, 0x20) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz0\x00', 0x200002, 0x0) r2 = openat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) sendmsg$kcm(r3, 0x0, 0xfffffffffffffffc) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup/syz1\x00', 0x200002, 0x0) gettid() r4 = socket$kcm(0x11, 0x2, 0x0) sendmsg$kcm(r4, &(0x7f0000000200)={&(0x7f0000000040)=@nfc, 0x80, 0x0}, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) mkdirat$cgroup(r5, 0x0, 0x1ff) socket$kcm(0x11, 0x2, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r2, 0xc, 0x1, 0xd8, 0x0}, 0x20) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x2, 0x1c, &(0x7f0000000980)=ANY=[@ANYBLOB="8500000f7d00b7e1ff9724002ac8991601ad814eeb7b4fd5ee25ba83a72ba28f97cb0c9ad407e03f98a2f54eaabb372d8199ad6306ede43a67863593c59251df04459fa354dc3b820501f3ffb58bc4730f78e709652743498eae4839051b2c3d0510147acda9508c01c6dbdaf0a0ee718e67d02249d4d17ee4bbb35ba26fe4aba8fbbcc6d66b645c1671ebadcb84b4fe35d132e5f9a948606f334c3886bfbaf2a0bc045aa7f78f20f94bd9f0658ade293b596d237ddc80d851ec788ba03bdf1a552e3dff57c71a71f10e65802308ac57ae9ab961c16910be5f00c31095d821339125"], &(0x7f0000000340)='syzkaller\x00', 0x1, 0x82, &(0x7f0000000480)=""/130, 0x40f00, 0x4, [], 0x0, 0x10, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000000580)={0x4, 0x7, 0x6, 0xffffffff}, 0x10}, 0x70) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r6, 0xc0, &(0x7f0000000800)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)=0x4, 0x0, 0x0, 0x0, &(0x7f0000000440)={0x1, 0x4}, 0x0, 0x0, &(0x7f0000000740)={0x4, 0x3, 0x3, 0x553}, &(0x7f0000000780)=0x5, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=0x100000001}}, 0x10) r7 = syz_open_dev$adsp(&(0x7f0000000300)='/dev/adsp#\x00', 0x0, 0x10080) write$FUSE_INTERRUPT(r7, &(0x7f0000000400)={0x10, 0x0, 0x5}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0xffffffffffffffcf) close(r3) socketpair$unix(0x1, 0x4, 0x0, &(0x7f0000000240)) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0}, 0x28) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r9 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r9, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) 21:45:57 executing program 4: socket$kcm(0x2, 0x1, 0x84) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000900)=ANY=[@ANYBLOB="9f0d343f8f3672b246c5e3575e3bad29af7a982e5093be13037bae5e55d3901efcbad02c798684968abd7cd0f3463233c58a4171b61d275264b0c25a86770e422769c2240915668f9c27dcb8caa76b6b52bcf7f0234471abd5fa470b20eff96ea602ca594f7f1a08a7b251002c49eac4221ab3012d6c7c4d8505140e10"], 0x0, 0x7d}, 0x20) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz0\x00', 0x200002, 0x0) r2 = openat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) sendmsg$kcm(r3, 0x0, 0xfffffffffffffffc) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup/syz1\x00', 0x200002, 0x0) gettid() r4 = socket$kcm(0x11, 0x2, 0x0) sendmsg$kcm(r4, &(0x7f0000000200)={&(0x7f0000000040)=@nfc, 0x80, 0x0}, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) mkdirat$cgroup(r5, 0x0, 0x1ff) socket$kcm(0x11, 0x2, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r2, 0xc, 0x1, 0xd8, 0x0}, 0x20) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x2, 0x1c, &(0x7f0000000980)=ANY=[@ANYBLOB="8500000f7d00b7e1ff9724002ac8991601ad814eeb7b4fd5ee25ba83a72ba28f97cb0c9ad407e03f98a2f54eaabb372d8199ad6306ede43a67863593c59251df04459fa354dc3b820501f3ffb58bc4730f78e709652743498eae4839051b2c3d0510147acda9508c01c6dbdaf0a0ee718e67d02249d4d17ee4bbb35ba26fe4aba8fbbcc6d66b645c1671ebadcb84b4fe35d132e5f9a948606f334c3886bfbaf2a0bc045aa7f78f20f94bd9f0658ade293b596d237ddc80d851ec788ba03bdf1a552e3dff57c71a71f10e65802308ac57ae9ab961c16910be5f00c31095d821339125"], &(0x7f0000000340)='syzkaller\x00', 0x1, 0x82, &(0x7f0000000480)=""/130, 0x40f00, 0x4, [], 0x0, 0x10, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000000580)={0x4, 0x7, 0x6, 0xffffffff}, 0x10}, 0x70) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r6, 0xc0, &(0x7f0000000800)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)=0x4, 0x0, 0x0, 0x0, &(0x7f0000000440)={0x1, 0x4}, 0x0, 0x0, &(0x7f0000000740)={0x4, 0x3, 0x3, 0x553}, &(0x7f0000000780)=0x5, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=0x100000001}}, 0x10) r7 = syz_open_dev$adsp(&(0x7f0000000300)='/dev/adsp#\x00', 0x0, 0x10080) write$FUSE_INTERRUPT(r7, &(0x7f0000000400)={0x10, 0x0, 0x5}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0xffffffffffffffcf) close(r3) socketpair$unix(0x1, 0x4, 0x0, &(0x7f0000000240)) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0}, 0x28) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) 21:45:57 executing program 2: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x19, 0x4, 0x4, 0xbd, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x3c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000200)='(', &(0x7f0000000100)='\a'}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r0, &(0x7f0000000340), &(0x7f0000000400)='\a'}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000000)={r0, &(0x7f0000000440), &(0x7f0000001440)=""/193}, 0x20) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000140)=@assoc_value={0x0}, &(0x7f00000001c0)=0x8) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000000240)={r1, @in6={{0xa, 0x4e24, 0x800, @loopback, 0xb7e}}, 0x5, 0x50, 0x4, 0xfffffff8, 0x3}, &(0x7f0000000300)=0x98) openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) 21:45:57 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r3 = creat(&(0x7f0000000180)='./bus\x00', 0x40) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000000200)={0x0, r3}) r4 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r5 = creat(&(0x7f0000000300)='./file0\x00', 0x0) ioctl$EXT4_IOC_MOVE_EXT(r4, 0xc028660f, &(0x7f0000000200)={0x0, r5}) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r4, 0x84, 0x75, &(0x7f0000000000)={0x0, 0x3}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r2, 0x84, 0x76, &(0x7f0000000100)={r6, 0xa056}, 0x8) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x7fffffff}) ioctl$EXT4_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000340)) 21:45:58 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r1, 0x84, 0x20, &(0x7f00000000c0)=0x2, 0x4) arch_prctl$ARCH_GET_GS(0x1004, &(0x7f0000000000)) ioctl$EXT4_IOC_GROUP_EXTEND(r1, 0x40086607, &(0x7f0000000100)=0xfffffffffffff800) 21:45:58 executing program 2: r0 = creat(&(0x7f0000000280)='./file0\x00', 0xc0) close(r0) socket$inet6_tcp(0xa, 0x1, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @multicast1}, &(0x7f00000000c0)=0x10) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r2 = creat(&(0x7f0000000300)='./file0\x00', 0x0) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000200)={0x0, r2}) ioctl$SIOCRSSL2CALL(r2, 0x89e2, &(0x7f0000000100)=@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) execve(&(0x7f0000000000)='./file0\x00', &(0x7f00000003c0)=[&(0x7f0000001b00)='gcB\xc6+\xbf\xcc_\x81 \xd5\xb9\x93L9\x87\x84K\xb9!\x0eX czg\x14\xec*\xed\xa6u\xc4\x14*\xdb_\xe8\\\x96\n\xa6)\v\xf9 \xddb|\xe7\x14\x82\xc3\x90\xf9\r?i\x86Lpw\xba\xe1\v\x1a9G\x04\fpfP\xcf\xee<:C\x1e\\\x1f&\xaf\xea?\x91\a\xea\x8d\x05\x83aJ\xf0v\xc0q\x84\x93il\v\x03\b\xadT\a\x14\xd7\xd5u\x84\x82\xb2\xd4(\x1d\x04\xf2\v\xe9\x8a\xdfU\xd1\x1f\x9b\x1d2mRQ\xea\x90\xa0m#\xa4\x1dy\x9d\xe9\xfa\x06\xa27\x9d;\xe4\xb4\x86\xa7&\xa9c6\x1b\x8d\xa6$\x82\x1b\x9a\x82\xc0o/\x8c\x97\xb9BJh\x9f\xb2\"\x95j\xd7PN\x89\x7f\xc8AB\xc7}T\xbe\x8aO\x9d\x94\x8d\xf1\xe7\xe2\xad\xdd\xc2\xb7\xe8Ac*v\xf7\x16\x8fe\xef\x84\xf5k\xa9\xeb\xebt\xc3\xf1f\xca\x04*\xec\xfa\xe5b\xeb\xb4\x99\xefSv\x82\xe2\xe3\x02)sP%Z\xad\x83\xda\xbe2\xa9\xf2\xdaH\xf2{\xf6~\x0f\xb9\xdd.\x06W\xd7\x1dG<\x1e\f2c\xf4\xa0d\x01\x88\xee\xcc\x18(\rap\x98?\xb1$\xe9\xe9+\xa6\xfb\xb1\xc61\xf1\xe7m\xfd\x05\xee\xa0L\xe4C\"\xba\xd5\x91]]\xb26\xbfA\x86\f\xda\fi\xc8\xefl&*\"_^5\xd1 H\x17\xf0\xcc\a\x10dxb\xc2\x13m[P\xac]\xc2\xc1\xa8\x1df_\xcax\xbd\xf4m\x1e\x18occU\xb5\\\xf5\x05\xec\xa3\x98\f1\x89\x99\xf0P\x8e\x1b\xe3\x9e\xb9\x0f\xf9\xb0\xadd\x9d=d\x94\xec\xceQx\xdb\xf6zG!3\xd7\x05\xf0Xk\xb7vo?1H\x86\x192\xb2&\xa5\x9d\xd7\xbc\x85\a\xfer\x14\x0e\xd9=\x9f\xa1\xda@\xc7-\x93\xbc4\xc0\xfe\xf6\xf6\xc4\xc3ZT>R\x11\xba\xf9\x17\r\x98\a\x06\xe8\x80\xef\xdf\x87\x1f\xfd\xb8\x99\x9c\x19\xb4\xac', &(0x7f0000000e00)='gcB\xc6+\xbf\xcc_\x81 \xd5\xb9\x93L9\x87\x84K\xb9!\x0eX czg\x14\xec*\xed\xa6u\xc4\x14*\xdb_\xe8\\\x96\n\xa6)\v\xf9 \xddb|\xe7\x14\x82\xc3\x90\xf9\r?i\x86Lpw\xba\xe1\v\x1a9G\x04\fpfP\xcf\xee<:C\x1e\\\x1f&\xaf\xea?\x91\a\xea\x8d\x05\x83aJ\xf0v\xc0q\x84\x93il\v\x03\b\xadT\a\x14\xd7\xd5u\x84\x82\xb2\xd4(\x1d\x04\xf2\v\xe9\x8a\xdfU\xd1\x1f\x9b\x1d2mRQ\xea\x90\xa0m#\xa4\x1dy\x9d\xe9\xfa\x06\xa27\x9d;\xe4\xb4\x86\xa7&\xa9c6\x1b\x8d\xa6$\x82\x1b\x9a\x82\xc0o/\x8c\x97\xb9BJh\x9f\xb2\"\x95j\xd7PN\x89\x7f\xc8AB\xc7}T\xbe\x8aO\x9d\x94\x8d\xf1\xe7\xe2\xad\xdd\xc2\xb7\xe8Ac*v\xf7\x16\x8fe\xef\x84\xf5k\xa9\xeb\xebt\xc3\xf1f\xca\x04*\xec\xfa\xe5b\xeb\xb4\x99\xefSv\x82\xe2\xe3\x02)sP%Z\xad\x83\xda\xbe2\xa9\xf2\xdaH\xf2{\xf6~\x0f\xb9\xdd.\x06W\xd7\x1dG<\x1e\f2c\xf4\xa0d\x01\x88\xee\xcc\x18(\rap\x98?\xb1$\xe9\xe9+\xa6\xfb\xb1\xc61\xf1\xe7m\xfd\x05\xee\xa0L\xe4C\"\xba\xd5\x91]]\xb26\xbfA\x86\f\xda\fi\xc8\xefl&*\"_^5\xd1 H\x17\xf0\xcc\a\x10dxb\xc2\x13m[P\xac]\xc2\xc1\xa8\x1df_\xcax\xbd\xf4m\x1e\x18occU\xb5\\\xf5\x05\xec\xa3\x98\f1\x89\x99\xf0P\x8e\x1b\xe3\x9e\xb9\x0f\xf9\xb0\xadd\x9d=d\x94\xec\xceQx\xdb\xf6zG!3\xd7\x05\xf0Xk\xb7vo?1H\x86\x192\xb2&\xa5\x9d\xd7\xbc\x85\a\xfer\x14\x0e\xd9=\x9f\xa1\xda@\xc7-\x93\xbc4\xc0\xfe\xf6\xf6\xc4\xc3ZT>R\x11\xba\xf9\x17\r\x98\a\x06\xe8\x80\xef\xdf\x87\x1f\xfd\xb8\x99\x9c\x19\xb4\xac'], &(0x7f0000001ac0)=[&(0x7f0000002100)='gcB\xc6+\xbf\xcc_\x81 \xd5\xb9\x93L9\x87\x84K\xb9!\x0eX czg\x14\xec*\xed\xa6u\xc4\x14*\xdb_\xe8\\\x96\n\xa6)\v\xf9 \xddb|\xe7\x14\x82\xc3\x90\xf9\r?i\x86Lpw\xba\xe1\v\x1a9G\x04\fpfP\xcf\xee<:C\x1e\\\x1f&\xaf\xea?\x91\a\xea\x8d\x05\x83aJ\xf0v\xc0q\x84\x93il\v\x03\b\xadT\a\x14\xd7\xd5u\x84\x82\xb2\xd4(\x1d\x04\xf2\v\xe9\x8a\xdfU\xd1\x1f\x9b\x1d2mRQ\xea\x90\xa0m#\xa4\x1dy\x9d\xe9\xfa\x06\xa27\x9d;\xe4\xb4\x86\xa7&\xa9c6\x1b\x8d\xa6$\x82\x1b\x9a\x82\xc0o/\x8c\x97\xb9BJh\x9f\xb2\"\x95j\xd7PN\x89\x7f\xc8AB\xc7}T\xbe\x8aO\x9d\x94\x8d\xf1\xe7\xe2\xad\xdd\xc2\xb7\xe8Ac*v\xf7\x16\x8fe\xef\x84\xf5k\xa9\xeb\xebt\xc3\xf1f\xca\x04*\xec\xfa\xe5b\xeb\xb4\x99\xefSv\x82\xe2\xe3\x02)sP%Z\xad\x83\xda\xbe2\xa9\xf2\xdaH\xf2{\xf6~\x0f\xb9\xdd.\x06W\xd7\x1dG<\x1e\f2c\xf4\xa0d\x01\x88\xee\xcc\x18(\rap\x98?\xb1$\xe9\xe9+\xa6\xfb\xb1\xc61\xf1\xe7m\xfd\x05\xee\xa0L\xe4C\"\xba\xd5\x91]]\xb26\xbfA\x86\f\xda\fi\xc8\xefl&*\"_^5\xd1 H\x17\xf0\xcc\a\x10dxb\xc2\x13m[P\xac]\xc2\xc1\xa8\x1df_\xcax\xbd\xf4m\x1e\x18occU\xb5\\\xf5\x05\xec\xa3\x98\f1\x89\x99\xf0P\x8e\x1b\xe3\x9e\xb9\x0f\xf9\xb0\xadd\x9d=d\x94\xec\xceQx\xdb\xf6zG!3\xd7\x05\xf0Xk\xb7vo?1H\x86\x192\xb2&\xa5\x9d\xd7\xbc\x85\a\xfer\x14\x0e\xd9=\x9f\xa1\xda@\xc7-\x93\xbc4\xc0\xfe\xf6\xf6\xc4\xc3ZT>R\x11\xba\xf9\x17\r\x98\a\x06\xe8\x80\xef\xdf\x87\x1f\xfd\xb8\x99\x9c\x19\xb4\xac', &(0x7f0000000a40)='gcB\xc6+\xbf\xcc_\x81 \xd5\xb9\x93L9\x87\x84K\xb9!\x0eX czg\x14\xec*\xed\xa6u\xc4\x14*\xdb_\xe8\\\x96\n\xa6)\v\xf9 \xddb|\xe7\x14\x82\xc3\x90\xf9\r?i\x86Lpw\xba\xe1\v\x1a9G\x04\fpfP\xcf\xee<:C\x1e\\\x1f&\xaf\xea?\x91\a\xea\x8d\x05\x83aJ\xf0v\xc0q\x84\x93il\v\x03\b\xadT\a\x14\xd7\xd5u\x84\x82\xb2\xd4(\x1d\x04\xf2\v\xe9\x8a\xdfU\xd1\x1f\x9b\x1d2mRQ\xea\x90\xa0m#\xa4\x1dy\x9d\xe9\xfa\x06\xa27\x9d;\xe4\xb4\x86\xa7&\xa9c6\x1b\x8d\xa6$\x82\x1b\x9a\x82\xc0o/\x8c\x97\xb9BJh\x9f\xb2\"\x95j\xd7PN\x89\x7f\xc8AB\xc7}T\xbe\x8aO\x9d\x94\x8d\xf1\xe7\xe2\xad\xdd\xc2\xb7\xe8Ac*v\xf7\x16\x8fe\xef\x84\xf5k\xa9\xeb\xebt\xc3\xf1f\xca\x04*\xec\xfa\xe5b\xeb\xb4\x99\xefSv\x82\xe2\xe3\x02)sP%Z\xad\x83\xda\xbe2\xa9\xf2\x04\xda\nU\x84\xc2\xe3E\xc1\xd8L\xb1r\xb0\xdaH\xf2{\xf6~\x0f\xb9\xdd.\x06W\xd7\x1dG<\x1e\f2c\xf4\xa0d\x01\x88\xee\xcc\x18(\rap\x98?\xb1$\xe9\xe9+\xa6\xfb\xb1\xc61\xf1\xe7m\xfd\x05\xee\xa0L\xe4C\"\xba\xd5\x91]]\xb26\xbfA\x86\f\xda\fi\xc8\xefl&*\"_^5\xd1 H\x17\xf0\xcc\a\x10dxb\xc2\x13m[P\xac]\xc2\xc1\xa8\x1df_\xcax\xbd\xf4m\x1e\x18occU\xb5\\\xf5\x05\xec\xa3\x98\f1\x8b\x99\xf0P\x8e\x1b\xe3\x9e\xb9\x0f\xf9\xb0\xadd\x9d=d\x94\xec\xceQx\xdb\xf6zG!3\xd7\x05\xf0Xk\xb7vo?1H\x86\x192\xb2&\xa5\x9d\xd7\xbc\x85\a\xfer\x14\x0e\xd9=\x9f\xa1\xda@\xc7-\x93\xbc4\xc0\xfe\xf6\xf6\xc4\xc3ZT>R\x11\xba\xf9\x17\r\x98\a', &(0x7f0000001440)='gcB\xc6+\xbf\xcc_\x81 \xd5\xb9\x93L9\x87\x84K\xb9!\x0eX czg\x14\xec*\xed\xa6u\xc4\x14*\xdb_\xe8\\\x96\n\xa6)\v\xf9 \xddb|\xe7\x14\x82\xc3\x90\xf9\r?i\x86Lpw\xba\xe1\v\x1a9G\x04\fpfP\xcf\xee<:C\x1e\\\x1f&\xaf\xea?\x91\a\xea\x8d\x05\x83aJ\xf0v\xc0q\x84\x93il\v\x03\b\xadT\a\x14\xd7\xd5u\x84\x82\xb2\xd4(\x1d\x04\xf2\v\xe9\x8a\xdfE\xd1\x1f\x9b\x1d2mRQ\xea\x90\xa0m#\xa4\x1dy\x9d\xe9\xfa\x06\xa27\x9d;\xe4\xb4\x86\xa7&\xa9c6\x1b\x8d\xa6$\x82\x1b\x9a\x82\xc0o/\x8c\x97\xb9BJh\x9f\xb2\"\x95j\xd7PN\x89\x7f\xc8AB\xc7}T\xbe\x8aO\x9d\x94\x8d\xf1\xe7\xe2\xad\xdd\xc2\xb7\xe8Ac*v\xf7\x16\x8fe\xef\x84\xf5k\xa9\xeb\xebt\xc3\xf1f\xca\x04*\xec\xfa\xe5b\xeb\xb4\x99\xefSv\x82\xe2\xe3\x02)sP%Z\xad\x83\xda\xbe2\xa9\xf2\xdaH\xf2{\xf6~\x0f\xb9\xdd.\x06W\xd7\x1dG<\x1e\f2c\xf4\xa0d\x01\x88\xee\xcc\x18(\rap\x98?\xb1$\xe9\xe9+\xa6\xfb\xb1\xc61\xf1\xe7m\xfd\x05\xee\xa0L\xe4C\"\xba\xd5\x91]]\xb26\xbfA\x86\f\xda\fi\xc8\xefl&*\"_^5\xd1 H\x17\xf0\xcc\a\x10dxb\xc2\x13m[P\xac]\xc2\xc1\xa8\x1df_\xcax\xbd\xf4m\x1e\x18occU\xb5\\\xf5\x05\xec\xa3\x98\f1\x89\x99\xf0P\x8e\x1b\xe3\x9e\xb9\x0f\xf9\xb0\xadd\x9d=d\x94\xec\xceQx\xdb\xf6zG!3\xd7\x05\xf0Xk\xb7vo?1H\x86\x192\xb2&\xa5\x9d\xd7\xbc\x85\a\xfer\x14\x0e\xd9=\x9f\xa1\xda@\xc7-\x93\xbc4\xc0\xfe\xf6\xf6\xc4\xc3ZT>R\x11\xba\xf9\x17\r\x98\x06\x06\xe8\x80\xef\xdf\x87\x1f\xfd\xb8\x99\x9c\x19\xb4\xac', &(0x7f0000001240)='gcB\xc6+\xbf\xcc_\x81 \xd5\xb9\x93L9\x87\x84K\xb9!\x0eX czg\x14\xec*\xed\xa6u\xc4\x14*\xdb_\xe8\\\x96\n\xa6)\v\xf9 \xddb|\xe7\x14\x82\xc3\x90\xf9\r?i\x86Lpw\xba\xe1\v\x1a9G\x04\fpfP\xcf\xee<:C\x1e\\\x1f&\xaf\xea?\x91\a\xea\x8d\x05\x83aJ\xf0v\xc0q\x84\x93il\v\x03\b\xadT\a\x14\xd7\xd5u\x84\x82\xb2\xd4(\x1d\x04\xf2\v\xe9\x8a\xdfU\xd1\x1f\x9b\x1d2mRQ\xea\x90\xa0m#\xa4\x1dy\x9d\xe9\xfa\x06\xa27\x9d;\xe4\xb4\x86\xa7&\xa9c6\x1b\x8d\xa6$\x82\x1b\x9a\x82\xc0o/\x8c\x97\xb9BJh\x9f\xb2\"\x95j\xd7PN\x89\x7f\xc8AB\xc7}T\xbe\x8aO\x9d\x94\x8d\xf1\xe7\xe2\xad\xdd\xc2\xb7\xe8Ac*v\xf7\x16\x8fe\xef\x84\xf5k\xa9\xeb\xebt\xc3\xf1f\xca\x04*\xec\xfa\xe5b\xeb\xb4\x99\xefSv\x82\xe2\xe3\x02)sP%Z\xad\x83\xda\xbe2\xa9\xf2\x04\xda\nU\x84\xc2\xe3E\xc1\xd8L\xb1r\xb0\xdaH\xf2{\xf6~\x0f\xb9\xdd.\x06W\xd7\x1dG<\x1e\f2c\xf4\xa0d\x01\x88\xee\xcc\x18(\rap\x98?\xb1$\xe9\xe9+\xa6\xfb\xb1\xc61\xf1\xe7m\xfd\x05\xee\xa0L\xe4C\"\xba\xd5\x91]]\xb26\xbfA\x86\f\xda\fi\xc8\xefl&*\"_^5\xd1 H\x17\xf0\xcc\a\x10dxb\xc2\x13m[P\xac]\xc2\xc1\xa8\x1df_\xcax\xbd\xf4m\x1e\x18occU\xb5\\\xf5\x05\xec\xa3\x98\f1\x8b\x99\xf0P\x8e\x1b\xe3\x9e\xb9\x0f\xf9\xb0\xadd\x9d=d\x94\xec\xceQx\xdb\xf6zG!3\xd7\x05\xf0Xk\xb7vo?1H\x86\x192\xb2&\xa5\x9d\xd7\xbc\x85\a\xfer\x14\x0e\xd9=\x9f\xa1\xda@\xc7-\x93\xbc4\xc0\xfe\xf6\xf6\xc4\xc3ZT>R\x11\xba\xf9\x17\r\x98\a', &(0x7f0000000840)='gcB\xc6+\xbf\xcc_\x81 \xd5\xb9\x93L9\x87\x84K\xb9!\x0eX czg\x14\xec*\xed\xa6u\xc4\x14*\xdb_\xe8\\\x96\n\xa6)\v\xf9 \xddb|\xe7\x14\x82\xc3\x90\xf9\r?i\x86Lpw\xba\xe1\v\x1a9G\x04\fpfP\xcf\xee<:C\x1e\\\x1f&\xaf\xea?\x91\a\xea\x8d\x05\x83aJ\xf0v\xc0q\x84\x93il\v\x03\b\xadT\a\x14\xd7\xd5u\x84\x82\xb2\xd4(\x1d\x04\xf2\v\xe9\x8a\xdfU\xd1\x1f\x9b\x1d2mRQ\xea\x90\xa0m#\xa4\x1dy\x9d\xe9\xfa\x06\xa27\x9d;\xe4\xb4\x86\xa7&\xa9c6\x1b\x8d\xa6$\x82\x1b\x9a\x82\xc0o/\x8c\x97\xb9BJh\x9f\xb2\"\x95j\xd7PN\x89\x7f\xc8AB\xc7}T\xbe\x8aO\x9d\x94\x8d\xf1\xe7\xe2\xad\xdd\xc2\xb7\xe8Ac*v\xf7\x16\x8fe\xef\x84\xf5k\xa9\xeb\xebt\xc3\xf1f\xca\x04*\xec\xfa\xe5b\xeb\xb4\x99\xefSv\x82\xe2\xe3\x02)sP%Z\xad\x83\xda\xbe2\xa9\xf2\xdaH\xf2{\xf6~\x0f\xb9\xdd.\x06W\xd7\x1dG<\x1e\f2c\xf4\xa0d\x01\x88\xee\xcc\x18(\rap\x98?\xb1$\xe9\xe9+\xa6\xfb\xb1\xc61\xf1\xe7m\xfd\x05\xee\xa0L\xe4C\"\xba\xd5\x91]]\xb26\xbfA\x86\f\xda\fi\xc8\xefl&*\"_^5\xd1 H\x17\xf0\xcc\a\x10dxb\xc2\x13m[P\xac]\xc2\xc1\xa8\x1df_\xcax\xbd\xf4m\x1e\x18occU\xb5\\\xf5\x05\xec\xa3\x98\f1\x89\x99\xf0P\x8e\x1b\xe3\x9e\xb9\x0f\xf9\xb0\xadd\x9d=d\x94\xec\xceQx\xdb\xf6zG!3\xd7\x05\xf0Xk\xb7vo?1H\x86\x192\xb2&\xa5\x9d\xd7\xbc\x85\a\xfer\x14\x0e\xd9=\x9f\xa1\xda@\xc7-\x93\xbc4\xc0\xfe\xf6\xf6\xc4\xc3ZT>R\x11\xba\xf9\x17\r\x98\a\x06\xe8\x80\xef\xdf\x87\x1f\xfd\xb8\x99\x9c\x19\xb4\xac', &(0x7f0000000440)='gcB\xc6+\xbf\xcc_\x81 \xd5\xb9\x93L9\x87\x84K\xb9!\x0eX czg\x14\xec*\xed\xa6u\xc4\x14*\xdb_\xe8\\\x96\n\xa6)\v\xf9 \xddb|\xe7\x14\x82\xc3\x90\xf9\r?i\x86Lpw\xba\xe1\v\x1a9G\x04\fpfP\xcf\xee<:C\x1e\\\x1f&\xaf\xea?\x91\a\xea\x8d\x05\x83aJ\xf0v\xc0q\x84\x93il\v\x03\b\xadT\a\x14\xd7\xd5u\x84\x82\xb2\xd4(\x1d\x04\xf2\v\xe9\x8a\xdfU\xd1\x1f\x9b\x1d2mRQ\xea\x90\xa0m#\xa4\x1dy\x9d\xe9\xfa\x06\xa27\x9d;\xe4\xb4\x86\xa7&\xa9c6\x1b\x8d\xa6$\x82\x1b\x9a\x82\xc0o/\x8c\x97\xb9BJh\x9f\xb2\"\x95j\xd7PN\x89\x7f\xc8AB\xc7}T\xbe\x8aO\x9d\x94\x8d\xf1\xe7\xe2\xad\xdd\xc2\xb7\xe8Ac\xe6,\xf9\xec\x84R\xc2\x02\xf5k\xa9\xeb\xebt\xc3\xf1f\xca\x04*\xec\xfa\xe5b\xeb\xb4\x99\xefSv\x82\xe2\xe3\x02)sP%Z\xad\x83\xda\xf2{\xf6~\x0f\xb9\xdd.\x06W\xd7\x1dG<\x1e\f2c\xf4\xa0d\x01\x88\xee\xcc\x18(\rap\x98?\xb1$\xe9\xe9+\xa6\xfb\xb1\xc61\xf1\xe7m\xfd\x05\xee\xa0L\xe4C\"\xba\xd5\x91]]\xb26\xbfA\x86\f\xda\fi\xc8\xefl&*\"_^5\xd1 H\x17\xf0\xcc\a\x10dxb\xc2\x13m[P\xac]\xc2\xc1\xa8\x1df_\xcax\xbd\xf4m\x1e\x18occU\xb5\\\xf5\x05\xec\xa3\x98\f1\x89\x99\xf0P\x8e\x1b\xe3\x9e\xb9\x0f\xf9\xb0\xadd\x9d=f\xf3\xca\'\xa8\x1b\xae\xff\xbe\xf9\xe7\xed34\x1c\xd1\x94\xec\xceQx\xdb\xf6zG!3\xd7\x05\xf0Xk\xb7vo?1H\x86\x192\xb2&\xa5\x9d\xd7\xbc\x85\a\xfer\x14\x0e\xd9=\x9f\xa1\xda@\xc7-\x93\xbc4\xc0\xfe\xf6\xf6\xc4\xc3ZT>R\x11\xba\xf9\x17\r\x98\a\x06\xe8\x80\xef\xdf\x87\x1f\xfd\xb8\x99\x9c\x19\xb4\xac', &(0x7f0000000640)='gcB\xc6+\xbf\xcc_\x81 \xd5\xb9\x93L9\x87\x84K\xb9!\x0eX czg\x14\xec*\xed\xa6u\xc4\x14*\xdb_\xe8\\\x96\n\xa6)\v\xf9 \xddb|\xe7\x14\x82\xc3\x90\xf9\r?i\x86Lpw\xba\xe1\v\x1a9G\x04\fpfP\xcf\xee<:C\x1e\\\x1f&\xaf\xea?\x91\a\xea\x8d\x05\x83aJ\xf0v\xc0q\x84\x93il\v\x03\b\xadT\a\x14\xd7\xd5u\x84\x82\xb2\xd4(\x1d\x04\xf2\v\xe9\x8a\xdfU\xd1\x1f\x9b\x1d2mRQ\xea\x90\xa0m#\xa4\x1dy\x9d\xe9\xfa\x06\xa27\x9d;\xe4\xb4\x86\xa7&\xa9c6\x1b\x8d\xa6$\x82\x1b\x9a\x82\xc0o/\x8c\x97\xb9BJh\x9f\xb2\"\x95j\xd7PN\x89\x7f\xc8AB\xc7}T\xbe\x8aO\x9d\x94\x8d\xf1\xe7\xe2\xad\xdd\xc2\xb7\xe8Ac*v\xf7\x16\x8fe\xef\x84\xf5k\xa9\xeb\xebt\xc3\xf1f\xca\x04*\xec\xfa\xe5b\xeb\xb4\x99\xefSv\x82\xe2\xe3\x02)sP%Z\xad\x83\xda\xbe2\xa9\xf2\xdaH\xf2{\xf6~\x0f\xb9\xdd.\x06W\xd7\x1dG<\x1e\f2c\xf4\xa0d\x01\x88\xee\xcc\x18(\rap\x98?\xb1$\xe9\xe9+\xa6\xfb\xb1\xc61\xf1\xe7m\xfd\x05\xee\xa0L\xe4C\"\xba\xd5\x91]]\xb26\xbfA\x86\f\xda\fi\xc8\xefl&*\"_^5\xd1 H\x17\xf0\xcc\a\x10dxb\xc2\x13m[P\xac]\xc2\xc1\xa8\x1df_\xcax\xbd\xf4m\x1e\x18occU\xb5\\\xf5\x05\xec\xa3\x98\f1\x89\x99\xf0P\x8e\x1b\xe3\x9e\xb9\x0f\xf9\xb0\xadd\x9d=d\x94\xec\xceQx\xdb\xf6zG!3\xd7\x05\xf0Xk\xb7vo?1H\x86\x192\xb2&\xa5\x9d\xd7\xbc\x85\a\xfer\x14\x0e\xd9=\x9f\xa1\xda@\xc7-\x93\xbc4\xc0\xfe\xf6\xf6\xc4\xc3ZT>R\x11\xba\xf9\x17\r\x98\a\x06\xe8\x80\xef\xdf\x87\x1f\xfd\xb8\x99\x9c\x19\xb4\xac']) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000040)='$]selfcpuset\x00') 21:45:58 executing program 4: socket$kcm(0x2, 0x1, 0x84) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000900)=ANY=[@ANYBLOB="9f0d343f8f3672b246c5e3575e3bad29af7a982e5093be13037bae5e55d3901efcbad02c798684968abd7cd0f3463233c58a4171b61d275264b0c25a86770e422769c2240915668f9c27dcb8caa76b6b52bcf7f0234471abd5fa470b20eff96ea602ca594f7f1a08a7b251002c49eac4221ab3012d6c7c4d8505140e10"], 0x0, 0x7d}, 0x20) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz0\x00', 0x200002, 0x0) r2 = openat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) sendmsg$kcm(r3, 0x0, 0xfffffffffffffffc) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup/syz1\x00', 0x200002, 0x0) gettid() r4 = socket$kcm(0x11, 0x2, 0x0) sendmsg$kcm(r4, &(0x7f0000000200)={&(0x7f0000000040)=@nfc, 0x80, 0x0}, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) mkdirat$cgroup(r5, 0x0, 0x1ff) socket$kcm(0x11, 0x2, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r2, 0xc, 0x1, 0xd8, 0x0}, 0x20) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x2, 0x1c, &(0x7f0000000980)=ANY=[@ANYBLOB="8500000f7d00b7e1ff9724002ac8991601ad814eeb7b4fd5ee25ba83a72ba28f97cb0c9ad407e03f98a2f54eaabb372d8199ad6306ede43a67863593c59251df04459fa354dc3b820501f3ffb58bc4730f78e709652743498eae4839051b2c3d0510147acda9508c01c6dbdaf0a0ee718e67d02249d4d17ee4bbb35ba26fe4aba8fbbcc6d66b645c1671ebadcb84b4fe35d132e5f9a948606f334c3886bfbaf2a0bc045aa7f78f20f94bd9f0658ade293b596d237ddc80d851ec788ba03bdf1a552e3dff57c71a71f10e65802308ac57ae9ab961c16910be5f00c31095d821339125"], &(0x7f0000000340)='syzkaller\x00', 0x1, 0x82, &(0x7f0000000480)=""/130, 0x40f00, 0x4, [], 0x0, 0x10, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000000580)={0x4, 0x7, 0x6, 0xffffffff}, 0x10}, 0x70) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r6, 0xc0, &(0x7f0000000800)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)=0x4, 0x0, 0x0, 0x0, &(0x7f0000000440)={0x1, 0x4}, 0x0, 0x0, &(0x7f0000000740)={0x4, 0x3, 0x3, 0x553}, &(0x7f0000000780)=0x5, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=0x100000001}}, 0x10) r7 = syz_open_dev$adsp(&(0x7f0000000300)='/dev/adsp#\x00', 0x0, 0x10080) write$FUSE_INTERRUPT(r7, &(0x7f0000000400)={0x10, 0x0, 0x5}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0xffffffffffffffcf) close(r3) socketpair$unix(0x1, 0x4, 0x0, &(0x7f0000000240)) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0}, 0x28) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) 21:45:58 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x0) syz_open_pts(r1, 0x200000) r2 = dup(r0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) r3 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r4 = creat(&(0x7f0000000300)='./file0\x00', 0x0) ioctl$EXT4_IOC_MOVE_EXT(r3, 0xc028660f, &(0x7f0000000200)={0x0, r4}) ioctl$VIDIOC_G_CROP(r2, 0xc014563b, &(0x7f0000000240)={0x7, {0x4, 0x9, 0x4, 0x6}}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r5 = open(&(0x7f0000000080)='./bus\x00', 0x171102, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r5, 0x40086607, &(0x7f0000000100)=0xfffffffffffff800) ioctl$KVM_HAS_DEVICE_ATTR(r5, 0x4018aee3, &(0x7f00000001c0)={0x0, 0x4, 0x800, &(0x7f0000000180)=0x2}) r6 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x20000, 0x0) ioctl$SIOCX25SCAUSEDIAG(r6, 0x89ec, &(0x7f0000000280)={0x4, 0x25}) 21:45:58 executing program 3: sendmsg$key(0xffffffffffffffff, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000440)=ANY=[@ANYBLOB="020300030c0000004000000000412d1fbc0000c622bed100000091bde2f9180200ef00062e149999e0000036d81458186fe8b90002000100000000008c4c2fcbee23b0d900"], 0x3d}}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaab31, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x2c3, 0x400}], 0x1, 0x0) r0 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r1 = creat(&(0x7f0000000300)='./file0\x00', 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000340)={{{@in, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@local}}, &(0x7f0000000280)=0xe8) r3 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) r5 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r6 = creat(&(0x7f0000000300)='./file0\x00', 0x0) ioctl$EXT4_IOC_MOVE_EXT(r5, 0xc028660f, &(0x7f0000000200)={0x0, r6}) ioctl$SNDRV_TIMER_IOCTL_PVERSION(r6, 0x80045400, &(0x7f00000004c0)) setfsgid(r4) getgroups(0x6, &(0x7f00000002c0)=[0xffffffffffffffff, 0x0, 0x0, 0xee00, 0x0, r4]) chown(&(0x7f00000001c0)='./file0\x00', r2, r7) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000200)={0x0, r1}) sendmsg$key(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)={0x2, 0x0, 0x1, 0x7, 0xb, 0x0, 0x70bd2d, 0x25dfdbfb, [@sadb_x_sa2={0x2, 0x13, 0xff, 0x0, 0x0, 0x70bd2b, 0x3503}, @sadb_x_sa2={0x2, 0x13, 0x4, 0x0, 0x0, 0x70bd2c, 0x3500}, @sadb_x_filter={0x5, 0x1a, @in6=@empty, @in=@rand_addr=0x3, 0x0, 0x10}]}, 0x58}}, 0x4080) 21:45:58 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sysfs$2(0x2, 0x5, &(0x7f0000000080)=""/214) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$unix(0x1, 0x1, 0x0) ioctl$VIDIOC_G_OUTPUT(r2, 0x8004562e, &(0x7f0000000000)) bind$unix(r3, &(0x7f0000003000)=@abs={0x1}, 0x8) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r4, 0x5423, &(0x7f00000003c0)=0x1) fchdir(r4) listen(r3, 0x0) r5 = socket$unix(0x1, 0x1, 0x0) connect(r5, &(0x7f0000985ff8)=@un=@abs={0x1}, 0x8) getsockopt$inet_sctp_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f00000001c0), &(0x7f0000000200)=0xb) r6 = syz_open_procfs(0x0, &(0x7f0000000180)='cgroup\x00') r7 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r7, 0x5423, &(0x7f00000003c0)=0x1) sendfile(r7, r6, 0x0, 0x8000800000b3) 21:45:59 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) open(&(0x7f0000000000)='./bus\x00', 0x40400, 0x8) r2 = getpgrp(0x0) perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r2, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x1, 0x2e, 0x80, 0x0, 0x0, 0x6, 0x28000, 0x9, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x3, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x7, 0x4}, 0x80, 0x8, 0x0, 0x7, 0x8, 0x7, 0x6}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000100)=0xfffffffffffff800) 21:45:59 executing program 4: socket$kcm(0x2, 0x1, 0x84) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000900)=ANY=[@ANYBLOB="9f0d343f8f3672b246c5e3575e3bad29af7a982e5093be13037bae5e55d3901efcbad02c798684968abd7cd0f3463233c58a4171b61d275264b0c25a86770e422769c2240915668f9c27dcb8caa76b6b52bcf7f0234471abd5fa470b20eff96ea602ca594f7f1a08a7b251002c49eac4221ab3012d6c7c4d8505140e10"], 0x0, 0x7d}, 0x20) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz0\x00', 0x200002, 0x0) r2 = openat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) sendmsg$kcm(r3, 0x0, 0xfffffffffffffffc) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup/syz1\x00', 0x200002, 0x0) gettid() r4 = socket$kcm(0x11, 0x2, 0x0) sendmsg$kcm(r4, &(0x7f0000000200)={&(0x7f0000000040)=@nfc, 0x80, 0x0}, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) mkdirat$cgroup(r5, 0x0, 0x1ff) socket$kcm(0x11, 0x2, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r2, 0xc, 0x1, 0xd8, 0x0}, 0x20) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x2, 0x1c, &(0x7f0000000980)=ANY=[@ANYBLOB="8500000f7d00b7e1ff9724002ac8991601ad814eeb7b4fd5ee25ba83a72ba28f97cb0c9ad407e03f98a2f54eaabb372d8199ad6306ede43a67863593c59251df04459fa354dc3b820501f3ffb58bc4730f78e709652743498eae4839051b2c3d0510147acda9508c01c6dbdaf0a0ee718e67d02249d4d17ee4bbb35ba26fe4aba8fbbcc6d66b645c1671ebadcb84b4fe35d132e5f9a948606f334c3886bfbaf2a0bc045aa7f78f20f94bd9f0658ade293b596d237ddc80d851ec788ba03bdf1a552e3dff57c71a71f10e65802308ac57ae9ab961c16910be5f00c31095d821339125"], &(0x7f0000000340)='syzkaller\x00', 0x1, 0x82, &(0x7f0000000480)=""/130, 0x40f00, 0x4, [], 0x0, 0x10, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000000580)={0x4, 0x7, 0x6, 0xffffffff}, 0x10}, 0x70) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r6, 0xc0, &(0x7f0000000800)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)=0x4, 0x0, 0x0, 0x0, &(0x7f0000000440)={0x1, 0x4}, 0x0, 0x0, &(0x7f0000000740)={0x4, 0x3, 0x3, 0x553}, &(0x7f0000000780)=0x5, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=0x100000001}}, 0x10) r7 = syz_open_dev$adsp(&(0x7f0000000300)='/dev/adsp#\x00', 0x0, 0x10080) write$FUSE_INTERRUPT(r7, &(0x7f0000000400)={0x10, 0x0, 0x5}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0xffffffffffffffcf) close(r3) socketpair$unix(0x1, 0x4, 0x0, &(0x7f0000000240)) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0}, 0x28) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) [ 977.890018][ T5] libceph: mon1 (1)[::6]:6789 socket closed (con state CONNECTING) 21:45:59 executing program 1: ftruncate(0xffffffffffffffff, 0x2000000) r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x200, 0x0) r1 = syz_open_dev$vivid(&(0x7f0000000080)='/dev/video#\x00', 0x1, 0x2) fsconfig$FSCONFIG_SET_FD(r0, 0x5, &(0x7f0000000040)='*:vboxnet0&]\x00', 0x0, r1) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$MON_IOCQ_RING_SIZE(r2, 0x9205) recvfrom$rxrpc(r0, &(0x7f0000000100)=""/202, 0xca, 0x10021, 0x0, 0x0) write$uinput_user_dev(r2, &(0x7f0000000200)={'syz0\x00', {0xe4b6, 0x8001, 0x1ff, 0xf001}, 0x4a, [0x5, 0x8, 0x3, 0x9, 0x0, 0xfffffffc, 0x1, 0x3, 0x1, 0xf16, 0x10000, 0x0, 0xfaa, 0x40, 0x0, 0x1, 0x2, 0x8, 0x5343, 0x10001, 0x4, 0x3, 0x4, 0x9, 0x4, 0x7fff, 0x40, 0x10000, 0xffff, 0x100, 0x5, 0x8, 0x1000000, 0x3, 0x7, 0x401, 0x1f, 0x101, 0x6, 0x52, 0x101, 0x5, 0xcde1, 0x4, 0x9eb0, 0x1, 0xe261, 0x9, 0x400, 0xa61, 0x0, 0x0, 0x4, 0x400, 0x2, 0x5, 0x62, 0x8001, 0x73, 0x27e7, 0x800, 0x9, 0x909, 0x4], [0x9, 0x20, 0x7fff, 0x8001, 0x45, 0xfffffe01, 0xde, 0x8, 0xa2ea, 0x3367, 0x4, 0x6, 0x8, 0x2, 0x3, 0x7, 0x5, 0x8000, 0x3ff, 0xfffffffb, 0x40, 0xffffffff, 0x50, 0xd724, 0x0, 0x4e11, 0x1, 0x0, 0x0, 0xfffffffc, 0x6, 0x100, 0x8, 0x6, 0x7fff, 0x20, 0x401, 0x8, 0xe4, 0x3f, 0x5, 0xed13, 0x0, 0xff, 0x10001, 0x5fec, 0xff, 0x9c, 0x0, 0x2, 0x80, 0x4, 0x6, 0xfffff000, 0xfff, 0xffffffff, 0x2, 0x0, 0xfffffffb, 0x4, 0x7, 0x1, 0x1, 0x6], [0x100, 0x9, 0x8, 0x7, 0x5, 0x20, 0x147, 0xfffffffc, 0x6, 0x3ba672be, 0x0, 0xf8, 0x0, 0x39fd, 0xdb, 0x964, 0xffff, 0x7fff, 0x5a, 0x6, 0x7ff, 0x1, 0x5, 0x3ff, 0x6, 0xfffffffa, 0x3, 0x53, 0x5, 0x8, 0x7690, 0x1, 0x4, 0x7fffffff, 0x2cc6701f, 0xa3b, 0xc91, 0x1f, 0x2, 0xdc, 0x2000, 0x6, 0x9, 0x8, 0x6, 0x7fff, 0x6, 0x200, 0x4, 0x6, 0x3, 0x4, 0x5, 0x2, 0x0, 0x1000, 0x5, 0x1, 0x7, 0x2, 0x6, 0x5, 0x5, 0x5], [0x80000001, 0x6fed5f6b, 0x6, 0x644, 0x2, 0x1ff, 0x4, 0xffffff80, 0x10001, 0x6, 0x8b, 0x0, 0x20, 0x7ff, 0x7, 0x86, 0x10000, 0x1, 0x8, 0xfffffffa, 0x7, 0x7, 0xb1a4, 0x0, 0x80000000, 0x3, 0x19b, 0x9, 0x200, 0x6, 0xfff, 0x1, 0x1000, 0x8, 0x5, 0x1, 0xfffffffd, 0xfffffff7, 0x10001, 0x10000, 0x7f, 0x7, 0x25fe0e6e, 0x6, 0x80, 0x9, 0x27a, 0x9, 0x6, 0x5, 0x1, 0xd0bd, 0xb7, 0xfb90cc0, 0x4, 0x8, 0x200, 0x4, 0x2, 0xa26, 0xfa07, 0x4, 0x1, 0x2]}, 0x45c) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$VIDIOC_S_CTRL(r3, 0xc008561c, &(0x7f0000000680)={0x8, 0x7361}) r4 = getpgid(0x0) ptrace$pokeuser(0x6, r4, 0x7ff, 0x0) r5 = getpgrp(0xffffffffffffffff) ptrace$pokeuser(0x6, r5, 0x49, 0x9) r6 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000006c0)='/proc/capi/capi20ncci\x00', 0x400000, 0x0) ioctl$VIDIOC_SUBDEV_ENUM_MBUS_CODE(r6, 0xc0305602, &(0x7f0000000700)={0x0, 0x0, 0x1006}) ioctl$PPPIOCSDEBUG(0xffffffffffffffff, 0x40047440, &(0x7f0000000740)=0x9) r7 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000780)='/dev/ubi_ctrl\x00', 0x42080, 0x0) openat$cgroup_int(r7, &(0x7f00000007c0)='memory.swap.max\x00', 0x2, 0x0) r8 = openat$null(0xffffffffffffff9c, &(0x7f0000000800)='/dev/null\x00', 0x40100, 0x0) getsockopt$netrom_NETROM_T2(r8, 0x103, 0x2, &(0x7f0000000840)=0x84db, &(0x7f0000000880)=0x4) r9 = io_uring_setup(0xbad, &(0x7f00000008c0)={0x0, 0x0, 0x2, 0x0, 0x1cd}) fsetxattr$security_smack_transmute(r9, &(0x7f0000000940)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000980)='TRUE', 0x4, 0x2) getcwd(&(0x7f00000009c0)=""/163, 0xa3) setsockopt$CAIFSO_REQ_PARAM(r7, 0x116, 0x80, &(0x7f0000000a80)="91ba231248f0388951ff33567a5a90bb2610ea2ff8e042401aabf42b43a5af5200db8e3f42bf9e7abc2201de6ab0debb8aa0b3bc9e79f7cf6128674d922db2", 0x3f) ioctl$TIOCSCTTY(0xffffffffffffffff, 0x540e, 0x1) r10 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000ac0)='/dev/mixer\x00', 0x100, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r6, 0x84, 0x77, &(0x7f0000000b00)={0x0, 0x7, 0x5, [0x400, 0xfff, 0x0, 0x1, 0x7]}, &(0x7f0000000b40)=0x12) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r10, 0x84, 0x72, &(0x7f0000000b80)={r11, 0x7, 0x20}, &(0x7f0000000bc0)=0xc) writev(0xffffffffffffffff, &(0x7f0000003e00)=[{&(0x7f0000000c00)="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", 0x1000}, {&(0x7f0000001c00)="be5171c4884fc79bb8e0e21dfcfd17cafac71c302f46b856333e4419c369eb941c5bdffb50759761f562747738b2262b576f4acac09260f44de785e2d4f2adbad4ddb4f26e8844e0f125f2a06641d2befbaee484bf9a4dd928d468a38d910be730226fde14696074c1d03031c9158da08c4ab70e91272fedd0ec43008b2c9f81d390f27dcc39c1200de3cf9642c6c51c09b7f1c943d393c8872c7ecb909f7d6a478dc90e07c5cd319705b11f200f1632133925cf6465d1c567ac0583665aa5486f7559f66c6f79e29a1c2f93a17fc4", 0xcf}, {&(0x7f0000001d00)="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", 0x1000}, {&(0x7f0000002d00)="1a3ba4bcf85c638dc385ead8cbacb45b5c1b69c2aa62df1dd8572e85879315f688909158f11b5ccd42b4d8e16c83b5c3647404386fd08ac13d2a", 0x3a}, {&(0x7f0000002d40)="8482607170bbbe70f611ea0f8104abe9028b55973a665f2d9b79048f514de4600dab8798fcb5ecc8486cdf79fc02736170bd875b717df3fd5652d3bcb77b5ccfec042f926477b9ca33f3a059a6671cfb6de698ed8832d27d9d0cda21e6ad21415ddca9ee4b8b5066849eb2beb808bd23a909967703dbeab67a90688e3b0b57132ca81e46fc6d4ca452dec101ec105e707af6e44d1f2f502d3ab2e2cbabe7e73557d6d7cbc7c51af39900fbbe82caaa8cd1a329bf77a41589608c678f1dad5d055b112c71c6126e36b441b57f5ce3bcfacefc82343b4127fc4dd2f29b25063462f87d5a833b567144153ca613a862091c61d9420cd00ad4600dbc4224a2f9b38aa6871fab7a9003e15ebc7f603f956b5a9285de241812acaeeb7c7d98a9cf1a20e19e323738bd8313370d379f351b1cc62eb374d2c7379d32950011184ff97f97b1ca0ac0de6a868b032efe6d7273e1c7762a7c0934fbfcc4fedad571c7eb4a652e4e1926b70aaad079cff50cdc62533c712827cbc29b1f586adeca631f9a02db8016650fa0b5cd469d8ca4d80eeac02a41cf9659e367cca7c7f5f94d614b86e9705b4858ed3dc5f0fa4492048c5930a92f4c53a2d4412591fd589cb7e8244e11a570e8ebc8569c0f3bbc80b98168aed8c1a7b5d262a1c9434e293d576773267fff9275fc5145eae4696d73775b82c933721bf4dccc1ef24961a592c22bc82d61f15a97b69c5f16ea2bae5dfd86c92a146683555aaa8981b33801f894ea0c3e1a7acca01ac8d50b0812793f0282829ac7d53cfb4da1fb68e5f355e58ecebba2afdb253b04642028b88e6342c6f03065034d742f7ec517d95716c46b288518c2664ad79cecc4f26bf3d6e8ea577672d54df084e5538d163845497e5f4759c1c360e7f9c12481ae6367c54a58c66593fc72980772d68d93b2249971495b546abaad2e7161fad09d31ff9b684fa0b47d47f3cf0849d18bc0ba63fcd46578b1ad9b8e86d93b9f2e24a8a92fb01754bfa648f71b3be7ecc7b30d17a0a44abbc5d97cda81dfedb140ae461b210f2b2967c6e4a175e3e0942ba17325974c391e5e43b720094ae6bba2e6118c495c63158dd655fe051a1a0e5ab1e97677933d7aabe3cf862692f51c6c18c036f4ee815477a7070c16fc01db5bf0d158db04146509b6e493442fbf36a312407e2299688ef1d7d704891d310c0f38803675d187e5bfa3ba0b8a6c1fa90ec8f838149525abbdf17254ec28fbb5ff71a1576f548093269093b6ec23bc1e1010296f53801e95637687f2135ccb895b1ee0f868d662a7bfe52aad3da3c85140141eb55297dfbbcf353231d7aa7b96f5cd622fda70d9168bffe37641e92f00db35903433f2e142db05ea0db7ada4fd3b4e7d1288f91336eec181c80e804a87a294faaba3447c59a68503bea91739d1180d560e101b5c8c75edaf54fcbe3cced2f1926d6a2a51c5788fede76d5dedbafcc7770fe5e5144c39dbe7fa6eee06e265f7c02533f74cbfe359bc902edb6557bd355b0e5f3145e9c89e26069f8cf9522146d53bc64e7c70e7d2ea57ae380c8c55965ba123b45b94571e39c95e20d4cd6c2523ace4d2cf0eafeab8208fe0c7ca33907b31390c2910b7fb0bec218c43c48a0a79b4d1af560216c15868f2e7705d1a79f61dc4380fed50062663174f612fa984d76f5cab9d53d825e877226c228d681a6b347abebf64d3919b7c097496408961c03817c4c84f88604dd3fa273cbc16137bdab3923a3a039e65d20678d225ac9fb6425de1c079c9ea341ad08057d81a54b9931ceca0d0c36132312f0b120a6f4a0df17660bb110abde17f5d4690c78e8d548f42cfa20373131e73c0a9fd1cdfa471a7bffc39d3f282d2033556dace96720e61c97eb311985f343d701b8da60603517c1e8b5bacafac3f9cea802125f4946b6d88ff6cdbb49ef2f4a294f4af726722a5fe87c9e86aac1d3ee3782f2e7e559c9a3f224d7af17e71deb384fc34e2f4c76f1fba61a1b7bf0822e922689eb55c6354b8e6145fb9fb559c98b21e146f5af718b62dc700c4280aaf81485b70682aba4c40e3915df6923173e341163155605280caa06a7d5546e687a5052995b12ab82f8c9758efe01b1739f6b6464dcd4083ce5ad1279db18b90792fd2012d448d981e19bf887f5ef39871be98d197ec390a0c2afba87005f6930adcaba107d7d279e76250764710ed3322688c466bfd1ec2878123127e085d21d52165a6386a5cb7faa0d3322895744ae18480dd7c63901db2a645d75a979b1ddd54a9eda6b35c1262977b17d09a5f003c5b264ef4168602d597dac5e56ba1856051904ff177ea76088a12d303c352a68c2cea5b94263f7acf928ce230d4ad0f9fba19dcba6a3e0327a165a3293fdec5a7aee37589e48a972aa23557fb32a35203d5a53e73abcafb1acd12c11e1efdf168cf5515c7968bd69f1f10f24047afb3c053ab0b4ac2d1918c8cf3b0227961330714e8c9b3a02ade8adee39a6fb139840a21671360c6c35e48076abe77a3d7eea7c89002abb21bfdf4cab61260a5466bbadee0253ab2586d84caea5f7c02a1739c7e73eb2a69970b91ac2aa0ffa85dc02e4aa5495d7f78f8751abc5e161c6e30284ef38b53d7209f15db604cfc13ca8e1b62db58f7d11c243a9f47159abccacd4de966b45df0c14e88c2538c218e7bde5e82ebeedc816a1545a53add38f9891445094eac2f96e9923604c4e6c6859655dce207b8f10634a0444d469e7a9008eb7fbb47bfe2bebbbb21b2fd1253d57f7baf27d008691e50f7202a0f100b992597f598c955b1dbce6ffaa197fb2cca3c3cd4e1ff84941d322515c26d8ae3bfb98d664550dfee3e8941b147ed9567e181831d297d877f0f047f9770f343536a06d51cbc407c82babddb1576ce6a839fad866ff024016ad56d683dd85b1409f3d6b94ffcf4117b9a05d838253567b5c3e82918a1a7089c5522c79728051a811bbf97b7e490f2169e03475347415910a1ade75ffb4f21cfe0703fb9d464e0abf0ab3b4db334734530dc284e3548b71b914fd4a9f88a6e8b2f6aa9b0d9399a9c0ec19e47eac957ebfb44f29769b8b8e6951a5e36abb087168c4de3330a37ed7c3ad078d95cbf841b8224e7478924a13516ade53f29a8ee733fd01e539cc9ceacb2d6bbd6d676c41eef20268ffaeff47bac1f85e985e8bacc9c51d6fa0c759abf7e71c868bf3d93aad49802b8a2a49d5f91ce58487f210b492d41b0e316eb17d445a62932009e066c09a72e21ccc7ee76f6bd0aabc2fab4274db6d7a82738ed8981911656c406ec98f6ac0c884eca9c5bb9a6970dfa083fd44d2c91652cd557e016f6ef3d016b5ba9c734aca57bc274cbba9fc9b91ff8f0b8d9fc4b4ebd06b9fde78f54b0effdfbd4ebdd640a70e7c586f25b661a2dd96e259e9e60f33995c4babd04ec531ce3b5d7233afb56db793843facfefe9ec3326d764f4ba0c53c8ced454c642ac2936035f372c63be9457330046c9ebdab5b5b75638a65e868e9fbf5d00e3facfa6dd05df348d59e1a628eb5c2891343ec2c55346890465ccc9d827ee05c1658f38311750b62e88dbbef33b2056d34dab70782f9ade74dc50fe401f2d677c4e13903f04c905e86363e0293eed53c1565002080725bc01c75831ddd3889b8eb2a37417ab8ff6bdb079402364b8c5bd66f855489b0aca1cc1cff5d8ad5b14460ddc5dd9f67d5d8eded953c13c39629a1319ba89ea6bad46cb1c98bf16ded190bc86fa9c7bab76b511c11d288a59ab6dff45d4f168d041541b3c6584f1b85cabaa620e3f55092a76d78528a14a88a2e61d8efa25800bf9ead2245bf5fb53029287d479df4ac5daab48014eadd86f813c253dfc4b05e3cf77e53823750224ac82169f0e28fbe83260f594cf46bb51add48df25915693549dd3d321a41c5fa1dc7d81f0719b04f8a7c9bcf8481bebd0863f7103fbf48a39e99619212ab6f76f1ceadaa6bf594b1bfc6bb6674a07635db4dbc77bc7eb2439a243cff2daed5f1c30f972cc7c627f746e390c247265880a72177388b2fe348e1ccb7bdeedae2e2298d262535e9f26fa2cdd4647493383f2a6d8f8dfe682324bf0e72f5c46a9582df8bcc14b8c1f5f413db6898e487350d9bdb3b7e80aec4c9614e5e39f90bb10beac2c4c44cc1895e7c4edc690701e0aa5ff4b9a56a4d13a236bcdb035b8082617e92241ff956cf483fa5904de6d0c0b5f3cc4ba7cd6a9723c226fa060807aabfffd6ec153bf71ff1c034815620e8fbf47f129c44787d4e998793542e29940078559927a9d60fec8c6f453318ac5384bfca0db0c4532ef115434489ef97525613834b102146421f80cf0158f6ea46acb53fdda96260224bcc571d4d4a0634fd7619d51c6255c25ee7d0f305e328180afe82f84d59f11a0cb0fcacaf599a6f145d410db0af6aa37f99766aa776b02afb38b57739969d6483d1e37f1dd3a493c19fbb78811fcc0332290d2272521e0357e94336dcce1cbfe7b2f5db349975b70fd09b4e7eb0952c3eba8611c89e5c5dc376c850ba1a0de7cb547a3e1dd242b45df5f16dd1177e61cb713114952ec498b9e4fb92abdfa8e4c27c8f0bc2290dfdaf9146af52454348150ed8d3e7182e9260562dfe1cc106a4c86045dc70e6db11a058a02a74aa83cd86780f5e197ccf731ca25e732722cf571ae67741698f0da7a7875251e229a39df4cbc18c46d79c6fc2d84fa9890d6d4c26eff7b5397b6bec6a5837567cb78a5b0b7d2d4db11c90c185ab4aa6c87678bef7a8c50e252024ed1328c55a185573a269972d977b33db592d1dc1391def6fb2471e33d8fdba221fa0ec076322a48b321642989fe692731ac99ced77ef3d9d7f46cc4d49229f00f4f41bf8db63a39543b72d95869d7bc0ce37b7f113860adf79741f863eceb6783e3fed04ef76f003ff566d214fa292657af3876280fad07fa2858b80a30a59995a1a9970c7a663a09dd9d558f8a3a7b0420a4b6d812ed3f40711765c360de124df9e4b19f2c36882900245ae214577e8bcbc004c59cfdef8976fbc35eb6274fd52d59a34829221799ea0598c078f5060ce5d9a549df8af933bc1b6f1bc934edf472ec1ae3cbec4058c3de723780c596366e1ea6ad39bf535d8f49310817bdbb09039db4472509f85644b66edf927d273a9addd36751f6c8364b8addbb6871286316cb069d25b64328f33171f8bcee700cfd5e0c9b0c582c6d7fe6e60e5eaecc67191e27209da4500fb6617bf532c4ab70bf27714463555bea2f4b3d945e038ead42b79c4a2c3f1ae5e13eb892eb57fe07477f5653d86145587d13aed3f2247262619afffe39fc7d3b2cc92aef2f5285df0445ed04c96c3238850ceb08c92185fc013a699ec31c30032c1988824d5693fe856679cd30cd04f4de47d83ccf3872c45b1ae6d1e704e3fc408a1d1ca1a270cb736d02ddf613a053b1b2f654f319c4d0f60a34aa7e33cf8a94a9a8ad9d5c1e1409e5cc0cbfdc468cded82c3945fe86b04be8215de7e1ec2bb5104f129fe4b4fcc32974e6c9520f7a04bc3a8578835791a31ff2e189fc3097730793a218d2481480abc59f2dfc8b0597e2acc59073ad46b270c36466850ddd2542bbb12017aad4c1cdb893a805204f8a42c26e5735138cb34b8d12c9ba8f82739214b5478bb9118f2edb3e19233a3f57c47c486e8d79f81607f5888e112466cca69dad3d19662efc30727ef213d461a7e19dcd091f61d510c3d3a33f02b07dab5e6554e0852e6977705ba20f7103d745248d657db4ea87fd55a5612c40f", 0x1000}, {&(0x7f0000003d40)="06cc265f590220cd142f68eef0f1c54f8844db24b3812750a697d34302d8de11742808f6e1df585acd24787ad8440a1fa7d097bbf9a17f8bb74e833380546b129ca4090c48a428050bdce4bd77b5327887ef549dfb9d2467671ae08d0ebe97fad7ca37a7e803d6b5869d27c832ffca2e2136cd706c6bb00ab8f918b7e555ee40a1a3d9b36aa0b55592e0d13b9d29d26565ac37edb20ae627614edada06b7505f91254db7e6fbe6a86a2df1981f0db0d514d7d267ffedfec85bc00f", 0xbb}], 0x6) 21:45:59 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000280)=ANY=[@ANYBLOB="1500000065ffff0180000008003950323030302e4c0900000000000000504df6aad74ed8a60acf21e98b4b2a3d27a7082dbb78abd55fba3da80b856445ab100621d6234555c08dc540473786cd89e9b08e3f5972fe9ca162132c353f1b38fe51b123e19268c89c9dd81c796f27f537cc5a3fb54aff8eaff4f6b59c41705b96a6711d4679079d000002"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r4 = creat(&(0x7f0000000300)='./file0\x00', 0x0) ioctl$EXT4_IOC_MOVE_EXT(r3, 0xc028660f, &(0x7f0000000200)={0x0, r4}) r5 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r6 = creat(&(0x7f0000000300)='./file0\x00', 0x0) ioctl$EXT4_IOC_MOVE_EXT(r5, 0xc028660f, &(0x7f0000000200)={0x0, r6}) getsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f0000000480)={{{@in=@local, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in6=@empty}}, &(0x7f0000000080)=0xe8) ioctl$TUNSETIFINDEX(r4, 0x400454da, &(0x7f0000000180)=r7) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000400)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@cachetag={'cachetag', 0x3d, 'trusted.overlay.nlink\x00'}}]}}) 21:45:59 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r3 = creat(&(0x7f0000000180)='./bus\x00', 0x40) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000000200)={0x0, r3}) r4 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r5 = creat(&(0x7f0000000300)='./file0\x00', 0x0) ioctl$EXT4_IOC_MOVE_EXT(r4, 0xc028660f, &(0x7f0000000200)={0x0, r5}) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r4, 0x84, 0x75, &(0x7f0000000000)={0x0, 0x3}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r2, 0x84, 0x76, &(0x7f0000000100)={r6, 0xa056}, 0x8) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x7fffffff}) ioctl$EXT4_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000340)) 21:45:59 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r2, 0x40086607, &(0x7f0000000100)=0xfffffffffffff800) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f00000003c0)=0x1) ioctl$EXT4_IOC_SWAP_BOOT(r3, 0x6611) 21:45:59 executing program 1: ioctl$TCGETX(0xffffffffffffffff, 0x5432, 0x0) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socket$inet6(0xa, 0x2, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {}, [{}, {}], {}, [{}, {}, {}, {}, {}]}, 0x5c, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="75707065726469723d2e2f66696c65302c6c6f7765726469723d2e2f66696c65302c776f726b6469723d2e2f66696c65315c00db35979f5c450600272fe429c42a9e59cd202ed5c42b332368b8241176c86763e0acb49fac4a0059797792f3ebb0ac44ecb6bfebda59d182e859"]) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) r1 = dup2(r0, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) bind$rxrpc(0xffffffffffffffff, 0x0, 0x0) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000200)='/dev/rfkill\x00', 0x80000, 0x0) epoll_ctl$EPOLL_CTL_DEL(r1, 0x2, r2) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) syz_genetlink_get_family_id$SEG6(0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000100)) [ 978.490739][T17764] EXT4-fs warning: 8 callbacks suppressed [ 978.490757][T17764] EXT4-fs warning (device sda1): ext4_group_extend:1791: will only finish group (524288 blocks, 256 new) 21:45:59 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001240)=ANY=[@ANYBLOB="71756f74612c73752710bd4cfe4e0e0f677ee8011c85bc4a7a5f757365723d277b217b76"]) 21:46:00 executing program 4: socket$kcm(0x2, 0x1, 0x84) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000900)=ANY=[@ANYBLOB="9f0d343f8f3672b246c5e3575e3bad29af7a982e5093be13037bae5e55d3901efcbad02c798684968abd7cd0f3463233c58a4171b61d275264b0c25a86770e422769c2240915668f9c27dcb8caa76b6b52bcf7f0234471abd5fa470b20eff96ea602ca594f7f1a08a7b251002c49eac4221ab3012d6c7c4d8505140e10"], 0x0, 0x7d}, 0x20) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz0\x00', 0x200002, 0x0) r2 = openat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) sendmsg$kcm(r3, 0x0, 0xfffffffffffffffc) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup/syz1\x00', 0x200002, 0x0) gettid() r4 = socket$kcm(0x11, 0x2, 0x0) sendmsg$kcm(r4, &(0x7f0000000200)={&(0x7f0000000040)=@nfc, 0x80, 0x0}, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) mkdirat$cgroup(r5, 0x0, 0x1ff) socket$kcm(0x11, 0x2, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r2, 0xc, 0x1, 0xd8, 0x0}, 0x20) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x2, 0x1c, &(0x7f0000000980)=ANY=[@ANYBLOB="8500000f7d00b7e1ff9724002ac8991601ad814eeb7b4fd5ee25ba83a72ba28f97cb0c9ad407e03f98a2f54eaabb372d8199ad6306ede43a67863593c59251df04459fa354dc3b820501f3ffb58bc4730f78e709652743498eae4839051b2c3d0510147acda9508c01c6dbdaf0a0ee718e67d02249d4d17ee4bbb35ba26fe4aba8fbbcc6d66b645c1671ebadcb84b4fe35d132e5f9a948606f334c3886bfbaf2a0bc045aa7f78f20f94bd9f0658ade293b596d237ddc80d851ec788ba03bdf1a552e3dff57c71a71f10e65802308ac57ae9ab961c16910be5f00c31095d821339125"], &(0x7f0000000340)='syzkaller\x00', 0x1, 0x82, &(0x7f0000000480)=""/130, 0x40f00, 0x4, [], 0x0, 0x10, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000000580)={0x4, 0x7, 0x6, 0xffffffff}, 0x10}, 0x70) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r6, 0xc0, &(0x7f0000000800)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)=0x4, 0x0, 0x0, 0x0, &(0x7f0000000440)={0x1, 0x4}, 0x0, 0x0, &(0x7f0000000740)={0x4, 0x3, 0x3, 0x553}, &(0x7f0000000780)=0x5, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=0x100000001}}, 0x10) r7 = syz_open_dev$adsp(&(0x7f0000000300)='/dev/adsp#\x00', 0x0, 0x10080) write$FUSE_INTERRUPT(r7, &(0x7f0000000400)={0x10, 0x0, 0x5}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0xffffffffffffffcf) close(r3) socketpair$unix(0x1, 0x4, 0x0, &(0x7f0000000240)) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0}, 0x28) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') r9 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r9, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) [ 978.680160][T17764] EXT4-fs warning (device sda1): ext4_group_extend:1797: can't read last block, resize aborted [ 979.092636][T17863] netlink: 22 bytes leftover after parsing attributes in process `syz-executor.4'. [ 979.228389][T17863] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 21:46:00 executing program 1: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) syz_mount_image$bfs(&(0x7f0000000100)='bfs\x00', &(0x7f00000001c0)='./file0\x00', 0xfffffffffffffebe, 0x2, &(0x7f0000000240)=[{&(0x7f0000000200)="3ca77d11a56f5060dc778bd6bcc220743b", 0x11, 0x9}, {&(0x7f0000000340)="a945ef6e857f1cd0ccf8cf2fc1a3bd58fd7a3a0481a4c68520f32e97668a29adc200ba2156a2f3fef4ba563c7a0b06a2a8cca501fae1f8e6278b5b5383ce39e996699891388d55d672294d33fd3bbed44a520a7baab2d4f494477b1b934adac75f27fbd4f5f8637aff2d8164c1dc4964b8fb0b8e51ac0a0dca83f7dd20b24371043503c11f6f5f376a715ff0fe597bd6578faa833c7f3d7d76cee3fad1a6031307e8ae8231012ce6d783ccb5a2973d2a0f3665f6e847f7bb224da0d8f61e4001d9f6dacd4254ce809771986ee87a3e70963d503e6ce525cf5c6f9154391addd9", 0xe0}], 0x42000, 0x0) write$cgroup_subtree(r1, &(0x7f00000000c0)={[{0x0, 'io'}]}, 0x4) bind$inet(r2, &(0x7f00000002c0)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) r3 = socket$packet(0x11, 0x2, 0x300) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x1, 0x3, &(0x7f0000000540)=ANY=[@ANYBLOB="850000002e0000001f000000000000009500140000000000b10600000000000000d475ce7717395c2de1eb092afc8c1bb98d4f86ca748fea3cb8c97d00c961bdaf9b149c606bf06c8b3e3c156753c1f35ae3951415d78a22913ba90460f0595fd3c1ac5800030000000000000000d6d5c4ad790bf53864ba4cb516a840a40b776c46280d3b72da736053ae698b583561ee2260ce8d7ea68a57f43f5810f089f8b3c8a60c114454ace56aa6ba7793eb61f00e84ed779b6c4abdd78ea708e068e7ff44d2e14dc8e0a0b3c01c8b75a8e2be0e672ddfd91aa3bd979e910e66e6d31eb7b811d6acf6257f795b515fd82117dd23016e2971164c9b31f9f037f839c2d8522d2172e4a9c875ca6fe67123a1ddce4fd8f089e26aff232d76e04d81af48c2b841fdc26c15e0db582d486b4f200fd100c8490b305bc0ef0daf6b842b8b383fd85fcbf9325c57cb8e32aad43649f84fbd93053555d7bfe9f1c023caae4e0e157ed53c088d16d662282d067e47714cd61394a31194a62aef879fbc2f12d37ae2fb2859d49ad80e6468794eb4cdf81c9e8319eded94a693111adb65f9f38e159a1bcd13c331c480b4172860fade4660d484cffce0b2a818258475189eee1702faa1131edc3a0c063500cbd3"], &(0x7f0000000180)='GPL\x00'}, 0x48) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000000140)=r4, 0x4) splice(r0, 0x0, r2, 0x0, 0x30005, 0x0) 21:46:00 executing program 3: accept4$tipc(0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000040)=0x10, 0x40800) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup(0xffffffffffffffff) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000080)=0x3) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/qat_adf_ctl\x00', 0x640600, 0x0) fcntl$setlease(r1, 0x400, 0x3) syz_read_part_table(0x5000000, 0x0, 0x0) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ubi_ctrl\x00', 0x8a842, 0x0) ioctl$USBDEVFS_RESETEP(r2, 0x80045503, &(0x7f0000000140)={0x4, 0x1}) 21:46:01 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) r3 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x8000, 0x4080) r4 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r5 = creat(&(0x7f0000000300)='./file0\x00', 0x0) ioctl$EXT4_IOC_MOVE_EXT(r4, 0xc028660f, &(0x7f0000000200)={0x0, r5}) renameat2(r3, &(0x7f00000000c0)='./bus\x00', r5, &(0x7f0000000140)='./bus\x00', 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r2, 0x40086607, &(0x7f0000000100)=0xfffffffffffff800) 21:46:01 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r3 = creat(&(0x7f0000000180)='./bus\x00', 0x40) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000000200)={0x0, r3}) r4 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r5 = creat(&(0x7f0000000300)='./file0\x00', 0x0) ioctl$EXT4_IOC_MOVE_EXT(r4, 0xc028660f, &(0x7f0000000200)={0x0, r5}) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r4, 0x84, 0x75, &(0x7f0000000000)={0x0, 0x3}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r2, 0x84, 0x76, &(0x7f0000000100)={r6, 0xa056}, 0x8) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x7fffffff}) ioctl$EXT4_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000340)) 21:46:01 executing program 2: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB="02030002080000000000000000000000010016004e22000005001a000000000000000000000000000000da000000f091e326000000008a21e5a3000000000000"], 0x40}}, 0x0) r1 = socket$nl_crypto(0x10, 0x3, 0x15) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r0, 0xc0406619, &(0x7f0000000100)={{0x2, 0x0, @descriptor="ff1a359d22fe271d"}}) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r1, 0x10e, 0x1, &(0x7f0000000000)=0xd, 0x4) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f0000000240)='/proc/self/attr/current\x00', 0x2, 0x0) r3 = creat(&(0x7f0000000300)='./file0\x00', 0x0) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000000200)={0x0, r3}) setsockopt$SO_J1939_FILTER(r3, 0x6b, 0x1, &(0x7f0000000140)=[{0x1, 0x0, {0x1, 0x0, 0x2}, {0x3, 0xf0, 0x3}, 0xff, 0xfe}, {0x2, 0x2, {0x2, 0xf0}, {0x2, 0x0, 0x1}, 0xfd, 0x2}, {0x2, 0x1, {0x0, 0x2}, {0x1, 0x0, 0x1}, 0x2, 0xff}, {0x0, 0x1, {0x0, 0x1, 0x2}, {0x1, 0xf0, 0x2}, 0x0, 0x1}, {0x2, 0x2, {0x6, 0xf0, 0x1}, {0x0, 0xff, 0x7}, 0x0, 0x1}, {0x3, 0x3, {0x6, 0xf0, 0x4}, {0x0, 0x1, 0x4}, 0xfe, 0x2}, {0x0, 0x0, {0x0, 0xff, 0x7aff6294f8dacb88}, {0x2, 0x1, 0x1}, 0x2, 0xfd}], 0xe0) 21:46:01 executing program 4: socket$kcm(0x2, 0x1, 0x84) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000900)=ANY=[@ANYBLOB="9f0d343f8f3672b246c5e3575e3bad29af7a982e5093be13037bae5e55d3901efcbad02c798684968abd7cd0f3463233c58a4171b61d275264b0c25a86770e422769c2240915668f9c27dcb8caa76b6b52bcf7f0234471abd5fa470b20eff96ea602ca594f7f1a08a7b251002c49eac4221ab3012d6c7c4d8505140e10"], 0x0, 0x7d}, 0x20) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz0\x00', 0x200002, 0x0) r2 = openat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) sendmsg$kcm(r3, 0x0, 0xfffffffffffffffc) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup/syz1\x00', 0x200002, 0x0) gettid() r4 = socket$kcm(0x11, 0x2, 0x0) sendmsg$kcm(r4, &(0x7f0000000200)={&(0x7f0000000040)=@nfc, 0x80, 0x0}, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) mkdirat$cgroup(r5, 0x0, 0x1ff) socket$kcm(0x11, 0x2, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r2, 0xc, 0x1, 0xd8, 0x0}, 0x20) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x2, 0x1c, &(0x7f0000000980)=ANY=[@ANYBLOB="8500000f7d00b7e1ff9724002ac8991601ad814eeb7b4fd5ee25ba83a72ba28f97cb0c9ad407e03f98a2f54eaabb372d8199ad6306ede43a67863593c59251df04459fa354dc3b820501f3ffb58bc4730f78e709652743498eae4839051b2c3d0510147acda9508c01c6dbdaf0a0ee718e67d02249d4d17ee4bbb35ba26fe4aba8fbbcc6d66b645c1671ebadcb84b4fe35d132e5f9a948606f334c3886bfbaf2a0bc045aa7f78f20f94bd9f0658ade293b596d237ddc80d851ec788ba03bdf1a552e3dff57c71a71f10e65802308ac57ae9ab961c16910be5f00c31095d821339125"], &(0x7f0000000340)='syzkaller\x00', 0x1, 0x82, &(0x7f0000000480)=""/130, 0x40f00, 0x4, [], 0x0, 0x10, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000000580)={0x4, 0x7, 0x6, 0xffffffff}, 0x10}, 0x70) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r6, 0xc0, &(0x7f0000000800)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)=0x4, 0x0, 0x0, 0x0, &(0x7f0000000440)={0x1, 0x4}, 0x0, 0x0, &(0x7f0000000740)={0x4, 0x3, 0x3, 0x553}, &(0x7f0000000780)=0x5, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=0x100000001}}, 0x10) r7 = syz_open_dev$adsp(&(0x7f0000000300)='/dev/adsp#\x00', 0x0, 0x10080) write$FUSE_INTERRUPT(r7, &(0x7f0000000400)={0x10, 0x0, 0x5}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0xffffffffffffffcf) close(r3) socketpair$unix(0x1, 0x4, 0x0, &(0x7f0000000240)) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0}, 0x28) r8 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r8, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) [ 979.877891][ T5] libceph: mon1 (1)[::6]:6789 socket closed (con state CONNECTING) [ 979.974247][ T5] libceph: connect (1)[d::]:6789 error -101 21:46:01 executing program 0: r0 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r1 = creat(&(0x7f0000000300)='./file0\x00', 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000200)={0x0, r1}) getsockopt$inet_mreq(r0, 0x0, 0x24, &(0x7f0000000000)={@initdev, @dev}, &(0x7f00000000c0)=0x8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r4, 0x40086607, &(0x7f0000000100)=0xfffffffffffff800) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000340)={0x20, 0x6, 0x2, {0x7, @raw_data="9180c46ef88cae8ec1ec358452edd544fe4497602b4fbee52dfa9545088ab0e67f689309ffe77172626f21186d2d318af5d0ecda25d8fa317f36acdb96dbc605ccd68f7f618426921c2e27061d0213b88c472e67194210d3588b3d953da996f087dc94dc08abee3217cced71d3475f0ab4afe53f865a972314cfb23b32e995745a25675aa3a5a86e68b34301679ca1669d0b9c008c064213139446a8dbcc91d605634c14a892bde9ae2a8f8273874a3065e7654dd2b26c165ab34c93477532f9eff52e067a38f93c"}}) [ 980.024329][ T5] libceph: mon0 (1)[d::]:6789 connect error 21:46:01 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="4c00000024030705000000e2d80000ef6d866100040000", @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000020a0001006e6574656d0000001c000200000000000000000000000000000000200000000000000000da5bc4579c2df7071d0f94f6b8e368b86987644cfa4a0fc9c7bf7dc55cd10f1314e73c8d8966b477e5f9f65a747730daab5d164ca0ce83564989736e35a71b415c9832eedcb30a1871795d87306932f5"], 0x4c}}, 0x0) r2 = socket(0x10, 0x3, 0x0) sendmmsg$alg(r2, &(0x7f0000000140), 0x4924b68, 0x0) 21:46:01 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000300)={0xa, 0x8000002}, 0x1c) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000540)='dctcp\x00', 0x6) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r2 = creat(&(0x7f0000000300)='./bus\x00', 0x0) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000200)={0x0, r2}) ioctl$VIDIOC_UNSUBSCRIBE_EVENT(r2, 0x4020565b, &(0x7f0000000000)={0x8, 0x3ff, 0x1}) r3 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r4 = creat(&(0x7f0000000300)='./file0\x00', 0x0) ioctl$EXT4_IOC_MOVE_EXT(r3, 0xc028660f, &(0x7f0000000200)={0x0, r4}) r5 = socket$can_raw(0x1d, 0x3, 0x1) setsockopt$CAN_RAW_FD_FRAMES(r5, 0x65, 0x5, &(0x7f0000000100)=0x1, 0x4) r6 = socket(0x11, 0x800000003, 0x0) bind(r6, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2ac5000000012e0b3836005404b0e0301a060075f2e3ff5f163ee340b700000080000000000000fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c65400"}, 0x80) getsockname$packet(r6, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$can_raw(r5, &(0x7f0000000200)={&(0x7f0000000000)={0x1d, r7}, 0x10, &(0x7f0000000280)={0x0}}, 0x0) ioctl$sock_inet6_SIOCDIFADDR(r4, 0x8936, &(0x7f0000000040)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x2b, r7}) r8 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r8, 0x8914, &(0x7f0000000080)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r8, 0x8914, &(0x7f0000000140)={'lo\x00\x00\xe7\xff\x03\x00\x00\x00\x00\x06\x00', 0xfd}) r9 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r10 = creat(&(0x7f0000000300)='./file0\x00', 0x0) ioctl$EXT4_IOC_MOVE_EXT(r9, 0xc028660f, &(0x7f0000000200)={0x0, r10}) r11 = open(&(0x7f0000000140)='.\x00', 0x1, 0x0) r12 = creat(&(0x7f0000000300)='./file0\x00', 0x0) ioctl$EXT4_IOC_MOVE_EXT(r11, 0xc028660f, &(0x7f0000000200)={0x0, r12}) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000240)={r12, 0x10, &(0x7f00000001c0)={&(0x7f0000000180)=""/39, 0x27, 0xffffffffffffffff}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={r9, 0x10, &(0x7f0000000480)={&(0x7f0000000340)=""/218, 0xda, r13}}, 0xfffffffffffffeed) sendto$packet(r0, &(0x7f0000000340), 0xfffffffffffffd72, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) 21:46:01 executing program 2: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) socket(0x1e, 0x1, 0x0) bind$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, &(0x7f0000000200)) symlinkat(0x0, 0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00') lsetxattr$security_smack_transmute(0x0, &(0x7f0000000300)='security.SMACK64TRANSMUTE\x00', 0x0, 0x0, 0x0) add_key$user(0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$sock(0xffffffffffffffff, 0x0, 0x20) msgget$private(0x0, 0x0) geteuid() r2 = socket(0x0, 0x0, 0x0) setsockopt$packet_tx_ring(r2, 0x10f, 0x87, &(0x7f0000000000)=@req={0x0, 0x6, 0x5, 0x5}, 0x10) sendmsg(r2, &(0x7f0000000140)={&(0x7f00004f5000)=@generic={0x0, "0200000900000000000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, 0x0}, 0x0) dup2(r1, r0) [ 980.497502][T17970] netlink: 22 bytes leftover after parsing attributes in process `syz-executor.4'. [ 980.558375][T18046] EXT4-fs warning (device sda1): ext4_group_extend:1791: will only finish group (524288 blocks, 256 new) [ 980.632122][T17970] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 980.685225][T18046] EXT4-fs warning (device sda1): ext4_group_extend:1797: can't read last block, resize aborted [ 980.749181][ T5] libceph: connect (1)[d::]:6789 error -101 [ 980.755212][ T5] libceph: mon0 (1)[d::]:6789 connect error 21:46:02 executing program 1: r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="28000000320001fffffffffffffdff00000000001400010010000100080001006270660008000000b5fca02912e09aa9b85651a9b191495bb15488e3bd21a0021c948365a11610e1721d30f4294d2ba8c153a3e7294975006fe296afe2ccd91e6fccb41bf3c42ffccb66a116b655d22e09f63c9ef4ccc436a6892f589a43b74fd4fdd8cf634c2b126d74fca1bfc1ae3fc4f6d75b9a4d0079a5751b5af7c595fe602735bd98f0a667e528786052f7c77f876c667e21a0a80d39c0010c539cd93970e4ae9eabfcd8d8f6e0c99d1a074b90c61f0f262dfaf69edc42"], 0x28}}, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x400000, 0x0) sendmsg$TIPC_NL_MEDIA_SET(r1, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000080)={&(0x7f00000002c0)={0x5c, 0x0, 0x200, 0x70bd29, 0x25dfdbfd, {}, [@TIPC_NLA_NODE={0x20, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x2}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x8c}]}, @TIPC_NLA_MEDIA={0x28, 0x5, [@TIPC_NLA_MEDIA_PROP={0x24, 0x2, [@TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xe153}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x50b}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}]}]}]}, 0x5c}, 0x1, 0x0, 0x0, 0x8000001}, 0x4) sendmmsg$alg(r0, &(0x7f0000000140), 0x4924924924924f0, 0x0) 21:46:02 executing program 4: socket$kcm(0x2, 0x1, 0x84) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000900)=ANY=[@ANYBLOB="9f0d343f8f3672b246c5e3575e3bad29af7a982e5093be13037bae5e55d3901efcbad02c798684968abd7cd0f3463233c58a4171b61d275264b0c25a86770e422769c2240915668f9c27dcb8caa76b6b52bcf7f0234471abd5fa470b20eff96ea602ca594f7f1a08a7b251002c49eac4221ab3012d6c7c4d8505140e10"], 0x0, 0x7d}, 0x20) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz0\x00', 0x200002, 0x0) r2 = openat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) sendmsg$kcm(r3, 0x0, 0xfffffffffffffffc) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup/syz1\x00', 0x200002, 0x0) gettid() r4 = socket$kcm(0x11, 0x2, 0x0) sendmsg$kcm(r4, &(0x7f0000000200)={&(0x7f0000000040)=@nfc, 0x80, 0x0}, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) mkdirat$cgroup(r5, 0x0, 0x1ff) socket$kcm(0x11, 0x2, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r2, 0xc, 0x1, 0xd8, 0x0}, 0x20) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x2, 0x1c, &(0x7f0000000980)=ANY=[@ANYBLOB="8500000f7d00b7e1ff9724002ac8991601ad814eeb7b4fd5ee25ba83a72ba28f97cb0c9ad407e03f98a2f54eaabb372d8199ad6306ede43a67863593c59251df04459fa354dc3b820501f3ffb58bc4730f78e709652743498eae4839051b2c3d0510147acda9508c01c6dbdaf0a0ee718e67d02249d4d17ee4bbb35ba26fe4aba8fbbcc6d66b645c1671ebadcb84b4fe35d132e5f9a948606f334c3886bfbaf2a0bc045aa7f78f20f94bd9f0658ade293b596d237ddc80d851ec788ba03bdf1a552e3dff57c71a71f10e65802308ac57ae9ab961c16910be5f00c31095d821339125"], &(0x7f0000000340)='syzkaller\x00', 0x1, 0x82, &(0x7f0000000480)=""/130, 0x40f00, 0x4, [], 0x0, 0x10, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000000580)={0x4, 0x7, 0x6, 0xffffffff}, 0x10}, 0x70) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r6, 0xc0, &(0x7f0000000800)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)=0x4, 0x0, 0x0, 0x0, &(0x7f0000000440)={0x1, 0x4}, 0x0, 0x0, &(0x7f0000000740)={0x4, 0x3, 0x3, 0x553}, &(0x7f0000000780)=0x5, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=0x100000001}}, 0x10) r7 = syz_open_dev$adsp(&(0x7f0000000300)='/dev/adsp#\x00', 0x0, 0x10080) write$FUSE_INTERRUPT(r7, &(0x7f0000000400)={0x10, 0x0, 0x5}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0xffffffffffffffcf) close(r3) socketpair$unix(0x1, 0x4, 0x0, &(0x7f0000000240)) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) r8 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r8, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) 21:46:02 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0x1) ioctl$PIO_UNIMAPCLR(r0, 0x4b68, &(0x7f0000000140)={0x7, 0x3ff, 0x8001}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) r3 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x800100, 0x0) setsockopt$inet_mreqsrc(r3, 0x0, 0x26, &(0x7f00000000c0)={@multicast2, @remote, @empty}, 0xc) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r4 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r4, 0x40086607, &(0x7f0000000100)=0xfffffffffffff800) 21:46:02 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r3 = creat(&(0x7f0000000180)='./bus\x00', 0x40) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000000200)={0x0, r3}) r4 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r5 = creat(&(0x7f0000000300)='./file0\x00', 0x0) ioctl$EXT4_IOC_MOVE_EXT(r4, 0xc028660f, &(0x7f0000000200)={0x0, r5}) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r4, 0x84, 0x75, &(0x7f0000000000)={0x0, 0x3}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r2, 0x84, 0x76, &(0x7f0000000100)={r6, 0xa056}, 0x8) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x7fffffff}) ioctl$EXT4_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000340)) [ 981.450339][T18170] netlink: 22 bytes leftover after parsing attributes in process `syz-executor.4'. [ 981.534616][T18170] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 21:46:03 executing program 2: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2) write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) socket(0x1e, 0x1, 0x0) bind$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, &(0x7f0000000200)) symlinkat(0x0, 0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00') lsetxattr$security_smack_transmute(0x0, &(0x7f0000000300)='security.SMACK64TRANSMUTE\x00', 0x0, 0x0, 0x0) add_key$user(0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$sock(0xffffffffffffffff, 0x0, 0x20) msgget$private(0x0, 0x0) geteuid() r2 = socket(0x0, 0x0, 0x0) setsockopt$packet_tx_ring(r2, 0x10f, 0x87, &(0x7f0000000000)=@req={0x0, 0x6, 0x5, 0x5}, 0x10) sendmsg(r2, &(0x7f0000000140)={&(0x7f00004f5000)=@generic={0x0, "0200000900000000000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, 0x0}, 0x0) dup2(r1, r0) [ 981.604978][T18178] EXT4-fs warning (device sda1): ext4_group_extend:1791: will only finish group (524288 blocks, 256 new) 21:46:03 executing program 4: socket$kcm(0x2, 0x1, 0x84) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000900)=ANY=[@ANYBLOB="9f0d343f8f3672b246c5e3575e3bad29af7a982e5093be13037bae5e55d3901efcbad02c798684968abd7cd0f3463233c58a4171b61d275264b0c25a86770e422769c2240915668f9c27dcb8caa76b6b52bcf7f0234471abd5fa470b20eff96ea602ca594f7f1a08a7b251002c49eac4221ab3012d6c7c4d8505140e10"], 0x0, 0x7d}, 0x20) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz0\x00', 0x200002, 0x0) r2 = openat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) sendmsg$kcm(r3, 0x0, 0xfffffffffffffffc) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup/syz1\x00', 0x200002, 0x0) gettid() r4 = socket$kcm(0x11, 0x2, 0x0) sendmsg$kcm(r4, &(0x7f0000000200)={&(0x7f0000000040)=@nfc, 0x80, 0x0}, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) mkdirat$cgroup(r5, 0x0, 0x1ff) socket$kcm(0x11, 0x2, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r2, 0xc, 0x1, 0xd8, 0x0}, 0x20) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x2, 0x1c, &(0x7f0000000980)=ANY=[@ANYBLOB="8500000f7d00b7e1ff9724002ac8991601ad814eeb7b4fd5ee25ba83a72ba28f97cb0c9ad407e03f98a2f54eaabb372d8199ad6306ede43a67863593c59251df04459fa354dc3b820501f3ffb58bc4730f78e709652743498eae4839051b2c3d0510147acda9508c01c6dbdaf0a0ee718e67d02249d4d17ee4bbb35ba26fe4aba8fbbcc6d66b645c1671ebadcb84b4fe35d132e5f9a948606f334c3886bfbaf2a0bc045aa7f78f20f94bd9f0658ade293b596d237ddc80d851ec788ba03bdf1a552e3dff57c71a71f10e65802308ac57ae9ab961c16910be5f00c31095d821339125"], &(0x7f0000000340)='syzkaller\x00', 0x1, 0x82, &(0x7f0000000480)=""/130, 0x40f00, 0x4, [], 0x0, 0x10, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000000580)={0x4, 0x7, 0x6, 0xffffffff}, 0x10}, 0x70) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r6, 0xc0, &(0x7f0000000800)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)=0x4, 0x0, 0x0, 0x0, &(0x7f0000000440)={0x1, 0x4}, 0x0, 0x0, &(0x7f0000000740)={0x4, 0x3, 0x3, 0x553}, &(0x7f0000000780)=0x5, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=0x100000001}}, 0x10) r7 = syz_open_dev$adsp(&(0x7f0000000300)='/dev/adsp#\x00', 0x0, 0x10080) write$FUSE_INTERRUPT(r7, &(0x7f0000000400)={0x10, 0x0, 0x5}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0xffffffffffffffcf) close(r3) socketpair$unix(0x1, 0x4, 0x0, &(0x7f0000000240)) r8 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r8, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) [ 981.770985][T18178] EXT4-fs warning (device sda1): ext4_group_extend:1797: can't read last block, resize aborted [ 981.782451][ T2836] libceph: connect (1)[d::]:6789 error -101 [ 981.793057][ T2836] libceph: mon0 (1)[d::]:6789 connect error [ 981.879908][T18163] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. 21:46:03 executing program 1: socket$kcm(0x2, 0x1, 0x84) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000900)=ANY=[@ANYBLOB="9f0d343f8f3672b246c5e3575e3bad29af7a982e5093be13037bae5e55d3901efcbad02c798684968abd7cd0f3463233c58a4171b61d275264b0c25a86770e422769c2240915668f9c27dcb8caa76b6b52bcf7f0234471abd5fa470b20eff96ea602ca594f7f1a08a7b251002c49eac4221ab3012d6c7c4d8505140e10"], 0x0, 0x7d}, 0x20) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz0\x00', 0x200002, 0x0) r2 = openat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) sendmsg$kcm(r3, 0x0, 0xfffffffffffffffc) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup/syz1\x00', 0x200002, 0x0) gettid() r4 = socket$kcm(0x11, 0x2, 0x0) sendmsg$kcm(r4, &(0x7f0000000200)={&(0x7f0000000040)=@nfc, 0x80, 0x0}, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) mkdirat$cgroup(r5, 0x0, 0x1ff) socket$kcm(0x11, 0x2, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r2, 0xc, 0x1, 0xd8, 0x0}, 0x20) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x2, 0x1c, &(0x7f0000000980)=ANY=[@ANYBLOB="8500000f7d00b7e1ff9724002ac8991601ad814eeb7b4fd5ee25ba83a72ba28f97cb0c9ad407e03f98a2f54eaabb372d8199ad6306ede43a67863593c59251df04459fa354dc3b820501f3ffb58bc4730f78e709652743498eae4839051b2c3d0510147acda9508c01c6dbdaf0a0ee718e67d02249d4d17ee4bbb35ba26fe4aba8fbbcc6d66b645c1671ebadcb84b4fe35d132e5f9a948606f334c3886bfbaf2a0bc045aa7f78f20f94bd9f0658ade293b596d237ddc80d851ec788ba03bdf1a552e3dff57c71a71f10e65802308ac57ae9ab961c16910be5f00c31095d821339125"], &(0x7f0000000340)='syzkaller\x00', 0x1, 0x82, &(0x7f0000000480)=""/130, 0x40f00, 0x4, [], 0x0, 0x10, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000000580)={0x4, 0x7, 0x6, 0xffffffff}, 0x10}, 0x70) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r6, 0xc0, &(0x7f0000000800)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)=0x4, 0x0, 0x0, 0x0, &(0x7f0000000440)={0x1, 0x4}, 0x0, 0x0, &(0x7f0000000740)={0x4, 0x3, 0x3, 0x553}, &(0x7f0000000780)=0x5, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=0x100000001}}, 0x10) r7 = syz_open_dev$adsp(&(0x7f0000000300)='/dev/adsp#\x00', 0x0, 0x10080) write$FUSE_INTERRUPT(r7, &(0x7f0000000400)={0x10, 0x0, 0x5}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0xffffffffffffffcf) close(r3) socketpair$unix(0x1, 0x4, 0x0, &(0x7f0000000240)) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) r8 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r8, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) [ 982.261584][T18289] netlink: 22 bytes leftover after parsing attributes in process `syz-executor.4'. [ 982.390602][T18289] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 21:46:04 executing program 2: socket$kcm(0x2, 0x1, 0x84) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000900)=ANY=[@ANYBLOB="9f0d343f8f3672b246c5e3575e3bad29af7a982e5093be13037bae5e55d3901efcbad02c798684968abd7cd0f3463233c58a4171b61d275264b0c25a86770e422769c2240915668f9c27dcb8caa76b6b52bcf7f0234471abd5fa470b20eff96ea602ca594f7f1a08a7b251002c49eac4221ab3012d6c7c4d8505140e10"], 0x0, 0x7d}, 0x20) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz0\x00', 0x200002, 0x0) r2 = openat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) sendmsg$kcm(r3, 0x0, 0xfffffffffffffffc) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup/syz1\x00', 0x200002, 0x0) gettid() r4 = socket$kcm(0x11, 0x2, 0x0) sendmsg$kcm(r4, &(0x7f0000000200)={&(0x7f0000000040)=@nfc, 0x80, 0x0}, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) mkdirat$cgroup(r5, 0x0, 0x1ff) socket$kcm(0x11, 0x2, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r2, 0xc, 0x1, 0xd8, 0x0}, 0x20) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x2, 0x1c, &(0x7f0000000980)=ANY=[@ANYBLOB="8500000f7d00b7e1ff9724002ac8991601ad814eeb7b4fd5ee25ba83a72ba28f97cb0c9ad407e03f98a2f54eaabb372d8199ad6306ede43a67863593c59251df04459fa354dc3b820501f3ffb58bc4730f78e709652743498eae4839051b2c3d0510147acda9508c01c6dbdaf0a0ee718e67d02249d4d17ee4bbb35ba26fe4aba8fbbcc6d66b645c1671ebadcb84b4fe35d132e5f9a948606f334c3886bfbaf2a0bc045aa7f78f20f94bd9f0658ade293b596d237ddc80d851ec788ba03bdf1a552e3dff57c71a71f10e65802308ac57ae9ab961c16910be5f00c31095d821339125"], &(0x7f0000000340)='syzkaller\x00', 0x1, 0x82, &(0x7f0000000480)=""/130, 0x40f00, 0x4, [], 0x0, 0x10, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000000580)={0x4, 0x7, 0x6, 0xffffffff}, 0x10}, 0x70) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r6, 0xc0, &(0x7f0000000800)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)=0x4, 0x0, 0x0, 0x0, &(0x7f0000000440)={0x1, 0x4}, 0x0, 0x0, &(0x7f0000000740)={0x4, 0x3, 0x3, 0x553}, &(0x7f0000000780)=0x5, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=0x100000001}}, 0x10) r7 = syz_open_dev$adsp(&(0x7f0000000300)='/dev/adsp#\x00', 0x0, 0x10080) write$FUSE_INTERRUPT(r7, &(0x7f0000000400)={0x10, 0x0, 0x5}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0xffffffffffffffcf) close(r3) socketpair$unix(0x1, 0x4, 0x0, &(0x7f0000000240)) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0}, 0x28) r8 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r8, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) [ 982.681533][T18297] netlink: 22 bytes leftover after parsing attributes in process `syz-executor.1'. [ 982.791725][T18297] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 983.042887][T18301] netlink: 22 bytes leftover after parsing attributes in process `syz-executor.2'. [ 983.112904][T18301] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 21:46:04 executing program 4: socket$kcm(0x2, 0x1, 0x84) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000900)=ANY=[@ANYBLOB="9f0d343f8f3672b246c5e3575e3bad29af7a982e5093be13037bae5e55d3901efcbad02c798684968abd7cd0f3463233c58a4171b61d275264b0c25a86770e422769c2240915668f9c27dcb8caa76b6b52bcf7f0234471abd5fa470b20eff96ea602ca594f7f1a08a7b251002c49eac4221ab3012d6c7c4d8505140e10"], 0x0, 0x7d}, 0x20) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz0\x00', 0x200002, 0x0) r2 = openat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) sendmsg$kcm(r3, 0x0, 0xfffffffffffffffc) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup/syz1\x00', 0x200002, 0x0) gettid() r4 = socket$kcm(0x11, 0x2, 0x0) sendmsg$kcm(r4, &(0x7f0000000200)={&(0x7f0000000040)=@nfc, 0x80, 0x0}, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) mkdirat$cgroup(r5, 0x0, 0x1ff) socket$kcm(0x11, 0x2, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r2, 0xc, 0x1, 0xd8, 0x0}, 0x20) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x2, 0x1c, &(0x7f0000000980)=ANY=[@ANYBLOB="8500000f7d00b7e1ff9724002ac8991601ad814eeb7b4fd5ee25ba83a72ba28f97cb0c9ad407e03f98a2f54eaabb372d8199ad6306ede43a67863593c59251df04459fa354dc3b820501f3ffb58bc4730f78e709652743498eae4839051b2c3d0510147acda9508c01c6dbdaf0a0ee718e67d02249d4d17ee4bbb35ba26fe4aba8fbbcc6d66b645c1671ebadcb84b4fe35d132e5f9a948606f334c3886bfbaf2a0bc045aa7f78f20f94bd9f0658ade293b596d237ddc80d851ec788ba03bdf1a552e3dff57c71a71f10e65802308ac57ae9ab961c16910be5f00c31095d821339125"], &(0x7f0000000340)='syzkaller\x00', 0x1, 0x82, &(0x7f0000000480)=""/130, 0x40f00, 0x4, [], 0x0, 0x10, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000000580)={0x4, 0x7, 0x6, 0xffffffff}, 0x10}, 0x70) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r6, 0xc0, &(0x7f0000000800)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)=0x4, 0x0, 0x0, 0x0, &(0x7f0000000440)={0x1, 0x4}, 0x0, 0x0, &(0x7f0000000740)={0x4, 0x3, 0x3, 0x553}, &(0x7f0000000780)=0x5, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=0x100000001}}, 0x10) r7 = syz_open_dev$adsp(&(0x7f0000000300)='/dev/adsp#\x00', 0x0, 0x10080) write$FUSE_INTERRUPT(r7, &(0x7f0000000400)={0x10, 0x0, 0x5}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0xffffffffffffffcf) close(r3) r8 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r8, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) 21:46:04 executing program 1: socket$kcm(0x2, 0x1, 0x84) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000900)=ANY=[@ANYBLOB="9f0d343f8f3672b246c5e3575e3bad29af7a982e5093be13037bae5e55d3901efcbad02c798684968abd7cd0f3463233c58a4171b61d275264b0c25a86770e422769c2240915668f9c27dcb8caa76b6b52bcf7f0234471abd5fa470b20eff96ea602ca594f7f1a08a7b251002c49eac4221ab3012d6c7c4d8505140e10"], 0x0, 0x7d}, 0x20) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz0\x00', 0x200002, 0x0) r2 = openat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) sendmsg$kcm(r3, 0x0, 0xfffffffffffffffc) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup/syz1\x00', 0x200002, 0x0) gettid() r4 = socket$kcm(0x11, 0x2, 0x0) sendmsg$kcm(r4, &(0x7f0000000200)={&(0x7f0000000040)=@nfc, 0x80, 0x0}, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) mkdirat$cgroup(r5, 0x0, 0x1ff) socket$kcm(0x11, 0x2, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r2, 0xc, 0x1, 0xd8, 0x0}, 0x20) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x2, 0x1c, &(0x7f0000000980)=ANY=[@ANYBLOB="8500000f7d00b7e1ff9724002ac8991601ad814eeb7b4fd5ee25ba83a72ba28f97cb0c9ad407e03f98a2f54eaabb372d8199ad6306ede43a67863593c59251df04459fa354dc3b820501f3ffb58bc4730f78e709652743498eae4839051b2c3d0510147acda9508c01c6dbdaf0a0ee718e67d02249d4d17ee4bbb35ba26fe4aba8fbbcc6d66b645c1671ebadcb84b4fe35d132e5f9a948606f334c3886bfbaf2a0bc045aa7f78f20f94bd9f0658ade293b596d237ddc80d851ec788ba03bdf1a552e3dff57c71a71f10e65802308ac57ae9ab961c16910be5f00c31095d821339125"], &(0x7f0000000340)='syzkaller\x00', 0x1, 0x82, &(0x7f0000000480)=""/130, 0x40f00, 0x4, [], 0x0, 0x10, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000000580)={0x4, 0x7, 0x6, 0xffffffff}, 0x10}, 0x70) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r6, 0xc0, &(0x7f0000000800)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)=0x4, 0x0, 0x0, 0x0, &(0x7f0000000440)={0x1, 0x4}, 0x0, 0x0, &(0x7f0000000740)={0x4, 0x3, 0x3, 0x553}, &(0x7f0000000780)=0x5, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=0x100000001}}, 0x10) r7 = syz_open_dev$adsp(&(0x7f0000000300)='/dev/adsp#\x00', 0x0, 0x10080) write$FUSE_INTERRUPT(r7, &(0x7f0000000400)={0x10, 0x0, 0x5}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0xffffffffffffffcf) close(r3) socketpair$unix(0x1, 0x4, 0x0, &(0x7f0000000240)) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) r8 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r8, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) 21:46:05 executing program 3: prctl$PR_GET_SECCOMP(0x15) prctl$PR_SET_SECUREBITS(0x1c, 0xf) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000016c0)={0xffffffffffffffff}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r1, 0x0) r2 = open(&(0x7f00000001c0)='./file0\x00', 0x80044, 0x0) rt_sigtimedwait(&(0x7f0000061000), 0x0, 0x0, 0x8) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) fcntl$setlease(r2, 0x400, 0x0) 21:46:05 executing program 5: socket$kcm(0x2, 0x1, 0x84) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000900)=ANY=[@ANYBLOB="9f0d343f8f3672b246c5e3575e3bad29af7a982e5093be13037bae5e55d3901efcbad02c798684968abd7cd0f3463233c58a4171b61d275264b0c25a86770e422769c2240915668f9c27dcb8caa76b6b52bcf7f0234471abd5fa470b20eff96ea602ca594f7f1a08a7b251002c49eac4221ab3012d6c7c4d8505140e10"], 0x0, 0x7d}, 0x20) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz0\x00', 0x200002, 0x0) r2 = openat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) sendmsg$kcm(r3, 0x0, 0xfffffffffffffffc) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup/syz1\x00', 0x200002, 0x0) gettid() r4 = socket$kcm(0x11, 0x2, 0x0) sendmsg$kcm(r4, &(0x7f0000000200)={&(0x7f0000000040)=@nfc, 0x80, 0x0}, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) mkdirat$cgroup(r5, 0x0, 0x1ff) socket$kcm(0x11, 0x2, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r2, 0xc, 0x1, 0xd8, 0x0}, 0x20) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x2, 0x1c, &(0x7f0000000980)=ANY=[@ANYBLOB="8500000f7d00b7e1ff9724002ac8991601ad814eeb7b4fd5ee25ba83a72ba28f97cb0c9ad407e03f98a2f54eaabb372d8199ad6306ede43a67863593c59251df04459fa354dc3b820501f3ffb58bc4730f78e709652743498eae4839051b2c3d0510147acda9508c01c6dbdaf0a0ee718e67d02249d4d17ee4bbb35ba26fe4aba8fbbcc6d66b645c1671ebadcb84b4fe35d132e5f9a948606f334c3886bfbaf2a0bc045aa7f78f20f94bd9f0658ade293b596d237ddc80d851ec788ba03bdf1a552e3dff57c71a71f10e65802308ac57ae9ab961c16910be5f00c31095d821339125"], &(0x7f0000000340)='syzkaller\x00', 0x1, 0x82, &(0x7f0000000480)=""/130, 0x40f00, 0x4, [], 0x0, 0x10, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000000580)={0x4, 0x7, 0x6, 0xffffffff}, 0x10}, 0x70) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r6, 0xc0, &(0x7f0000000800)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)=0x4, 0x0, 0x0, 0x0, &(0x7f0000000440)={0x1, 0x4}, 0x0, 0x0, &(0x7f0000000740)={0x4, 0x3, 0x3, 0x553}, &(0x7f0000000780)=0x5, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=0x100000001}}, 0x10) r7 = syz_open_dev$adsp(&(0x7f0000000300)='/dev/adsp#\x00', 0x0, 0x10080) write$FUSE_INTERRUPT(r7, &(0x7f0000000400)={0x10, 0x0, 0x5}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0xffffffffffffffcf) close(r3) socketpair$unix(0x1, 0x4, 0x0, &(0x7f0000000240)) r8 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r8, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) 21:46:05 executing program 2: socket$kcm(0x2, 0x1, 0x84) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000900)=ANY=[@ANYBLOB="9f0d343f8f3672b246c5e3575e3bad29af7a982e5093be13037bae5e55d3901efcbad02c798684968abd7cd0f3463233c58a4171b61d275264b0c25a86770e422769c2240915668f9c27dcb8caa76b6b52bcf7f0234471abd5fa470b20eff96ea602ca594f7f1a08a7b251002c49eac4221ab3012d6c7c4d8505140e10"], 0x0, 0x7d}, 0x20) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz0\x00', 0x200002, 0x0) r2 = openat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) sendmsg$kcm(r3, 0x0, 0xfffffffffffffffc) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup/syz1\x00', 0x200002, 0x0) gettid() r4 = socket$kcm(0x11, 0x2, 0x0) sendmsg$kcm(r4, &(0x7f0000000200)={&(0x7f0000000040)=@nfc, 0x80, 0x0}, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) mkdirat$cgroup(r5, 0x0, 0x1ff) socket$kcm(0x11, 0x2, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r2, 0xc, 0x1, 0xd8, 0x0}, 0x20) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x2, 0x1c, &(0x7f0000000980)=ANY=[@ANYBLOB="8500000f7d00b7e1ff9724002ac8991601ad814eeb7b4fd5ee25ba83a72ba28f97cb0c9ad407e03f98a2f54eaabb372d8199ad6306ede43a67863593c59251df04459fa354dc3b820501f3ffb58bc4730f78e709652743498eae4839051b2c3d0510147acda9508c01c6dbdaf0a0ee718e67d02249d4d17ee4bbb35ba26fe4aba8fbbcc6d66b645c1671ebadcb84b4fe35d132e5f9a948606f334c3886bfbaf2a0bc045aa7f78f20f94bd9f0658ade293b596d237ddc80d851ec788ba03bdf1a552e3dff57c71a71f10e65802308ac57ae9ab961c16910be5f00c31095d821339125"], &(0x7f0000000340)='syzkaller\x00', 0x1, 0x82, &(0x7f0000000480)=""/130, 0x40f00, 0x4, [], 0x0, 0x10, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000000580)={0x4, 0x7, 0x6, 0xffffffff}, 0x10}, 0x70) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r6, 0xc0, &(0x7f0000000800)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)=0x4, 0x0, 0x0, 0x0, &(0x7f0000000440)={0x1, 0x4}, 0x0, 0x0, &(0x7f0000000740)={0x4, 0x3, 0x3, 0x553}, &(0x7f0000000780)=0x5, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=0x100000001}}, 0x10) r7 = syz_open_dev$adsp(&(0x7f0000000300)='/dev/adsp#\x00', 0x0, 0x10080) write$FUSE_INTERRUPT(r7, &(0x7f0000000400)={0x10, 0x0, 0x5}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0xffffffffffffffcf) close(r3) socketpair$unix(0x1, 0x4, 0x0, &(0x7f0000000240)) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0}, 0x28) r8 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r8, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) [ 983.922371][T18324] netlink: 22 bytes leftover after parsing attributes in process `syz-executor.1'. [ 983.957638][T18323] netlink: 22 bytes leftover after parsing attributes in process `syz-executor.2'. [ 984.032097][T18317] netlink: 22 bytes leftover after parsing attributes in process `syz-executor.4'. [ 984.042366][T18324] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 984.087346][T18323] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 21:46:05 executing program 1: socket$kcm(0x2, 0x1, 0x84) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000900)=ANY=[@ANYBLOB="9f0d343f8f3672b246c5e3575e3bad29af7a982e5093be13037bae5e55d3901efcbad02c798684968abd7cd0f3463233c58a4171b61d275264b0c25a86770e422769c2240915668f9c27dcb8caa76b6b52bcf7f0234471abd5fa470b20eff96ea602ca594f7f1a08a7b251002c49eac4221ab3012d6c7c4d8505140e10"], 0x0, 0x7d}, 0x20) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz0\x00', 0x200002, 0x0) r2 = openat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) sendmsg$kcm(r3, 0x0, 0xfffffffffffffffc) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup/syz1\x00', 0x200002, 0x0) gettid() r4 = socket$kcm(0x11, 0x2, 0x0) sendmsg$kcm(r4, &(0x7f0000000200)={&(0x7f0000000040)=@nfc, 0x80, 0x0}, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) mkdirat$cgroup(r5, 0x0, 0x1ff) socket$kcm(0x11, 0x2, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r2, 0xc, 0x1, 0xd8, 0x0}, 0x20) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x2, 0x1c, &(0x7f0000000980)=ANY=[@ANYBLOB="8500000f7d00b7e1ff9724002ac8991601ad814eeb7b4fd5ee25ba83a72ba28f97cb0c9ad407e03f98a2f54eaabb372d8199ad6306ede43a67863593c59251df04459fa354dc3b820501f3ffb58bc4730f78e709652743498eae4839051b2c3d0510147acda9508c01c6dbdaf0a0ee718e67d02249d4d17ee4bbb35ba26fe4aba8fbbcc6d66b645c1671ebadcb84b4fe35d132e5f9a948606f334c3886bfbaf2a0bc045aa7f78f20f94bd9f0658ade293b596d237ddc80d851ec788ba03bdf1a552e3dff57c71a71f10e65802308ac57ae9ab961c16910be5f00c31095d821339125"], &(0x7f0000000340)='syzkaller\x00', 0x1, 0x82, &(0x7f0000000480)=""/130, 0x40f00, 0x4, [], 0x0, 0x10, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000000580)={0x4, 0x7, 0x6, 0xffffffff}, 0x10}, 0x70) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r6, 0xc0, &(0x7f0000000800)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)=0x4, 0x0, 0x0, 0x0, &(0x7f0000000440)={0x1, 0x4}, 0x0, 0x0, &(0x7f0000000740)={0x4, 0x3, 0x3, 0x553}, &(0x7f0000000780)=0x5, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=0x100000001}}, 0x10) r7 = syz_open_dev$adsp(&(0x7f0000000300)='/dev/adsp#\x00', 0x0, 0x10080) write$FUSE_INTERRUPT(r7, &(0x7f0000000400)={0x10, 0x0, 0x5}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0xffffffffffffffcf) close(r3) socketpair$unix(0x1, 0x4, 0x0, &(0x7f0000000240)) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) r8 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r8, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) [ 984.238097][T18317] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 21:46:05 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='W\x11/vga_ar\x80iter \x00', 0x100, 0x0) sendto$unix(r2, &(0x7f0000000140)="966841a8d683e0c1b589376fb5b62de4b80770c7fdfd77ddb6c879071605e2cd1c736e1d0c56d11b85a79ce90b78008cf4a2f7f44d44fb84584b6333e18ab275a42cdef48a9f8322afcb8131846e5328012e6eaa4b79d75a658aa4a7d206374c72c3cae30dd9c3546c8a2e608e3b15e9f0f761bb6f30a23f0924e6", 0x7b, 0x80, &(0x7f00000001c0)=@file={0x0, './bus\x00'}, 0x6e) r3 = open(&(0x7f0000000080)='./bus\x00', 0x49149492af975ed1, 0x78) r4 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r5, 0x5423, &(0x7f00000003c0)=0x1) ioctl$FS_IOC_GETFLAGS(r5, 0x80086601, &(0x7f0000000240)) r6 = creat(&(0x7f0000000300)='./file0\x00', 0x0) ioctl$EXT4_IOC_MOVE_EXT(r4, 0xc028660f, &(0x7f0000000200)={0x0, r6}) setsockopt$netlink_NETLINK_TX_RING(r6, 0x10e, 0x7, &(0x7f00000000c0)={0x140000, 0xea, 0x400, 0x2}, 0x10) ioctl$EXT4_IOC_GROUP_EXTEND(r3, 0x40086607, &(0x7f0000000100)=0xfffffffffffff800) epoll_create(0x8001) 21:46:05 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r0) bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0xd, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x3, 0x1, 0x90}]}, &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xdba3dd835d632db6, 0x10, &(0x7f0000000000), 0xfdd1}, 0x48) 21:46:05 executing program 2: socket$kcm(0x2, 0x1, 0x84) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000900)=ANY=[@ANYBLOB="9f0d343f8f3672b246c5e3575e3bad29af7a982e5093be13037bae5e55d3901efcbad02c798684968abd7cd0f3463233c58a4171b61d275264b0c25a86770e422769c2240915668f9c27dcb8caa76b6b52bcf7f0234471abd5fa470b20eff96ea602ca594f7f1a08a7b251002c49eac4221ab3012d6c7c4d8505140e10"], 0x0, 0x7d}, 0x20) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz0\x00', 0x200002, 0x0) r2 = openat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) sendmsg$kcm(r3, 0x0, 0xfffffffffffffffc) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup/syz1\x00', 0x200002, 0x0) gettid() r4 = socket$kcm(0x11, 0x2, 0x0) sendmsg$kcm(r4, &(0x7f0000000200)={&(0x7f0000000040)=@nfc, 0x80, 0x0}, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) mkdirat$cgroup(r5, 0x0, 0x1ff) socket$kcm(0x11, 0x2, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r2, 0xc, 0x1, 0xd8, 0x0}, 0x20) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x2, 0x1c, &(0x7f0000000980)=ANY=[@ANYBLOB="8500000f7d00b7e1ff9724002ac8991601ad814eeb7b4fd5ee25ba83a72ba28f97cb0c9ad407e03f98a2f54eaabb372d8199ad6306ede43a67863593c59251df04459fa354dc3b820501f3ffb58bc4730f78e709652743498eae4839051b2c3d0510147acda9508c01c6dbdaf0a0ee718e67d02249d4d17ee4bbb35ba26fe4aba8fbbcc6d66b645c1671ebadcb84b4fe35d132e5f9a948606f334c3886bfbaf2a0bc045aa7f78f20f94bd9f0658ade293b596d237ddc80d851ec788ba03bdf1a552e3dff57c71a71f10e65802308ac57ae9ab961c16910be5f00c31095d821339125"], &(0x7f0000000340)='syzkaller\x00', 0x1, 0x82, &(0x7f0000000480)=""/130, 0x40f00, 0x4, [], 0x0, 0x10, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000000580)={0x4, 0x7, 0x6, 0xffffffff}, 0x10}, 0x70) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r6, 0xc0, &(0x7f0000000800)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)=0x4, 0x0, 0x0, 0x0, &(0x7f0000000440)={0x1, 0x4}, 0x0, 0x0, &(0x7f0000000740)={0x4, 0x3, 0x3, 0x553}, &(0x7f0000000780)=0x5, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=0x100000001}}, 0x10) r7 = syz_open_dev$adsp(&(0x7f0000000300)='/dev/adsp#\x00', 0x0, 0x10080) write$FUSE_INTERRUPT(r7, &(0x7f0000000400)={0x10, 0x0, 0x5}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0xffffffffffffffcf) close(r3) socketpair$unix(0x1, 0x4, 0x0, &(0x7f0000000240)) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0}, 0x28) r8 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r8, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) [ 984.419341][ T2836] libceph: mon1 (1)[::6]:6789 socket closed (con state CONNECTING) 21:46:05 executing program 4: socket$kcm(0x2, 0x1, 0x84) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000900)=ANY=[@ANYBLOB="9f0d343f8f3672b246c5e3575e3bad29af7a982e5093be13037bae5e55d3901efcbad02c798684968abd7cd0f3463233c58a4171b61d275264b0c25a86770e422769c2240915668f9c27dcb8caa76b6b52bcf7f0234471abd5fa470b20eff96ea602ca594f7f1a08a7b251002c49eac4221ab3012d6c7c4d8505140e10"], 0x0, 0x7d}, 0x20) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz0\x00', 0x200002, 0x0) r2 = openat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) sendmsg$kcm(r3, 0x0, 0xfffffffffffffffc) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup/syz1\x00', 0x200002, 0x0) gettid() r4 = socket$kcm(0x11, 0x2, 0x0) sendmsg$kcm(r4, &(0x7f0000000200)={&(0x7f0000000040)=@nfc, 0x80, 0x0}, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) mkdirat$cgroup(r5, 0x0, 0x1ff) socket$kcm(0x11, 0x2, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r2, 0xc, 0x1, 0xd8, 0x0}, 0x20) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x2, 0x1c, &(0x7f0000000980)=ANY=[@ANYBLOB="8500000f7d00b7e1ff9724002ac8991601ad814eeb7b4fd5ee25ba83a72ba28f97cb0c9ad407e03f98a2f54eaabb372d8199ad6306ede43a67863593c59251df04459fa354dc3b820501f3ffb58bc4730f78e709652743498eae4839051b2c3d0510147acda9508c01c6dbdaf0a0ee718e67d02249d4d17ee4bbb35ba26fe4aba8fbbcc6d66b645c1671ebadcb84b4fe35d132e5f9a948606f334c3886bfbaf2a0bc045aa7f78f20f94bd9f0658ade293b596d237ddc80d851ec788ba03bdf1a552e3dff57c71a71f10e65802308ac57ae9ab961c16910be5f00c31095d821339125"], &(0x7f0000000340)='syzkaller\x00', 0x1, 0x82, &(0x7f0000000480)=""/130, 0x40f00, 0x4, [], 0x0, 0x10, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000000580)={0x4, 0x7, 0x6, 0xffffffff}, 0x10}, 0x70) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r6, 0xc0, &(0x7f0000000800)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)=0x4, 0x0, 0x0, 0x0, &(0x7f0000000440)={0x1, 0x4}, 0x0, 0x0, &(0x7f0000000740)={0x4, 0x3, 0x3, 0x553}, &(0x7f0000000780)=0x5, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=0x100000001}}, 0x10) r7 = syz_open_dev$adsp(&(0x7f0000000300)='/dev/adsp#\x00', 0x0, 0x10080) write$FUSE_INTERRUPT(r7, &(0x7f0000000400)={0x10, 0x0, 0x5}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0xffffffffffffffcf) r8 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r8, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) [ 984.554385][T18345] __nla_validate_parse: 1 callbacks suppressed [ 984.554482][T18345] netlink: 22 bytes leftover after parsing attributes in process `syz-executor.1'. [ 984.638446][T18345] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 984.703026][T18349] EXT4-fs warning (device sda1): ext4_group_extend:1791: will only finish group (524288 blocks, 256 new) 21:46:06 executing program 3: socket$kcm(0x2, 0x1, 0x84) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000900)=ANY=[@ANYBLOB="9f0d343f8f3672b246c5e3575e3bad29af7a982e5093be13037bae5e55d3901efcbad02c798684968abd7cd0f3463233c58a4171b61d275264b0c25a86770e422769c2240915668f9c27dcb8caa76b6b52bcf7f0234471abd5fa470b20eff96ea602ca594f7f1a08a7b251002c49eac4221ab3012d6c7c4d8505140e10"], 0x0, 0x7d}, 0x20) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz0\x00', 0x200002, 0x0) r2 = openat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) sendmsg$kcm(r3, 0x0, 0xfffffffffffffffc) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup/syz1\x00', 0x200002, 0x0) gettid() r4 = socket$kcm(0x11, 0x2, 0x0) sendmsg$kcm(r4, &(0x7f0000000200)={&(0x7f0000000040)=@nfc, 0x80, 0x0}, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) mkdirat$cgroup(r5, 0x0, 0x1ff) socket$kcm(0x11, 0x2, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r2, 0xc, 0x1, 0xd8, 0x0}, 0x20) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x2, 0x1c, &(0x7f0000000980)=ANY=[@ANYBLOB="8500000f7d00b7e1ff9724002ac8991601ad814eeb7b4fd5ee25ba83a72ba28f97cb0c9ad407e03f98a2f54eaabb372d8199ad6306ede43a67863593c59251df04459fa354dc3b820501f3ffb58bc4730f78e709652743498eae4839051b2c3d0510147acda9508c01c6dbdaf0a0ee718e67d02249d4d17ee4bbb35ba26fe4aba8fbbcc6d66b645c1671ebadcb84b4fe35d132e5f9a948606f334c3886bfbaf2a0bc045aa7f78f20f94bd9f0658ade293b596d237ddc80d851ec788ba03bdf1a552e3dff57c71a71f10e65802308ac57ae9ab961c16910be5f00c31095d821339125"], &(0x7f0000000340)='syzkaller\x00', 0x1, 0x82, &(0x7f0000000480)=""/130, 0x40f00, 0x4, [], 0x0, 0x10, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000000580)={0x4, 0x7, 0x6, 0xffffffff}, 0x10}, 0x70) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r6, 0xc0, &(0x7f0000000800)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)=0x4, 0x0, 0x0, 0x0, &(0x7f0000000440)={0x1, 0x4}, 0x0, 0x0, &(0x7f0000000740)={0x4, 0x3, 0x3, 0x553}, &(0x7f0000000780)=0x5, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=0x100000001}}, 0x10) r7 = syz_open_dev$adsp(&(0x7f0000000300)='/dev/adsp#\x00', 0x0, 0x10080) write$FUSE_INTERRUPT(r7, &(0x7f0000000400)={0x10, 0x0, 0x5}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0xffffffffffffffcf) close(r3) r8 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r8, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) [ 984.772716][T18357] netlink: 22 bytes leftover after parsing attributes in process `syz-executor.4'. [ 984.787132][T18353] netlink: 22 bytes leftover after parsing attributes in process `syz-executor.2'. [ 984.819351][T18349] EXT4-fs warning (device sda1): ext4_group_extend:1797: can't read last block, resize aborted [ 984.853458][T18357] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 21:46:06 executing program 5: sched_setscheduler(0x0, 0x5, &(0x7f0000000000)) ioctl$SG_GET_ACCESS_COUNT(0xffffffffffffffff, 0x2289, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x8, @perf_config_ext={0x0, 0x73a6}, 0x8008, 0x0, 0x0, 0x0, 0x100000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x0, 0x0) openat$mixer(0xffffffffffffff9c, 0x0, 0x40200, 0x0) ptrace$getsig(0x4202, 0xffffffffffffffff, 0xfffffffffffffffe, &(0x7f0000000240)) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r3 = creat(&(0x7f0000000300)='./file0\x00', 0x0) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000000200)={0x0, r3}) ioctl$NBD_SET_FLAGS(r2, 0xab0a, 0x2) connect$inet6(r1, &(0x7f0000000240)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r4 = creat(&(0x7f0000000300)='./file0\x00', 0x0) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r5, 0x5423, &(0x7f00000003c0)=0x1) ioctl$EXT4_IOC_MOVE_EXT(r5, 0xc028660f, &(0x7f0000000200)={0x0, r4, 0xfffffffffffffffc, 0x0, 0x0, 0x100000000}) r6 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r7 = creat(&(0x7f0000000300)='./file0\x00', 0x0) ioctl$EXT4_IOC_MOVE_EXT(r6, 0xc028660f, &(0x7f0000000200)={0x0, r7}) r8 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r9 = creat(&(0x7f0000000300)='./file0\x00', 0x0) ioctl$EXT4_IOC_MOVE_EXT(r8, 0xc028660f, &(0x7f0000000200)={0x0, r9}) getsockopt$inet_IP_XFRM_POLICY(r8, 0x0, 0x11, &(0x7f0000000540)={{{@in=@initdev, @in6=@empty}}, {{@in6=@empty}, 0x0, @in=@local}}, &(0x7f0000000180)=0xe8) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000000)=0x576, 0x4) r10 = syz_open_procfs(0x0, 0x0) preadv(r10, 0x0, 0x0, 0x400000) connect(r1, &(0x7f00000001c0)=@in={0x2, 0x4e20, @remote}, 0x80) sendmmsg(r1, &(0x7f00000002c0), 0x4000000000000d7, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0x0) accept4$bt_l2cap(0xffffffffffffffff, 0x0, &(0x7f0000000100), 0x0) r11 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r11, 0x5423, &(0x7f00000003c0)=0x1) r12 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r12, 0x5423, &(0x7f00000003c0)=0x1) tee(r11, r12, 0x2, 0x13) socketpair$unix(0x1, 0x5, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x5caad999, 0x200000000000000, 0x0, 0x362) ioctl$VIDIOC_G_CTRL(r10, 0xc008561b, &(0x7f0000000080)={0x0, 0x1ff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000000c0)='stack\x00') 21:46:06 executing program 1: socket$kcm(0x2, 0x1, 0x84) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000900)=ANY=[@ANYBLOB="9f0d343f8f3672b246c5e3575e3bad29af7a982e5093be13037bae5e55d3901efcbad02c798684968abd7cd0f3463233c58a4171b61d275264b0c25a86770e422769c2240915668f9c27dcb8caa76b6b52bcf7f0234471abd5fa470b20eff96ea602ca594f7f1a08a7b251002c49eac4221ab3012d6c7c4d8505140e10"], 0x0, 0x7d}, 0x20) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz0\x00', 0x200002, 0x0) r2 = openat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) sendmsg$kcm(r3, 0x0, 0xfffffffffffffffc) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup/syz1\x00', 0x200002, 0x0) gettid() r4 = socket$kcm(0x11, 0x2, 0x0) sendmsg$kcm(r4, &(0x7f0000000200)={&(0x7f0000000040)=@nfc, 0x80, 0x0}, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) mkdirat$cgroup(r5, 0x0, 0x1ff) socket$kcm(0x11, 0x2, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r2, 0xc, 0x1, 0xd8, 0x0}, 0x20) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x2, 0x1c, &(0x7f0000000980)=ANY=[@ANYBLOB="8500000f7d00b7e1ff9724002ac8991601ad814eeb7b4fd5ee25ba83a72ba28f97cb0c9ad407e03f98a2f54eaabb372d8199ad6306ede43a67863593c59251df04459fa354dc3b820501f3ffb58bc4730f78e709652743498eae4839051b2c3d0510147acda9508c01c6dbdaf0a0ee718e67d02249d4d17ee4bbb35ba26fe4aba8fbbcc6d66b645c1671ebadcb84b4fe35d132e5f9a948606f334c3886bfbaf2a0bc045aa7f78f20f94bd9f0658ade293b596d237ddc80d851ec788ba03bdf1a552e3dff57c71a71f10e65802308ac57ae9ab961c16910be5f00c31095d821339125"], &(0x7f0000000340)='syzkaller\x00', 0x1, 0x82, &(0x7f0000000480)=""/130, 0x40f00, 0x4, [], 0x0, 0x10, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000000580)={0x4, 0x7, 0x6, 0xffffffff}, 0x10}, 0x70) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r6, 0xc0, &(0x7f0000000800)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)=0x4, 0x0, 0x0, 0x0, &(0x7f0000000440)={0x1, 0x4}, 0x0, 0x0, &(0x7f0000000740)={0x4, 0x3, 0x3, 0x553}, &(0x7f0000000780)=0x5, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=0x100000001}}, 0x10) r7 = syz_open_dev$adsp(&(0x7f0000000300)='/dev/adsp#\x00', 0x0, 0x10080) write$FUSE_INTERRUPT(r7, &(0x7f0000000400)={0x10, 0x0, 0x5}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0xffffffffffffffcf) close(r3) socketpair$unix(0x1, 0x4, 0x0, &(0x7f0000000240)) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) 21:46:06 executing program 2: io_setup(0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1000000000000001, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000040)=0x100000001, 0xfe41) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000003c0)=0x1) r2 = dup(r1) ioctl$VHOST_GET_FEATURES(r2, 0x8008af00, &(0x7f0000000000)) r3 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r4 = socket$kcm(0x2, 0x2, 0x73) bind$inet(r4, &(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10) connect(r4, &(0x7f0000000000)=@pppol2tpv3={0x2, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80) getpeername$packet(r4, 0x0, &(0x7f0000000140)) ioctl$sock_SIOCDELDLCI(r4, 0x8981, &(0x7f00000000c0)={'nlmon0\x00', 0x40}) r5 = creat(&(0x7f0000000300)='./file0\x00', 0x0) ioctl$EXT4_IOC_MOVE_EXT(r3, 0xc028660f, &(0x7f0000000200)={0x0, r5, 0x0, 0xfffffffffffffffc, 0x1, 0x8}) ioctl$SNDRV_CTL_IOCTL_PCM_INFO(r5, 0xc1205531, &(0x7f0000000140)={0x1ff, 0x2, 0x0, 0x4, [], [], [], 0x8, 0x6, 0x6dd, 0xf95, "335bf810af8e7c8bd0d47b42e2a61bed"}) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f00000002c0)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x2, &(0x7f0000000100)=@gcm_128={{0x608}, "61fb514aaf0e7a51", "e338d252f52ea3cfe706864de110e243", "f60d9005", "0aba8e87fe9129f3"}, 0x28) [ 985.238723][T18369] netlink: 22 bytes leftover after parsing attributes in process `syz-executor.3'. 21:46:06 executing program 4: socket$kcm(0x2, 0x1, 0x84) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000900)=ANY=[@ANYBLOB="9f0d343f8f3672b246c5e3575e3bad29af7a982e5093be13037bae5e55d3901efcbad02c798684968abd7cd0f3463233c58a4171b61d275264b0c25a86770e422769c2240915668f9c27dcb8caa76b6b52bcf7f0234471abd5fa470b20eff96ea602ca594f7f1a08a7b251002c49eac4221ab3012d6c7c4d8505140e10"], 0x0, 0x7d}, 0x20) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz0\x00', 0x200002, 0x0) r2 = openat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) sendmsg$kcm(r3, 0x0, 0xfffffffffffffffc) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup/syz1\x00', 0x200002, 0x0) gettid() r4 = socket$kcm(0x11, 0x2, 0x0) sendmsg$kcm(r4, &(0x7f0000000200)={&(0x7f0000000040)=@nfc, 0x80, 0x0}, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) mkdirat$cgroup(r5, 0x0, 0x1ff) socket$kcm(0x11, 0x2, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r2, 0xc, 0x1, 0xd8, 0x0}, 0x20) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x2, 0x1c, &(0x7f0000000980)=ANY=[@ANYBLOB="8500000f7d00b7e1ff9724002ac8991601ad814eeb7b4fd5ee25ba83a72ba28f97cb0c9ad407e03f98a2f54eaabb372d8199ad6306ede43a67863593c59251df04459fa354dc3b820501f3ffb58bc4730f78e709652743498eae4839051b2c3d0510147acda9508c01c6dbdaf0a0ee718e67d02249d4d17ee4bbb35ba26fe4aba8fbbcc6d66b645c1671ebadcb84b4fe35d132e5f9a948606f334c3886bfbaf2a0bc045aa7f78f20f94bd9f0658ade293b596d237ddc80d851ec788ba03bdf1a552e3dff57c71a71f10e65802308ac57ae9ab961c16910be5f00c31095d821339125"], &(0x7f0000000340)='syzkaller\x00', 0x1, 0x82, &(0x7f0000000480)=""/130, 0x40f00, 0x4, [], 0x0, 0x10, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000000580)={0x4, 0x7, 0x6, 0xffffffff}, 0x10}, 0x70) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r6, 0xc0, &(0x7f0000000800)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)=0x4, 0x0, 0x0, 0x0, &(0x7f0000000440)={0x1, 0x4}, 0x0, 0x0, &(0x7f0000000740)={0x4, 0x3, 0x3, 0x553}, &(0x7f0000000780)=0x5, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=0x100000001}}, 0x10) r7 = syz_open_dev$adsp(&(0x7f0000000300)='/dev/adsp#\x00', 0x0, 0x10080) write$FUSE_INTERRUPT(r7, &(0x7f0000000400)={0x10, 0x0, 0x5}, 0x10) r8 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r8, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) [ 985.287205][T18369] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 985.494115][T18372] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. [ 985.503915][T18356] EXT4-fs warning (device sda1): ext4_group_extend:1791: will only finish group (524288 blocks, 256 new) 21:46:07 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f00000003c0)=0x1) pread64(r2, &(0x7f0000000040)=""/23, 0x17, 0x3) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) r4 = dup3(r1, r3, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r6 = ioctl$KVM_CREATE_VCPU(r5, 0xae41, 0x0) r7 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r8 = fcntl$dupfd(r7, 0x0, r7) socket$inet6_tcp(0xa, 0x1, 0x0) syz_kvm_setup_cpu$x86(r8, r6, &(0x7f0000000000/0x18000)=nil, 0x0, 0xffffffffffffff83, 0x0, 0x0, 0xfffffffffffffe6d) [ 985.739868][T18356] EXT4-fs warning (device sda1): ext4_group_extend:1797: can't read last block, resize aborted [ 985.764331][T18385] netlink: 22 bytes leftover after parsing attributes in process `syz-executor.4'. [ 985.782450][ T5] libceph: mon1 (1)[::6]:6789 socket closed (con state CONNECTING) 21:46:07 executing program 1: socket$kcm(0x2, 0x1, 0x84) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000900)=ANY=[@ANYBLOB="9f0d343f8f3672b246c5e3575e3bad29af7a982e5093be13037bae5e55d3901efcbad02c798684968abd7cd0f3463233c58a4171b61d275264b0c25a86770e422769c2240915668f9c27dcb8caa76b6b52bcf7f0234471abd5fa470b20eff96ea602ca594f7f1a08a7b251002c49eac4221ab3012d6c7c4d8505140e10"], 0x0, 0x7d}, 0x20) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz0\x00', 0x200002, 0x0) r2 = openat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) sendmsg$kcm(r3, 0x0, 0xfffffffffffffffc) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup/syz1\x00', 0x200002, 0x0) gettid() r4 = socket$kcm(0x11, 0x2, 0x0) sendmsg$kcm(r4, &(0x7f0000000200)={&(0x7f0000000040)=@nfc, 0x80, 0x0}, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) mkdirat$cgroup(r5, 0x0, 0x1ff) socket$kcm(0x11, 0x2, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r2, 0xc, 0x1, 0xd8, 0x0}, 0x20) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x2, 0x1c, &(0x7f0000000980)=ANY=[@ANYBLOB="8500000f7d00b7e1ff9724002ac8991601ad814eeb7b4fd5ee25ba83a72ba28f97cb0c9ad407e03f98a2f54eaabb372d8199ad6306ede43a67863593c59251df04459fa354dc3b820501f3ffb58bc4730f78e709652743498eae4839051b2c3d0510147acda9508c01c6dbdaf0a0ee718e67d02249d4d17ee4bbb35ba26fe4aba8fbbcc6d66b645c1671ebadcb84b4fe35d132e5f9a948606f334c3886bfbaf2a0bc045aa7f78f20f94bd9f0658ade293b596d237ddc80d851ec788ba03bdf1a552e3dff57c71a71f10e65802308ac57ae9ab961c16910be5f00c31095d821339125"], &(0x7f0000000340)='syzkaller\x00', 0x1, 0x82, &(0x7f0000000480)=""/130, 0x40f00, 0x4, [], 0x0, 0x10, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000000580)={0x4, 0x7, 0x6, 0xffffffff}, 0x10}, 0x70) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r6, 0xc0, &(0x7f0000000800)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)=0x4, 0x0, 0x0, 0x0, &(0x7f0000000440)={0x1, 0x4}, 0x0, 0x0, &(0x7f0000000740)={0x4, 0x3, 0x3, 0x553}, &(0x7f0000000780)=0x5, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=0x100000001}}, 0x10) r7 = syz_open_dev$adsp(&(0x7f0000000300)='/dev/adsp#\x00', 0x0, 0x10080) write$FUSE_INTERRUPT(r7, &(0x7f0000000400)={0x10, 0x0, 0x5}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0xffffffffffffffcf) close(r3) socketpair$unix(0x1, 0x4, 0x0, &(0x7f0000000240)) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) [ 985.875615][T18385] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 21:46:07 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x15, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110200000000000a5000000000000009500000000000000"], &(0x7f0000003ff6)='G\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x19c, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r3 = creat(&(0x7f0000000300)='./file0\x00', 0x0) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000000200)={0x0, r3}) getsockopt$SO_J1939_ERRQUEUE(r2, 0x6b, 0x4, &(0x7f0000000080), &(0x7f00000000c0)=0x4) r4 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/qat_adf_ctl\x00', 0x101000, 0x0) bind$rxrpc(r4, &(0x7f0000000180)=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x4e22, 0x800, @ipv4={[], [], @remote}, 0x81}}, 0x24) 21:46:07 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r2 = creat(&(0x7f0000000300)='./file0\x00', 0x0) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000200)={0x0, r2}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x20000000000) r3 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r3, 0x40086607, &(0x7f0000000100)=0xfffffffffffff800) 21:46:07 executing program 4: socket$kcm(0x2, 0x1, 0x84) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000900)=ANY=[@ANYBLOB="9f0d343f8f3672b246c5e3575e3bad29af7a982e5093be13037bae5e55d3901efcbad02c798684968abd7cd0f3463233c58a4171b61d275264b0c25a86770e422769c2240915668f9c27dcb8caa76b6b52bcf7f0234471abd5fa470b20eff96ea602ca594f7f1a08a7b251002c49eac4221ab3012d6c7c4d8505140e10"], 0x0, 0x7d}, 0x20) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz0\x00', 0x200002, 0x0) r2 = openat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) sendmsg$kcm(r3, 0x0, 0xfffffffffffffffc) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup/syz1\x00', 0x200002, 0x0) gettid() r4 = socket$kcm(0x11, 0x2, 0x0) sendmsg$kcm(r4, &(0x7f0000000200)={&(0x7f0000000040)=@nfc, 0x80, 0x0}, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) mkdirat$cgroup(r5, 0x0, 0x1ff) socket$kcm(0x11, 0x2, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r2, 0xc, 0x1, 0xd8, 0x0}, 0x20) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x2, 0x1c, &(0x7f0000000980)=ANY=[@ANYBLOB="8500000f7d00b7e1ff9724002ac8991601ad814eeb7b4fd5ee25ba83a72ba28f97cb0c9ad407e03f98a2f54eaabb372d8199ad6306ede43a67863593c59251df04459fa354dc3b820501f3ffb58bc4730f78e709652743498eae4839051b2c3d0510147acda9508c01c6dbdaf0a0ee718e67d02249d4d17ee4bbb35ba26fe4aba8fbbcc6d66b645c1671ebadcb84b4fe35d132e5f9a948606f334c3886bfbaf2a0bc045aa7f78f20f94bd9f0658ade293b596d237ddc80d851ec788ba03bdf1a552e3dff57c71a71f10e65802308ac57ae9ab961c16910be5f00c31095d821339125"], &(0x7f0000000340)='syzkaller\x00', 0x1, 0x82, &(0x7f0000000480)=""/130, 0x40f00, 0x4, [], 0x0, 0x10, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000000580)={0x4, 0x7, 0x6, 0xffffffff}, 0x10}, 0x70) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r6, 0xc0, &(0x7f0000000800)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)=0x4, 0x0, 0x0, 0x0, &(0x7f0000000440)={0x1, 0x4}, 0x0, 0x0, &(0x7f0000000740)={0x4, 0x3, 0x3, 0x553}, &(0x7f0000000780)=0x5, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=0x100000001}}, 0x10) syz_open_dev$adsp(&(0x7f0000000300)='/dev/adsp#\x00', 0x0, 0x10080) r7 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r7, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) [ 986.566022][T18586] EXT4-fs warning (device sda1): ext4_group_extend:1791: will only finish group (524288 blocks, 256 new) [ 986.659246][T18586] EXT4-fs warning (device sda1): ext4_group_extend:1797: can't read last block, resize aborted 21:46:08 executing program 2: socket$kcm(0x2, 0x1, 0x84) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000900)=ANY=[@ANYBLOB="9f0d343f8f3672b246c5e3575e3bad29af7a982e5093be13037bae5e55d3901efcbad02c798684968abd7cd0f3463233c58a4171b61d275264b0c25a86770e422769c2240915668f9c27dcb8caa76b6b52bcf7f0234471abd5fa470b20eff96ea602ca594f7f1a08a7b251002c49eac4221ab3012d6c7c4d8505140e10"], 0x0, 0x7d}, 0x20) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz0\x00', 0x200002, 0x0) r2 = openat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) sendmsg$kcm(r3, 0x0, 0xfffffffffffffffc) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup/syz1\x00', 0x200002, 0x0) gettid() r4 = socket$kcm(0x11, 0x2, 0x0) sendmsg$kcm(r4, &(0x7f0000000200)={&(0x7f0000000040)=@nfc, 0x80, 0x0}, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) mkdirat$cgroup(r5, 0x0, 0x1ff) socket$kcm(0x11, 0x2, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r2, 0xc, 0x1, 0xd8, 0x0}, 0x20) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x2, 0x1c, &(0x7f0000000980)=ANY=[@ANYBLOB="8500000f7d00b7e1ff9724002ac8991601ad814eeb7b4fd5ee25ba83a72ba28f97cb0c9ad407e03f98a2f54eaabb372d8199ad6306ede43a67863593c59251df04459fa354dc3b820501f3ffb58bc4730f78e709652743498eae4839051b2c3d0510147acda9508c01c6dbdaf0a0ee718e67d02249d4d17ee4bbb35ba26fe4aba8fbbcc6d66b645c1671ebadcb84b4fe35d132e5f9a948606f334c3886bfbaf2a0bc045aa7f78f20f94bd9f0658ade293b596d237ddc80d851ec788ba03bdf1a552e3dff57c71a71f10e65802308ac57ae9ab961c16910be5f00c31095d821339125"], &(0x7f0000000340)='syzkaller\x00', 0x1, 0x82, &(0x7f0000000480)=""/130, 0x40f00, 0x4, [], 0x0, 0x10, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000000580)={0x4, 0x7, 0x6, 0xffffffff}, 0x10}, 0x70) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r6, 0xc0, &(0x7f0000000800)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)=0x4, 0x0, 0x0, 0x0, &(0x7f0000000440)={0x1, 0x4}, 0x0, 0x0, &(0x7f0000000740)={0x4, 0x3, 0x3, 0x553}, &(0x7f0000000780)=0x5, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=0x100000001}}, 0x10) r7 = syz_open_dev$adsp(&(0x7f0000000300)='/dev/adsp#\x00', 0x0, 0x10080) write$FUSE_INTERRUPT(r7, &(0x7f0000000400)={0x10, 0x0, 0x5}, 0x10) r8 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r8, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) 21:46:08 executing program 1: socket$kcm(0x2, 0x1, 0x84) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000900)=ANY=[@ANYBLOB="9f0d343f8f3672b246c5e3575e3bad29af7a982e5093be13037bae5e55d3901efcbad02c798684968abd7cd0f3463233c58a4171b61d275264b0c25a86770e422769c2240915668f9c27dcb8caa76b6b52bcf7f0234471abd5fa470b20eff96ea602ca594f7f1a08a7b251002c49eac4221ab3012d6c7c4d8505140e10"], 0x0, 0x7d}, 0x20) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz0\x00', 0x200002, 0x0) r2 = openat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) sendmsg$kcm(r3, 0x0, 0xfffffffffffffffc) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup/syz1\x00', 0x200002, 0x0) gettid() r4 = socket$kcm(0x11, 0x2, 0x0) sendmsg$kcm(r4, &(0x7f0000000200)={&(0x7f0000000040)=@nfc, 0x80, 0x0}, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) mkdirat$cgroup(r5, 0x0, 0x1ff) socket$kcm(0x11, 0x2, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r2, 0xc, 0x1, 0xd8, 0x0}, 0x20) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x2, 0x1c, &(0x7f0000000980)=ANY=[@ANYBLOB="8500000f7d00b7e1ff9724002ac8991601ad814eeb7b4fd5ee25ba83a72ba28f97cb0c9ad407e03f98a2f54eaabb372d8199ad6306ede43a67863593c59251df04459fa354dc3b820501f3ffb58bc4730f78e709652743498eae4839051b2c3d0510147acda9508c01c6dbdaf0a0ee718e67d02249d4d17ee4bbb35ba26fe4aba8fbbcc6d66b645c1671ebadcb84b4fe35d132e5f9a948606f334c3886bfbaf2a0bc045aa7f78f20f94bd9f0658ade293b596d237ddc80d851ec788ba03bdf1a552e3dff57c71a71f10e65802308ac57ae9ab961c16910be5f00c31095d821339125"], &(0x7f0000000340)='syzkaller\x00', 0x1, 0x82, &(0x7f0000000480)=""/130, 0x40f00, 0x4, [], 0x0, 0x10, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000000580)={0x4, 0x7, 0x6, 0xffffffff}, 0x10}, 0x70) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r6, 0xc0, &(0x7f0000000800)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)=0x4, 0x0, 0x0, 0x0, &(0x7f0000000440)={0x1, 0x4}, 0x0, 0x0, &(0x7f0000000740)={0x4, 0x3, 0x3, 0x553}, &(0x7f0000000780)=0x5, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=0x100000001}}, 0x10) r7 = syz_open_dev$adsp(&(0x7f0000000300)='/dev/adsp#\x00', 0x0, 0x10080) write$FUSE_INTERRUPT(r7, &(0x7f0000000400)={0x10, 0x0, 0x5}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0xffffffffffffffcf) close(r3) socketpair$unix(0x1, 0x4, 0x0, &(0x7f0000000240)) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) [ 986.862327][ T5] libceph: connect (1)[d::]:6789 error -101 [ 986.868356][ T5] libceph: mon0 (1)[d::]:6789 connect error [ 986.989681][T18638] netlink: 22 bytes leftover after parsing attributes in process `syz-executor.4'. 21:46:08 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000003c0)=0x1) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000003c0)=0x1) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f00000003c0)=0x1) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f00000003c0)=0x1) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r4, 0x5423, &(0x7f00000003c0)=0x1) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r5, 0x5423, &(0x7f00000003c0)=0x1) r6 = accept4$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14, 0x24f276cf6ae4c7b2) r7 = dup(r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) r8 = open(&(0x7f0000000000)='./file0\x00', 0x103242, 0x5) r9 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r10 = creat(&(0x7f0000000300)='./file0\x00', 0x0) ioctl$EXT4_IOC_MOVE_EXT(r9, 0xc028660f, &(0x7f0000000200)={0x0, r10}) ioctl$BLKROGET(r9, 0x125e, &(0x7f0000000080)) ioctl$EXT4_IOC_GROUP_EXTEND(r8, 0x40086607, &(0x7f0000000100)=0xfffffffffffff800) [ 987.155927][T18638] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 987.315092][T18695] netlink: 22 bytes leftover after parsing attributes in process `syz-executor.2'. [ 987.461671][T18695] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 987.779169][ T5] libceph: connect (1)[d::]:6789 error -101 [ 987.788842][ T5] libceph: mon0 (1)[d::]:6789 connect error 21:46:09 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x40891}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000080)=0x82) r2 = add_key$user(&(0x7f0000000240)='user\x00', &(0x7f0000000280)={'syz', 0x0}, &(0x7f0000000340)="8a1815e88281cfc0f2c089cd6b8e00d0c784b944069b3816653a75036e6832e1ae65473507a3976bee948bf3ed78c4c04fa0ff6d6d61c16a5d8b2cbf706e06509fb84cd0667c5ad01fb178ffff487ade9e8c2fcb92684d7e923f58b209c8182e69d7584c18e0e080c6e878fa562f998159dd41c3813b195ee3e33504128183ef18ee92f58a", 0x85, 0xfffffffffffffffe) r3 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r4 = creat(&(0x7f0000000300)='./file0\x00', 0x0) ioctl$EXT4_IOC_MOVE_EXT(r3, 0xc028660f, &(0x7f0000000200)={0x0, r4}) symlink(&(0x7f00000004c0)='./bus\x00', &(0x7f00000006c0)='./bus\x00') ioctl$PPPIOCCONNECT(r4, 0x4004743a, &(0x7f00000002c0)) keyctl$invalidate(0x15, r2) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8984413869d6e3ae, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x18, 0x0, 0x119, 0x0, 0x0, {0x4}, [@nested={0x4}]}, 0x18}, 0x1, 0xf0ffff}, 0x0) write$cgroup_subtree(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="00639fdd20"], 0xfdef) r6 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000400)='/dev/snapshot\x00', 0x44000, 0x0) epoll_pwait(r6, &(0x7f0000000440)=[{}, {}], 0x2, 0x1, &(0x7f0000000480)={0x4}, 0x8) 21:46:09 executing program 1: socket$kcm(0x2, 0x1, 0x84) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000900)=ANY=[@ANYBLOB="9f0d343f8f3672b246c5e3575e3bad29af7a982e5093be13037bae5e55d3901efcbad02c798684968abd7cd0f3463233c58a4171b61d275264b0c25a86770e422769c2240915668f9c27dcb8caa76b6b52bcf7f0234471abd5fa470b20eff96ea602ca594f7f1a08a7b251002c49eac4221ab3012d6c7c4d8505140e10"], 0x0, 0x7d}, 0x20) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz0\x00', 0x200002, 0x0) r2 = openat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) sendmsg$kcm(r3, 0x0, 0xfffffffffffffffc) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup/syz1\x00', 0x200002, 0x0) gettid() r4 = socket$kcm(0x11, 0x2, 0x0) sendmsg$kcm(r4, &(0x7f0000000200)={&(0x7f0000000040)=@nfc, 0x80, 0x0}, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) mkdirat$cgroup(r5, 0x0, 0x1ff) socket$kcm(0x11, 0x2, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r2, 0xc, 0x1, 0xd8, 0x0}, 0x20) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x2, 0x1c, &(0x7f0000000980)=ANY=[@ANYBLOB="8500000f7d00b7e1ff9724002ac8991601ad814eeb7b4fd5ee25ba83a72ba28f97cb0c9ad407e03f98a2f54eaabb372d8199ad6306ede43a67863593c59251df04459fa354dc3b820501f3ffb58bc4730f78e709652743498eae4839051b2c3d0510147acda9508c01c6dbdaf0a0ee718e67d02249d4d17ee4bbb35ba26fe4aba8fbbcc6d66b645c1671ebadcb84b4fe35d132e5f9a948606f334c3886bfbaf2a0bc045aa7f78f20f94bd9f0658ade293b596d237ddc80d851ec788ba03bdf1a552e3dff57c71a71f10e65802308ac57ae9ab961c16910be5f00c31095d821339125"], &(0x7f0000000340)='syzkaller\x00', 0x1, 0x82, &(0x7f0000000480)=""/130, 0x40f00, 0x4, [], 0x0, 0x10, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000000580)={0x4, 0x7, 0x6, 0xffffffff}, 0x10}, 0x70) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r6, 0xc0, &(0x7f0000000800)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)=0x4, 0x0, 0x0, 0x0, &(0x7f0000000440)={0x1, 0x4}, 0x0, 0x0, &(0x7f0000000740)={0x4, 0x3, 0x3, 0x553}, &(0x7f0000000780)=0x5, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=0x100000001}}, 0x10) r7 = syz_open_dev$adsp(&(0x7f0000000300)='/dev/adsp#\x00', 0x0, 0x10080) write$FUSE_INTERRUPT(r7, &(0x7f0000000400)={0x10, 0x0, 0x5}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0xffffffffffffffcf) close(r3) socketpair$unix(0x1, 0x4, 0x0, &(0x7f0000000240)) r8 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r8, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) 21:46:09 executing program 2: socket$kcm(0x2, 0x1, 0x84) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000900)=ANY=[@ANYBLOB="9f0d343f8f3672b246c5e3575e3bad29af7a982e5093be13037bae5e55d3901efcbad02c798684968abd7cd0f3463233c58a4171b61d275264b0c25a86770e422769c2240915668f9c27dcb8caa76b6b52bcf7f0234471abd5fa470b20eff96ea602ca594f7f1a08a7b251002c49eac4221ab3012d6c7c4d8505140e10"], 0x0, 0x7d}, 0x20) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz0\x00', 0x200002, 0x0) r2 = openat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) sendmsg$kcm(r3, 0x0, 0xfffffffffffffffc) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup/syz1\x00', 0x200002, 0x0) gettid() r4 = socket$kcm(0x11, 0x2, 0x0) sendmsg$kcm(r4, &(0x7f0000000200)={&(0x7f0000000040)=@nfc, 0x80, 0x0}, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) mkdirat$cgroup(r5, 0x0, 0x1ff) socket$kcm(0x11, 0x2, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r2, 0xc, 0x1, 0xd8, 0x0}, 0x20) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x2, 0x1c, &(0x7f0000000980)=ANY=[@ANYBLOB="8500000f7d00b7e1ff9724002ac8991601ad814eeb7b4fd5ee25ba83a72ba28f97cb0c9ad407e03f98a2f54eaabb372d8199ad6306ede43a67863593c59251df04459fa354dc3b820501f3ffb58bc4730f78e709652743498eae4839051b2c3d0510147acda9508c01c6dbdaf0a0ee718e67d02249d4d17ee4bbb35ba26fe4aba8fbbcc6d66b645c1671ebadcb84b4fe35d132e5f9a948606f334c3886bfbaf2a0bc045aa7f78f20f94bd9f0658ade293b596d237ddc80d851ec788ba03bdf1a552e3dff57c71a71f10e65802308ac57ae9ab961c16910be5f00c31095d821339125"], &(0x7f0000000340)='syzkaller\x00', 0x1, 0x82, &(0x7f0000000480)=""/130, 0x40f00, 0x4, [], 0x0, 0x10, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000000580)={0x4, 0x7, 0x6, 0xffffffff}, 0x10}, 0x70) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r6, 0xc0, &(0x7f0000000800)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)=0x4, 0x0, 0x0, 0x0, &(0x7f0000000440)={0x1, 0x4}, 0x0, 0x0, &(0x7f0000000740)={0x4, 0x3, 0x3, 0x553}, &(0x7f0000000780)=0x5, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=0x100000001}}, 0x10) r7 = syz_open_dev$adsp(&(0x7f0000000300)='/dev/adsp#\x00', 0x0, 0x10080) write$FUSE_INTERRUPT(r7, &(0x7f0000000400)={0x10, 0x0, 0x5}, 0x10) r8 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r8, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) 21:46:09 executing program 4: socket$kcm(0x2, 0x1, 0x84) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000900)=ANY=[@ANYBLOB="9f0d343f8f3672b246c5e3575e3bad29af7a982e5093be13037bae5e55d3901efcbad02c798684968abd7cd0f3463233c58a4171b61d275264b0c25a86770e422769c2240915668f9c27dcb8caa76b6b52bcf7f0234471abd5fa470b20eff96ea602ca594f7f1a08a7b251002c49eac4221ab3012d6c7c4d8505140e10"], 0x0, 0x7d}, 0x20) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz0\x00', 0x200002, 0x0) r2 = openat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) sendmsg$kcm(r3, 0x0, 0xfffffffffffffffc) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup/syz1\x00', 0x200002, 0x0) gettid() r4 = socket$kcm(0x11, 0x2, 0x0) sendmsg$kcm(r4, &(0x7f0000000200)={&(0x7f0000000040)=@nfc, 0x80, 0x0}, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) mkdirat$cgroup(r5, 0x0, 0x1ff) socket$kcm(0x11, 0x2, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r2, 0xc, 0x1, 0xd8, 0x0}, 0x20) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x2, 0x1c, &(0x7f0000000980)=ANY=[@ANYBLOB="8500000f7d00b7e1ff9724002ac8991601ad814eeb7b4fd5ee25ba83a72ba28f97cb0c9ad407e03f98a2f54eaabb372d8199ad6306ede43a67863593c59251df04459fa354dc3b820501f3ffb58bc4730f78e709652743498eae4839051b2c3d0510147acda9508c01c6dbdaf0a0ee718e67d02249d4d17ee4bbb35ba26fe4aba8fbbcc6d66b645c1671ebadcb84b4fe35d132e5f9a948606f334c3886bfbaf2a0bc045aa7f78f20f94bd9f0658ade293b596d237ddc80d851ec788ba03bdf1a552e3dff57c71a71f10e65802308ac57ae9ab961c16910be5f00c31095d821339125"], &(0x7f0000000340)='syzkaller\x00', 0x1, 0x82, &(0x7f0000000480)=""/130, 0x40f00, 0x4, [], 0x0, 0x10, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000000580)={0x4, 0x7, 0x6, 0xffffffff}, 0x10}, 0x70) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r6, 0xc0, &(0x7f0000000800)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)=0x4, 0x0, 0x0, 0x0, &(0x7f0000000440)={0x1, 0x4}, 0x0, 0x0, &(0x7f0000000740)={0x4, 0x3, 0x3, 0x553}, &(0x7f0000000780)=0x5, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=0x100000001}}, 0x10) r7 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r7, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) [ 988.073124][T18754] EXT4-fs warning (device sda1): ext4_group_extend:1791: will only finish group (524288 blocks, 256 new) 21:46:09 executing program 3: r0 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x1, 0x51b70a15c4277a3d) getsockopt$inet_sctp_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000040)={0x0, 0xeb4d}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f00000000c0)={r1, @in6={{0xa, 0x4e23, 0x0, @loopback, 0x1}}, 0x9, 0x81}, &(0x7f0000000180)=0x90) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dlm-control\x00', 0x24802, 0x0) ioctl$RTC_VL_READ(r2, 0x80047013, &(0x7f0000000200)) ioctl$UI_SET_PROPBIT(0xffffffffffffffff, 0x4004556e, 0x8) ioctl$NBD_DO_IT(r2, 0xab03) r3 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ubi_ctrl\x00', 0x401, 0x0) setsockopt$netrom_NETROM_IDLE(r3, 0x103, 0x7, &(0x7f0000000280)=0x7, 0x4) r4 = syz_open_dev$sndmidi(&(0x7f00000002c0)='/dev/snd/midiC#D#\x00', 0x1, 0x408001) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r4) r5 = syz_open_dev$admmidi(&(0x7f0000000480)='/dev/admmidi#\x00', 0x100, 0x0) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r5, 0x6, 0x16, &(0x7f00000004c0)=[@timestamp, @window={0x3, 0x6, 0xf3d}, @sack_perm, @sack_perm], 0x4) sync_file_range(0xffffffffffffffff, 0x1f, 0x8, 0x5) r6 = dup(r0) readahead(r6, 0x4, 0x4c3b34f3) read$FUSE(r2, &(0x7f0000000500), 0x1000) r7 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000001500)='/dev/dlm-control\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(r7, 0x84, 0x14, &(0x7f0000001540), &(0x7f0000001580)=0x4) r8 = syz_genetlink_get_family_id$team(&(0x7f0000001600)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001640)={'team0\x00', 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000044c0)={{{@in=@loopback, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in6=@mcast1}}, &(0x7f00000045c0)=0xe8) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000004680)={'bridge_slave_1\x00', 0x0}) accept$packet(r0, &(0x7f0000007e00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000007e40)=0x14) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000007e80)={'yam0\x00', 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(r7, 0x29, 0x23, &(0x7f0000007ec0)={{{@in=@multicast1, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in6=@remote}}, &(0x7f0000007fc0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000008000)={'team0\x00', 0x0}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000085c0)={0x0, @multicast2, @broadcast}, &(0x7f0000008600)=0xc) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000008640)={'teql0\x00', 0x0}) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, &(0x7f00000086c0)={{{@in6=@loopback, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in=@initdev}}, &(0x7f00000087c0)=0xe8) getsockname(0xffffffffffffffff, &(0x7f0000008b00)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000008b80)=0x80) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x23, &(0x7f0000008bc0)={@multicast1, @dev, 0x0}, &(0x7f0000008c00)=0xc) accept$packet(0xffffffffffffffff, &(0x7f000000a600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000a640)=0x14) getpeername$packet(r7, &(0x7f000000a680)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f000000a6c0)=0x14) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f000000a700)={'vcan0\x00', 0x0}) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x24, &(0x7f000000a740)={@dev, @multicast2, 0x0}, &(0x7f000000a780)=0xc) accept$packet(0xffffffffffffffff, &(0x7f000000aa40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000aa80)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1b, &(0x7f000000ad00)={@loopback, 0x0}, &(0x7f000000ad40)=0x14) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f000000ae00)={'bond_slave_0\x00', 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000000ae40)={{{@in=@multicast1, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@empty}}, &(0x7f000000af40)=0xe8) recvmmsg(0xffffffffffffffff, &(0x7f000000c080)=[{{&(0x7f000000af80)=@sco, 0x80, &(0x7f000000b400)=[{&(0x7f000000b000)=""/116, 0x74}, {&(0x7f000000b080)=""/227, 0xe3}, {&(0x7f000000b180)}, {&(0x7f000000b1c0)=""/8, 0x8}, {&(0x7f000000b200)=""/32, 0x20}, {&(0x7f000000b240)=""/111, 0x6f}, {&(0x7f000000b2c0)=""/130, 0x82}, {&(0x7f000000b380)=""/89, 0x59}], 0x8, &(0x7f000000b480)=""/244, 0xf4}, 0x6}, {{0x0, 0x0, &(0x7f000000b940)=[{&(0x7f000000b580)=""/145, 0x91}, {&(0x7f000000b640)=""/120, 0x78}, {&(0x7f000000b6c0)=""/112, 0x70}, {&(0x7f000000b740)}, {&(0x7f000000b780)}, {&(0x7f000000b7c0)=""/195, 0xc3}, {&(0x7f000000b8c0)=""/4, 0x4}, {&(0x7f000000b900)=""/10, 0xa}], 0x8, &(0x7f000000b9c0)=""/243, 0xf3}}, {{&(0x7f000000bac0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x80, &(0x7f000000c000)=[{&(0x7f000000bb40)=""/90, 0x5a}, {&(0x7f000000bbc0)=""/230, 0xe6}, {&(0x7f000000bcc0)=""/253, 0xfd}, {&(0x7f000000bdc0)=""/85, 0x55}, {&(0x7f000000be40)=""/137, 0x89}, {&(0x7f000000bf00)=""/128, 0x80}, {&(0x7f000000bf80)=""/110, 0x6e}], 0x7}, 0xffff}], 0x3, 0x80002103, 0x0) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000012700)={0x0, @broadcast, @multicast1}, &(0x7f0000012740)=0xc) accept$packet(0xffffffffffffffff, &(0x7f0000014b40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000014b80)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000153c0)={{{@in6=@initdev, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@multicast2}}, &(0x7f00000154c0)=0xe8) getsockname$packet(r5, &(0x7f0000015800)={0x11, 0x0, 0x0}, &(0x7f0000015840)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000015fc0)={'team0\x00', 0x0}) getsockopt$inet_IP_XFRM_POLICY(r7, 0x0, 0x11, &(0x7f00000160c0)={{{@in=@initdev, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in=@multicast2}}, &(0x7f00000161c0)=0xe8) sendmsg$TEAM_CMD_NOOP(r0, &(0x7f0000016d40)={&(0x7f00000015c0)={0x10, 0x0, 0x0, 0x20100}, 0xc, &(0x7f0000016d00)={&(0x7f0000016200)={0xaf0, r8, 0x20, 0x70bd27, 0x25dfdbff, {}, [{{0x8, 0x1, r9}, {0x1a8, 0x2, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r10}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x5}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x4}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r11}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r12}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r13}}}, {0x3c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0xc, 0x4, [{0x0, 0x1, 0x9, 0x1000}]}}}]}}, {{0x8, 0x1, r14}, {0x44, 0x2, [{0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x103cd942}}, {0x8, 0x6, r15}}}]}}, {{0x8, 0x1, r16}, {0x270, 0x2, [{0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x5}}, {0x8, 0x6, r17}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x7}}, {0x8}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0xcc37}}, {0x8, 0x6, r18}}}, {0x3c, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0xc, 0x4, 'random\x00'}}}, {0x4c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x1c, 0x4, [{0x8, 0x20, 0x0, 0x4}, {0x1, 0x5, 0x1, 0x6}, {0x200, 0x9, 0x7, 0x8001}]}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r19}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0xbacb}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r20}}, {0x8}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x20}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x2}}}]}}, {{0x8, 0x1, r21}, {0x21c, 0x2, [{0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x4}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x8}}, {0x8, 0x6, r22}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r23}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x8}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x7}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0xfffffdbf}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x80000001}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r24}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r25}}}]}}, {{0x8}, {0x78, 0x2, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x46cf}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r26}}}]}}, {{0x8, 0x1, r27}, {0x230, 0x2, [{0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r28}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x8001}}, {0x8}}}, {0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0x1c, 0x4, 'hash_to_port_mapping\x00'}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x100}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x2}}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r29}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x5}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r30}}, {0x8}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r31}}}]}}, {{0x8, 0x1, r32}, {0x13c, 0x2, [{0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0x1c, 0x4, 'hash_to_port_mapping\x00'}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x8}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'roundrobin\x00'}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0xf78}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r33}}}]}}, {{0x8, 0x1, r34}, {0x40, 0x2, [{0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r35}}}]}}]}, 0xaf0}, 0x1, 0x0, 0x0, 0x10000080}, 0x10) [ 988.255276][T18793] netlink: 22 bytes leftover after parsing attributes in process `syz-executor.4'. [ 988.335535][T18754] EXT4-fs warning (device sda1): ext4_group_extend:1797: can't read last block, resize aborted [ 988.441277][T18793] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 988.594738][T18802] netlink: 22 bytes leftover after parsing attributes in process `syz-executor.2'. [ 988.728375][T18802] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 988.819673][ T5] libceph: connect (1)[d::]:6789 error -101 [ 988.840100][ T5] libceph: mon0 (1)[d::]:6789 connect error 21:46:10 executing program 4: socket$kcm(0x2, 0x1, 0x84) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000900)=ANY=[@ANYBLOB="9f0d343f8f3672b246c5e3575e3bad29af7a982e5093be13037bae5e55d3901efcbad02c798684968abd7cd0f3463233c58a4171b61d275264b0c25a86770e422769c2240915668f9c27dcb8caa76b6b52bcf7f0234471abd5fa470b20eff96ea602ca594f7f1a08a7b251002c49eac4221ab3012d6c7c4d8505140e10"], 0x0, 0x7d}, 0x20) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz0\x00', 0x200002, 0x0) r2 = openat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) sendmsg$kcm(r3, 0x0, 0xfffffffffffffffc) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup/syz1\x00', 0x200002, 0x0) gettid() r4 = socket$kcm(0x11, 0x2, 0x0) sendmsg$kcm(r4, &(0x7f0000000200)={&(0x7f0000000040)=@nfc, 0x80, 0x0}, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) mkdirat$cgroup(r5, 0x0, 0x1ff) socket$kcm(0x11, 0x2, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r2, 0xc, 0x1, 0xd8, 0x0}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x2, 0x1c, &(0x7f0000000980)=ANY=[@ANYBLOB="8500000f7d00b7e1ff9724002ac8991601ad814eeb7b4fd5ee25ba83a72ba28f97cb0c9ad407e03f98a2f54eaabb372d8199ad6306ede43a67863593c59251df04459fa354dc3b820501f3ffb58bc4730f78e709652743498eae4839051b2c3d0510147acda9508c01c6dbdaf0a0ee718e67d02249d4d17ee4bbb35ba26fe4aba8fbbcc6d66b645c1671ebadcb84b4fe35d132e5f9a948606f334c3886bfbaf2a0bc045aa7f78f20f94bd9f0658ade293b596d237ddc80d851ec788ba03bdf1a552e3dff57c71a71f10e65802308ac57ae9ab961c16910be5f00c31095d821339125"], &(0x7f0000000340)='syzkaller\x00', 0x1, 0x82, &(0x7f0000000480)=""/130, 0x40f00, 0x4, [], 0x0, 0x10, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000000580)={0x4, 0x7, 0x6, 0xffffffff}, 0x10}, 0x70) r6 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r6, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) [ 988.957042][T18887] device nr0 entered promiscuous mode 21:46:10 executing program 3: open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) r0 = creat(&(0x7f0000000300)='./file0\x00', 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000003c0)=0x1) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000080)={0x0, r0, 0x2, 0x1003, 0xfffffffffffffffd, 0x1}) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r3 = creat(&(0x7f0000000300)='./file0\x00', 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000140)="0800b5055e0bcf067b0071") r5 = socket$netlink(0x10, 0x3, 0xc) writev(r5, &(0x7f0000fb5ff0)=[{&(0x7f0000fb4000)="1f00000002031900000007000000068100023b0509000100010100ff3ffe58", 0x1f}], 0x1) writev(r5, &(0x7f0000fb5ff0)=[{&(0x7f0000fb4000)="1f00000001031900efff07000000068100023b0509000100010100ff3fff58", 0x1f}], 0x1) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000000200)={0x0, r3}) rename(&(0x7f00000000c0)='./bus\x00', &(0x7f0000000100)='./bus\x00') write$P9_RVERSION(r3, &(0x7f0000000000)=ANY=[@ANYBLOB="150000ff6504ff0801fff408003950323030302e75"], 0x15) r6 = syz_open_dev$usbmon(&(0x7f0000000200)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$MON_IOCG_STATS(r6, 0x9204, 0x0) 21:46:10 executing program 2: socket$kcm(0x2, 0x1, 0x84) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000900)=ANY=[@ANYBLOB="9f0d343f8f3672b246c5e3575e3bad29af7a982e5093be13037bae5e55d3901efcbad02c798684968abd7cd0f3463233c58a4171b61d275264b0c25a86770e422769c2240915668f9c27dcb8caa76b6b52bcf7f0234471abd5fa470b20eff96ea602ca594f7f1a08a7b251002c49eac4221ab3012d6c7c4d8505140e10"], 0x0, 0x7d}, 0x20) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz0\x00', 0x200002, 0x0) r2 = openat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) sendmsg$kcm(r3, 0x0, 0xfffffffffffffffc) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup/syz1\x00', 0x200002, 0x0) gettid() r4 = socket$kcm(0x11, 0x2, 0x0) sendmsg$kcm(r4, &(0x7f0000000200)={&(0x7f0000000040)=@nfc, 0x80, 0x0}, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) mkdirat$cgroup(r5, 0x0, 0x1ff) socket$kcm(0x11, 0x2, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r2, 0xc, 0x1, 0xd8, 0x0}, 0x20) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x2, 0x1c, &(0x7f0000000980)=ANY=[@ANYBLOB="8500000f7d00b7e1ff9724002ac8991601ad814eeb7b4fd5ee25ba83a72ba28f97cb0c9ad407e03f98a2f54eaabb372d8199ad6306ede43a67863593c59251df04459fa354dc3b820501f3ffb58bc4730f78e709652743498eae4839051b2c3d0510147acda9508c01c6dbdaf0a0ee718e67d02249d4d17ee4bbb35ba26fe4aba8fbbcc6d66b645c1671ebadcb84b4fe35d132e5f9a948606f334c3886bfbaf2a0bc045aa7f78f20f94bd9f0658ade293b596d237ddc80d851ec788ba03bdf1a552e3dff57c71a71f10e65802308ac57ae9ab961c16910be5f00c31095d821339125"], &(0x7f0000000340)='syzkaller\x00', 0x1, 0x82, &(0x7f0000000480)=""/130, 0x40f00, 0x4, [], 0x0, 0x10, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000000580)={0x4, 0x7, 0x6, 0xffffffff}, 0x10}, 0x70) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r6, 0xc0, &(0x7f0000000800)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)=0x4, 0x0, 0x0, 0x0, &(0x7f0000000440)={0x1, 0x4}, 0x0, 0x0, &(0x7f0000000740)={0x4, 0x3, 0x3, 0x553}, &(0x7f0000000780)=0x5, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=0x100000001}}, 0x10) r7 = syz_open_dev$adsp(&(0x7f0000000300)='/dev/adsp#\x00', 0x0, 0x10080) write$FUSE_INTERRUPT(r7, &(0x7f0000000400)={0x10, 0x0, 0x5}, 0x10) r8 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r8, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) 21:46:10 executing program 1: socket$kcm(0x2, 0x1, 0x84) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000900)=ANY=[@ANYBLOB="9f0d343f8f3672b246c5e3575e3bad29af7a982e5093be13037bae5e55d3901efcbad02c798684968abd7cd0f3463233c58a4171b61d275264b0c25a86770e422769c2240915668f9c27dcb8caa76b6b52bcf7f0234471abd5fa470b20eff96ea602ca594f7f1a08a7b251002c49eac4221ab3012d6c7c4d8505140e10"], 0x0, 0x7d}, 0x20) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz0\x00', 0x200002, 0x0) r2 = openat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) sendmsg$kcm(r3, 0x0, 0xfffffffffffffffc) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup/syz1\x00', 0x200002, 0x0) gettid() r4 = socket$kcm(0x11, 0x2, 0x0) sendmsg$kcm(r4, &(0x7f0000000200)={&(0x7f0000000040)=@nfc, 0x80, 0x0}, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) mkdirat$cgroup(r5, 0x0, 0x1ff) socket$kcm(0x11, 0x2, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r2, 0xc, 0x1, 0xd8, 0x0}, 0x20) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x2, 0x1c, &(0x7f0000000980)=ANY=[@ANYBLOB="8500000f7d00b7e1ff9724002ac8991601ad814eeb7b4fd5ee25ba83a72ba28f97cb0c9ad407e03f98a2f54eaabb372d8199ad6306ede43a67863593c59251df04459fa354dc3b820501f3ffb58bc4730f78e709652743498eae4839051b2c3d0510147acda9508c01c6dbdaf0a0ee718e67d02249d4d17ee4bbb35ba26fe4aba8fbbcc6d66b645c1671ebadcb84b4fe35d132e5f9a948606f334c3886bfbaf2a0bc045aa7f78f20f94bd9f0658ade293b596d237ddc80d851ec788ba03bdf1a552e3dff57c71a71f10e65802308ac57ae9ab961c16910be5f00c31095d821339125"], &(0x7f0000000340)='syzkaller\x00', 0x1, 0x82, &(0x7f0000000480)=""/130, 0x40f00, 0x4, [], 0x0, 0x10, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000000580)={0x4, 0x7, 0x6, 0xffffffff}, 0x10}, 0x70) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r6, 0xc0, &(0x7f0000000800)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)=0x4, 0x0, 0x0, 0x0, &(0x7f0000000440)={0x1, 0x4}, 0x0, 0x0, &(0x7f0000000740)={0x4, 0x3, 0x3, 0x553}, &(0x7f0000000780)=0x5, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=0x100000001}}, 0x10) r7 = syz_open_dev$adsp(&(0x7f0000000300)='/dev/adsp#\x00', 0x0, 0x10080) write$FUSE_INTERRUPT(r7, &(0x7f0000000400)={0x10, 0x0, 0x5}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0xffffffffffffffcf) close(r3) socketpair$unix(0x1, 0x4, 0x0, &(0x7f0000000240)) r8 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r8, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) [ 989.529468][T18935] netlink: 22 bytes leftover after parsing attributes in process `syz-executor.4'. [ 989.798106][T18935] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 989.842209][ T5] libceph: mon1 (1)[::6]:6789 socket closed (con state CONNECTING) [ 989.880032][T18956] netlink: 22 bytes leftover after parsing attributes in process `syz-executor.2'. [ 990.108927][T18956] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 21:46:11 executing program 4: socket$kcm(0x2, 0x1, 0x84) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000900)=ANY=[@ANYBLOB="9f0d343f8f3672b246c5e3575e3bad29af7a982e5093be13037bae5e55d3901efcbad02c798684968abd7cd0f3463233c58a4171b61d275264b0c25a86770e422769c2240915668f9c27dcb8caa76b6b52bcf7f0234471abd5fa470b20eff96ea602ca594f7f1a08a7b251002c49eac4221ab3012d6c7c4d8505140e10"], 0x0, 0x7d}, 0x20) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz0\x00', 0x200002, 0x0) r2 = openat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) sendmsg$kcm(r3, 0x0, 0xfffffffffffffffc) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup/syz1\x00', 0x200002, 0x0) gettid() r4 = socket$kcm(0x11, 0x2, 0x0) sendmsg$kcm(r4, &(0x7f0000000200)={&(0x7f0000000040)=@nfc, 0x80, 0x0}, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) mkdirat$cgroup(r5, 0x0, 0x1ff) socket$kcm(0x11, 0x2, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r2, 0xc, 0x1, 0xd8, 0x0}, 0x20) r6 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r6, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) 21:46:11 executing program 1: socket$kcm(0x2, 0x1, 0x84) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000900)=ANY=[@ANYBLOB="9f0d343f8f3672b246c5e3575e3bad29af7a982e5093be13037bae5e55d3901efcbad02c798684968abd7cd0f3463233c58a4171b61d275264b0c25a86770e422769c2240915668f9c27dcb8caa76b6b52bcf7f0234471abd5fa470b20eff96ea602ca594f7f1a08a7b251002c49eac4221ab3012d6c7c4d8505140e10"], 0x0, 0x7d}, 0x20) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz0\x00', 0x200002, 0x0) r2 = openat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) sendmsg$kcm(r3, 0x0, 0xfffffffffffffffc) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup/syz1\x00', 0x200002, 0x0) gettid() r4 = socket$kcm(0x11, 0x2, 0x0) sendmsg$kcm(r4, &(0x7f0000000200)={&(0x7f0000000040)=@nfc, 0x80, 0x0}, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) mkdirat$cgroup(r5, 0x0, 0x1ff) socket$kcm(0x11, 0x2, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r2, 0xc, 0x1, 0xd8, 0x0}, 0x20) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x2, 0x1c, &(0x7f0000000980)=ANY=[@ANYBLOB="8500000f7d00b7e1ff9724002ac8991601ad814eeb7b4fd5ee25ba83a72ba28f97cb0c9ad407e03f98a2f54eaabb372d8199ad6306ede43a67863593c59251df04459fa354dc3b820501f3ffb58bc4730f78e709652743498eae4839051b2c3d0510147acda9508c01c6dbdaf0a0ee718e67d02249d4d17ee4bbb35ba26fe4aba8fbbcc6d66b645c1671ebadcb84b4fe35d132e5f9a948606f334c3886bfbaf2a0bc045aa7f78f20f94bd9f0658ade293b596d237ddc80d851ec788ba03bdf1a552e3dff57c71a71f10e65802308ac57ae9ab961c16910be5f00c31095d821339125"], &(0x7f0000000340)='syzkaller\x00', 0x1, 0x82, &(0x7f0000000480)=""/130, 0x40f00, 0x4, [], 0x0, 0x10, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000000580)={0x4, 0x7, 0x6, 0xffffffff}, 0x10}, 0x70) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r6, 0xc0, &(0x7f0000000800)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)=0x4, 0x0, 0x0, 0x0, &(0x7f0000000440)={0x1, 0x4}, 0x0, 0x0, &(0x7f0000000740)={0x4, 0x3, 0x3, 0x553}, &(0x7f0000000780)=0x5, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=0x100000001}}, 0x10) r7 = syz_open_dev$adsp(&(0x7f0000000300)='/dev/adsp#\x00', 0x0, 0x10080) write$FUSE_INTERRUPT(r7, &(0x7f0000000400)={0x10, 0x0, 0x5}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0xffffffffffffffcf) close(r3) socketpair$unix(0x1, 0x4, 0x0, &(0x7f0000000240)) r8 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r8, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) [ 990.625188][T19050] netlink: 22 bytes leftover after parsing attributes in process `syz-executor.4'. [ 990.759618][T19050] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 991.889375][ T2836] libceph: mon1 (1)[::6]:6789 socket error on write 21:46:13 executing program 1: socket$kcm(0x2, 0x1, 0x84) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000900)=ANY=[@ANYBLOB="9f0d343f8f3672b246c5e3575e3bad29af7a982e5093be13037bae5e55d3901efcbad02c798684968abd7cd0f3463233c58a4171b61d275264b0c25a86770e422769c2240915668f9c27dcb8caa76b6b52bcf7f0234471abd5fa470b20eff96ea602ca594f7f1a08a7b251002c49eac4221ab3012d6c7c4d8505140e10"], 0x0, 0x7d}, 0x20) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz0\x00', 0x200002, 0x0) r2 = openat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) sendmsg$kcm(r3, 0x0, 0xfffffffffffffffc) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup/syz1\x00', 0x200002, 0x0) gettid() r4 = socket$kcm(0x11, 0x2, 0x0) sendmsg$kcm(r4, &(0x7f0000000200)={&(0x7f0000000040)=@nfc, 0x80, 0x0}, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) mkdirat$cgroup(r5, 0x0, 0x1ff) socket$kcm(0x11, 0x2, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r2, 0xc, 0x1, 0xd8, 0x0}, 0x20) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x2, 0x1c, &(0x7f0000000980)=ANY=[@ANYBLOB="8500000f7d00b7e1ff9724002ac8991601ad814eeb7b4fd5ee25ba83a72ba28f97cb0c9ad407e03f98a2f54eaabb372d8199ad6306ede43a67863593c59251df04459fa354dc3b820501f3ffb58bc4730f78e709652743498eae4839051b2c3d0510147acda9508c01c6dbdaf0a0ee718e67d02249d4d17ee4bbb35ba26fe4aba8fbbcc6d66b645c1671ebadcb84b4fe35d132e5f9a948606f334c3886bfbaf2a0bc045aa7f78f20f94bd9f0658ade293b596d237ddc80d851ec788ba03bdf1a552e3dff57c71a71f10e65802308ac57ae9ab961c16910be5f00c31095d821339125"], &(0x7f0000000340)='syzkaller\x00', 0x1, 0x82, &(0x7f0000000480)=""/130, 0x40f00, 0x4, [], 0x0, 0x10, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000000580)={0x4, 0x7, 0x6, 0xffffffff}, 0x10}, 0x70) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r6, 0xc0, &(0x7f0000000800)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)=0x4, 0x0, 0x0, 0x0, &(0x7f0000000440)={0x1, 0x4}, 0x0, 0x0, &(0x7f0000000740)={0x4, 0x3, 0x3, 0x553}, &(0x7f0000000780)=0x5, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=0x100000001}}, 0x10) r7 = syz_open_dev$adsp(&(0x7f0000000300)='/dev/adsp#\x00', 0x0, 0x10080) write$FUSE_INTERRUPT(r7, &(0x7f0000000400)={0x10, 0x0, 0x5}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0xffffffffffffffcf) close(r3) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) r8 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r8, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) 21:46:13 executing program 2: socket$kcm(0x2, 0x1, 0x84) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000900)=ANY=[@ANYBLOB="9f0d343f8f3672b246c5e3575e3bad29af7a982e5093be13037bae5e55d3901efcbad02c798684968abd7cd0f3463233c58a4171b61d275264b0c25a86770e422769c2240915668f9c27dcb8caa76b6b52bcf7f0234471abd5fa470b20eff96ea602ca594f7f1a08a7b251002c49eac4221ab3012d6c7c4d8505140e10"], 0x0, 0x7d}, 0x20) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz0\x00', 0x200002, 0x0) r2 = openat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) sendmsg$kcm(r3, 0x0, 0xfffffffffffffffc) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup/syz1\x00', 0x200002, 0x0) gettid() r4 = socket$kcm(0x11, 0x2, 0x0) sendmsg$kcm(r4, &(0x7f0000000200)={&(0x7f0000000040)=@nfc, 0x80, 0x0}, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) mkdirat$cgroup(r5, 0x0, 0x1ff) socket$kcm(0x11, 0x2, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r2, 0xc, 0x1, 0xd8, 0x0}, 0x20) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x2, 0x1c, &(0x7f0000000980)=ANY=[@ANYBLOB="8500000f7d00b7e1ff9724002ac8991601ad814eeb7b4fd5ee25ba83a72ba28f97cb0c9ad407e03f98a2f54eaabb372d8199ad6306ede43a67863593c59251df04459fa354dc3b820501f3ffb58bc4730f78e709652743498eae4839051b2c3d0510147acda9508c01c6dbdaf0a0ee718e67d02249d4d17ee4bbb35ba26fe4aba8fbbcc6d66b645c1671ebadcb84b4fe35d132e5f9a948606f334c3886bfbaf2a0bc045aa7f78f20f94bd9f0658ade293b596d237ddc80d851ec788ba03bdf1a552e3dff57c71a71f10e65802308ac57ae9ab961c16910be5f00c31095d821339125"], &(0x7f0000000340)='syzkaller\x00', 0x1, 0x82, &(0x7f0000000480)=""/130, 0x40f00, 0x4, [], 0x0, 0x10, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000000580)={0x4, 0x7, 0x6, 0xffffffff}, 0x10}, 0x70) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r6, 0xc0, &(0x7f0000000800)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)=0x4, 0x0, 0x0, 0x0, &(0x7f0000000440)={0x1, 0x4}, 0x0, 0x0, &(0x7f0000000740)={0x4, 0x3, 0x3, 0x553}, &(0x7f0000000780)=0x5, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=0x100000001}}, 0x10) r7 = syz_open_dev$adsp(&(0x7f0000000300)='/dev/adsp#\x00', 0x0, 0x10080) write$FUSE_INTERRUPT(r7, &(0x7f0000000400)={0x10, 0x0, 0x5}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) 21:46:13 executing program 4: socket$kcm(0x2, 0x1, 0x84) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000900)=ANY=[@ANYBLOB="9f0d343f8f3672b246c5e3575e3bad29af7a982e5093be13037bae5e55d3901efcbad02c798684968abd7cd0f3463233c58a4171b61d275264b0c25a86770e422769c2240915668f9c27dcb8caa76b6b52bcf7f0234471abd5fa470b20eff96ea602ca594f7f1a08a7b251002c49eac4221ab3012d6c7c4d8505140e10"], 0x0, 0x7d}, 0x20) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz0\x00', 0x200002, 0x0) openat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) sendmsg$kcm(r2, 0x0, 0xfffffffffffffffc) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup/syz1\x00', 0x200002, 0x0) gettid() r3 = socket$kcm(0x11, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000000200)={&(0x7f0000000040)=@nfc, 0x80, 0x0}, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) mkdirat$cgroup(r4, 0x0, 0x1ff) socket$kcm(0x11, 0x2, 0x0) r5 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r5, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) 21:46:13 executing program 5: socket$kcm(0x2, 0x1, 0x84) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000900)=ANY=[@ANYBLOB="9f0d343f8f3672b246c5e3575e3bad29af7a982e5093be13037bae5e55d3901efcbad02c798684968abd7cd0f3463233c58a4171b61d275264b0c25a86770e422769c2240915668f9c27dcb8caa76b6b52bcf7f0234471abd5fa470b20eff96ea602ca594f7f1a08a7b251002c49eac4221ab3012d6c7c4d8505140e10"], 0x0, 0x7d}, 0x20) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz0\x00', 0x200002, 0x0) r2 = openat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) sendmsg$kcm(r3, 0x0, 0xfffffffffffffffc) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup/syz1\x00', 0x200002, 0x0) gettid() r4 = socket$kcm(0x11, 0x2, 0x0) sendmsg$kcm(r4, &(0x7f0000000200)={&(0x7f0000000040)=@nfc, 0x80, 0x0}, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) mkdirat$cgroup(r5, 0x0, 0x1ff) socket$kcm(0x11, 0x2, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r2, 0xc, 0x1, 0xd8, 0x0}, 0x20) r6 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r6, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) 21:46:13 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x24, 0x0, 0x0, 0x0, 0x0, {}, [@SEG6_ATTR_DSTLEN={0x8, 0x2, 0x100004}, @SEG6_ATTR_HMACKEYID={0x8}]}, 0x24}}, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="c700000034002908000000000000000003000000c70000003b000100ffff0000000000000000b5068848fff2"], 0xfde8}, 0x1, 0xffffff7f0e000000}, 0x0) r1 = syz_genetlink_get_family_id$devlink(&(0x7f00000000c0)='devlink\x00') r2 = getpgrp(0x0) perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r2, 0x0, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r4 = creat(&(0x7f0000000300)='./file0\x00', 0x0) ioctl$EXT4_IOC_MOVE_EXT(r3, 0xc028660f, &(0x7f0000000200)={0x0, r4}) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000100}, 0xc, &(0x7f00000002c0)={&(0x7f0000000200)={0xb4, r1, 0x4, 0x70bd25, 0x25dfdbfb, {}, [{@nsim={{0x10, 0x1, 'netdevsim\x00'}, {0x10, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_ID={0x8, 0x8b, 0x4}}, {@nsim={{0x10, 0x1, 'netdevsim\x00'}, {0x10, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_ID={0x8, 0x8b, 0x3}}, {@nsim={{0x10, 0x1, 'netdevsim\x00'}, {0x10, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8, 0x8a, r2}}, {@nsim={{0x10, 0x1, 'netdevsim\x00'}, {0x10, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_FD={0x8, 0x89, r3}}]}, 0xb4}, 0x1, 0x0, 0x0, 0x4511d}, 0x40000081) [ 992.403837][T19184] netlink: 99 bytes leftover after parsing attributes in process `syz-executor.3'. [ 992.572046][T19182] netlink: 22 bytes leftover after parsing attributes in process `syz-executor.4'. [ 992.578812][T19189] netlink: 22 bytes leftover after parsing attributes in process `syz-executor.1'. [ 992.604537][T19184] openvswitch: netlink: IP tunnel dst address not specified 21:46:14 executing program 2: socket$kcm(0x2, 0x1, 0x84) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000900)=ANY=[@ANYBLOB="9f0d343f8f3672b246c5e3575e3bad29af7a982e5093be13037bae5e55d3901efcbad02c798684968abd7cd0f3463233c58a4171b61d275264b0c25a86770e422769c2240915668f9c27dcb8caa76b6b52bcf7f0234471abd5fa470b20eff96ea602ca594f7f1a08a7b251002c49eac4221ab3012d6c7c4d8505140e10"], 0x0, 0x7d}, 0x20) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz0\x00', 0x200002, 0x0) r2 = openat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) sendmsg$kcm(r3, 0x0, 0xfffffffffffffffc) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup/syz1\x00', 0x200002, 0x0) gettid() r4 = socket$kcm(0x11, 0x2, 0x0) sendmsg$kcm(r4, &(0x7f0000000200)={&(0x7f0000000040)=@nfc, 0x80, 0x0}, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) mkdirat$cgroup(r5, 0x0, 0x1ff) socket$kcm(0x11, 0x2, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r2, 0xc, 0x1, 0xd8, 0x0}, 0x20) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x2, 0x1c, &(0x7f0000000980)=ANY=[@ANYBLOB="8500000f7d00b7e1ff9724002ac8991601ad814eeb7b4fd5ee25ba83a72ba28f97cb0c9ad407e03f98a2f54eaabb372d8199ad6306ede43a67863593c59251df04459fa354dc3b820501f3ffb58bc4730f78e709652743498eae4839051b2c3d0510147acda9508c01c6dbdaf0a0ee718e67d02249d4d17ee4bbb35ba26fe4aba8fbbcc6d66b645c1671ebadcb84b4fe35d132e5f9a948606f334c3886bfbaf2a0bc045aa7f78f20f94bd9f0658ade293b596d237ddc80d851ec788ba03bdf1a552e3dff57c71a71f10e65802308ac57ae9ab961c16910be5f00c31095d821339125"], &(0x7f0000000340)='syzkaller\x00', 0x1, 0x82, &(0x7f0000000480)=""/130, 0x40f00, 0x4, [], 0x0, 0x10, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000000580)={0x4, 0x7, 0x6, 0xffffffff}, 0x10}, 0x70) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r6, 0xc0, &(0x7f0000000800)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)=0x4, 0x0, 0x0, 0x0, &(0x7f0000000440)={0x1, 0x4}, 0x0, 0x0, &(0x7f0000000740)={0x4, 0x3, 0x3, 0x553}, &(0x7f0000000780)=0x5, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=0x100000001}}, 0x10) r7 = syz_open_dev$adsp(&(0x7f0000000300)='/dev/adsp#\x00', 0x0, 0x10080) write$FUSE_INTERRUPT(r7, &(0x7f0000000400)={0x10, 0x0, 0x5}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) [ 992.784865][T19182] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 992.819815][ T2836] libceph: connect (1)[d::]:6789 error -101 [ 992.825842][ T2836] libceph: mon0 (1)[d::]:6789 connect error [ 992.894925][T19190] netlink: 99 bytes leftover after parsing attributes in process `syz-executor.3'. 21:46:14 executing program 5: socket$kcm(0x2, 0x1, 0x84) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000900)=ANY=[@ANYBLOB="9f0d343f8f3672b246c5e3575e3bad29af7a982e5093be13037bae5e55d3901efcbad02c798684968abd7cd0f3463233c58a4171b61d275264b0c25a86770e422769c2240915668f9c27dcb8caa76b6b52bcf7f0234471abd5fa470b20eff96ea602ca594f7f1a08a7b251002c49eac4221ab3012d6c7c4d8505140e10"], 0x0, 0x7d}, 0x20) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz0\x00', 0x200002, 0x0) r2 = openat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) sendmsg$kcm(r3, 0x0, 0xfffffffffffffffc) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup/syz1\x00', 0x200002, 0x0) gettid() r4 = socket$kcm(0x11, 0x2, 0x0) sendmsg$kcm(r4, &(0x7f0000000200)={&(0x7f0000000040)=@nfc, 0x80, 0x0}, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) mkdirat$cgroup(r5, 0x0, 0x1ff) socket$kcm(0x11, 0x2, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r2, 0xc, 0x1, 0xd8, 0x0}, 0x20) r6 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r6, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) 21:46:14 executing program 1: socket$kcm(0x2, 0x1, 0x84) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000900)=ANY=[@ANYBLOB="9f0d343f8f3672b246c5e3575e3bad29af7a982e5093be13037bae5e55d3901efcbad02c798684968abd7cd0f3463233c58a4171b61d275264b0c25a86770e422769c2240915668f9c27dcb8caa76b6b52bcf7f0234471abd5fa470b20eff96ea602ca594f7f1a08a7b251002c49eac4221ab3012d6c7c4d8505140e10"], 0x0, 0x7d}, 0x20) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz0\x00', 0x200002, 0x0) r2 = openat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) sendmsg$kcm(r3, 0x0, 0xfffffffffffffffc) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup/syz1\x00', 0x200002, 0x0) gettid() r4 = socket$kcm(0x11, 0x2, 0x0) sendmsg$kcm(r4, &(0x7f0000000200)={&(0x7f0000000040)=@nfc, 0x80, 0x0}, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) mkdirat$cgroup(r5, 0x0, 0x1ff) socket$kcm(0x11, 0x2, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r2, 0xc, 0x1, 0xd8, 0x0}, 0x20) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x2, 0x1c, &(0x7f0000000980)=ANY=[@ANYBLOB="8500000f7d00b7e1ff9724002ac8991601ad814eeb7b4fd5ee25ba83a72ba28f97cb0c9ad407e03f98a2f54eaabb372d8199ad6306ede43a67863593c59251df04459fa354dc3b820501f3ffb58bc4730f78e709652743498eae4839051b2c3d0510147acda9508c01c6dbdaf0a0ee718e67d02249d4d17ee4bbb35ba26fe4aba8fbbcc6d66b645c1671ebadcb84b4fe35d132e5f9a948606f334c3886bfbaf2a0bc045aa7f78f20f94bd9f0658ade293b596d237ddc80d851ec788ba03bdf1a552e3dff57c71a71f10e65802308ac57ae9ab961c16910be5f00c31095d821339125"], &(0x7f0000000340)='syzkaller\x00', 0x1, 0x82, &(0x7f0000000480)=""/130, 0x40f00, 0x4, [], 0x0, 0x10, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000000580)={0x4, 0x7, 0x6, 0xffffffff}, 0x10}, 0x70) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r6, 0xc0, &(0x7f0000000800)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)=0x4, 0x0, 0x0, 0x0, &(0x7f0000000440)={0x1, 0x4}, 0x0, 0x0, &(0x7f0000000740)={0x4, 0x3, 0x3, 0x553}, &(0x7f0000000780)=0x5, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=0x100000001}}, 0x10) r7 = syz_open_dev$adsp(&(0x7f0000000300)='/dev/adsp#\x00', 0x0, 0x10080) write$FUSE_INTERRUPT(r7, &(0x7f0000000400)={0x10, 0x0, 0x5}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0xffffffffffffffcf) close(r3) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) r8 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r8, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) [ 993.015453][T19190] openvswitch: netlink: IP tunnel dst address not specified 21:46:14 executing program 4: socket$kcm(0x2, 0x1, 0x84) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000900)=ANY=[@ANYBLOB="9f0d343f8f3672b246c5e3575e3bad29af7a982e5093be13037bae5e55d3901efcbad02c798684968abd7cd0f3463233c58a4171b61d275264b0c25a86770e422769c2240915668f9c27dcb8caa76b6b52bcf7f0234471abd5fa470b20eff96ea602ca594f7f1a08a7b251002c49eac4221ab3012d6c7c4d8505140e10"], 0x0, 0x7d}, 0x20) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz0\x00', 0x200002, 0x0) openat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) sendmsg$kcm(r2, 0x0, 0xfffffffffffffffc) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup/syz1\x00', 0x200002, 0x0) gettid() r3 = socket$kcm(0x11, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000000200)={&(0x7f0000000040)=@nfc, 0x80, 0x0}, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) mkdirat$cgroup(r4, 0x0, 0x1ff) r5 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r5, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) 21:46:14 executing program 3: socket$kcm(0x2, 0x1, 0x84) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000900)=ANY=[@ANYBLOB="9f0d343f8f3672b246c5e3575e3bad29af7a982e5093be13037bae5e55d3901efcbad02c798684968abd7cd0f3463233c58a4171b61d275264b0c25a86770e422769c2240915668f9c27dcb8caa76b6b52bcf7f0234471abd5fa470b20eff96ea602ca594f7f1a08a7b251002c49eac4221ab3012d6c7c4d8505140e10"], 0x0, 0x7d}, 0x20) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz0\x00', 0x200002, 0x0) openat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) sendmsg$kcm(r2, 0x0, 0xfffffffffffffffc) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup/syz1\x00', 0x200002, 0x0) gettid() r3 = socket$kcm(0x11, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000000200)={&(0x7f0000000040)=@nfc, 0x80, 0x0}, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) mkdirat$cgroup(r4, 0x0, 0x1ff) socket$kcm(0x11, 0x2, 0x0) r5 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r5, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) [ 993.389918][T19204] netlink: 22 bytes leftover after parsing attributes in process `syz-executor.1'. [ 993.428209][T19202] netlink: 22 bytes leftover after parsing attributes in process `syz-executor.5'. [ 993.500265][T19202] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 993.568972][T19216] netlink: 22 bytes leftover after parsing attributes in process `syz-executor.4'. 21:46:15 executing program 2: socket$kcm(0x2, 0x1, 0x84) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000900)=ANY=[@ANYBLOB="9f0d343f8f3672b246c5e3575e3bad29af7a982e5093be13037bae5e55d3901efcbad02c798684968abd7cd0f3463233c58a4171b61d275264b0c25a86770e422769c2240915668f9c27dcb8caa76b6b52bcf7f0234471abd5fa470b20eff96ea602ca594f7f1a08a7b251002c49eac4221ab3012d6c7c4d8505140e10"], 0x0, 0x7d}, 0x20) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz0\x00', 0x200002, 0x0) r2 = openat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) sendmsg$kcm(r3, 0x0, 0xfffffffffffffffc) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup/syz1\x00', 0x200002, 0x0) gettid() r4 = socket$kcm(0x11, 0x2, 0x0) sendmsg$kcm(r4, &(0x7f0000000200)={&(0x7f0000000040)=@nfc, 0x80, 0x0}, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) mkdirat$cgroup(r5, 0x0, 0x1ff) socket$kcm(0x11, 0x2, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r2, 0xc, 0x1, 0xd8, 0x0}, 0x20) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x2, 0x1c, &(0x7f0000000980)=ANY=[@ANYBLOB="8500000f7d00b7e1ff9724002ac8991601ad814eeb7b4fd5ee25ba83a72ba28f97cb0c9ad407e03f98a2f54eaabb372d8199ad6306ede43a67863593c59251df04459fa354dc3b820501f3ffb58bc4730f78e709652743498eae4839051b2c3d0510147acda9508c01c6dbdaf0a0ee718e67d02249d4d17ee4bbb35ba26fe4aba8fbbcc6d66b645c1671ebadcb84b4fe35d132e5f9a948606f334c3886bfbaf2a0bc045aa7f78f20f94bd9f0658ade293b596d237ddc80d851ec788ba03bdf1a552e3dff57c71a71f10e65802308ac57ae9ab961c16910be5f00c31095d821339125"], &(0x7f0000000340)='syzkaller\x00', 0x1, 0x82, &(0x7f0000000480)=""/130, 0x40f00, 0x4, [], 0x0, 0x10, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000000580)={0x4, 0x7, 0x6, 0xffffffff}, 0x10}, 0x70) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r6, 0xc0, &(0x7f0000000800)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)=0x4, 0x0, 0x0, 0x0, &(0x7f0000000440)={0x1, 0x4}, 0x0, 0x0, &(0x7f0000000740)={0x4, 0x3, 0x3, 0x553}, &(0x7f0000000780)=0x5, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=0x100000001}}, 0x10) r7 = syz_open_dev$adsp(&(0x7f0000000300)='/dev/adsp#\x00', 0x0, 0x10080) write$FUSE_INTERRUPT(r7, &(0x7f0000000400)={0x10, 0x0, 0x5}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) [ 993.649166][T19216] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 993.778815][ T2836] libceph: connect (1)[d::]:6789 error -101 [ 993.784935][ T2836] libceph: mon0 (1)[d::]:6789 connect error [ 993.788372][T19218] netlink: 22 bytes leftover after parsing attributes in process `syz-executor.3'. 21:46:15 executing program 1: socket$kcm(0x2, 0x1, 0x84) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000900)=ANY=[@ANYBLOB="9f0d343f8f3672b246c5e3575e3bad29af7a982e5093be13037bae5e55d3901efcbad02c798684968abd7cd0f3463233c58a4171b61d275264b0c25a86770e422769c2240915668f9c27dcb8caa76b6b52bcf7f0234471abd5fa470b20eff96ea602ca594f7f1a08a7b251002c49eac4221ab3012d6c7c4d8505140e10"], 0x0, 0x7d}, 0x20) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz0\x00', 0x200002, 0x0) r2 = openat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) sendmsg$kcm(r3, 0x0, 0xfffffffffffffffc) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup/syz1\x00', 0x200002, 0x0) gettid() r4 = socket$kcm(0x11, 0x2, 0x0) sendmsg$kcm(r4, &(0x7f0000000200)={&(0x7f0000000040)=@nfc, 0x80, 0x0}, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) mkdirat$cgroup(r5, 0x0, 0x1ff) socket$kcm(0x11, 0x2, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r2, 0xc, 0x1, 0xd8, 0x0}, 0x20) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x2, 0x1c, &(0x7f0000000980)=ANY=[@ANYBLOB="8500000f7d00b7e1ff9724002ac8991601ad814eeb7b4fd5ee25ba83a72ba28f97cb0c9ad407e03f98a2f54eaabb372d8199ad6306ede43a67863593c59251df04459fa354dc3b820501f3ffb58bc4730f78e709652743498eae4839051b2c3d0510147acda9508c01c6dbdaf0a0ee718e67d02249d4d17ee4bbb35ba26fe4aba8fbbcc6d66b645c1671ebadcb84b4fe35d132e5f9a948606f334c3886bfbaf2a0bc045aa7f78f20f94bd9f0658ade293b596d237ddc80d851ec788ba03bdf1a552e3dff57c71a71f10e65802308ac57ae9ab961c16910be5f00c31095d821339125"], &(0x7f0000000340)='syzkaller\x00', 0x1, 0x82, &(0x7f0000000480)=""/130, 0x40f00, 0x4, [], 0x0, 0x10, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000000580)={0x4, 0x7, 0x6, 0xffffffff}, 0x10}, 0x70) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r6, 0xc0, &(0x7f0000000800)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)=0x4, 0x0, 0x0, 0x0, &(0x7f0000000440)={0x1, 0x4}, 0x0, 0x0, &(0x7f0000000740)={0x4, 0x3, 0x3, 0x553}, &(0x7f0000000780)=0x5, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=0x100000001}}, 0x10) r7 = syz_open_dev$adsp(&(0x7f0000000300)='/dev/adsp#\x00', 0x0, 0x10080) write$FUSE_INTERRUPT(r7, &(0x7f0000000400)={0x10, 0x0, 0x5}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0xffffffffffffffcf) close(r3) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) r8 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r8, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) [ 993.880795][T19218] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 21:46:15 executing program 4: socket$kcm(0x2, 0x1, 0x84) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000900)=ANY=[@ANYBLOB="9f0d343f8f3672b246c5e3575e3bad29af7a982e5093be13037bae5e55d3901efcbad02c798684968abd7cd0f3463233c58a4171b61d275264b0c25a86770e422769c2240915668f9c27dcb8caa76b6b52bcf7f0234471abd5fa470b20eff96ea602ca594f7f1a08a7b251002c49eac4221ab3012d6c7c4d8505140e10"], 0x0, 0x7d}, 0x20) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz0\x00', 0x200002, 0x0) openat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) sendmsg$kcm(r2, 0x0, 0xfffffffffffffffc) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup/syz1\x00', 0x200002, 0x0) gettid() r3 = socket$kcm(0x11, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000000200)={&(0x7f0000000040)=@nfc, 0x80, 0x0}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r4 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r4, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) 21:46:15 executing program 5: socket$kcm(0x2, 0x1, 0x84) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000900)=ANY=[@ANYBLOB="9f0d343f8f3672b246c5e3575e3bad29af7a982e5093be13037bae5e55d3901efcbad02c798684968abd7cd0f3463233c58a4171b61d275264b0c25a86770e422769c2240915668f9c27dcb8caa76b6b52bcf7f0234471abd5fa470b20eff96ea602ca594f7f1a08a7b251002c49eac4221ab3012d6c7c4d8505140e10"], 0x0, 0x7d}, 0x20) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz0\x00', 0x200002, 0x0) r2 = openat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) sendmsg$kcm(r3, 0x0, 0xfffffffffffffffc) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup/syz1\x00', 0x200002, 0x0) gettid() r4 = socket$kcm(0x11, 0x2, 0x0) sendmsg$kcm(r4, &(0x7f0000000200)={&(0x7f0000000040)=@nfc, 0x80, 0x0}, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) mkdirat$cgroup(r5, 0x0, 0x1ff) socket$kcm(0x11, 0x2, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r2, 0xc, 0x1, 0xd8, 0x0}, 0x20) r6 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r6, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) [ 994.330249][T19233] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 21:46:15 executing program 3: socket$kcm(0x2, 0x1, 0x84) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000900)=ANY=[@ANYBLOB="9f0d343f8f3672b246c5e3575e3bad29af7a982e5093be13037bae5e55d3901efcbad02c798684968abd7cd0f3463233c58a4171b61d275264b0c25a86770e422769c2240915668f9c27dcb8caa76b6b52bcf7f0234471abd5fa470b20eff96ea602ca594f7f1a08a7b251002c49eac4221ab3012d6c7c4d8505140e10"], 0x0, 0x7d}, 0x20) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz0\x00', 0x200002, 0x0) openat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) sendmsg$kcm(r2, 0x0, 0xfffffffffffffffc) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup/syz1\x00', 0x200002, 0x0) gettid() r3 = socket$kcm(0x11, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000000200)={&(0x7f0000000040)=@nfc, 0x80, 0x0}, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) mkdirat$cgroup(r4, 0x0, 0x1ff) socket$kcm(0x11, 0x2, 0x0) r5 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r5, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) 21:46:15 executing program 2: socket$kcm(0x2, 0x1, 0x84) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000900)=ANY=[@ANYBLOB="9f0d343f8f3672b246c5e3575e3bad29af7a982e5093be13037bae5e55d3901efcbad02c798684968abd7cd0f3463233c58a4171b61d275264b0c25a86770e422769c2240915668f9c27dcb8caa76b6b52bcf7f0234471abd5fa470b20eff96ea602ca594f7f1a08a7b251002c49eac4221ab3012d6c7c4d8505140e10"], 0x0, 0x7d}, 0x20) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz0\x00', 0x200002, 0x0) r2 = openat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) sendmsg$kcm(r3, 0x0, 0xfffffffffffffffc) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup/syz1\x00', 0x200002, 0x0) gettid() r4 = socket$kcm(0x11, 0x2, 0x0) sendmsg$kcm(r4, &(0x7f0000000200)={&(0x7f0000000040)=@nfc, 0x80, 0x0}, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) mkdirat$cgroup(r5, 0x0, 0x1ff) socket$kcm(0x11, 0x2, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r2, 0xc, 0x1, 0xd8, 0x0}, 0x20) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x2, 0x1c, &(0x7f0000000980)=ANY=[@ANYBLOB="8500000f7d00b7e1ff9724002ac8991601ad814eeb7b4fd5ee25ba83a72ba28f97cb0c9ad407e03f98a2f54eaabb372d8199ad6306ede43a67863593c59251df04459fa354dc3b820501f3ffb58bc4730f78e709652743498eae4839051b2c3d0510147acda9508c01c6dbdaf0a0ee718e67d02249d4d17ee4bbb35ba26fe4aba8fbbcc6d66b645c1671ebadcb84b4fe35d132e5f9a948606f334c3886bfbaf2a0bc045aa7f78f20f94bd9f0658ade293b596d237ddc80d851ec788ba03bdf1a552e3dff57c71a71f10e65802308ac57ae9ab961c16910be5f00c31095d821339125"], &(0x7f0000000340)='syzkaller\x00', 0x1, 0x82, &(0x7f0000000480)=""/130, 0x40f00, 0x4, [], 0x0, 0x10, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000000580)={0x4, 0x7, 0x6, 0xffffffff}, 0x10}, 0x70) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r6, 0xc0, &(0x7f0000000800)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)=0x4, 0x0, 0x0, 0x0, &(0x7f0000000440)={0x1, 0x4}, 0x0, 0x0, &(0x7f0000000740)={0x4, 0x3, 0x3, 0x553}, &(0x7f0000000780)=0x5, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=0x100000001}}, 0x10) syz_open_dev$adsp(&(0x7f0000000300)='/dev/adsp#\x00', 0x0, 0x10080) r7 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r7, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) [ 994.446087][T19228] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 21:46:16 executing program 5: socket$kcm(0x2, 0x1, 0x84) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000900)=ANY=[@ANYBLOB="9f0d343f8f3672b246c5e3575e3bad29af7a982e5093be13037bae5e55d3901efcbad02c798684968abd7cd0f3463233c58a4171b61d275264b0c25a86770e422769c2240915668f9c27dcb8caa76b6b52bcf7f0234471abd5fa470b20eff96ea602ca594f7f1a08a7b251002c49eac4221ab3012d6c7c4d8505140e10"], 0x0, 0x7d}, 0x20) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz0\x00', 0x200002, 0x0) r2 = openat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) sendmsg$kcm(r3, 0x0, 0xfffffffffffffffc) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup/syz1\x00', 0x200002, 0x0) gettid() r4 = socket$kcm(0x11, 0x2, 0x0) sendmsg$kcm(r4, &(0x7f0000000200)={&(0x7f0000000040)=@nfc, 0x80, 0x0}, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) mkdirat$cgroup(r5, 0x0, 0x1ff) socket$kcm(0x11, 0x2, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r2, 0xc, 0x1, 0xd8, 0x0}, 0x20) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x2, 0x1c, &(0x7f0000000980)=ANY=[@ANYBLOB="8500000f7d00b7e1ff9724002ac8991601ad814eeb7b4fd5ee25ba83a72ba28f97cb0c9ad407e03f98a2f54eaabb372d8199ad6306ede43a67863593c59251df04459fa354dc3b820501f3ffb58bc4730f78e709652743498eae4839051b2c3d0510147acda9508c01c6dbdaf0a0ee718e67d02249d4d17ee4bbb35ba26fe4aba8fbbcc6d66b645c1671ebadcb84b4fe35d132e5f9a948606f334c3886bfbaf2a0bc045aa7f78f20f94bd9f0658ade293b596d237ddc80d851ec788ba03bdf1a552e3dff57c71a71f10e65802308ac57ae9ab961c16910be5f00c31095d821339125"], &(0x7f0000000340)='syzkaller\x00', 0x1, 0x82, &(0x7f0000000480)=""/130, 0x40f00, 0x4, [], 0x0, 0x10, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000000580)={0x4, 0x7, 0x6, 0xffffffff}, 0x10}, 0x70) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r6, 0xc0, &(0x7f0000000800)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)=0x4, 0x0, 0x0, 0x0, &(0x7f0000000440)={0x1, 0x4}, 0x0, 0x0, &(0x7f0000000740)={0x4, 0x3, 0x3, 0x553}, &(0x7f0000000780)=0x5, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=0x100000001}}, 0x10) r7 = syz_open_dev$adsp(&(0x7f0000000300)='/dev/adsp#\x00', 0x0, 0x10080) write$FUSE_INTERRUPT(r7, &(0x7f0000000400)={0x10, 0x0, 0x5}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0xffffffffffffffcf) close(r3) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) r8 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r8, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) [ 994.636555][T19244] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 21:46:16 executing program 1: socket$kcm(0x2, 0x1, 0x84) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000900)=ANY=[@ANYBLOB="9f0d343f8f3672b246c5e3575e3bad29af7a982e5093be13037bae5e55d3901efcbad02c798684968abd7cd0f3463233c58a4171b61d275264b0c25a86770e422769c2240915668f9c27dcb8caa76b6b52bcf7f0234471abd5fa470b20eff96ea602ca594f7f1a08a7b251002c49eac4221ab3012d6c7c4d8505140e10"], 0x0, 0x7d}, 0x20) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz0\x00', 0x200002, 0x0) r2 = openat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) sendmsg$kcm(r3, 0x0, 0xfffffffffffffffc) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup/syz1\x00', 0x200002, 0x0) gettid() r4 = socket$kcm(0x11, 0x2, 0x0) sendmsg$kcm(r4, &(0x7f0000000200)={&(0x7f0000000040)=@nfc, 0x80, 0x0}, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) mkdirat$cgroup(r5, 0x0, 0x1ff) socket$kcm(0x11, 0x2, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r2, 0xc, 0x1, 0xd8, 0x0}, 0x20) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x2, 0x1c, &(0x7f0000000980)=ANY=[@ANYBLOB="8500000f7d00b7e1ff9724002ac8991601ad814eeb7b4fd5ee25ba83a72ba28f97cb0c9ad407e03f98a2f54eaabb372d8199ad6306ede43a67863593c59251df04459fa354dc3b820501f3ffb58bc4730f78e709652743498eae4839051b2c3d0510147acda9508c01c6dbdaf0a0ee718e67d02249d4d17ee4bbb35ba26fe4aba8fbbcc6d66b645c1671ebadcb84b4fe35d132e5f9a948606f334c3886bfbaf2a0bc045aa7f78f20f94bd9f0658ade293b596d237ddc80d851ec788ba03bdf1a552e3dff57c71a71f10e65802308ac57ae9ab961c16910be5f00c31095d821339125"], &(0x7f0000000340)='syzkaller\x00', 0x1, 0x82, &(0x7f0000000480)=""/130, 0x40f00, 0x4, [], 0x0, 0x10, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000000580)={0x4, 0x7, 0x6, 0xffffffff}, 0x10}, 0x70) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r6, 0xc0, &(0x7f0000000800)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)=0x4, 0x0, 0x0, 0x0, &(0x7f0000000440)={0x1, 0x4}, 0x0, 0x0, &(0x7f0000000740)={0x4, 0x3, 0x3, 0x553}, &(0x7f0000000780)=0x5, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=0x100000001}}, 0x10) r7 = syz_open_dev$adsp(&(0x7f0000000300)='/dev/adsp#\x00', 0x0, 0x10080) write$FUSE_INTERRUPT(r7, &(0x7f0000000400)={0x10, 0x0, 0x5}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0xffffffffffffffcf) socketpair$unix(0x1, 0x4, 0x0, &(0x7f0000000240)) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) r8 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r8, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) 21:46:16 executing program 4: socket$kcm(0x2, 0x1, 0x84) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000900)=ANY=[@ANYBLOB="9f0d343f8f3672b246c5e3575e3bad29af7a982e5093be13037bae5e55d3901efcbad02c798684968abd7cd0f3463233c58a4171b61d275264b0c25a86770e422769c2240915668f9c27dcb8caa76b6b52bcf7f0234471abd5fa470b20eff96ea602ca594f7f1a08a7b251002c49eac4221ab3012d6c7c4d8505140e10"], 0x0, 0x7d}, 0x20) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz0\x00', 0x200002, 0x0) openat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) sendmsg$kcm(r2, 0x0, 0xfffffffffffffffc) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup/syz1\x00', 0x200002, 0x0) gettid() r3 = socket$kcm(0x11, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000000200)={&(0x7f0000000040)=@nfc, 0x80, 0x0}, 0x0) r4 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r4, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) [ 994.818879][ T2836] libceph: connect (1)[d::]:6789 error -101 [ 994.862856][ T2836] libceph: mon0 (1)[d::]:6789 connect error [ 994.983627][T19250] __nla_validate_parse: 5 callbacks suppressed [ 994.983657][T19250] netlink: 22 bytes leftover after parsing attributes in process `syz-executor.5'. [ 994.983966][T19249] netlink: 22 bytes leftover after parsing attributes in process `syz-executor.4'. [ 995.047301][T19250] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 21:46:16 executing program 2: socket$kcm(0x2, 0x1, 0x84) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000900)=ANY=[@ANYBLOB="9f0d343f8f3672b246c5e3575e3bad29af7a982e5093be13037bae5e55d3901efcbad02c798684968abd7cd0f3463233c58a4171b61d275264b0c25a86770e422769c2240915668f9c27dcb8caa76b6b52bcf7f0234471abd5fa470b20eff96ea602ca594f7f1a08a7b251002c49eac4221ab3012d6c7c4d8505140e10"], 0x0, 0x7d}, 0x20) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz0\x00', 0x200002, 0x0) r2 = openat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) sendmsg$kcm(r3, 0x0, 0xfffffffffffffffc) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup/syz1\x00', 0x200002, 0x0) gettid() r4 = socket$kcm(0x11, 0x2, 0x0) sendmsg$kcm(r4, &(0x7f0000000200)={&(0x7f0000000040)=@nfc, 0x80, 0x0}, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) mkdirat$cgroup(r5, 0x0, 0x1ff) socket$kcm(0x11, 0x2, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r2, 0xc, 0x1, 0xd8, 0x0}, 0x20) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x2, 0x1c, &(0x7f0000000980)=ANY=[@ANYBLOB="8500000f7d00b7e1ff9724002ac8991601ad814eeb7b4fd5ee25ba83a72ba28f97cb0c9ad407e03f98a2f54eaabb372d8199ad6306ede43a67863593c59251df04459fa354dc3b820501f3ffb58bc4730f78e709652743498eae4839051b2c3d0510147acda9508c01c6dbdaf0a0ee718e67d02249d4d17ee4bbb35ba26fe4aba8fbbcc6d66b645c1671ebadcb84b4fe35d132e5f9a948606f334c3886bfbaf2a0bc045aa7f78f20f94bd9f0658ade293b596d237ddc80d851ec788ba03bdf1a552e3dff57c71a71f10e65802308ac57ae9ab961c16910be5f00c31095d821339125"], &(0x7f0000000340)='syzkaller\x00', 0x1, 0x82, &(0x7f0000000480)=""/130, 0x40f00, 0x4, [], 0x0, 0x10, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000000580)={0x4, 0x7, 0x6, 0xffffffff}, 0x10}, 0x70) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r6, 0xc0, &(0x7f0000000800)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)=0x4, 0x0, 0x0, 0x0, &(0x7f0000000440)={0x1, 0x4}, 0x0, 0x0, &(0x7f0000000740)={0x4, 0x3, 0x3, 0x553}, &(0x7f0000000780)=0x5, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=0x100000001}}, 0x10) syz_open_dev$adsp(&(0x7f0000000300)='/dev/adsp#\x00', 0x0, 0x10080) r7 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r7, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) 21:46:16 executing program 3: socket$kcm(0x2, 0x1, 0x84) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000900)=ANY=[@ANYBLOB="9f0d343f8f3672b246c5e3575e3bad29af7a982e5093be13037bae5e55d3901efcbad02c798684968abd7cd0f3463233c58a4171b61d275264b0c25a86770e422769c2240915668f9c27dcb8caa76b6b52bcf7f0234471abd5fa470b20eff96ea602ca594f7f1a08a7b251002c49eac4221ab3012d6c7c4d8505140e10"], 0x0, 0x7d}, 0x20) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz0\x00', 0x200002, 0x0) openat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) sendmsg$kcm(r2, 0x0, 0xfffffffffffffffc) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup/syz1\x00', 0x200002, 0x0) gettid() r3 = socket$kcm(0x11, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000000200)={&(0x7f0000000040)=@nfc, 0x80, 0x0}, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) mkdirat$cgroup(r4, 0x0, 0x1ff) socket$kcm(0x11, 0x2, 0x0) r5 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r5, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) 21:46:16 executing program 4: socket$kcm(0x2, 0x1, 0x84) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000900)=ANY=[@ANYBLOB="9f0d343f8f3672b246c5e3575e3bad29af7a982e5093be13037bae5e55d3901efcbad02c798684968abd7cd0f3463233c58a4171b61d275264b0c25a86770e422769c2240915668f9c27dcb8caa76b6b52bcf7f0234471abd5fa470b20eff96ea602ca594f7f1a08a7b251002c49eac4221ab3012d6c7c4d8505140e10"], 0x0, 0x7d}, 0x20) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz0\x00', 0x200002, 0x0) openat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) sendmsg$kcm(r2, 0x0, 0xfffffffffffffffc) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup/syz1\x00', 0x200002, 0x0) gettid() r3 = socket$kcm(0x11, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000000200)={&(0x7f0000000040)=@nfc, 0x80, 0x0}, 0x0) r4 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r4, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) 21:46:16 executing program 5: socket$kcm(0x2, 0x1, 0x84) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000900)=ANY=[@ANYBLOB="9f0d343f8f3672b246c5e3575e3bad29af7a982e5093be13037bae5e55d3901efcbad02c798684968abd7cd0f3463233c58a4171b61d275264b0c25a86770e422769c2240915668f9c27dcb8caa76b6b52bcf7f0234471abd5fa470b20eff96ea602ca594f7f1a08a7b251002c49eac4221ab3012d6c7c4d8505140e10"], 0x0, 0x7d}, 0x20) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz0\x00', 0x200002, 0x0) r2 = openat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) sendmsg$kcm(r3, 0x0, 0xfffffffffffffffc) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup/syz1\x00', 0x200002, 0x0) gettid() r4 = socket$kcm(0x11, 0x2, 0x0) sendmsg$kcm(r4, &(0x7f0000000200)={&(0x7f0000000040)=@nfc, 0x80, 0x0}, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) mkdirat$cgroup(r5, 0x0, 0x1ff) socket$kcm(0x11, 0x2, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r2, 0xc, 0x1, 0xd8, 0x0}, 0x20) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x2, 0x1c, &(0x7f0000000980)=ANY=[@ANYBLOB="8500000f7d00b7e1ff9724002ac8991601ad814eeb7b4fd5ee25ba83a72ba28f97cb0c9ad407e03f98a2f54eaabb372d8199ad6306ede43a67863593c59251df04459fa354dc3b820501f3ffb58bc4730f78e709652743498eae4839051b2c3d0510147acda9508c01c6dbdaf0a0ee718e67d02249d4d17ee4bbb35ba26fe4aba8fbbcc6d66b645c1671ebadcb84b4fe35d132e5f9a948606f334c3886bfbaf2a0bc045aa7f78f20f94bd9f0658ade293b596d237ddc80d851ec788ba03bdf1a552e3dff57c71a71f10e65802308ac57ae9ab961c16910be5f00c31095d821339125"], &(0x7f0000000340)='syzkaller\x00', 0x1, 0x82, &(0x7f0000000480)=""/130, 0x40f00, 0x4, [], 0x0, 0x10, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000000580)={0x4, 0x7, 0x6, 0xffffffff}, 0x10}, 0x70) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r6, 0xc0, &(0x7f0000000800)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)=0x4, 0x0, 0x0, 0x0, &(0x7f0000000440)={0x1, 0x4}, 0x0, 0x0, &(0x7f0000000740)={0x4, 0x3, 0x3, 0x553}, &(0x7f0000000780)=0x5, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=0x100000001}}, 0x10) syz_open_dev$adsp(&(0x7f0000000300)='/dev/adsp#\x00', 0x0, 0x10080) r7 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r7, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) [ 995.473061][T19282] netlink: 22 bytes leftover after parsing attributes in process `syz-executor.2'. [ 995.517105][T19347] netlink: 22 bytes leftover after parsing attributes in process `syz-executor.3'. [ 995.598705][T19282] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 21:46:17 executing program 1: socket$kcm(0x2, 0x1, 0x84) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000900)=ANY=[@ANYBLOB="9f0d343f8f3672b246c5e3575e3bad29af7a982e5093be13037bae5e55d3901efcbad02c798684968abd7cd0f3463233c58a4171b61d275264b0c25a86770e422769c2240915668f9c27dcb8caa76b6b52bcf7f0234471abd5fa470b20eff96ea602ca594f7f1a08a7b251002c49eac4221ab3012d6c7c4d8505140e10"], 0x0, 0x7d}, 0x20) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz0\x00', 0x200002, 0x0) r2 = openat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) sendmsg$kcm(r3, 0x0, 0xfffffffffffffffc) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup/syz1\x00', 0x200002, 0x0) gettid() r4 = socket$kcm(0x11, 0x2, 0x0) sendmsg$kcm(r4, &(0x7f0000000200)={&(0x7f0000000040)=@nfc, 0x80, 0x0}, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) mkdirat$cgroup(r5, 0x0, 0x1ff) socket$kcm(0x11, 0x2, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r2, 0xc, 0x1, 0xd8, 0x0}, 0x20) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x2, 0x1c, &(0x7f0000000980)=ANY=[@ANYBLOB="8500000f7d00b7e1ff9724002ac8991601ad814eeb7b4fd5ee25ba83a72ba28f97cb0c9ad407e03f98a2f54eaabb372d8199ad6306ede43a67863593c59251df04459fa354dc3b820501f3ffb58bc4730f78e709652743498eae4839051b2c3d0510147acda9508c01c6dbdaf0a0ee718e67d02249d4d17ee4bbb35ba26fe4aba8fbbcc6d66b645c1671ebadcb84b4fe35d132e5f9a948606f334c3886bfbaf2a0bc045aa7f78f20f94bd9f0658ade293b596d237ddc80d851ec788ba03bdf1a552e3dff57c71a71f10e65802308ac57ae9ab961c16910be5f00c31095d821339125"], &(0x7f0000000340)='syzkaller\x00', 0x1, 0x82, &(0x7f0000000480)=""/130, 0x40f00, 0x4, [], 0x0, 0x10, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000000580)={0x4, 0x7, 0x6, 0xffffffff}, 0x10}, 0x70) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r6, 0xc0, &(0x7f0000000800)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)=0x4, 0x0, 0x0, 0x0, &(0x7f0000000440)={0x1, 0x4}, 0x0, 0x0, &(0x7f0000000740)={0x4, 0x3, 0x3, 0x553}, &(0x7f0000000780)=0x5, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=0x100000001}}, 0x10) r7 = syz_open_dev$adsp(&(0x7f0000000300)='/dev/adsp#\x00', 0x0, 0x10080) write$FUSE_INTERRUPT(r7, &(0x7f0000000400)={0x10, 0x0, 0x5}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0xffffffffffffffcf) socketpair$unix(0x1, 0x4, 0x0, &(0x7f0000000240)) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) r8 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r8, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) [ 995.676086][T19362] netlink: 22 bytes leftover after parsing attributes in process `syz-executor.4'. [ 995.820316][T19368] netlink: 22 bytes leftover after parsing attributes in process `syz-executor.1'. [ 995.904295][T19362] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 21:46:17 executing program 3: socket$kcm(0x2, 0x1, 0x84) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000900)=ANY=[@ANYBLOB="9f0d343f8f3672b246c5e3575e3bad29af7a982e5093be13037bae5e55d3901efcbad02c798684968abd7cd0f3463233c58a4171b61d275264b0c25a86770e422769c2240915668f9c27dcb8caa76b6b52bcf7f0234471abd5fa470b20eff96ea602ca594f7f1a08a7b251002c49eac4221ab3012d6c7c4d8505140e10"], 0x0, 0x7d}, 0x20) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz0\x00', 0x200002, 0x0) r2 = openat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) sendmsg$kcm(r3, 0x0, 0xfffffffffffffffc) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup/syz1\x00', 0x200002, 0x0) gettid() r4 = socket$kcm(0x11, 0x2, 0x0) sendmsg$kcm(r4, &(0x7f0000000200)={&(0x7f0000000040)=@nfc, 0x80, 0x0}, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) mkdirat$cgroup(r5, 0x0, 0x1ff) socket$kcm(0x11, 0x2, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r2, 0xc, 0x1, 0xd8, 0x0}, 0x20) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x2, 0x1c, &(0x7f0000000980)=ANY=[@ANYBLOB="8500000f7d00b7e1ff9724002ac8991601ad814eeb7b4fd5ee25ba83a72ba28f97cb0c9ad407e03f98a2f54eaabb372d8199ad6306ede43a67863593c59251df04459fa354dc3b820501f3ffb58bc4730f78e709652743498eae4839051b2c3d0510147acda9508c01c6dbdaf0a0ee718e67d02249d4d17ee4bbb35ba26fe4aba8fbbcc6d66b645c1671ebadcb84b4fe35d132e5f9a948606f334c3886bfbaf2a0bc045aa7f78f20f94bd9f0658ade293b596d237ddc80d851ec788ba03bdf1a552e3dff57c71a71f10e65802308ac57ae9ab961c16910be5f00c31095d821339125"], &(0x7f0000000340)='syzkaller\x00', 0x1, 0x82, &(0x7f0000000480)=""/130, 0x40f00, 0x4, [], 0x0, 0x10, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000000580)={0x4, 0x7, 0x6, 0xffffffff}, 0x10}, 0x70) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r6, 0xc0, &(0x7f0000000800)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)=0x4, 0x0, 0x0, 0x0, &(0x7f0000000440)={0x1, 0x4}, 0x0, 0x0, &(0x7f0000000740)={0x4, 0x3, 0x3, 0x553}, &(0x7f0000000780)=0x5, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=0x100000001}}, 0x10) r7 = syz_open_dev$adsp(&(0x7f0000000300)='/dev/adsp#\x00', 0x0, 0x10080) write$FUSE_INTERRUPT(r7, &(0x7f0000000400)={0x10, 0x0, 0x5}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0xffffffffffffffcf) close(r3) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) r8 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r8, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) 21:46:17 executing program 2: socket$kcm(0x2, 0x1, 0x84) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000900)=ANY=[@ANYBLOB="9f0d343f8f3672b246c5e3575e3bad29af7a982e5093be13037bae5e55d3901efcbad02c798684968abd7cd0f3463233c58a4171b61d275264b0c25a86770e422769c2240915668f9c27dcb8caa76b6b52bcf7f0234471abd5fa470b20eff96ea602ca594f7f1a08a7b251002c49eac4221ab3012d6c7c4d8505140e10"], 0x0, 0x7d}, 0x20) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz0\x00', 0x200002, 0x0) r2 = openat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) sendmsg$kcm(r3, 0x0, 0xfffffffffffffffc) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup/syz1\x00', 0x200002, 0x0) gettid() r4 = socket$kcm(0x11, 0x2, 0x0) sendmsg$kcm(r4, &(0x7f0000000200)={&(0x7f0000000040)=@nfc, 0x80, 0x0}, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) mkdirat$cgroup(r5, 0x0, 0x1ff) socket$kcm(0x11, 0x2, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r2, 0xc, 0x1, 0xd8, 0x0}, 0x20) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x2, 0x1c, &(0x7f0000000980)=ANY=[@ANYBLOB="8500000f7d00b7e1ff9724002ac8991601ad814eeb7b4fd5ee25ba83a72ba28f97cb0c9ad407e03f98a2f54eaabb372d8199ad6306ede43a67863593c59251df04459fa354dc3b820501f3ffb58bc4730f78e709652743498eae4839051b2c3d0510147acda9508c01c6dbdaf0a0ee718e67d02249d4d17ee4bbb35ba26fe4aba8fbbcc6d66b645c1671ebadcb84b4fe35d132e5f9a948606f334c3886bfbaf2a0bc045aa7f78f20f94bd9f0658ade293b596d237ddc80d851ec788ba03bdf1a552e3dff57c71a71f10e65802308ac57ae9ab961c16910be5f00c31095d821339125"], &(0x7f0000000340)='syzkaller\x00', 0x1, 0x82, &(0x7f0000000480)=""/130, 0x40f00, 0x4, [], 0x0, 0x10, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000000580)={0x4, 0x7, 0x6, 0xffffffff}, 0x10}, 0x70) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r6, 0xc0, &(0x7f0000000800)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)=0x4, 0x0, 0x0, 0x0, &(0x7f0000000440)={0x1, 0x4}, 0x0, 0x0, &(0x7f0000000740)={0x4, 0x3, 0x3, 0x553}, &(0x7f0000000780)=0x5, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=0x100000001}}, 0x10) r7 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r7, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) [ 995.970523][T19365] netlink: 22 bytes leftover after parsing attributes in process `syz-executor.5'. [ 996.058097][T19365] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 21:46:17 executing program 4: socket$kcm(0x2, 0x1, 0x84) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000900)=ANY=[@ANYBLOB="9f0d343f8f3672b246c5e3575e3bad29af7a982e5093be13037bae5e55d3901efcbad02c798684968abd7cd0f3463233c58a4171b61d275264b0c25a86770e422769c2240915668f9c27dcb8caa76b6b52bcf7f0234471abd5fa470b20eff96ea602ca594f7f1a08a7b251002c49eac4221ab3012d6c7c4d8505140e10"], 0x0, 0x7d}, 0x20) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz0\x00', 0x200002, 0x0) openat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) sendmsg$kcm(r2, 0x0, 0xfffffffffffffffc) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup/syz1\x00', 0x200002, 0x0) gettid() socket$kcm(0x11, 0x2, 0x0) r3 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r3, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) [ 996.201933][T19374] netlink: 22 bytes leftover after parsing attributes in process `syz-executor.2'. [ 996.221636][T19371] netlink: 22 bytes leftover after parsing attributes in process `syz-executor.3'. 21:46:17 executing program 1: socket$kcm(0x2, 0x1, 0x84) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000900)=ANY=[@ANYBLOB="9f0d343f8f3672b246c5e3575e3bad29af7a982e5093be13037bae5e55d3901efcbad02c798684968abd7cd0f3463233c58a4171b61d275264b0c25a86770e422769c2240915668f9c27dcb8caa76b6b52bcf7f0234471abd5fa470b20eff96ea602ca594f7f1a08a7b251002c49eac4221ab3012d6c7c4d8505140e10"], 0x0, 0x7d}, 0x20) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz0\x00', 0x200002, 0x0) r2 = openat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) sendmsg$kcm(r3, 0x0, 0xfffffffffffffffc) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup/syz1\x00', 0x200002, 0x0) gettid() r4 = socket$kcm(0x11, 0x2, 0x0) sendmsg$kcm(r4, &(0x7f0000000200)={&(0x7f0000000040)=@nfc, 0x80, 0x0}, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) mkdirat$cgroup(r5, 0x0, 0x1ff) socket$kcm(0x11, 0x2, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r2, 0xc, 0x1, 0xd8, 0x0}, 0x20) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x2, 0x1c, &(0x7f0000000980)=ANY=[@ANYBLOB="8500000f7d00b7e1ff9724002ac8991601ad814eeb7b4fd5ee25ba83a72ba28f97cb0c9ad407e03f98a2f54eaabb372d8199ad6306ede43a67863593c59251df04459fa354dc3b820501f3ffb58bc4730f78e709652743498eae4839051b2c3d0510147acda9508c01c6dbdaf0a0ee718e67d02249d4d17ee4bbb35ba26fe4aba8fbbcc6d66b645c1671ebadcb84b4fe35d132e5f9a948606f334c3886bfbaf2a0bc045aa7f78f20f94bd9f0658ade293b596d237ddc80d851ec788ba03bdf1a552e3dff57c71a71f10e65802308ac57ae9ab961c16910be5f00c31095d821339125"], &(0x7f0000000340)='syzkaller\x00', 0x1, 0x82, &(0x7f0000000480)=""/130, 0x40f00, 0x4, [], 0x0, 0x10, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000000580)={0x4, 0x7, 0x6, 0xffffffff}, 0x10}, 0x70) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r6, 0xc0, &(0x7f0000000800)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)=0x4, 0x0, 0x0, 0x0, &(0x7f0000000440)={0x1, 0x4}, 0x0, 0x0, &(0x7f0000000740)={0x4, 0x3, 0x3, 0x553}, &(0x7f0000000780)=0x5, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=0x100000001}}, 0x10) r7 = syz_open_dev$adsp(&(0x7f0000000300)='/dev/adsp#\x00', 0x0, 0x10080) write$FUSE_INTERRUPT(r7, &(0x7f0000000400)={0x10, 0x0, 0x5}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0xffffffffffffffcf) socketpair$unix(0x1, 0x4, 0x0, &(0x7f0000000240)) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) r8 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r8, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) [ 996.314836][T19374] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 21:46:17 executing program 5: socket$kcm(0x2, 0x1, 0x84) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000900)=ANY=[@ANYBLOB="9f0d343f8f3672b246c5e3575e3bad29af7a982e5093be13037bae5e55d3901efcbad02c798684968abd7cd0f3463233c58a4171b61d275264b0c25a86770e422769c2240915668f9c27dcb8caa76b6b52bcf7f0234471abd5fa470b20eff96ea602ca594f7f1a08a7b251002c49eac4221ab3012d6c7c4d8505140e10"], 0x0, 0x7d}, 0x20) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz0\x00', 0x200002, 0x0) openat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) sendmsg$kcm(r2, 0x0, 0xfffffffffffffffc) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup/syz1\x00', 0x200002, 0x0) gettid() r3 = socket$kcm(0x11, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000000200)={&(0x7f0000000040)=@nfc, 0x80, 0x0}, 0x0) r4 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r4, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) [ 996.451754][T19378] netlink: 22 bytes leftover after parsing attributes in process `syz-executor.4'. [ 996.513367][T19380] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 21:46:18 executing program 3: socket$kcm(0x2, 0x1, 0x84) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000900)=ANY=[@ANYBLOB="9f0d343f8f3672b246c5e3575e3bad29af7a982e5093be13037bae5e55d3901efcbad02c798684968abd7cd0f3463233c58a4171b61d275264b0c25a86770e422769c2240915668f9c27dcb8caa76b6b52bcf7f0234471abd5fa470b20eff96ea602ca594f7f1a08a7b251002c49eac4221ab3012d6c7c4d8505140e10"], 0x0, 0x7d}, 0x20) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz0\x00', 0x200002, 0x0) r2 = openat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) sendmsg$kcm(r3, 0x0, 0xfffffffffffffffc) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup/syz1\x00', 0x200002, 0x0) gettid() r4 = socket$kcm(0x11, 0x2, 0x0) sendmsg$kcm(r4, &(0x7f0000000200)={&(0x7f0000000040)=@nfc, 0x80, 0x0}, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) mkdirat$cgroup(r5, 0x0, 0x1ff) socket$kcm(0x11, 0x2, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r2, 0xc, 0x1, 0xd8, 0x0}, 0x20) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x2, 0x1c, &(0x7f0000000980)=ANY=[@ANYBLOB="8500000f7d00b7e1ff9724002ac8991601ad814eeb7b4fd5ee25ba83a72ba28f97cb0c9ad407e03f98a2f54eaabb372d8199ad6306ede43a67863593c59251df04459fa354dc3b820501f3ffb58bc4730f78e709652743498eae4839051b2c3d0510147acda9508c01c6dbdaf0a0ee718e67d02249d4d17ee4bbb35ba26fe4aba8fbbcc6d66b645c1671ebadcb84b4fe35d132e5f9a948606f334c3886bfbaf2a0bc045aa7f78f20f94bd9f0658ade293b596d237ddc80d851ec788ba03bdf1a552e3dff57c71a71f10e65802308ac57ae9ab961c16910be5f00c31095d821339125"], &(0x7f0000000340)='syzkaller\x00', 0x1, 0x82, &(0x7f0000000480)=""/130, 0x40f00, 0x4, [], 0x0, 0x10, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000000580)={0x4, 0x7, 0x6, 0xffffffff}, 0x10}, 0x70) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r6, 0xc0, &(0x7f0000000800)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)=0x4, 0x0, 0x0, 0x0, &(0x7f0000000440)={0x1, 0x4}, 0x0, 0x0, &(0x7f0000000740)={0x4, 0x3, 0x3, 0x553}, &(0x7f0000000780)=0x5, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=0x100000001}}, 0x10) syz_open_dev$adsp(&(0x7f0000000300)='/dev/adsp#\x00', 0x0, 0x10080) r7 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r7, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) 21:46:18 executing program 2: socket$kcm(0x2, 0x1, 0x84) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000900)=ANY=[@ANYBLOB="9f0d343f8f3672b246c5e3575e3bad29af7a982e5093be13037bae5e55d3901efcbad02c798684968abd7cd0f3463233c58a4171b61d275264b0c25a86770e422769c2240915668f9c27dcb8caa76b6b52bcf7f0234471abd5fa470b20eff96ea602ca594f7f1a08a7b251002c49eac4221ab3012d6c7c4d8505140e10"], 0x0, 0x7d}, 0x20) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz0\x00', 0x200002, 0x0) r2 = openat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) sendmsg$kcm(r3, 0x0, 0xfffffffffffffffc) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup/syz1\x00', 0x200002, 0x0) gettid() r4 = socket$kcm(0x11, 0x2, 0x0) sendmsg$kcm(r4, &(0x7f0000000200)={&(0x7f0000000040)=@nfc, 0x80, 0x0}, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) mkdirat$cgroup(r5, 0x0, 0x1ff) socket$kcm(0x11, 0x2, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r2, 0xc, 0x1, 0xd8, 0x0}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x2, 0x1c, &(0x7f0000000980)=ANY=[@ANYBLOB="8500000f7d00b7e1ff9724002ac8991601ad814eeb7b4fd5ee25ba83a72ba28f97cb0c9ad407e03f98a2f54eaabb372d8199ad6306ede43a67863593c59251df04459fa354dc3b820501f3ffb58bc4730f78e709652743498eae4839051b2c3d0510147acda9508c01c6dbdaf0a0ee718e67d02249d4d17ee4bbb35ba26fe4aba8fbbcc6d66b645c1671ebadcb84b4fe35d132e5f9a948606f334c3886bfbaf2a0bc045aa7f78f20f94bd9f0658ade293b596d237ddc80d851ec788ba03bdf1a552e3dff57c71a71f10e65802308ac57ae9ab961c16910be5f00c31095d821339125"], &(0x7f0000000340)='syzkaller\x00', 0x1, 0x82, &(0x7f0000000480)=""/130, 0x40f00, 0x4, [], 0x0, 0x10, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000000580)={0x4, 0x7, 0x6, 0xffffffff}, 0x10}, 0x70) r6 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r6, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) [ 996.655464][T19384] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 21:46:18 executing program 4: socket$kcm(0x2, 0x1, 0x84) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000900)=ANY=[@ANYBLOB="9f0d343f8f3672b246c5e3575e3bad29af7a982e5093be13037bae5e55d3901efcbad02c798684968abd7cd0f3463233c58a4171b61d275264b0c25a86770e422769c2240915668f9c27dcb8caa76b6b52bcf7f0234471abd5fa470b20eff96ea602ca594f7f1a08a7b251002c49eac4221ab3012d6c7c4d8505140e10"], 0x0, 0x7d}, 0x20) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz0\x00', 0x200002, 0x0) openat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) sendmsg$kcm(r2, 0x0, 0xfffffffffffffffc) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup/syz1\x00', 0x200002, 0x0) gettid() socket$kcm(0x11, 0x2, 0x0) r3 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r3, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) 21:46:18 executing program 1: socket$kcm(0x2, 0x1, 0x84) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000900)=ANY=[@ANYBLOB="9f0d343f8f3672b246c5e3575e3bad29af7a982e5093be13037bae5e55d3901efcbad02c798684968abd7cd0f3463233c58a4171b61d275264b0c25a86770e422769c2240915668f9c27dcb8caa76b6b52bcf7f0234471abd5fa470b20eff96ea602ca594f7f1a08a7b251002c49eac4221ab3012d6c7c4d8505140e10"], 0x0, 0x7d}, 0x20) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz0\x00', 0x200002, 0x0) r2 = openat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) sendmsg$kcm(r3, 0x0, 0xfffffffffffffffc) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup/syz1\x00', 0x200002, 0x0) gettid() r4 = socket$kcm(0x11, 0x2, 0x0) sendmsg$kcm(r4, &(0x7f0000000200)={&(0x7f0000000040)=@nfc, 0x80, 0x0}, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) mkdirat$cgroup(r5, 0x0, 0x1ff) socket$kcm(0x11, 0x2, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r2, 0xc, 0x1, 0xd8, 0x0}, 0x20) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x2, 0x1c, &(0x7f0000000980)=ANY=[@ANYBLOB="8500000f7d00b7e1ff9724002ac8991601ad814eeb7b4fd5ee25ba83a72ba28f97cb0c9ad407e03f98a2f54eaabb372d8199ad6306ede43a67863593c59251df04459fa354dc3b820501f3ffb58bc4730f78e709652743498eae4839051b2c3d0510147acda9508c01c6dbdaf0a0ee718e67d02249d4d17ee4bbb35ba26fe4aba8fbbcc6d66b645c1671ebadcb84b4fe35d132e5f9a948606f334c3886bfbaf2a0bc045aa7f78f20f94bd9f0658ade293b596d237ddc80d851ec788ba03bdf1a552e3dff57c71a71f10e65802308ac57ae9ab961c16910be5f00c31095d821339125"], &(0x7f0000000340)='syzkaller\x00', 0x1, 0x82, &(0x7f0000000480)=""/130, 0x40f00, 0x4, [], 0x0, 0x10, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000000580)={0x4, 0x7, 0x6, 0xffffffff}, 0x10}, 0x70) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r6, 0xc0, &(0x7f0000000800)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)=0x4, 0x0, 0x0, 0x0, &(0x7f0000000440)={0x1, 0x4}, 0x0, 0x0, &(0x7f0000000740)={0x4, 0x3, 0x3, 0x553}, &(0x7f0000000780)=0x5, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=0x100000001}}, 0x10) r7 = syz_open_dev$adsp(&(0x7f0000000300)='/dev/adsp#\x00', 0x0, 0x10080) write$FUSE_INTERRUPT(r7, &(0x7f0000000400)={0x10, 0x0, 0x5}, 0x10) socketpair$unix(0x1, 0x4, 0x0, &(0x7f0000000240)) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) r8 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r8, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) [ 996.866100][ T2836] libceph: mon1 (1)[::6]:6789 socket error on read [ 996.888258][T19394] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 21:46:18 executing program 5: socket$kcm(0x2, 0x1, 0x84) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000900)=ANY=[@ANYBLOB="9f0d343f8f3672b246c5e3575e3bad29af7a982e5093be13037bae5e55d3901efcbad02c798684968abd7cd0f3463233c58a4171b61d275264b0c25a86770e422769c2240915668f9c27dcb8caa76b6b52bcf7f0234471abd5fa470b20eff96ea602ca594f7f1a08a7b251002c49eac4221ab3012d6c7c4d8505140e10"], 0x0, 0x7d}, 0x20) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz0\x00', 0x200002, 0x0) openat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) sendmsg$kcm(r2, 0x0, 0xfffffffffffffffc) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup/syz1\x00', 0x200002, 0x0) gettid() r3 = socket$kcm(0x11, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000000200)={&(0x7f0000000040)=@nfc, 0x80, 0x0}, 0x0) r4 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r4, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) 21:46:18 executing program 3: socket$kcm(0x2, 0x1, 0x84) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000900)=ANY=[@ANYBLOB="9f0d343f8f3672b246c5e3575e3bad29af7a982e5093be13037bae5e55d3901efcbad02c798684968abd7cd0f3463233c58a4171b61d275264b0c25a86770e422769c2240915668f9c27dcb8caa76b6b52bcf7f0234471abd5fa470b20eff96ea602ca594f7f1a08a7b251002c49eac4221ab3012d6c7c4d8505140e10"], 0x0, 0x7d}, 0x20) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz0\x00', 0x200002, 0x0) r2 = openat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) sendmsg$kcm(r3, 0x0, 0xfffffffffffffffc) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup/syz1\x00', 0x200002, 0x0) gettid() r4 = socket$kcm(0x11, 0x2, 0x0) sendmsg$kcm(r4, &(0x7f0000000200)={&(0x7f0000000040)=@nfc, 0x80, 0x0}, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) mkdirat$cgroup(r5, 0x0, 0x1ff) socket$kcm(0x11, 0x2, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r2, 0xc, 0x1, 0xd8, 0x0}, 0x20) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x2, 0x1c, &(0x7f0000000980)=ANY=[@ANYBLOB="8500000f7d00b7e1ff9724002ac8991601ad814eeb7b4fd5ee25ba83a72ba28f97cb0c9ad407e03f98a2f54eaabb372d8199ad6306ede43a67863593c59251df04459fa354dc3b820501f3ffb58bc4730f78e709652743498eae4839051b2c3d0510147acda9508c01c6dbdaf0a0ee718e67d02249d4d17ee4bbb35ba26fe4aba8fbbcc6d66b645c1671ebadcb84b4fe35d132e5f9a948606f334c3886bfbaf2a0bc045aa7f78f20f94bd9f0658ade293b596d237ddc80d851ec788ba03bdf1a552e3dff57c71a71f10e65802308ac57ae9ab961c16910be5f00c31095d821339125"], &(0x7f0000000340)='syzkaller\x00', 0x1, 0x82, &(0x7f0000000480)=""/130, 0x40f00, 0x4, [], 0x0, 0x10, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000000580)={0x4, 0x7, 0x6, 0xffffffff}, 0x10}, 0x70) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r6, 0xc0, &(0x7f0000000800)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)=0x4, 0x0, 0x0, 0x0, &(0x7f0000000440)={0x1, 0x4}, 0x0, 0x0, &(0x7f0000000740)={0x4, 0x3, 0x3, 0x553}, &(0x7f0000000780)=0x5, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=0x100000001}}, 0x10) r7 = syz_open_dev$adsp(&(0x7f0000000300)='/dev/adsp#\x00', 0x0, 0x10080) write$FUSE_INTERRUPT(r7, &(0x7f0000000400)={0x10, 0x0, 0x5}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0xffffffffffffffcf) socketpair$unix(0x1, 0x4, 0x0, &(0x7f0000000240)) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) r8 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r8, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) 21:46:18 executing program 4: socket$kcm(0x2, 0x1, 0x84) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000900)=ANY=[@ANYBLOB="9f0d343f8f3672b246c5e3575e3bad29af7a982e5093be13037bae5e55d3901efcbad02c798684968abd7cd0f3463233c58a4171b61d275264b0c25a86770e422769c2240915668f9c27dcb8caa76b6b52bcf7f0234471abd5fa470b20eff96ea602ca594f7f1a08a7b251002c49eac4221ab3012d6c7c4d8505140e10"], 0x0, 0x7d}, 0x20) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz0\x00', 0x200002, 0x0) openat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) sendmsg$kcm(r2, 0x0, 0xfffffffffffffffc) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup/syz1\x00', 0x200002, 0x0) gettid() socket$kcm(0x11, 0x2, 0x0) r3 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r3, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) [ 997.090266][T19398] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 21:46:18 executing program 2: socket$kcm(0x2, 0x1, 0x84) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000900)=ANY=[@ANYBLOB="9f0d343f8f3672b246c5e3575e3bad29af7a982e5093be13037bae5e55d3901efcbad02c798684968abd7cd0f3463233c58a4171b61d275264b0c25a86770e422769c2240915668f9c27dcb8caa76b6b52bcf7f0234471abd5fa470b20eff96ea602ca594f7f1a08a7b251002c49eac4221ab3012d6c7c4d8505140e10"], 0x0, 0x7d}, 0x20) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz0\x00', 0x200002, 0x0) r2 = openat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) sendmsg$kcm(r3, 0x0, 0xfffffffffffffffc) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup/syz1\x00', 0x200002, 0x0) gettid() r4 = socket$kcm(0x11, 0x2, 0x0) sendmsg$kcm(r4, &(0x7f0000000200)={&(0x7f0000000040)=@nfc, 0x80, 0x0}, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) mkdirat$cgroup(r5, 0x0, 0x1ff) socket$kcm(0x11, 0x2, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r2, 0xc, 0x1, 0xd8, 0x0}, 0x20) r6 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r6, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) [ 997.240322][T19401] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 21:46:18 executing program 1: socket$kcm(0x2, 0x1, 0x84) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000900)=ANY=[@ANYBLOB="9f0d343f8f3672b246c5e3575e3bad29af7a982e5093be13037bae5e55d3901efcbad02c798684968abd7cd0f3463233c58a4171b61d275264b0c25a86770e422769c2240915668f9c27dcb8caa76b6b52bcf7f0234471abd5fa470b20eff96ea602ca594f7f1a08a7b251002c49eac4221ab3012d6c7c4d8505140e10"], 0x0, 0x7d}, 0x20) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz0\x00', 0x200002, 0x0) r2 = openat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) sendmsg$kcm(r3, 0x0, 0xfffffffffffffffc) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup/syz1\x00', 0x200002, 0x0) gettid() r4 = socket$kcm(0x11, 0x2, 0x0) sendmsg$kcm(r4, &(0x7f0000000200)={&(0x7f0000000040)=@nfc, 0x80, 0x0}, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) mkdirat$cgroup(r5, 0x0, 0x1ff) socket$kcm(0x11, 0x2, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r2, 0xc, 0x1, 0xd8, 0x0}, 0x20) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x2, 0x1c, &(0x7f0000000980)=ANY=[@ANYBLOB="8500000f7d00b7e1ff9724002ac8991601ad814eeb7b4fd5ee25ba83a72ba28f97cb0c9ad407e03f98a2f54eaabb372d8199ad6306ede43a67863593c59251df04459fa354dc3b820501f3ffb58bc4730f78e709652743498eae4839051b2c3d0510147acda9508c01c6dbdaf0a0ee718e67d02249d4d17ee4bbb35ba26fe4aba8fbbcc6d66b645c1671ebadcb84b4fe35d132e5f9a948606f334c3886bfbaf2a0bc045aa7f78f20f94bd9f0658ade293b596d237ddc80d851ec788ba03bdf1a552e3dff57c71a71f10e65802308ac57ae9ab961c16910be5f00c31095d821339125"], &(0x7f0000000340)='syzkaller\x00', 0x1, 0x82, &(0x7f0000000480)=""/130, 0x40f00, 0x4, [], 0x0, 0x10, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000000580)={0x4, 0x7, 0x6, 0xffffffff}, 0x10}, 0x70) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r6, 0xc0, &(0x7f0000000800)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)=0x4, 0x0, 0x0, 0x0, &(0x7f0000000440)={0x1, 0x4}, 0x0, 0x0, &(0x7f0000000740)={0x4, 0x3, 0x3, 0x553}, &(0x7f0000000780)=0x5, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=0x100000001}}, 0x10) syz_open_dev$adsp(&(0x7f0000000300)='/dev/adsp#\x00', 0x0, 0x10080) socketpair$unix(0x1, 0x4, 0x0, &(0x7f0000000240)) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) r7 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r7, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) [ 997.373380][T19407] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 21:46:18 executing program 4: socket$kcm(0x2, 0x1, 0x84) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000900)=ANY=[@ANYBLOB="9f0d343f8f3672b246c5e3575e3bad29af7a982e5093be13037bae5e55d3901efcbad02c798684968abd7cd0f3463233c58a4171b61d275264b0c25a86770e422769c2240915668f9c27dcb8caa76b6b52bcf7f0234471abd5fa470b20eff96ea602ca594f7f1a08a7b251002c49eac4221ab3012d6c7c4d8505140e10"], 0x0, 0x7d}, 0x20) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz0\x00', 0x200002, 0x0) openat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) sendmsg$kcm(r2, 0x0, 0xfffffffffffffffc) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup/syz1\x00', 0x200002, 0x0) gettid() r3 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r3, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) [ 997.501048][T19405] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 21:46:18 executing program 5: socket$kcm(0x2, 0x1, 0x84) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000900)=ANY=[@ANYBLOB="9f0d343f8f3672b246c5e3575e3bad29af7a982e5093be13037bae5e55d3901efcbad02c798684968abd7cd0f3463233c58a4171b61d275264b0c25a86770e422769c2240915668f9c27dcb8caa76b6b52bcf7f0234471abd5fa470b20eff96ea602ca594f7f1a08a7b251002c49eac4221ab3012d6c7c4d8505140e10"], 0x0, 0x7d}, 0x20) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz0\x00', 0x200002, 0x0) openat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) sendmsg$kcm(r2, 0x0, 0xfffffffffffffffc) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup/syz1\x00', 0x200002, 0x0) gettid() r3 = socket$kcm(0x11, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000000200)={&(0x7f0000000040)=@nfc, 0x80, 0x0}, 0x0) r4 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r4, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) 21:46:19 executing program 2: socket$kcm(0x2, 0x1, 0x84) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000900)=ANY=[@ANYBLOB="9f0d343f8f3672b246c5e3575e3bad29af7a982e5093be13037bae5e55d3901efcbad02c798684968abd7cd0f3463233c58a4171b61d275264b0c25a86770e422769c2240915668f9c27dcb8caa76b6b52bcf7f0234471abd5fa470b20eff96ea602ca594f7f1a08a7b251002c49eac4221ab3012d6c7c4d8505140e10"], 0x0, 0x7d}, 0x20) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz0\x00', 0x200002, 0x0) r2 = openat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) sendmsg$kcm(r3, 0x0, 0xfffffffffffffffc) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup/syz1\x00', 0x200002, 0x0) gettid() r4 = socket$kcm(0x11, 0x2, 0x0) sendmsg$kcm(r4, &(0x7f0000000200)={&(0x7f0000000040)=@nfc, 0x80, 0x0}, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) mkdirat$cgroup(r5, 0x0, 0x1ff) socket$kcm(0x11, 0x2, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r2, 0xc, 0x1, 0xd8, 0x0}, 0x20) r6 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r6, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) [ 997.557429][T19413] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 21:46:19 executing program 3: socket$kcm(0x2, 0x1, 0x84) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000900)=ANY=[@ANYBLOB="9f0d343f8f3672b246c5e3575e3bad29af7a982e5093be13037bae5e55d3901efcbad02c798684968abd7cd0f3463233c58a4171b61d275264b0c25a86770e422769c2240915668f9c27dcb8caa76b6b52bcf7f0234471abd5fa470b20eff96ea602ca594f7f1a08a7b251002c49eac4221ab3012d6c7c4d8505140e10"], 0x0, 0x7d}, 0x20) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz0\x00', 0x200002, 0x0) r2 = openat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) sendmsg$kcm(r3, 0x0, 0xfffffffffffffffc) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup/syz1\x00', 0x200002, 0x0) gettid() r4 = socket$kcm(0x11, 0x2, 0x0) sendmsg$kcm(r4, &(0x7f0000000200)={&(0x7f0000000040)=@nfc, 0x80, 0x0}, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) mkdirat$cgroup(r5, 0x0, 0x1ff) socket$kcm(0x11, 0x2, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r2, 0xc, 0x1, 0xd8, 0x0}, 0x20) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x2, 0x1c, &(0x7f0000000980)=ANY=[@ANYBLOB="8500000f7d00b7e1ff9724002ac8991601ad814eeb7b4fd5ee25ba83a72ba28f97cb0c9ad407e03f98a2f54eaabb372d8199ad6306ede43a67863593c59251df04459fa354dc3b820501f3ffb58bc4730f78e709652743498eae4839051b2c3d0510147acda9508c01c6dbdaf0a0ee718e67d02249d4d17ee4bbb35ba26fe4aba8fbbcc6d66b645c1671ebadcb84b4fe35d132e5f9a948606f334c3886bfbaf2a0bc045aa7f78f20f94bd9f0658ade293b596d237ddc80d851ec788ba03bdf1a552e3dff57c71a71f10e65802308ac57ae9ab961c16910be5f00c31095d821339125"], &(0x7f0000000340)='syzkaller\x00', 0x1, 0x82, &(0x7f0000000480)=""/130, 0x40f00, 0x4, [], 0x0, 0x10, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000000580)={0x4, 0x7, 0x6, 0xffffffff}, 0x10}, 0x70) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r6, 0xc0, &(0x7f0000000800)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)=0x4, 0x0, 0x0, 0x0, &(0x7f0000000440)={0x1, 0x4}, 0x0, 0x0, &(0x7f0000000740)={0x4, 0x3, 0x3, 0x553}, &(0x7f0000000780)=0x5, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=0x100000001}}, 0x10) r7 = syz_open_dev$adsp(&(0x7f0000000300)='/dev/adsp#\x00', 0x0, 0x10080) write$FUSE_INTERRUPT(r7, &(0x7f0000000400)={0x10, 0x0, 0x5}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0xffffffffffffffcf) socketpair$unix(0x1, 0x4, 0x0, &(0x7f0000000240)) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) r8 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r8, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) [ 997.720068][T19422] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 21:46:19 executing program 1: socket$kcm(0x2, 0x1, 0x84) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000900)=ANY=[@ANYBLOB="9f0d343f8f3672b246c5e3575e3bad29af7a982e5093be13037bae5e55d3901efcbad02c798684968abd7cd0f3463233c58a4171b61d275264b0c25a86770e422769c2240915668f9c27dcb8caa76b6b52bcf7f0234471abd5fa470b20eff96ea602ca594f7f1a08a7b251002c49eac4221ab3012d6c7c4d8505140e10"], 0x0, 0x7d}, 0x20) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz0\x00', 0x200002, 0x0) r2 = openat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) sendmsg$kcm(r3, 0x0, 0xfffffffffffffffc) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup/syz1\x00', 0x200002, 0x0) gettid() r4 = socket$kcm(0x11, 0x2, 0x0) sendmsg$kcm(r4, &(0x7f0000000200)={&(0x7f0000000040)=@nfc, 0x80, 0x0}, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) mkdirat$cgroup(r5, 0x0, 0x1ff) socket$kcm(0x11, 0x2, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r2, 0xc, 0x1, 0xd8, 0x0}, 0x20) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x2, 0x1c, &(0x7f0000000980)=ANY=[@ANYBLOB="8500000f7d00b7e1ff9724002ac8991601ad814eeb7b4fd5ee25ba83a72ba28f97cb0c9ad407e03f98a2f54eaabb372d8199ad6306ede43a67863593c59251df04459fa354dc3b820501f3ffb58bc4730f78e709652743498eae4839051b2c3d0510147acda9508c01c6dbdaf0a0ee718e67d02249d4d17ee4bbb35ba26fe4aba8fbbcc6d66b645c1671ebadcb84b4fe35d132e5f9a948606f334c3886bfbaf2a0bc045aa7f78f20f94bd9f0658ade293b596d237ddc80d851ec788ba03bdf1a552e3dff57c71a71f10e65802308ac57ae9ab961c16910be5f00c31095d821339125"], &(0x7f0000000340)='syzkaller\x00', 0x1, 0x82, &(0x7f0000000480)=""/130, 0x40f00, 0x4, [], 0x0, 0x10, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000000580)={0x4, 0x7, 0x6, 0xffffffff}, 0x10}, 0x70) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r6, 0xc0, &(0x7f0000000800)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)=0x4, 0x0, 0x0, 0x0, &(0x7f0000000440)={0x1, 0x4}, 0x0, 0x0, &(0x7f0000000740)={0x4, 0x3, 0x3, 0x553}, &(0x7f0000000780)=0x5, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=0x100000001}}, 0x10) socketpair$unix(0x1, 0x4, 0x0, &(0x7f0000000240)) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) r7 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r7, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) [ 997.791733][T19423] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 21:46:19 executing program 2: socket$kcm(0x2, 0x1, 0x84) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000900)=ANY=[@ANYBLOB="9f0d343f8f3672b246c5e3575e3bad29af7a982e5093be13037bae5e55d3901efcbad02c798684968abd7cd0f3463233c58a4171b61d275264b0c25a86770e422769c2240915668f9c27dcb8caa76b6b52bcf7f0234471abd5fa470b20eff96ea602ca594f7f1a08a7b251002c49eac4221ab3012d6c7c4d8505140e10"], 0x0, 0x7d}, 0x20) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz0\x00', 0x200002, 0x0) openat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) sendmsg$kcm(r2, 0x0, 0xfffffffffffffffc) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup/syz1\x00', 0x200002, 0x0) gettid() r3 = socket$kcm(0x11, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000000200)={&(0x7f0000000040)=@nfc, 0x80, 0x0}, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) mkdirat$cgroup(r4, 0x0, 0x1ff) socket$kcm(0x11, 0x2, 0x0) r5 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r5, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) 21:46:19 executing program 5: socket$kcm(0x2, 0x1, 0x84) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000900)=ANY=[@ANYBLOB="9f0d343f8f3672b246c5e3575e3bad29af7a982e5093be13037bae5e55d3901efcbad02c798684968abd7cd0f3463233c58a4171b61d275264b0c25a86770e422769c2240915668f9c27dcb8caa76b6b52bcf7f0234471abd5fa470b20eff96ea602ca594f7f1a08a7b251002c49eac4221ab3012d6c7c4d8505140e10"], 0x0, 0x7d}, 0x20) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz0\x00', 0x200002, 0x0) r2 = openat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) sendmsg$kcm(r3, 0x0, 0xfffffffffffffffc) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup/syz1\x00', 0x200002, 0x0) gettid() r4 = socket$kcm(0x11, 0x2, 0x0) sendmsg$kcm(r4, &(0x7f0000000200)={&(0x7f0000000040)=@nfc, 0x80, 0x0}, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) mkdirat$cgroup(r5, 0x0, 0x1ff) socket$kcm(0x11, 0x2, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r2, 0xc, 0x1, 0xd8, 0x0}, 0x20) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x2, 0x1c, &(0x7f0000000980)=ANY=[@ANYBLOB="8500000f7d00b7e1ff9724002ac8991601ad814eeb7b4fd5ee25ba83a72ba28f97cb0c9ad407e03f98a2f54eaabb372d8199ad6306ede43a67863593c59251df04459fa354dc3b820501f3ffb58bc4730f78e709652743498eae4839051b2c3d0510147acda9508c01c6dbdaf0a0ee718e67d02249d4d17ee4bbb35ba26fe4aba8fbbcc6d66b645c1671ebadcb84b4fe35d132e5f9a948606f334c3886bfbaf2a0bc045aa7f78f20f94bd9f0658ade293b596d237ddc80d851ec788ba03bdf1a552e3dff57c71a71f10e65802308ac57ae9ab961c16910be5f00c31095d821339125"], &(0x7f0000000340)='syzkaller\x00', 0x1, 0x82, &(0x7f0000000480)=""/130, 0x40f00, 0x4, [], 0x0, 0x10, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000000580)={0x4, 0x7, 0x6, 0xffffffff}, 0x10}, 0x70) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r6, 0xc0, &(0x7f0000000800)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)=0x4, 0x0, 0x0, 0x0, &(0x7f0000000440)={0x1, 0x4}, 0x0, 0x0, &(0x7f0000000740)={0x4, 0x3, 0x3, 0x553}, &(0x7f0000000780)=0x5, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=0x100000001}}, 0x10) syz_open_dev$adsp(&(0x7f0000000300)='/dev/adsp#\x00', 0x0, 0x10080) socketpair$unix(0x1, 0x4, 0x0, &(0x7f0000000240)) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) r7 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r7, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) 21:46:19 executing program 4: socket$kcm(0x2, 0x1, 0x84) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000900)=ANY=[@ANYBLOB="9f0d343f8f3672b246c5e3575e3bad29af7a982e5093be13037bae5e55d3901efcbad02c798684968abd7cd0f3463233c58a4171b61d275264b0c25a86770e422769c2240915668f9c27dcb8caa76b6b52bcf7f0234471abd5fa470b20eff96ea602ca594f7f1a08a7b251002c49eac4221ab3012d6c7c4d8505140e10"], 0x0, 0x7d}, 0x20) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz0\x00', 0x200002, 0x0) openat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) sendmsg$kcm(r2, 0x0, 0xfffffffffffffffc) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup/syz1\x00', 0x200002, 0x0) r3 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r3, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) [ 998.076619][T19430] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 998.209884][T19426] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 21:46:19 executing program 1: socket$kcm(0x2, 0x1, 0x84) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000900)=ANY=[@ANYBLOB="9f0d343f8f3672b246c5e3575e3bad29af7a982e5093be13037bae5e55d3901efcbad02c798684968abd7cd0f3463233c58a4171b61d275264b0c25a86770e422769c2240915668f9c27dcb8caa76b6b52bcf7f0234471abd5fa470b20eff96ea602ca594f7f1a08a7b251002c49eac4221ab3012d6c7c4d8505140e10"], 0x0, 0x7d}, 0x20) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz0\x00', 0x200002, 0x0) r2 = openat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) sendmsg$kcm(r3, 0x0, 0xfffffffffffffffc) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup/syz1\x00', 0x200002, 0x0) gettid() r4 = socket$kcm(0x11, 0x2, 0x0) sendmsg$kcm(r4, &(0x7f0000000200)={&(0x7f0000000040)=@nfc, 0x80, 0x0}, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) mkdirat$cgroup(r5, 0x0, 0x1ff) socket$kcm(0x11, 0x2, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r2, 0xc, 0x1, 0xd8, 0x0}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x2, 0x1c, &(0x7f0000000980)=ANY=[@ANYBLOB="8500000f7d00b7e1ff9724002ac8991601ad814eeb7b4fd5ee25ba83a72ba28f97cb0c9ad407e03f98a2f54eaabb372d8199ad6306ede43a67863593c59251df04459fa354dc3b820501f3ffb58bc4730f78e709652743498eae4839051b2c3d0510147acda9508c01c6dbdaf0a0ee718e67d02249d4d17ee4bbb35ba26fe4aba8fbbcc6d66b645c1671ebadcb84b4fe35d132e5f9a948606f334c3886bfbaf2a0bc045aa7f78f20f94bd9f0658ade293b596d237ddc80d851ec788ba03bdf1a552e3dff57c71a71f10e65802308ac57ae9ab961c16910be5f00c31095d821339125"], &(0x7f0000000340)='syzkaller\x00', 0x1, 0x82, &(0x7f0000000480)=""/130, 0x40f00, 0x4, [], 0x0, 0x10, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000000580)={0x4, 0x7, 0x6, 0xffffffff}, 0x10}, 0x70) socketpair$unix(0x1, 0x4, 0x0, &(0x7f0000000240)) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) r6 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r6, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) 21:46:19 executing program 2: socket$kcm(0x2, 0x1, 0x84) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000900)=ANY=[@ANYBLOB="9f0d343f8f3672b246c5e3575e3bad29af7a982e5093be13037bae5e55d3901efcbad02c798684968abd7cd0f3463233c58a4171b61d275264b0c25a86770e422769c2240915668f9c27dcb8caa76b6b52bcf7f0234471abd5fa470b20eff96ea602ca594f7f1a08a7b251002c49eac4221ab3012d6c7c4d8505140e10"], 0x0, 0x7d}, 0x20) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz0\x00', 0x200002, 0x0) openat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) sendmsg$kcm(r2, 0x0, 0xfffffffffffffffc) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup/syz1\x00', 0x200002, 0x0) gettid() r3 = socket$kcm(0x11, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000000200)={&(0x7f0000000040)=@nfc, 0x80, 0x0}, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) mkdirat$cgroup(r4, 0x0, 0x1ff) socket$kcm(0x11, 0x2, 0x0) r5 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r5, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) 21:46:19 executing program 4: socket$kcm(0x2, 0x1, 0x84) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000900)=ANY=[@ANYBLOB="9f0d343f8f3672b246c5e3575e3bad29af7a982e5093be13037bae5e55d3901efcbad02c798684968abd7cd0f3463233c58a4171b61d275264b0c25a86770e422769c2240915668f9c27dcb8caa76b6b52bcf7f0234471abd5fa470b20eff96ea602ca594f7f1a08a7b251002c49eac4221ab3012d6c7c4d8505140e10"], 0x0, 0x7d}, 0x20) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz0\x00', 0x200002, 0x0) openat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) sendmsg$kcm(r2, 0x0, 0xfffffffffffffffc) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup/syz1\x00', 0x200002, 0x0) r3 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r3, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) 21:46:19 executing program 5: socket$kcm(0x2, 0x1, 0x84) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000900)=ANY=[@ANYBLOB="9f0d343f8f3672b246c5e3575e3bad29af7a982e5093be13037bae5e55d3901efcbad02c798684968abd7cd0f3463233c58a4171b61d275264b0c25a86770e422769c2240915668f9c27dcb8caa76b6b52bcf7f0234471abd5fa470b20eff96ea602ca594f7f1a08a7b251002c49eac4221ab3012d6c7c4d8505140e10"], 0x0, 0x7d}, 0x20) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz0\x00', 0x200002, 0x0) openat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) sendmsg$kcm(r2, 0x0, 0xfffffffffffffffc) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup/syz1\x00', 0x200002, 0x0) gettid() r3 = socket$kcm(0x11, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000000200)={&(0x7f0000000040)=@nfc, 0x80, 0x0}, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) mkdirat$cgroup(r4, 0x0, 0x1ff) socket$kcm(0x11, 0x2, 0x0) r5 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r5, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) 21:46:19 executing program 3: socket$kcm(0x2, 0x1, 0x84) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000900)=ANY=[@ANYBLOB="9f0d343f8f3672b246c5e3575e3bad29af7a982e5093be13037bae5e55d3901efcbad02c798684968abd7cd0f3463233c58a4171b61d275264b0c25a86770e422769c2240915668f9c27dcb8caa76b6b52bcf7f0234471abd5fa470b20eff96ea602ca594f7f1a08a7b251002c49eac4221ab3012d6c7c4d8505140e10"], 0x0, 0x7d}, 0x20) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz0\x00', 0x200002, 0x0) r2 = openat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) sendmsg$kcm(r3, 0x0, 0xfffffffffffffffc) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup/syz1\x00', 0x200002, 0x0) gettid() r4 = socket$kcm(0x11, 0x2, 0x0) sendmsg$kcm(r4, &(0x7f0000000200)={&(0x7f0000000040)=@nfc, 0x80, 0x0}, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) mkdirat$cgroup(r5, 0x0, 0x1ff) socket$kcm(0x11, 0x2, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r2, 0xc, 0x1, 0xd8, 0x0}, 0x20) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x2, 0x1c, &(0x7f0000000980)=ANY=[@ANYBLOB="8500000f7d00b7e1ff9724002ac8991601ad814eeb7b4fd5ee25ba83a72ba28f97cb0c9ad407e03f98a2f54eaabb372d8199ad6306ede43a67863593c59251df04459fa354dc3b820501f3ffb58bc4730f78e709652743498eae4839051b2c3d0510147acda9508c01c6dbdaf0a0ee718e67d02249d4d17ee4bbb35ba26fe4aba8fbbcc6d66b645c1671ebadcb84b4fe35d132e5f9a948606f334c3886bfbaf2a0bc045aa7f78f20f94bd9f0658ade293b596d237ddc80d851ec788ba03bdf1a552e3dff57c71a71f10e65802308ac57ae9ab961c16910be5f00c31095d821339125"], &(0x7f0000000340)='syzkaller\x00', 0x1, 0x82, &(0x7f0000000480)=""/130, 0x40f00, 0x4, [], 0x0, 0x10, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000000580)={0x4, 0x7, 0x6, 0xffffffff}, 0x10}, 0x70) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r6, 0xc0, &(0x7f0000000800)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)=0x4, 0x0, 0x0, 0x0, &(0x7f0000000440)={0x1, 0x4}, 0x0, 0x0, &(0x7f0000000740)={0x4, 0x3, 0x3, 0x553}, &(0x7f0000000780)=0x5, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=0x100000001}}, 0x10) r7 = syz_open_dev$adsp(&(0x7f0000000300)='/dev/adsp#\x00', 0x0, 0x10080) write$FUSE_INTERRUPT(r7, &(0x7f0000000400)={0x10, 0x0, 0x5}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0xffffffffffffffcf) socketpair$unix(0x1, 0x4, 0x0, &(0x7f0000000240)) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) r8 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r8, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) [ 998.490881][T19443] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 21:46:20 executing program 4: socket$kcm(0x2, 0x1, 0x84) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000900)=ANY=[@ANYBLOB="9f0d343f8f3672b246c5e3575e3bad29af7a982e5093be13037bae5e55d3901efcbad02c798684968abd7cd0f3463233c58a4171b61d275264b0c25a86770e422769c2240915668f9c27dcb8caa76b6b52bcf7f0234471abd5fa470b20eff96ea602ca594f7f1a08a7b251002c49eac4221ab3012d6c7c4d8505140e10"], 0x0, 0x7d}, 0x20) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz0\x00', 0x200002, 0x0) openat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) sendmsg$kcm(r2, 0x0, 0xfffffffffffffffc) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup/syz1\x00', 0x200002, 0x0) r3 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r3, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) [ 998.594167][T19446] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 21:46:20 executing program 2: socket$kcm(0x2, 0x1, 0x84) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000900)=ANY=[@ANYBLOB="9f0d343f8f3672b246c5e3575e3bad29af7a982e5093be13037bae5e55d3901efcbad02c798684968abd7cd0f3463233c58a4171b61d275264b0c25a86770e422769c2240915668f9c27dcb8caa76b6b52bcf7f0234471abd5fa470b20eff96ea602ca594f7f1a08a7b251002c49eac4221ab3012d6c7c4d8505140e10"], 0x0, 0x7d}, 0x20) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz0\x00', 0x200002, 0x0) openat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) sendmsg$kcm(r2, 0x0, 0xfffffffffffffffc) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup/syz1\x00', 0x200002, 0x0) gettid() r3 = socket$kcm(0x11, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000000200)={&(0x7f0000000040)=@nfc, 0x80, 0x0}, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) mkdirat$cgroup(r4, 0x0, 0x1ff) r5 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r5, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) [ 998.750657][T19456] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 21:46:20 executing program 1: socket$kcm(0x2, 0x1, 0x84) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000900)=ANY=[@ANYBLOB="9f0d343f8f3672b246c5e3575e3bad29af7a982e5093be13037bae5e55d3901efcbad02c798684968abd7cd0f3463233c58a4171b61d275264b0c25a86770e422769c2240915668f9c27dcb8caa76b6b52bcf7f0234471abd5fa470b20eff96ea602ca594f7f1a08a7b251002c49eac4221ab3012d6c7c4d8505140e10"], 0x0, 0x7d}, 0x20) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz0\x00', 0x200002, 0x0) r2 = openat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) sendmsg$kcm(r3, 0x0, 0xfffffffffffffffc) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup/syz1\x00', 0x200002, 0x0) gettid() r4 = socket$kcm(0x11, 0x2, 0x0) sendmsg$kcm(r4, &(0x7f0000000200)={&(0x7f0000000040)=@nfc, 0x80, 0x0}, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) mkdirat$cgroup(r5, 0x0, 0x1ff) socket$kcm(0x11, 0x2, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r2, 0xc, 0x1, 0xd8, 0x0}, 0x20) socketpair$unix(0x1, 0x4, 0x0, &(0x7f0000000240)) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) r6 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r6, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) [ 998.826624][ T2836] libceph: connect (1)[d::]:6789 error -101 21:46:20 executing program 4: socket$kcm(0x2, 0x1, 0x84) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000900)=ANY=[@ANYBLOB="9f0d343f8f3672b246c5e3575e3bad29af7a982e5093be13037bae5e55d3901efcbad02c798684968abd7cd0f3463233c58a4171b61d275264b0c25a86770e422769c2240915668f9c27dcb8caa76b6b52bcf7f0234471abd5fa470b20eff96ea602ca594f7f1a08a7b251002c49eac4221ab3012d6c7c4d8505140e10"], 0x0, 0x7d}, 0x20) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz0\x00', 0x200002, 0x0) openat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) sendmsg$kcm(r2, 0x0, 0xfffffffffffffffc) gettid() r3 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r3, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) [ 998.869262][ T2836] libceph: mon0 (1)[d::]:6789 connect error [ 998.872012][T19460] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 21:46:20 executing program 5: socket$kcm(0x2, 0x1, 0x84) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000900)=ANY=[@ANYBLOB="9f0d343f8f3672b246c5e3575e3bad29af7a982e5093be13037bae5e55d3901efcbad02c798684968abd7cd0f3463233c58a4171b61d275264b0c25a86770e422769c2240915668f9c27dcb8caa76b6b52bcf7f0234471abd5fa470b20eff96ea602ca594f7f1a08a7b251002c49eac4221ab3012d6c7c4d8505140e10"], 0x0, 0x7d}, 0x20) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz0\x00', 0x200002, 0x0) openat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) sendmsg$kcm(r2, 0x0, 0xfffffffffffffffc) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup/syz1\x00', 0x200002, 0x0) r3 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r3, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) 21:46:20 executing program 3: socket$kcm(0x2, 0x1, 0x84) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000900)=ANY=[@ANYBLOB="9f0d343f8f3672b246c5e3575e3bad29af7a982e5093be13037bae5e55d3901efcbad02c798684968abd7cd0f3463233c58a4171b61d275264b0c25a86770e422769c2240915668f9c27dcb8caa76b6b52bcf7f0234471abd5fa470b20eff96ea602ca594f7f1a08a7b251002c49eac4221ab3012d6c7c4d8505140e10"], 0x0, 0x7d}, 0x20) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz0\x00', 0x200002, 0x0) r2 = openat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) sendmsg$kcm(r3, 0x0, 0xfffffffffffffffc) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup/syz1\x00', 0x200002, 0x0) gettid() r4 = socket$kcm(0x11, 0x2, 0x0) sendmsg$kcm(r4, &(0x7f0000000200)={&(0x7f0000000040)=@nfc, 0x80, 0x0}, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) mkdirat$cgroup(r5, 0x0, 0x1ff) socket$kcm(0x11, 0x2, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r2, 0xc, 0x1, 0xd8, 0x0}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x2, 0x1c, &(0x7f0000000980)=ANY=[@ANYBLOB="8500000f7d00b7e1ff9724002ac8991601ad814eeb7b4fd5ee25ba83a72ba28f97cb0c9ad407e03f98a2f54eaabb372d8199ad6306ede43a67863593c59251df04459fa354dc3b820501f3ffb58bc4730f78e709652743498eae4839051b2c3d0510147acda9508c01c6dbdaf0a0ee718e67d02249d4d17ee4bbb35ba26fe4aba8fbbcc6d66b645c1671ebadcb84b4fe35d132e5f9a948606f334c3886bfbaf2a0bc045aa7f78f20f94bd9f0658ade293b596d237ddc80d851ec788ba03bdf1a552e3dff57c71a71f10e65802308ac57ae9ab961c16910be5f00c31095d821339125"], &(0x7f0000000340)='syzkaller\x00', 0x1, 0x82, &(0x7f0000000480)=""/130, 0x40f00, 0x4, [], 0x0, 0x10, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000000580)={0x4, 0x7, 0x6, 0xffffffff}, 0x10}, 0x70) socketpair$unix(0x1, 0x4, 0x0, &(0x7f0000000240)) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) r6 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r6, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) 21:46:20 executing program 2: socket$kcm(0x2, 0x1, 0x84) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000900)=ANY=[@ANYBLOB="9f0d343f8f3672b246c5e3575e3bad29af7a982e5093be13037bae5e55d3901efcbad02c798684968abd7cd0f3463233c58a4171b61d275264b0c25a86770e422769c2240915668f9c27dcb8caa76b6b52bcf7f0234471abd5fa470b20eff96ea602ca594f7f1a08a7b251002c49eac4221ab3012d6c7c4d8505140e10"], 0x0, 0x7d}, 0x20) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz0\x00', 0x200002, 0x0) openat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) sendmsg$kcm(r2, 0x0, 0xfffffffffffffffc) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup/syz1\x00', 0x200002, 0x0) gettid() r3 = socket$kcm(0x11, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000000200)={&(0x7f0000000040)=@nfc, 0x80, 0x0}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r4 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r4, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) [ 999.141831][T19463] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 21:46:20 executing program 4: socket$kcm(0x2, 0x1, 0x84) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000900)=ANY=[@ANYBLOB="9f0d343f8f3672b246c5e3575e3bad29af7a982e5093be13037bae5e55d3901efcbad02c798684968abd7cd0f3463233c58a4171b61d275264b0c25a86770e422769c2240915668f9c27dcb8caa76b6b52bcf7f0234471abd5fa470b20eff96ea602ca594f7f1a08a7b251002c49eac4221ab3012d6c7c4d8505140e10"], 0x0, 0x7d}, 0x20) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz0\x00', 0x200002, 0x0) openat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) sendmsg$kcm(r2, 0x0, 0xfffffffffffffffc) gettid() r3 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r3, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) [ 999.233160][T19473] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 21:46:20 executing program 1: socket$kcm(0x2, 0x1, 0x84) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000900)=ANY=[@ANYBLOB="9f0d343f8f3672b246c5e3575e3bad29af7a982e5093be13037bae5e55d3901efcbad02c798684968abd7cd0f3463233c58a4171b61d275264b0c25a86770e422769c2240915668f9c27dcb8caa76b6b52bcf7f0234471abd5fa470b20eff96ea602ca594f7f1a08a7b251002c49eac4221ab3012d6c7c4d8505140e10"], 0x0, 0x7d}, 0x20) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz0\x00', 0x200002, 0x0) openat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) sendmsg$kcm(r2, 0x0, 0xfffffffffffffffc) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup/syz1\x00', 0x200002, 0x0) gettid() r3 = socket$kcm(0x11, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000000200)={&(0x7f0000000040)=@nfc, 0x80, 0x0}, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) mkdirat$cgroup(r4, 0x0, 0x1ff) socket$kcm(0x11, 0x2, 0x0) socketpair$unix(0x1, 0x4, 0x0, &(0x7f0000000240)) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) r5 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r5, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) [ 999.293206][T19472] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 21:46:20 executing program 2: socket$kcm(0x2, 0x1, 0x84) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000900)=ANY=[@ANYBLOB="9f0d343f8f3672b246c5e3575e3bad29af7a982e5093be13037bae5e55d3901efcbad02c798684968abd7cd0f3463233c58a4171b61d275264b0c25a86770e422769c2240915668f9c27dcb8caa76b6b52bcf7f0234471abd5fa470b20eff96ea602ca594f7f1a08a7b251002c49eac4221ab3012d6c7c4d8505140e10"], 0x0, 0x7d}, 0x20) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz0\x00', 0x200002, 0x0) openat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) sendmsg$kcm(r2, 0x0, 0xfffffffffffffffc) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup/syz1\x00', 0x200002, 0x0) gettid() r3 = socket$kcm(0x11, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000000200)={&(0x7f0000000040)=@nfc, 0x80, 0x0}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r4 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r4, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) 21:46:20 executing program 5: socket$kcm(0x2, 0x1, 0x84) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000900)=ANY=[@ANYBLOB="9f0d343f8f3672b246c5e3575e3bad29af7a982e5093be13037bae5e55d3901efcbad02c798684968abd7cd0f3463233c58a4171b61d275264b0c25a86770e422769c2240915668f9c27dcb8caa76b6b52bcf7f0234471abd5fa470b20eff96ea602ca594f7f1a08a7b251002c49eac4221ab3012d6c7c4d8505140e10"], 0x0, 0x7d}, 0x20) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz0\x00', 0x200002, 0x0) r2 = openat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) sendmsg$kcm(r3, 0x0, 0xfffffffffffffffc) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup/syz1\x00', 0x200002, 0x0) gettid() r4 = socket$kcm(0x11, 0x2, 0x0) sendmsg$kcm(r4, &(0x7f0000000200)={&(0x7f0000000040)=@nfc, 0x80, 0x0}, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) mkdirat$cgroup(r5, 0x0, 0x1ff) socket$kcm(0x11, 0x2, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r2, 0xc, 0x1, 0xd8, 0x0}, 0x20) socketpair$unix(0x1, 0x4, 0x0, &(0x7f0000000240)) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) r6 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r6, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) [ 999.477925][T19481] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 21:46:20 executing program 3: socket$kcm(0x2, 0x1, 0x84) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000900)=ANY=[@ANYBLOB="9f0d343f8f3672b246c5e3575e3bad29af7a982e5093be13037bae5e55d3901efcbad02c798684968abd7cd0f3463233c58a4171b61d275264b0c25a86770e422769c2240915668f9c27dcb8caa76b6b52bcf7f0234471abd5fa470b20eff96ea602ca594f7f1a08a7b251002c49eac4221ab3012d6c7c4d8505140e10"], 0x0, 0x7d}, 0x20) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz0\x00', 0x200002, 0x0) openat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) sendmsg$kcm(r2, 0x0, 0xfffffffffffffffc) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup/syz1\x00', 0x200002, 0x0) gettid() r3 = socket$kcm(0x11, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000000200)={&(0x7f0000000040)=@nfc, 0x80, 0x0}, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) mkdirat$cgroup(r4, 0x0, 0x1ff) r5 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r5, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) 21:46:21 executing program 1: socket$kcm(0x2, 0x1, 0x84) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000900)=ANY=[@ANYBLOB="9f0d343f8f3672b246c5e3575e3bad29af7a982e5093be13037bae5e55d3901efcbad02c798684968abd7cd0f3463233c58a4171b61d275264b0c25a86770e422769c2240915668f9c27dcb8caa76b6b52bcf7f0234471abd5fa470b20eff96ea602ca594f7f1a08a7b251002c49eac4221ab3012d6c7c4d8505140e10"], 0x0, 0x7d}, 0x20) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz0\x00', 0x200002, 0x0) openat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) sendmsg$kcm(r2, 0x0, 0xfffffffffffffffc) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup/syz1\x00', 0x200002, 0x0) gettid() r3 = socket$kcm(0x11, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000000200)={&(0x7f0000000040)=@nfc, 0x80, 0x0}, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) mkdirat$cgroup(r4, 0x0, 0x1ff) socket$kcm(0x11, 0x2, 0x0) socketpair$unix(0x1, 0x4, 0x0, &(0x7f0000000240)) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) r5 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r5, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) 21:46:21 executing program 4: socket$kcm(0x2, 0x1, 0x84) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000900)=ANY=[@ANYBLOB="9f0d343f8f3672b246c5e3575e3bad29af7a982e5093be13037bae5e55d3901efcbad02c798684968abd7cd0f3463233c58a4171b61d275264b0c25a86770e422769c2240915668f9c27dcb8caa76b6b52bcf7f0234471abd5fa470b20eff96ea602ca594f7f1a08a7b251002c49eac4221ab3012d6c7c4d8505140e10"], 0x0, 0x7d}, 0x20) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz0\x00', 0x200002, 0x0) openat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) sendmsg$kcm(r2, 0x0, 0xfffffffffffffffc) gettid() r3 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r3, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) [ 999.600959][T19522] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 21:46:21 executing program 2: socket$kcm(0x2, 0x1, 0x84) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000900)=ANY=[@ANYBLOB="9f0d343f8f3672b246c5e3575e3bad29af7a982e5093be13037bae5e55d3901efcbad02c798684968abd7cd0f3463233c58a4171b61d275264b0c25a86770e422769c2240915668f9c27dcb8caa76b6b52bcf7f0234471abd5fa470b20eff96ea602ca594f7f1a08a7b251002c49eac4221ab3012d6c7c4d8505140e10"], 0x0, 0x7d}, 0x20) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz0\x00', 0x200002, 0x0) openat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) sendmsg$kcm(r2, 0x0, 0xfffffffffffffffc) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup/syz1\x00', 0x200002, 0x0) gettid() r3 = socket$kcm(0x11, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000000200)={&(0x7f0000000040)=@nfc, 0x80, 0x0}, 0x0) r4 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r4, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) [ 999.780189][ T2836] libceph: connect (1)[d::]:6789 error -101 [ 999.786220][ T2836] libceph: mon0 (1)[d::]:6789 connect error [ 999.810562][T19596] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 21:46:21 executing program 5: socket$kcm(0x2, 0x1, 0x84) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000900)=ANY=[@ANYBLOB="9f0d343f8f3672b246c5e3575e3bad29af7a982e5093be13037bae5e55d3901efcbad02c798684968abd7cd0f3463233c58a4171b61d275264b0c25a86770e422769c2240915668f9c27dcb8caa76b6b52bcf7f0234471abd5fa470b20eff96ea602ca594f7f1a08a7b251002c49eac4221ab3012d6c7c4d8505140e10"], 0x0, 0x7d}, 0x20) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz0\x00', 0x200002, 0x0) openat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) sendmsg$kcm(r2, 0x0, 0xfffffffffffffffc) gettid() r3 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r3, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) 21:46:21 executing program 3: socket$kcm(0x2, 0x1, 0x84) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000900)=ANY=[@ANYBLOB="9f0d343f8f3672b246c5e3575e3bad29af7a982e5093be13037bae5e55d3901efcbad02c798684968abd7cd0f3463233c58a4171b61d275264b0c25a86770e422769c2240915668f9c27dcb8caa76b6b52bcf7f0234471abd5fa470b20eff96ea602ca594f7f1a08a7b251002c49eac4221ab3012d6c7c4d8505140e10"], 0x0, 0x7d}, 0x20) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz0\x00', 0x200002, 0x0) openat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) sendmsg$kcm(r2, 0x0, 0xfffffffffffffffc) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup/syz1\x00', 0x200002, 0x0) gettid() r3 = socket$kcm(0x11, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000000200)={&(0x7f0000000040)=@nfc, 0x80, 0x0}, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) mkdirat$cgroup(r4, 0x0, 0x1ff) socket$kcm(0x11, 0x2, 0x0) r5 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r5, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) 21:46:21 executing program 1: socket$kcm(0x2, 0x1, 0x84) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000900)=ANY=[@ANYBLOB="9f0d343f8f3672b246c5e3575e3bad29af7a982e5093be13037bae5e55d3901efcbad02c798684968abd7cd0f3463233c58a4171b61d275264b0c25a86770e422769c2240915668f9c27dcb8caa76b6b52bcf7f0234471abd5fa470b20eff96ea602ca594f7f1a08a7b251002c49eac4221ab3012d6c7c4d8505140e10"], 0x0, 0x7d}, 0x20) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz0\x00', 0x200002, 0x0) openat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) sendmsg$kcm(r2, 0x0, 0xfffffffffffffffc) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup/syz1\x00', 0x200002, 0x0) gettid() r3 = socket$kcm(0x11, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000000200)={&(0x7f0000000040)=@nfc, 0x80, 0x0}, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) mkdirat$cgroup(r4, 0x0, 0x1ff) socket$kcm(0x11, 0x2, 0x0) socketpair$unix(0x1, 0x4, 0x0, &(0x7f0000000240)) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) r5 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r5, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) [ 999.990459][T19601] __nla_validate_parse: 37 callbacks suppressed [ 999.990736][T19601] netlink: 22 bytes leftover after parsing attributes in process `syz-executor.2'. 21:46:21 executing program 4: socket$kcm(0x2, 0x1, 0x84) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000900)=ANY=[@ANYBLOB="9f0d343f8f3672b246c5e3575e3bad29af7a982e5093be13037bae5e55d3901efcbad02c798684968abd7cd0f3463233c58a4171b61d275264b0c25a86770e422769c2240915668f9c27dcb8caa76b6b52bcf7f0234471abd5fa470b20eff96ea602ca594f7f1a08a7b251002c49eac4221ab3012d6c7c4d8505140e10"], 0x0, 0x7d}, 0x20) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz0\x00', 0x200002, 0x0) openat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) gettid() r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) [ 1000.060734][T19602] netlink: 22 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1000.133424][T19601] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 1000.203199][T19608] netlink: 22 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1000.237026][T19608] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 21:46:21 executing program 2: socket$kcm(0x2, 0x1, 0x84) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000900)=ANY=[@ANYBLOB="9f0d343f8f3672b246c5e3575e3bad29af7a982e5093be13037bae5e55d3901efcbad02c798684968abd7cd0f3463233c58a4171b61d275264b0c25a86770e422769c2240915668f9c27dcb8caa76b6b52bcf7f0234471abd5fa470b20eff96ea602ca594f7f1a08a7b251002c49eac4221ab3012d6c7c4d8505140e10"], 0x0, 0x7d}, 0x20) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz0\x00', 0x200002, 0x0) openat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) sendmsg$kcm(r2, 0x0, 0xfffffffffffffffc) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup/syz1\x00', 0x200002, 0x0) gettid() socket$kcm(0x11, 0x2, 0x0) r3 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r3, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) 21:46:21 executing program 5: socket$kcm(0x2, 0x1, 0x84) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000900)=ANY=[@ANYBLOB="9f0d343f8f3672b246c5e3575e3bad29af7a982e5093be13037bae5e55d3901efcbad02c798684968abd7cd0f3463233c58a4171b61d275264b0c25a86770e422769c2240915668f9c27dcb8caa76b6b52bcf7f0234471abd5fa470b20eff96ea602ca594f7f1a08a7b251002c49eac4221ab3012d6c7c4d8505140e10"], 0x0, 0x7d}, 0x20) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz0\x00', 0x200002, 0x0) openat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) sendmsg$kcm(r2, 0x0, 0xfffffffffffffffc) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup/syz1\x00', 0x200002, 0x0) gettid() r3 = socket$kcm(0x11, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000000200)={&(0x7f0000000040)=@nfc, 0x80, 0x0}, 0x0) r4 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r4, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) [ 1000.293551][T19609] netlink: 22 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1000.307027][T19611] netlink: 22 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1000.346538][T19609] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 21:46:21 executing program 3: socket$kcm(0x2, 0x1, 0x84) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000900)=ANY=[@ANYBLOB="9f0d343f8f3672b246c5e3575e3bad29af7a982e5093be13037bae5e55d3901efcbad02c798684968abd7cd0f3463233c58a4171b61d275264b0c25a86770e422769c2240915668f9c27dcb8caa76b6b52bcf7f0234471abd5fa470b20eff96ea602ca594f7f1a08a7b251002c49eac4221ab3012d6c7c4d8505140e10"], 0x0, 0x7d}, 0x20) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz0\x00', 0x200002, 0x0) openat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) sendmsg$kcm(r2, 0x0, 0xfffffffffffffffc) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup/syz1\x00', 0x200002, 0x0) gettid() r3 = socket$kcm(0x11, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000000200)={&(0x7f0000000040)=@nfc, 0x80, 0x0}, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) mkdirat$cgroup(r4, 0x0, 0x1ff) socket$kcm(0x11, 0x2, 0x0) r5 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r5, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) 21:46:21 executing program 4: socket$kcm(0x2, 0x1, 0x84) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000900)=ANY=[@ANYBLOB="9f0d343f8f3672b246c5e3575e3bad29af7a982e5093be13037bae5e55d3901efcbad02c798684968abd7cd0f3463233c58a4171b61d275264b0c25a86770e422769c2240915668f9c27dcb8caa76b6b52bcf7f0234471abd5fa470b20eff96ea602ca594f7f1a08a7b251002c49eac4221ab3012d6c7c4d8505140e10"], 0x0, 0x7d}, 0x20) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz0\x00', 0x200002, 0x0) openat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) gettid() r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) [ 1000.533436][T19617] netlink: 22 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1000.624810][T19617] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 21:46:22 executing program 1: socket$kcm(0x2, 0x1, 0x84) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000900)=ANY=[@ANYBLOB="9f0d343f8f3672b246c5e3575e3bad29af7a982e5093be13037bae5e55d3901efcbad02c798684968abd7cd0f3463233c58a4171b61d275264b0c25a86770e422769c2240915668f9c27dcb8caa76b6b52bcf7f0234471abd5fa470b20eff96ea602ca594f7f1a08a7b251002c49eac4221ab3012d6c7c4d8505140e10"], 0x0, 0x7d}, 0x20) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz0\x00', 0x200002, 0x0) openat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) sendmsg$kcm(r2, 0x0, 0xfffffffffffffffc) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup/syz1\x00', 0x200002, 0x0) gettid() r3 = socket$kcm(0x11, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000000200)={&(0x7f0000000040)=@nfc, 0x80, 0x0}, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) mkdirat$cgroup(r4, 0x0, 0x1ff) socketpair$unix(0x1, 0x4, 0x0, &(0x7f0000000240)) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) r5 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r5, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) [ 1000.708399][T19623] netlink: 22 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1000.746592][T19625] netlink: 22 bytes leftover after parsing attributes in process `syz-executor.3'. 21:46:22 executing program 5: socket$kcm(0x2, 0x1, 0x84) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000900)=ANY=[@ANYBLOB="9f0d343f8f3672b246c5e3575e3bad29af7a982e5093be13037bae5e55d3901efcbad02c798684968abd7cd0f3463233c58a4171b61d275264b0c25a86770e422769c2240915668f9c27dcb8caa76b6b52bcf7f0234471abd5fa470b20eff96ea602ca594f7f1a08a7b251002c49eac4221ab3012d6c7c4d8505140e10"], 0x0, 0x7d}, 0x20) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz0\x00', 0x200002, 0x0) openat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) sendmsg$kcm(r2, 0x0, 0xfffffffffffffffc) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup/syz1\x00', 0x200002, 0x0) gettid() r3 = socket$kcm(0x11, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000000200)={&(0x7f0000000040)=@nfc, 0x80, 0x0}, 0x0) r4 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r4, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) [ 1000.753869][T19623] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 21:46:22 executing program 2: socket$kcm(0x2, 0x1, 0x84) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000900)=ANY=[@ANYBLOB="9f0d343f8f3672b246c5e3575e3bad29af7a982e5093be13037bae5e55d3901efcbad02c798684968abd7cd0f3463233c58a4171b61d275264b0c25a86770e422769c2240915668f9c27dcb8caa76b6b52bcf7f0234471abd5fa470b20eff96ea602ca594f7f1a08a7b251002c49eac4221ab3012d6c7c4d8505140e10"], 0x0, 0x7d}, 0x20) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz0\x00', 0x200002, 0x0) openat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) sendmsg$kcm(r2, 0x0, 0xfffffffffffffffc) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup/syz1\x00', 0x200002, 0x0) gettid() r3 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r3, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) [ 1000.816905][T19627] netlink: 22 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1000.828901][ T2836] libceph: connect (1)[d::]:6789 error -101 [ 1000.836604][ T2836] libceph: mon0 (1)[d::]:6789 connect error [ 1000.866122][T19630] netlink: 22 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1000.886311][T19627] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 21:46:22 executing program 4: socket$kcm(0x2, 0x1, 0x84) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000900)=ANY=[@ANYBLOB="9f0d343f8f3672b246c5e3575e3bad29af7a982e5093be13037bae5e55d3901efcbad02c798684968abd7cd0f3463233c58a4171b61d275264b0c25a86770e422769c2240915668f9c27dcb8caa76b6b52bcf7f0234471abd5fa470b20eff96ea602ca594f7f1a08a7b251002c49eac4221ab3012d6c7c4d8505140e10"], 0x0, 0x7d}, 0x20) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz0\x00', 0x200002, 0x0) openat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) gettid() r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) 21:46:22 executing program 3: socket$kcm(0x2, 0x1, 0x84) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000900)=ANY=[@ANYBLOB="9f0d343f8f3672b246c5e3575e3bad29af7a982e5093be13037bae5e55d3901efcbad02c798684968abd7cd0f3463233c58a4171b61d275264b0c25a86770e422769c2240915668f9c27dcb8caa76b6b52bcf7f0234471abd5fa470b20eff96ea602ca594f7f1a08a7b251002c49eac4221ab3012d6c7c4d8505140e10"], 0x0, 0x7d}, 0x20) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz0\x00', 0x200002, 0x0) openat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) sendmsg$kcm(r2, 0x0, 0xfffffffffffffffc) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup/syz1\x00', 0x200002, 0x0) gettid() r3 = socket$kcm(0x11, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000000200)={&(0x7f0000000040)=@nfc, 0x80, 0x0}, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) mkdirat$cgroup(r4, 0x0, 0x1ff) socket$kcm(0x11, 0x2, 0x0) socketpair$unix(0x1, 0x4, 0x0, &(0x7f0000000240)) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) r5 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r5, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) [ 1001.074685][T19633] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 21:46:22 executing program 5: socket$kcm(0x2, 0x1, 0x84) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000900)=ANY=[@ANYBLOB="9f0d343f8f3672b246c5e3575e3bad29af7a982e5093be13037bae5e55d3901efcbad02c798684968abd7cd0f3463233c58a4171b61d275264b0c25a86770e422769c2240915668f9c27dcb8caa76b6b52bcf7f0234471abd5fa470b20eff96ea602ca594f7f1a08a7b251002c49eac4221ab3012d6c7c4d8505140e10"], 0x0, 0x7d}, 0x20) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz0\x00', 0x200002, 0x0) openat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) sendmsg$kcm(r2, 0x0, 0xfffffffffffffffc) gettid() r3 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r3, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) 21:46:22 executing program 1: socket$kcm(0x2, 0x1, 0x84) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000900)=ANY=[@ANYBLOB="9f0d343f8f3672b246c5e3575e3bad29af7a982e5093be13037bae5e55d3901efcbad02c798684968abd7cd0f3463233c58a4171b61d275264b0c25a86770e422769c2240915668f9c27dcb8caa76b6b52bcf7f0234471abd5fa470b20eff96ea602ca594f7f1a08a7b251002c49eac4221ab3012d6c7c4d8505140e10"], 0x0, 0x7d}, 0x20) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz0\x00', 0x200002, 0x0) openat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) sendmsg$kcm(r2, 0x0, 0xfffffffffffffffc) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup/syz1\x00', 0x200002, 0x0) gettid() r3 = socket$kcm(0x11, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000000200)={&(0x7f0000000040)=@nfc, 0x80, 0x0}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) socketpair$unix(0x1, 0x4, 0x0, &(0x7f0000000240)) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) r4 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r4, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) [ 1001.235174][T19637] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 21:46:22 executing program 2: socket$kcm(0x2, 0x1, 0x84) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000900)=ANY=[@ANYBLOB="9f0d343f8f3672b246c5e3575e3bad29af7a982e5093be13037bae5e55d3901efcbad02c798684968abd7cd0f3463233c58a4171b61d275264b0c25a86770e422769c2240915668f9c27dcb8caa76b6b52bcf7f0234471abd5fa470b20eff96ea602ca594f7f1a08a7b251002c49eac4221ab3012d6c7c4d8505140e10"], 0x0, 0x7d}, 0x20) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz0\x00', 0x200002, 0x0) openat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) sendmsg$kcm(r2, 0x0, 0xfffffffffffffffc) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup/syz1\x00', 0x200002, 0x0) r3 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r3, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) [ 1001.293338][T19646] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 21:46:22 executing program 4: socket$kcm(0x2, 0x1, 0x84) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000900)=ANY=[@ANYBLOB="9f0d343f8f3672b246c5e3575e3bad29af7a982e5093be13037bae5e55d3901efcbad02c798684968abd7cd0f3463233c58a4171b61d275264b0c25a86770e422769c2240915668f9c27dcb8caa76b6b52bcf7f0234471abd5fa470b20eff96ea602ca594f7f1a08a7b251002c49eac4221ab3012d6c7c4d8505140e10"], 0x0, 0x7d}, 0x20) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz0\x00', 0x200002, 0x0) gettid() r1 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r1, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) [ 1001.418356][T19641] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 21:46:22 executing program 1: socket$kcm(0x2, 0x1, 0x84) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000900)=ANY=[@ANYBLOB="9f0d343f8f3672b246c5e3575e3bad29af7a982e5093be13037bae5e55d3901efcbad02c798684968abd7cd0f3463233c58a4171b61d275264b0c25a86770e422769c2240915668f9c27dcb8caa76b6b52bcf7f0234471abd5fa470b20eff96ea602ca594f7f1a08a7b251002c49eac4221ab3012d6c7c4d8505140e10"], 0x0, 0x7d}, 0x20) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz0\x00', 0x200002, 0x0) openat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) sendmsg$kcm(r2, 0x0, 0xfffffffffffffffc) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup/syz1\x00', 0x200002, 0x0) gettid() r3 = socket$kcm(0x11, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000000200)={&(0x7f0000000040)=@nfc, 0x80, 0x0}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) socketpair$unix(0x1, 0x4, 0x0, &(0x7f0000000240)) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) r4 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r4, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) 21:46:22 executing program 5: socket$kcm(0x2, 0x1, 0x84) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000900)=ANY=[@ANYBLOB="9f0d343f8f3672b246c5e3575e3bad29af7a982e5093be13037bae5e55d3901efcbad02c798684968abd7cd0f3463233c58a4171b61d275264b0c25a86770e422769c2240915668f9c27dcb8caa76b6b52bcf7f0234471abd5fa470b20eff96ea602ca594f7f1a08a7b251002c49eac4221ab3012d6c7c4d8505140e10"], 0x0, 0x7d}, 0x20) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz0\x00', 0x200002, 0x0) openat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) sendmsg$kcm(r2, 0x0, 0xfffffffffffffffc) gettid() r3 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r3, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) 21:46:22 executing program 2: socket$kcm(0x2, 0x1, 0x84) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000900)=ANY=[@ANYBLOB="9f0d343f8f3672b246c5e3575e3bad29af7a982e5093be13037bae5e55d3901efcbad02c798684968abd7cd0f3463233c58a4171b61d275264b0c25a86770e422769c2240915668f9c27dcb8caa76b6b52bcf7f0234471abd5fa470b20eff96ea602ca594f7f1a08a7b251002c49eac4221ab3012d6c7c4d8505140e10"], 0x0, 0x7d}, 0x20) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz0\x00', 0x200002, 0x0) openat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) sendmsg$kcm(r2, 0x0, 0xfffffffffffffffc) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup/syz1\x00', 0x200002, 0x0) r3 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r3, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) [ 1001.627293][T19757] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 21:46:23 executing program 3: socket$kcm(0x2, 0x1, 0x84) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000900)=ANY=[@ANYBLOB="9f0d343f8f3672b246c5e3575e3bad29af7a982e5093be13037bae5e55d3901efcbad02c798684968abd7cd0f3463233c58a4171b61d275264b0c25a86770e422769c2240915668f9c27dcb8caa76b6b52bcf7f0234471abd5fa470b20eff96ea602ca594f7f1a08a7b251002c49eac4221ab3012d6c7c4d8505140e10"], 0x0, 0x7d}, 0x20) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz0\x00', 0x200002, 0x0) openat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) sendmsg$kcm(r2, 0x0, 0xfffffffffffffffc) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup/syz1\x00', 0x200002, 0x0) gettid() r3 = socket$kcm(0x11, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000000200)={&(0x7f0000000040)=@nfc, 0x80, 0x0}, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) mkdirat$cgroup(r4, 0x0, 0x1ff) socket$kcm(0x11, 0x2, 0x0) socketpair$unix(0x1, 0x4, 0x0, &(0x7f0000000240)) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) r5 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r5, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) [ 1001.703416][T19761] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 21:46:23 executing program 5: socket$kcm(0x2, 0x1, 0x84) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000900)=ANY=[@ANYBLOB="9f0d343f8f3672b246c5e3575e3bad29af7a982e5093be13037bae5e55d3901efcbad02c798684968abd7cd0f3463233c58a4171b61d275264b0c25a86770e422769c2240915668f9c27dcb8caa76b6b52bcf7f0234471abd5fa470b20eff96ea602ca594f7f1a08a7b251002c49eac4221ab3012d6c7c4d8505140e10"], 0x0, 0x7d}, 0x20) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz0\x00', 0x200002, 0x0) r2 = openat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) sendmsg$kcm(r3, 0x0, 0xfffffffffffffffc) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup/syz1\x00', 0x200002, 0x0) gettid() r4 = socket$kcm(0x11, 0x2, 0x0) sendmsg$kcm(r4, &(0x7f0000000200)={&(0x7f0000000040)=@nfc, 0x80, 0x0}, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) mkdirat$cgroup(r5, 0x0, 0x1ff) socket$kcm(0x11, 0x2, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r2, 0xc, 0x1, 0xd8, 0x0}, 0x20) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x2, 0x1c, &(0x7f0000000980)=ANY=[@ANYBLOB="8500000f7d00b7e1ff9724002ac8991601ad814eeb7b4fd5ee25ba83a72ba28f97cb0c9ad407e03f98a2f54eaabb372d8199ad6306ede43a67863593c59251df04459fa354dc3b820501f3ffb58bc4730f78e709652743498eae4839051b2c3d0510147acda9508c01c6dbdaf0a0ee718e67d02249d4d17ee4bbb35ba26fe4aba8fbbcc6d66b645c1671ebadcb84b4fe35d132e5f9a948606f334c3886bfbaf2a0bc045aa7f78f20f94bd9f0658ade293b596d237ddc80d851ec788ba03bdf1a552e3dff57c71a71f10e65802308ac57ae9ab961c16910be5f00c31095d821339125"], &(0x7f0000000340)='syzkaller\x00', 0x1, 0x82, &(0x7f0000000480)=""/130, 0x40f00, 0x4, [], 0x0, 0x10, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000000580)={0x4, 0x7, 0x6, 0xffffffff}, 0x10}, 0x70) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r6, 0xc0, &(0x7f0000000800)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)=0x4, 0x0, 0x0, 0x0, &(0x7f0000000440)={0x1, 0x4}, 0x0, 0x0, &(0x7f0000000740)={0x4, 0x3, 0x3, 0x553}, &(0x7f0000000780)=0x5, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=0x100000001}}, 0x10) socketpair$unix(0x1, 0x4, 0x0, &(0x7f0000000240)) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) r7 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r7, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) 21:46:23 executing program 4: socket$kcm(0x2, 0x1, 0x84) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000900)=ANY=[@ANYBLOB="9f0d343f8f3672b246c5e3575e3bad29af7a982e5093be13037bae5e55d3901efcbad02c798684968abd7cd0f3463233c58a4171b61d275264b0c25a86770e422769c2240915668f9c27dcb8caa76b6b52bcf7f0234471abd5fa470b20eff96ea602ca594f7f1a08a7b251002c49eac4221ab3012d6c7c4d8505140e10"], 0x0, 0x7d}, 0x20) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() r1 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r1, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) 21:46:23 executing program 2: socket$kcm(0x2, 0x1, 0x84) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000900)=ANY=[@ANYBLOB="9f0d343f8f3672b246c5e3575e3bad29af7a982e5093be13037bae5e55d3901efcbad02c798684968abd7cd0f3463233c58a4171b61d275264b0c25a86770e422769c2240915668f9c27dcb8caa76b6b52bcf7f0234471abd5fa470b20eff96ea602ca594f7f1a08a7b251002c49eac4221ab3012d6c7c4d8505140e10"], 0x0, 0x7d}, 0x20) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz0\x00', 0x200002, 0x0) openat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) sendmsg$kcm(r2, 0x0, 0xfffffffffffffffc) r3 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r3, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) 21:46:23 executing program 1: socket$kcm(0x2, 0x1, 0x84) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000900)=ANY=[@ANYBLOB="9f0d343f8f3672b246c5e3575e3bad29af7a982e5093be13037bae5e55d3901efcbad02c798684968abd7cd0f3463233c58a4171b61d275264b0c25a86770e422769c2240915668f9c27dcb8caa76b6b52bcf7f0234471abd5fa470b20eff96ea602ca594f7f1a08a7b251002c49eac4221ab3012d6c7c4d8505140e10"], 0x0, 0x7d}, 0x20) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz0\x00', 0x200002, 0x0) openat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) sendmsg$kcm(r2, 0x0, 0xfffffffffffffffc) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup/syz1\x00', 0x200002, 0x0) gettid() r3 = socket$kcm(0x11, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000000200)={&(0x7f0000000040)=@nfc, 0x80, 0x0}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) socketpair$unix(0x1, 0x4, 0x0, &(0x7f0000000240)) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) r4 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r4, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) [ 1001.938807][T19866] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 21:46:23 executing program 4: socket$kcm(0x2, 0x1, 0x84) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000900)=ANY=[@ANYBLOB="9f0d343f8f3672b246c5e3575e3bad29af7a982e5093be13037bae5e55d3901efcbad02c798684968abd7cd0f3463233c58a4171b61d275264b0c25a86770e422769c2240915668f9c27dcb8caa76b6b52bcf7f0234471abd5fa470b20eff96ea602ca594f7f1a08a7b251002c49eac4221ab3012d6c7c4d8505140e10"], 0x0, 0x7d}, 0x20) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() r1 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r1, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) [ 1002.122860][T19874] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 21:46:23 executing program 3: socket$kcm(0x2, 0x1, 0x84) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000900)=ANY=[@ANYBLOB="9f0d343f8f3672b246c5e3575e3bad29af7a982e5093be13037bae5e55d3901efcbad02c798684968abd7cd0f3463233c58a4171b61d275264b0c25a86770e422769c2240915668f9c27dcb8caa76b6b52bcf7f0234471abd5fa470b20eff96ea602ca594f7f1a08a7b251002c49eac4221ab3012d6c7c4d8505140e10"], 0x0, 0x7d}, 0x20) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz0\x00', 0x200002, 0x0) openat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) sendmsg$kcm(r2, 0x0, 0xfffffffffffffffc) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup/syz1\x00', 0x200002, 0x0) gettid() r3 = socket$kcm(0x11, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000000200)={&(0x7f0000000040)=@nfc, 0x80, 0x0}, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) mkdirat$cgroup(r4, 0x0, 0x1ff) socket$kcm(0x11, 0x2, 0x0) socketpair$unix(0x1, 0x4, 0x0, &(0x7f0000000240)) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) r5 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r5, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) [ 1002.214803][T19876] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 21:46:23 executing program 1: socket$kcm(0x2, 0x1, 0x84) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000900)=ANY=[@ANYBLOB="9f0d343f8f3672b246c5e3575e3bad29af7a982e5093be13037bae5e55d3901efcbad02c798684968abd7cd0f3463233c58a4171b61d275264b0c25a86770e422769c2240915668f9c27dcb8caa76b6b52bcf7f0234471abd5fa470b20eff96ea602ca594f7f1a08a7b251002c49eac4221ab3012d6c7c4d8505140e10"], 0x0, 0x7d}, 0x20) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz0\x00', 0x200002, 0x0) openat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) sendmsg$kcm(r2, 0x0, 0xfffffffffffffffc) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup/syz1\x00', 0x200002, 0x0) gettid() r3 = socket$kcm(0x11, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000000200)={&(0x7f0000000040)=@nfc, 0x80, 0x0}, 0x0) socketpair$unix(0x1, 0x4, 0x0, &(0x7f0000000240)) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) r4 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r4, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) [ 1002.324294][T19882] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 21:46:23 executing program 2: socket$kcm(0x2, 0x1, 0x84) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000900)=ANY=[@ANYBLOB="9f0d343f8f3672b246c5e3575e3bad29af7a982e5093be13037bae5e55d3901efcbad02c798684968abd7cd0f3463233c58a4171b61d275264b0c25a86770e422769c2240915668f9c27dcb8caa76b6b52bcf7f0234471abd5fa470b20eff96ea602ca594f7f1a08a7b251002c49eac4221ab3012d6c7c4d8505140e10"], 0x0, 0x7d}, 0x20) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz0\x00', 0x200002, 0x0) openat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) [ 1002.425517][T19883] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 21:46:23 executing program 5: socket$kcm(0x2, 0x1, 0x84) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000900)=ANY=[@ANYBLOB="9f0d343f8f3672b246c5e3575e3bad29af7a982e5093be13037bae5e55d3901efcbad02c798684968abd7cd0f3463233c58a4171b61d275264b0c25a86770e422769c2240915668f9c27dcb8caa76b6b52bcf7f0234471abd5fa470b20eff96ea602ca594f7f1a08a7b251002c49eac4221ab3012d6c7c4d8505140e10"], 0x0, 0x7d}, 0x20) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz0\x00', 0x200002, 0x0) openat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) sendmsg$kcm(r2, 0x0, 0xfffffffffffffffc) r3 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r3, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) 21:46:24 executing program 4: socket$kcm(0x2, 0x1, 0x84) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000900)=ANY=[@ANYBLOB="9f0d343f8f3672b246c5e3575e3bad29af7a982e5093be13037bae5e55d3901efcbad02c798684968abd7cd0f3463233c58a4171b61d275264b0c25a86770e422769c2240915668f9c27dcb8caa76b6b52bcf7f0234471abd5fa470b20eff96ea602ca594f7f1a08a7b251002c49eac4221ab3012d6c7c4d8505140e10"], 0x0, 0x7d}, 0x20) gettid() r1 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r1, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) [ 1002.594349][T19890] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 21:46:24 executing program 3: socket$kcm(0x2, 0x1, 0x84) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000900)=ANY=[@ANYBLOB="9f0d343f8f3672b246c5e3575e3bad29af7a982e5093be13037bae5e55d3901efcbad02c798684968abd7cd0f3463233c58a4171b61d275264b0c25a86770e422769c2240915668f9c27dcb8caa76b6b52bcf7f0234471abd5fa470b20eff96ea602ca594f7f1a08a7b251002c49eac4221ab3012d6c7c4d8505140e10"], 0x0, 0x7d}, 0x20) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz0\x00', 0x200002, 0x0) openat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) sendmsg$kcm(r2, 0x0, 0xfffffffffffffffc) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup/syz1\x00', 0x200002, 0x0) gettid() r3 = socket$kcm(0x11, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000000200)={&(0x7f0000000040)=@nfc, 0x80, 0x0}, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) mkdirat$cgroup(r4, 0x0, 0x1ff) socket$kcm(0x11, 0x2, 0x0) socketpair$unix(0x1, 0x4, 0x0, &(0x7f0000000240)) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) 21:46:24 executing program 5: socket$kcm(0x2, 0x1, 0x84) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000900)=ANY=[@ANYBLOB="9f0d343f8f3672b246c5e3575e3bad29af7a982e5093be13037bae5e55d3901efcbad02c798684968abd7cd0f3463233c58a4171b61d275264b0c25a86770e422769c2240915668f9c27dcb8caa76b6b52bcf7f0234471abd5fa470b20eff96ea602ca594f7f1a08a7b251002c49eac4221ab3012d6c7c4d8505140e10"], 0x0, 0x7d}, 0x20) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz0\x00', 0x200002, 0x0) openat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) sendmsg$kcm(r2, 0x0, 0xfffffffffffffffc) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup/syz1\x00', 0x200002, 0x0) gettid() socket$kcm(0x11, 0x2, 0x0) r3 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r3, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) 21:46:24 executing program 1: socket$kcm(0x2, 0x1, 0x84) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000900)=ANY=[@ANYBLOB="9f0d343f8f3672b246c5e3575e3bad29af7a982e5093be13037bae5e55d3901efcbad02c798684968abd7cd0f3463233c58a4171b61d275264b0c25a86770e422769c2240915668f9c27dcb8caa76b6b52bcf7f0234471abd5fa470b20eff96ea602ca594f7f1a08a7b251002c49eac4221ab3012d6c7c4d8505140e10"], 0x0, 0x7d}, 0x20) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz0\x00', 0x200002, 0x0) openat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) sendmsg$kcm(r2, 0x0, 0xfffffffffffffffc) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup/syz1\x00', 0x200002, 0x0) gettid() r3 = socket$kcm(0x11, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000000200)={&(0x7f0000000040)=@nfc, 0x80, 0x0}, 0x0) socketpair$unix(0x1, 0x4, 0x0, &(0x7f0000000240)) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) r4 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r4, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) 21:46:24 executing program 2: socket$kcm(0x2, 0x1, 0x84) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000900)=ANY=[@ANYBLOB="9f0d343f8f3672b246c5e3575e3bad29af7a982e5093be13037bae5e55d3901efcbad02c798684968abd7cd0f3463233c58a4171b61d275264b0c25a86770e422769c2240915668f9c27dcb8caa76b6b52bcf7f0234471abd5fa470b20eff96ea602ca594f7f1a08a7b251002c49eac4221ab3012d6c7c4d8505140e10"], 0x0, 0x7d}, 0x20) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz0\x00', 0x200002, 0x0) openat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) [ 1002.790968][T19996] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 1002.858608][ T2836] libceph: mon1 (1)[::6]:6789 socket closed (con state CONNECTING) 21:46:24 executing program 2: socket$kcm(0x2, 0x1, 0x84) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000900)=ANY=[@ANYBLOB="9f0d343f8f3672b246c5e3575e3bad29af7a982e5093be13037bae5e55d3901efcbad02c798684968abd7cd0f3463233c58a4171b61d275264b0c25a86770e422769c2240915668f9c27dcb8caa76b6b52bcf7f0234471abd5fa470b20eff96ea602ca594f7f1a08a7b251002c49eac4221ab3012d6c7c4d8505140e10"], 0x0, 0x7d}, 0x20) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz0\x00', 0x200002, 0x0) openat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) 21:46:24 executing program 4: socket$kcm(0x2, 0x1, 0x84) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) gettid() r1 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r1, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) [ 1003.066159][T20005] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 21:46:24 executing program 3: socket$kcm(0x2, 0x1, 0x84) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000900)=ANY=[@ANYBLOB="9f0d343f8f3672b246c5e3575e3bad29af7a982e5093be13037bae5e55d3901efcbad02c798684968abd7cd0f3463233c58a4171b61d275264b0c25a86770e422769c2240915668f9c27dcb8caa76b6b52bcf7f0234471abd5fa470b20eff96ea602ca594f7f1a08a7b251002c49eac4221ab3012d6c7c4d8505140e10"], 0x0, 0x7d}, 0x20) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz0\x00', 0x200002, 0x0) openat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) sendmsg$kcm(r2, 0x0, 0xfffffffffffffffc) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup/syz1\x00', 0x200002, 0x0) gettid() r3 = socket$kcm(0x11, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000000200)={&(0x7f0000000040)=@nfc, 0x80, 0x0}, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) mkdirat$cgroup(r4, 0x0, 0x1ff) socket$kcm(0x11, 0x2, 0x0) socketpair$unix(0x1, 0x4, 0x0, &(0x7f0000000240)) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) 21:46:24 executing program 5: socket$kcm(0x2, 0x1, 0x84) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000900)=ANY=[@ANYBLOB="9f0d343f8f3672b246c5e3575e3bad29af7a982e5093be13037bae5e55d3901efcbad02c798684968abd7cd0f3463233c58a4171b61d275264b0c25a86770e422769c2240915668f9c27dcb8caa76b6b52bcf7f0234471abd5fa470b20eff96ea602ca594f7f1a08a7b251002c49eac4221ab3012d6c7c4d8505140e10"], 0x0, 0x7d}, 0x20) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz0\x00', 0x200002, 0x0) openat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) [ 1003.193672][T20013] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 21:46:24 executing program 1: socket$kcm(0x2, 0x1, 0x84) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000900)=ANY=[@ANYBLOB="9f0d343f8f3672b246c5e3575e3bad29af7a982e5093be13037bae5e55d3901efcbad02c798684968abd7cd0f3463233c58a4171b61d275264b0c25a86770e422769c2240915668f9c27dcb8caa76b6b52bcf7f0234471abd5fa470b20eff96ea602ca594f7f1a08a7b251002c49eac4221ab3012d6c7c4d8505140e10"], 0x0, 0x7d}, 0x20) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz0\x00', 0x200002, 0x0) openat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) sendmsg$kcm(r2, 0x0, 0xfffffffffffffffc) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup/syz1\x00', 0x200002, 0x0) gettid() socket$kcm(0x11, 0x2, 0x0) socketpair$unix(0x1, 0x4, 0x0, &(0x7f0000000240)) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) r3 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r3, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) [ 1003.263101][T20021] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 21:46:24 executing program 4: socket$kcm(0x2, 0x1, 0x84) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) gettid() r1 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r1, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) 21:46:24 executing program 2: socket$kcm(0x2, 0x1, 0x84) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000900)=ANY=[@ANYBLOB="9f0d343f8f3672b246c5e3575e3bad29af7a982e5093be13037bae5e55d3901efcbad02c798684968abd7cd0f3463233c58a4171b61d275264b0c25a86770e422769c2240915668f9c27dcb8caa76b6b52bcf7f0234471abd5fa470b20eff96ea602ca594f7f1a08a7b251002c49eac4221ab3012d6c7c4d8505140e10"], 0x0, 0x7d}, 0x20) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz0\x00', 0x200002, 0x0) r1 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r1, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) 21:46:24 executing program 3: socket$kcm(0x2, 0x1, 0x84) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000900)=ANY=[@ANYBLOB="9f0d343f8f3672b246c5e3575e3bad29af7a982e5093be13037bae5e55d3901efcbad02c798684968abd7cd0f3463233c58a4171b61d275264b0c25a86770e422769c2240915668f9c27dcb8caa76b6b52bcf7f0234471abd5fa470b20eff96ea602ca594f7f1a08a7b251002c49eac4221ab3012d6c7c4d8505140e10"], 0x0, 0x7d}, 0x20) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz0\x00', 0x200002, 0x0) openat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) sendmsg$kcm(r2, 0x0, 0xfffffffffffffffc) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup/syz1\x00', 0x200002, 0x0) gettid() r3 = socket$kcm(0x11, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000000200)={&(0x7f0000000040)=@nfc, 0x80, 0x0}, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) mkdirat$cgroup(r4, 0x0, 0x1ff) socket$kcm(0x11, 0x2, 0x0) socketpair$unix(0x1, 0x4, 0x0, &(0x7f0000000240)) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) [ 1003.461388][T20031] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 21:46:24 executing program 5: socket$kcm(0x2, 0x1, 0x84) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000900)=ANY=[@ANYBLOB="9f0d343f8f3672b246c5e3575e3bad29af7a982e5093be13037bae5e55d3901efcbad02c798684968abd7cd0f3463233c58a4171b61d275264b0c25a86770e422769c2240915668f9c27dcb8caa76b6b52bcf7f0234471abd5fa470b20eff96ea602ca594f7f1a08a7b251002c49eac4221ab3012d6c7c4d8505140e10"], 0x0, 0x7d}, 0x20) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz0\x00', 0x200002, 0x0) openat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) sendmsg$kcm(r2, 0x0, 0xfffffffffffffffc) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup/syz1\x00', 0x200002, 0x0) gettid() socket$kcm(0x11, 0x2, 0x0) r3 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r3, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) 21:46:25 executing program 2: socket$kcm(0x2, 0x1, 0x84) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000900)=ANY=[@ANYBLOB="9f0d343f8f3672b246c5e3575e3bad29af7a982e5093be13037bae5e55d3901efcbad02c798684968abd7cd0f3463233c58a4171b61d275264b0c25a86770e422769c2240915668f9c27dcb8caa76b6b52bcf7f0234471abd5fa470b20eff96ea602ca594f7f1a08a7b251002c49eac4221ab3012d6c7c4d8505140e10"], 0x0, 0x7d}, 0x20) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz0\x00', 0x200002, 0x0) r1 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r1, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) 21:46:25 executing program 4: socket$kcm(0x2, 0x1, 0x84) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) gettid() r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) [ 1003.659693][T20029] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 21:46:25 executing program 1: socket$kcm(0x2, 0x1, 0x84) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000900)=ANY=[@ANYBLOB="9f0d343f8f3672b246c5e3575e3bad29af7a982e5093be13037bae5e55d3901efcbad02c798684968abd7cd0f3463233c58a4171b61d275264b0c25a86770e422769c2240915668f9c27dcb8caa76b6b52bcf7f0234471abd5fa470b20eff96ea602ca594f7f1a08a7b251002c49eac4221ab3012d6c7c4d8505140e10"], 0x0, 0x7d}, 0x20) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz0\x00', 0x200002, 0x0) openat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) sendmsg$kcm(r2, 0x0, 0xfffffffffffffffc) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup/syz1\x00', 0x200002, 0x0) gettid() socketpair$unix(0x1, 0x4, 0x0, &(0x7f0000000240)) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) r3 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r3, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) [ 1003.766961][T20042] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 21:46:25 executing program 4: socket$kcm(0x2, 0x1, 0x84) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) gettid() r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) 21:46:25 executing program 5: socket$kcm(0x2, 0x1, 0x84) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000900)=ANY=[@ANYBLOB="9f0d343f8f3672b246c5e3575e3bad29af7a982e5093be13037bae5e55d3901efcbad02c798684968abd7cd0f3463233c58a4171b61d275264b0c25a86770e422769c2240915668f9c27dcb8caa76b6b52bcf7f0234471abd5fa470b20eff96ea602ca594f7f1a08a7b251002c49eac4221ab3012d6c7c4d8505140e10"], 0x0, 0x7d}, 0x20) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz0\x00', 0x200002, 0x0) openat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) sendmsg$kcm(r2, 0x0, 0xfffffffffffffffc) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup/syz1\x00', 0x200002, 0x0) gettid() socket$kcm(0x11, 0x2, 0x0) r3 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r3, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) 21:46:25 executing program 3: socket$kcm(0x2, 0x1, 0x84) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000900)=ANY=[@ANYBLOB="9f0d343f8f3672b246c5e3575e3bad29af7a982e5093be13037bae5e55d3901efcbad02c798684968abd7cd0f3463233c58a4171b61d275264b0c25a86770e422769c2240915668f9c27dcb8caa76b6b52bcf7f0234471abd5fa470b20eff96ea602ca594f7f1a08a7b251002c49eac4221ab3012d6c7c4d8505140e10"], 0x0, 0x7d}, 0x20) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz0\x00', 0x200002, 0x0) openat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) sendmsg$kcm(r2, 0x0, 0xfffffffffffffffc) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup/syz1\x00', 0x200002, 0x0) gettid() r3 = socket$kcm(0x11, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000000200)={&(0x7f0000000040)=@nfc, 0x80, 0x0}, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) mkdirat$cgroup(r4, 0x0, 0x1ff) socket$kcm(0x11, 0x2, 0x0) socketpair$unix(0x1, 0x4, 0x0, &(0x7f0000000240)) r5 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r5, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) 21:46:25 executing program 2: socket$kcm(0x2, 0x1, 0x84) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000900)=ANY=[@ANYBLOB="9f0d343f8f3672b246c5e3575e3bad29af7a982e5093be13037bae5e55d3901efcbad02c798684968abd7cd0f3463233c58a4171b61d275264b0c25a86770e422769c2240915668f9c27dcb8caa76b6b52bcf7f0234471abd5fa470b20eff96ea602ca594f7f1a08a7b251002c49eac4221ab3012d6c7c4d8505140e10"], 0x0, 0x7d}, 0x20) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r1, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) [ 1003.982972][T20048] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 1004.134446][T20059] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 21:46:25 executing program 4: socket$kcm(0x2, 0x1, 0x84) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) gettid() r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) 21:46:25 executing program 1: socket$kcm(0x2, 0x1, 0x84) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000900)=ANY=[@ANYBLOB="9f0d343f8f3672b246c5e3575e3bad29af7a982e5093be13037bae5e55d3901efcbad02c798684968abd7cd0f3463233c58a4171b61d275264b0c25a86770e422769c2240915668f9c27dcb8caa76b6b52bcf7f0234471abd5fa470b20eff96ea602ca594f7f1a08a7b251002c49eac4221ab3012d6c7c4d8505140e10"], 0x0, 0x7d}, 0x20) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz0\x00', 0x200002, 0x0) openat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) sendmsg$kcm(r2, 0x0, 0xfffffffffffffffc) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup/syz1\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x4, 0x0, &(0x7f0000000240)) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) r3 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r3, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) 21:46:25 executing program 2: socket$kcm(0x2, 0x1, 0x84) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000900)=ANY=[@ANYBLOB="9f0d343f8f3672b246c5e3575e3bad29af7a982e5093be13037bae5e55d3901efcbad02c798684968abd7cd0f3463233c58a4171b61d275264b0c25a86770e422769c2240915668f9c27dcb8caa76b6b52bcf7f0234471abd5fa470b20eff96ea602ca594f7f1a08a7b251002c49eac4221ab3012d6c7c4d8505140e10"], 0x0, 0x7d}, 0x20) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r1, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) [ 1004.284499][T20060] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 21:46:25 executing program 3: socket$kcm(0x2, 0x1, 0x84) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000900)=ANY=[@ANYBLOB="9f0d343f8f3672b246c5e3575e3bad29af7a982e5093be13037bae5e55d3901efcbad02c798684968abd7cd0f3463233c58a4171b61d275264b0c25a86770e422769c2240915668f9c27dcb8caa76b6b52bcf7f0234471abd5fa470b20eff96ea602ca594f7f1a08a7b251002c49eac4221ab3012d6c7c4d8505140e10"], 0x0, 0x7d}, 0x20) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz0\x00', 0x200002, 0x0) openat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) sendmsg$kcm(r2, 0x0, 0xfffffffffffffffc) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup/syz1\x00', 0x200002, 0x0) gettid() r3 = socket$kcm(0x11, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000000200)={&(0x7f0000000040)=@nfc, 0x80, 0x0}, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) mkdirat$cgroup(r4, 0x0, 0x1ff) socket$kcm(0x11, 0x2, 0x0) r5 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r5, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) [ 1004.361246][T20068] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 21:46:25 executing program 5: socket$kcm(0x2, 0x1, 0x84) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000900)=ANY=[@ANYBLOB="9f0d343f8f3672b246c5e3575e3bad29af7a982e5093be13037bae5e55d3901efcbad02c798684968abd7cd0f3463233c58a4171b61d275264b0c25a86770e422769c2240915668f9c27dcb8caa76b6b52bcf7f0234471abd5fa470b20eff96ea602ca594f7f1a08a7b251002c49eac4221ab3012d6c7c4d8505140e10"], 0x0, 0x7d}, 0x20) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz0\x00', 0x200002, 0x0) openat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) sendmsg$kcm(r2, 0x0, 0xfffffffffffffffc) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup/syz1\x00', 0x200002, 0x0) gettid() socket$kcm(0x11, 0x2, 0x0) socketpair$unix(0x1, 0x4, 0x0, &(0x7f0000000240)) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) r3 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r3, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) [ 1004.479359][T20066] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 21:46:25 executing program 2: socket$kcm(0x2, 0x1, 0x84) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000900)=ANY=[@ANYBLOB="9f0d343f8f3672b246c5e3575e3bad29af7a982e5093be13037bae5e55d3901efcbad02c798684968abd7cd0f3463233c58a4171b61d275264b0c25a86770e422769c2240915668f9c27dcb8caa76b6b52bcf7f0234471abd5fa470b20eff96ea602ca594f7f1a08a7b251002c49eac4221ab3012d6c7c4d8505140e10"], 0x0, 0x7d}, 0x20) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r1, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) 21:46:25 executing program 4: socket$kcm(0x2, 0x1, 0x84) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) gettid() r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) 21:46:26 executing program 1: socket$kcm(0x2, 0x1, 0x84) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000900)=ANY=[@ANYBLOB="9f0d343f8f3672b246c5e3575e3bad29af7a982e5093be13037bae5e55d3901efcbad02c798684968abd7cd0f3463233c58a4171b61d275264b0c25a86770e422769c2240915668f9c27dcb8caa76b6b52bcf7f0234471abd5fa470b20eff96ea602ca594f7f1a08a7b251002c49eac4221ab3012d6c7c4d8505140e10"], 0x0, 0x7d}, 0x20) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz0\x00', 0x200002, 0x0) openat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) sendmsg$kcm(r2, 0x0, 0xfffffffffffffffc) socketpair$unix(0x1, 0x4, 0x0, &(0x7f0000000240)) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) r3 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r3, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) [ 1004.690346][T20072] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 1004.765106][T20079] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 21:46:26 executing program 4: socket$kcm(0x2, 0x1, 0x84) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) gettid() r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) [ 1004.819189][ T2836] libceph: mon1 (1)[::6]:6789 socket error on read [ 1004.830128][ T2836] libceph: connect (1)[d::]:6789 error -101 [ 1004.836212][ T2836] libceph: mon0 (1)[d::]:6789 connect error 21:46:26 executing program 3: socket$kcm(0x2, 0x1, 0x84) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000900)=ANY=[@ANYBLOB="9f0d343f8f3672b246c5e3575e3bad29af7a982e5093be13037bae5e55d3901efcbad02c798684968abd7cd0f3463233c58a4171b61d275264b0c25a86770e422769c2240915668f9c27dcb8caa76b6b52bcf7f0234471abd5fa470b20eff96ea602ca594f7f1a08a7b251002c49eac4221ab3012d6c7c4d8505140e10"], 0x0, 0x7d}, 0x20) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz0\x00', 0x200002, 0x0) openat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) sendmsg$kcm(r2, 0x0, 0xfffffffffffffffc) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup/syz1\x00', 0x200002, 0x0) gettid() r3 = socket$kcm(0x11, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000000200)={&(0x7f0000000040)=@nfc, 0x80, 0x0}, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) mkdirat$cgroup(r4, 0x0, 0x1ff) r5 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r5, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) [ 1004.916502][T20150] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 21:46:26 executing program 2: socket$kcm(0x2, 0x1, 0x84) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000900)=ANY=[@ANYBLOB="9f0d343f8f3672b246c5e3575e3bad29af7a982e5093be13037bae5e55d3901efcbad02c798684968abd7cd0f3463233c58a4171b61d275264b0c25a86770e422769c2240915668f9c27dcb8caa76b6b52bcf7f0234471abd5fa470b20eff96ea602ca594f7f1a08a7b251002c49eac4221ab3012d6c7c4d8505140e10"], 0x0, 0x7d}, 0x20) r1 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r1, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) 21:46:26 executing program 5: socket$kcm(0x2, 0x1, 0x84) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000900)=ANY=[@ANYBLOB="9f0d343f8f3672b246c5e3575e3bad29af7a982e5093be13037bae5e55d3901efcbad02c798684968abd7cd0f3463233c58a4171b61d275264b0c25a86770e422769c2240915668f9c27dcb8caa76b6b52bcf7f0234471abd5fa470b20eff96ea602ca594f7f1a08a7b251002c49eac4221ab3012d6c7c4d8505140e10"], 0x0, 0x7d}, 0x20) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz0\x00', 0x200002, 0x0) r2 = openat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) sendmsg$kcm(r3, 0x0, 0xfffffffffffffffc) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup/syz1\x00', 0x200002, 0x0) gettid() r4 = socket$kcm(0x11, 0x2, 0x0) sendmsg$kcm(r4, &(0x7f0000000200)={&(0x7f0000000040)=@nfc, 0x80, 0x0}, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) mkdirat$cgroup(r5, 0x0, 0x1ff) socket$kcm(0x11, 0x2, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r2, 0xc, 0x1, 0xd8, 0x0}, 0x20) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x2, 0x1c, &(0x7f0000000980)=ANY=[@ANYBLOB="8500000f7d00b7e1ff9724002ac8991601ad814eeb7b4fd5ee25ba83a72ba28f97cb0c9ad407e03f98a2f54eaabb372d8199ad6306ede43a67863593c59251df04459fa354dc3b820501f3ffb58bc4730f78e709652743498eae4839051b2c3d0510147acda9508c01c6dbdaf0a0ee718e67d02249d4d17ee4bbb35ba26fe4aba8fbbcc6d66b645c1671ebadcb84b4fe35d132e5f9a948606f334c3886bfbaf2a0bc045aa7f78f20f94bd9f0658ade293b596d237ddc80d851ec788ba03bdf1a552e3dff57c71a71f10e65802308ac57ae9ab961c16910be5f00c31095d821339125"], &(0x7f0000000340)='syzkaller\x00', 0x1, 0x82, &(0x7f0000000480)=""/130, 0x40f00, 0x4, [], 0x0, 0x10, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000000580)={0x4, 0x7, 0x6, 0xffffffff}, 0x10}, 0x70) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r6, 0xc0, &(0x7f0000000800)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)=0x4, 0x0, 0x0, 0x0, &(0x7f0000000440)={0x1, 0x4}, 0x0, 0x0, &(0x7f0000000740)={0x4, 0x3, 0x3, 0x553}, &(0x7f0000000780)=0x5, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=0x100000001}}, 0x10) r7 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r7, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) 21:46:26 executing program 4: socket$kcm(0x2, 0x1, 0x84) gettid() r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) 21:46:26 executing program 1: socket$kcm(0x2, 0x1, 0x84) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000900)=ANY=[@ANYBLOB="9f0d343f8f3672b246c5e3575e3bad29af7a982e5093be13037bae5e55d3901efcbad02c798684968abd7cd0f3463233c58a4171b61d275264b0c25a86770e422769c2240915668f9c27dcb8caa76b6b52bcf7f0234471abd5fa470b20eff96ea602ca594f7f1a08a7b251002c49eac4221ab3012d6c7c4d8505140e10"], 0x0, 0x7d}, 0x20) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz0\x00', 0x200002, 0x0) openat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) sendmsg$kcm(r2, 0x0, 0xfffffffffffffffc) socketpair$unix(0x1, 0x4, 0x0, &(0x7f0000000240)) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) r3 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r3, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) [ 1005.102376][T20193] __nla_validate_parse: 43 callbacks suppressed [ 1005.102386][T20193] netlink: 22 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1005.145792][T20191] netlink: 22 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1005.165311][T20200] netlink: 22 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1005.168892][T20193] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 1005.226179][T20202] netlink: 22 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1005.242347][T20200] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 21:46:26 executing program 3: socket$kcm(0x2, 0x1, 0x84) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000900)=ANY=[@ANYBLOB="9f0d343f8f3672b246c5e3575e3bad29af7a982e5093be13037bae5e55d3901efcbad02c798684968abd7cd0f3463233c58a4171b61d275264b0c25a86770e422769c2240915668f9c27dcb8caa76b6b52bcf7f0234471abd5fa470b20eff96ea602ca594f7f1a08a7b251002c49eac4221ab3012d6c7c4d8505140e10"], 0x0, 0x7d}, 0x20) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz0\x00', 0x200002, 0x0) openat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) sendmsg$kcm(r2, 0x0, 0xfffffffffffffffc) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup/syz1\x00', 0x200002, 0x0) gettid() r3 = socket$kcm(0x11, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000000200)={&(0x7f0000000040)=@nfc, 0x80, 0x0}, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) mkdirat$cgroup(r4, 0x0, 0x1ff) r5 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r5, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) 21:46:26 executing program 2: socket$kcm(0x2, 0x1, 0x84) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) r1 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r1, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) [ 1005.276095][T20202] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 21:46:26 executing program 1: socket$kcm(0x2, 0x1, 0x84) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000900)=ANY=[@ANYBLOB="9f0d343f8f3672b246c5e3575e3bad29af7a982e5093be13037bae5e55d3901efcbad02c798684968abd7cd0f3463233c58a4171b61d275264b0c25a86770e422769c2240915668f9c27dcb8caa76b6b52bcf7f0234471abd5fa470b20eff96ea602ca594f7f1a08a7b251002c49eac4221ab3012d6c7c4d8505140e10"], 0x0, 0x7d}, 0x20) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz0\x00', 0x200002, 0x0) openat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) socketpair$unix(0x1, 0x4, 0x0, &(0x7f0000000240)) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) [ 1005.387105][T20207] netlink: 22 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1005.412098][T20199] netlink: 22 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1005.431013][T20199] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 21:46:26 executing program 4: gettid() r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) [ 1005.463118][T20208] netlink: 22 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1005.473713][T20207] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 21:46:27 executing program 2: socket$kcm(0x2, 0x1, 0x84) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) 21:46:27 executing program 5: socket$kcm(0x2, 0x1, 0x84) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000900)=ANY=[@ANYBLOB="9f0d343f8f3672b246c5e3575e3bad29af7a982e5093be13037bae5e55d3901efcbad02c798684968abd7cd0f3463233c58a4171b61d275264b0c25a86770e422769c2240915668f9c27dcb8caa76b6b52bcf7f0234471abd5fa470b20eff96ea602ca594f7f1a08a7b251002c49eac4221ab3012d6c7c4d8505140e10"], 0x0, 0x7d}, 0x20) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz0\x00', 0x200002, 0x0) r2 = openat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) sendmsg$kcm(r3, 0x0, 0xfffffffffffffffc) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup/syz1\x00', 0x200002, 0x0) gettid() r4 = socket$kcm(0x11, 0x2, 0x0) sendmsg$kcm(r4, &(0x7f0000000200)={&(0x7f0000000040)=@nfc, 0x80, 0x0}, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) mkdirat$cgroup(r5, 0x0, 0x1ff) socket$kcm(0x11, 0x2, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r2, 0xc, 0x1, 0xd8, 0x0}, 0x20) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x2, 0x1c, &(0x7f0000000980)=ANY=[@ANYBLOB="8500000f7d00b7e1ff9724002ac8991601ad814eeb7b4fd5ee25ba83a72ba28f97cb0c9ad407e03f98a2f54eaabb372d8199ad6306ede43a67863593c59251df04459fa354dc3b820501f3ffb58bc4730f78e709652743498eae4839051b2c3d0510147acda9508c01c6dbdaf0a0ee718e67d02249d4d17ee4bbb35ba26fe4aba8fbbcc6d66b645c1671ebadcb84b4fe35d132e5f9a948606f334c3886bfbaf2a0bc045aa7f78f20f94bd9f0658ade293b596d237ddc80d851ec788ba03bdf1a552e3dff57c71a71f10e65802308ac57ae9ab961c16910be5f00c31095d821339125"], &(0x7f0000000340)='syzkaller\x00', 0x1, 0x82, &(0x7f0000000480)=""/130, 0x40f00, 0x4, [], 0x0, 0x10, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000000580)={0x4, 0x7, 0x6, 0xffffffff}, 0x10}, 0x70) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r6, 0xc0, &(0x7f0000000800)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)=0x4, 0x0, 0x0, 0x0, &(0x7f0000000440)={0x1, 0x4}, 0x0, 0x0, &(0x7f0000000740)={0x4, 0x3, 0x3, 0x553}, &(0x7f0000000780)=0x5, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=0x100000001}}, 0x10) r7 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r7, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) [ 1005.544154][T20208] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 1005.572998][T20214] netlink: 22 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1005.621353][T20214] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 1005.650655][T20211] netlink: 22 bytes leftover after parsing attributes in process `syz-executor.1'. 21:46:27 executing program 3: socket$kcm(0x2, 0x1, 0x84) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000900)=ANY=[@ANYBLOB="9f0d343f8f3672b246c5e3575e3bad29af7a982e5093be13037bae5e55d3901efcbad02c798684968abd7cd0f3463233c58a4171b61d275264b0c25a86770e422769c2240915668f9c27dcb8caa76b6b52bcf7f0234471abd5fa470b20eff96ea602ca594f7f1a08a7b251002c49eac4221ab3012d6c7c4d8505140e10"], 0x0, 0x7d}, 0x20) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz0\x00', 0x200002, 0x0) openat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) sendmsg$kcm(r2, 0x0, 0xfffffffffffffffc) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup/syz1\x00', 0x200002, 0x0) gettid() r3 = socket$kcm(0x11, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000000200)={&(0x7f0000000040)=@nfc, 0x80, 0x0}, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) mkdirat$cgroup(r4, 0x0, 0x1ff) r5 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r5, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) 21:46:27 executing program 4: gettid() r0 = socket$kcm(0x10, 0x0, 0x10) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) [ 1005.768327][T20222] netlink: 22 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1005.788871][ T2836] libceph: connect (1)[d::]:6789 error -101 [ 1005.794892][ T2836] libceph: mon0 (1)[d::]:6789 connect error 21:46:27 executing program 1: socket$kcm(0x2, 0x1, 0x84) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000900)=ANY=[@ANYBLOB="9f0d343f8f3672b246c5e3575e3bad29af7a982e5093be13037bae5e55d3901efcbad02c798684968abd7cd0f3463233c58a4171b61d275264b0c25a86770e422769c2240915668f9c27dcb8caa76b6b52bcf7f0234471abd5fa470b20eff96ea602ca594f7f1a08a7b251002c49eac4221ab3012d6c7c4d8505140e10"], 0x0, 0x7d}, 0x20) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz0\x00', 0x200002, 0x0) openat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) socketpair$unix(0x1, 0x4, 0x0, &(0x7f0000000240)) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) [ 1005.816921][T20222] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 21:46:27 executing program 4: gettid() r0 = socket$kcm(0x10, 0x0, 0x10) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) [ 1005.926951][T20225] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 21:46:27 executing program 2: socket$kcm(0x2, 0x1, 0x84) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) 21:46:27 executing program 5: socket$kcm(0x2, 0x1, 0x84) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000900)=ANY=[@ANYBLOB="9f0d343f8f3672b246c5e3575e3bad29af7a982e5093be13037bae5e55d3901efcbad02c798684968abd7cd0f3463233c58a4171b61d275264b0c25a86770e422769c2240915668f9c27dcb8caa76b6b52bcf7f0234471abd5fa470b20eff96ea602ca594f7f1a08a7b251002c49eac4221ab3012d6c7c4d8505140e10"], 0x0, 0x7d}, 0x20) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz0\x00', 0x200002, 0x0) openat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) socketpair$unix(0x1, 0x4, 0x0, &(0x7f0000000240)) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) [ 1006.145808][T20238] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 21:46:27 executing program 3: socket$kcm(0x2, 0x1, 0x84) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000900)=ANY=[@ANYBLOB="9f0d343f8f3672b246c5e3575e3bad29af7a982e5093be13037bae5e55d3901efcbad02c798684968abd7cd0f3463233c58a4171b61d275264b0c25a86770e422769c2240915668f9c27dcb8caa76b6b52bcf7f0234471abd5fa470b20eff96ea602ca594f7f1a08a7b251002c49eac4221ab3012d6c7c4d8505140e10"], 0x0, 0x7d}, 0x20) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz0\x00', 0x200002, 0x0) openat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) sendmsg$kcm(r2, 0x0, 0xfffffffffffffffc) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup/syz1\x00', 0x200002, 0x0) gettid() r3 = socket$kcm(0x11, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000000200)={&(0x7f0000000040)=@nfc, 0x80, 0x0}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r4 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r4, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) 21:46:27 executing program 4: gettid() r0 = socket$kcm(0x10, 0x0, 0x10) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) 21:46:27 executing program 1: socket$kcm(0x2, 0x1, 0x84) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000900)=ANY=[@ANYBLOB="9f0d343f8f3672b246c5e3575e3bad29af7a982e5093be13037bae5e55d3901efcbad02c798684968abd7cd0f3463233c58a4171b61d275264b0c25a86770e422769c2240915668f9c27dcb8caa76b6b52bcf7f0234471abd5fa470b20eff96ea602ca594f7f1a08a7b251002c49eac4221ab3012d6c7c4d8505140e10"], 0x0, 0x7d}, 0x20) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz0\x00', 0x200002, 0x0) openat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) socketpair$unix(0x1, 0x4, 0x0, &(0x7f0000000240)) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) [ 1006.335183][T20245] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 21:46:27 executing program 2: socket$kcm(0x2, 0x1, 0x84) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) 21:46:27 executing program 4: gettid() socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) 21:46:27 executing program 5: socket$kcm(0x2, 0x1, 0x84) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000900)=ANY=[@ANYBLOB="9f0d343f8f3672b246c5e3575e3bad29af7a982e5093be13037bae5e55d3901efcbad02c798684968abd7cd0f3463233c58a4171b61d275264b0c25a86770e422769c2240915668f9c27dcb8caa76b6b52bcf7f0234471abd5fa470b20eff96ea602ca594f7f1a08a7b251002c49eac4221ab3012d6c7c4d8505140e10"], 0x0, 0x7d}, 0x20) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz0\x00', 0x200002, 0x0) openat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) socketpair$unix(0x1, 0x4, 0x0, &(0x7f0000000240)) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) 21:46:27 executing program 3: socket$kcm(0x2, 0x1, 0x84) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000900)=ANY=[@ANYBLOB="9f0d343f8f3672b246c5e3575e3bad29af7a982e5093be13037bae5e55d3901efcbad02c798684968abd7cd0f3463233c58a4171b61d275264b0c25a86770e422769c2240915668f9c27dcb8caa76b6b52bcf7f0234471abd5fa470b20eff96ea602ca594f7f1a08a7b251002c49eac4221ab3012d6c7c4d8505140e10"], 0x0, 0x7d}, 0x20) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz0\x00', 0x200002, 0x0) openat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) sendmsg$kcm(r2, 0x0, 0xfffffffffffffffc) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup/syz1\x00', 0x200002, 0x0) gettid() r3 = socket$kcm(0x11, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000000200)={&(0x7f0000000040)=@nfc, 0x80, 0x0}, 0x0) r4 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r4, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) [ 1006.497551][T20251] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 21:46:28 executing program 4: gettid() socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) 21:46:28 executing program 2: socket$kcm(0x2, 0x1, 0x84) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) 21:46:28 executing program 1: socket$kcm(0x2, 0x1, 0x84) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000900)=ANY=[@ANYBLOB="9f0d343f8f3672b246c5e3575e3bad29af7a982e5093be13037bae5e55d3901efcbad02c798684968abd7cd0f3463233c58a4171b61d275264b0c25a86770e422769c2240915668f9c27dcb8caa76b6b52bcf7f0234471abd5fa470b20eff96ea602ca594f7f1a08a7b251002c49eac4221ab3012d6c7c4d8505140e10"], 0x0, 0x7d}, 0x20) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz0\x00', 0x200002, 0x0) openat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x4, 0x0, &(0x7f0000000240)) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) [ 1006.711891][T20262] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 21:46:28 executing program 2: socket$kcm(0x2, 0x1, 0x84) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) [ 1006.818866][ T2836] libceph: connect (1)[d::]:6789 error -101 [ 1006.824885][ T2836] libceph: mon0 (1)[d::]:6789 connect error 21:46:28 executing program 5: socket$kcm(0x2, 0x1, 0x84) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000900)=ANY=[@ANYBLOB="9f0d343f8f3672b246c5e3575e3bad29af7a982e5093be13037bae5e55d3901efcbad02c798684968abd7cd0f3463233c58a4171b61d275264b0c25a86770e422769c2240915668f9c27dcb8caa76b6b52bcf7f0234471abd5fa470b20eff96ea602ca594f7f1a08a7b251002c49eac4221ab3012d6c7c4d8505140e10"], 0x0, 0x7d}, 0x20) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz0\x00', 0x200002, 0x0) openat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) socketpair$unix(0x1, 0x4, 0x0, &(0x7f0000000240)) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) 21:46:28 executing program 4: gettid() socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) [ 1006.885731][T20272] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 21:46:28 executing program 3: socket$kcm(0x2, 0x1, 0x84) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000900)=ANY=[@ANYBLOB="9f0d343f8f3672b246c5e3575e3bad29af7a982e5093be13037bae5e55d3901efcbad02c798684968abd7cd0f3463233c58a4171b61d275264b0c25a86770e422769c2240915668f9c27dcb8caa76b6b52bcf7f0234471abd5fa470b20eff96ea602ca594f7f1a08a7b251002c49eac4221ab3012d6c7c4d8505140e10"], 0x0, 0x7d}, 0x20) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz0\x00', 0x200002, 0x0) openat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) sendmsg$kcm(r2, 0x0, 0xfffffffffffffffc) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup/syz1\x00', 0x200002, 0x0) gettid() socket$kcm(0x11, 0x2, 0x0) r3 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r3, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) 21:46:28 executing program 4: gettid() r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, 0x0, 0x0) [ 1007.024034][T20280] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 21:46:28 executing program 1: socket$kcm(0x2, 0x1, 0x84) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000900)=ANY=[@ANYBLOB="9f0d343f8f3672b246c5e3575e3bad29af7a982e5093be13037bae5e55d3901efcbad02c798684968abd7cd0f3463233c58a4171b61d275264b0c25a86770e422769c2240915668f9c27dcb8caa76b6b52bcf7f0234471abd5fa470b20eff96ea602ca594f7f1a08a7b251002c49eac4221ab3012d6c7c4d8505140e10"], 0x0, 0x7d}, 0x20) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz0\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x4, 0x0, &(0x7f0000000240)) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) r1 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r1, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) [ 1007.124676][T20284] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 21:46:28 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) 21:46:28 executing program 4: gettid() r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, 0x0, 0x0) 21:46:28 executing program 5: socket$kcm(0x2, 0x1, 0x84) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000900)=ANY=[@ANYBLOB="9f0d343f8f3672b246c5e3575e3bad29af7a982e5093be13037bae5e55d3901efcbad02c798684968abd7cd0f3463233c58a4171b61d275264b0c25a86770e422769c2240915668f9c27dcb8caa76b6b52bcf7f0234471abd5fa470b20eff96ea602ca594f7f1a08a7b251002c49eac4221ab3012d6c7c4d8505140e10"], 0x0, 0x7d}, 0x20) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz0\x00', 0x200002, 0x0) openat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) socketpair$unix(0x1, 0x4, 0x0, &(0x7f0000000240)) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) [ 1007.337479][T20291] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 21:46:28 executing program 3: socket$kcm(0x2, 0x1, 0x84) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000900)=ANY=[@ANYBLOB="9f0d343f8f3672b246c5e3575e3bad29af7a982e5093be13037bae5e55d3901efcbad02c798684968abd7cd0f3463233c58a4171b61d275264b0c25a86770e422769c2240915668f9c27dcb8caa76b6b52bcf7f0234471abd5fa470b20eff96ea602ca594f7f1a08a7b251002c49eac4221ab3012d6c7c4d8505140e10"], 0x0, 0x7d}, 0x20) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz0\x00', 0x200002, 0x0) openat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) sendmsg$kcm(r2, 0x0, 0xfffffffffffffffc) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup/syz1\x00', 0x200002, 0x0) gettid() r3 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r3, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) 21:46:28 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) 21:46:28 executing program 1: socket$kcm(0x2, 0x1, 0x84) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000900)=ANY=[@ANYBLOB="9f0d343f8f3672b246c5e3575e3bad29af7a982e5093be13037bae5e55d3901efcbad02c798684968abd7cd0f3463233c58a4171b61d275264b0c25a86770e422769c2240915668f9c27dcb8caa76b6b52bcf7f0234471abd5fa470b20eff96ea602ca594f7f1a08a7b251002c49eac4221ab3012d6c7c4d8505140e10"], 0x0, 0x7d}, 0x20) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x4, 0x0, &(0x7f0000000240)) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) r1 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r1, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) 21:46:28 executing program 4: gettid() r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, 0x0, 0x0) [ 1007.631070][T20309] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 21:46:29 executing program 5: socket$kcm(0x2, 0x1, 0x84) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000900)=ANY=[@ANYBLOB="9f0d343f8f3672b246c5e3575e3bad29af7a982e5093be13037bae5e55d3901efcbad02c798684968abd7cd0f3463233c58a4171b61d275264b0c25a86770e422769c2240915668f9c27dcb8caa76b6b52bcf7f0234471abd5fa470b20eff96ea602ca594f7f1a08a7b251002c49eac4221ab3012d6c7c4d8505140e10"], 0x0, 0x7d}, 0x20) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz0\x00', 0x200002, 0x0) openat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) socketpair$unix(0x1, 0x4, 0x0, &(0x7f0000000240)) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) 21:46:29 executing program 2: r0 = socket$kcm(0x10, 0x0, 0x10) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) [ 1007.770479][T20310] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 21:46:29 executing program 4: gettid() r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, 0x0}, 0x0) 21:46:29 executing program 3: socket$kcm(0x2, 0x1, 0x84) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000900)=ANY=[@ANYBLOB="9f0d343f8f3672b246c5e3575e3bad29af7a982e5093be13037bae5e55d3901efcbad02c798684968abd7cd0f3463233c58a4171b61d275264b0c25a86770e422769c2240915668f9c27dcb8caa76b6b52bcf7f0234471abd5fa470b20eff96ea602ca594f7f1a08a7b251002c49eac4221ab3012d6c7c4d8505140e10"], 0x0, 0x7d}, 0x20) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz0\x00', 0x200002, 0x0) openat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) sendmsg$kcm(r2, 0x0, 0xfffffffffffffffc) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup/syz1\x00', 0x200002, 0x0) gettid() r3 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r3, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) 21:46:29 executing program 1: socket$kcm(0x2, 0x1, 0x84) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000900)=ANY=[@ANYBLOB="9f0d343f8f3672b246c5e3575e3bad29af7a982e5093be13037bae5e55d3901efcbad02c798684968abd7cd0f3463233c58a4171b61d275264b0c25a86770e422769c2240915668f9c27dcb8caa76b6b52bcf7f0234471abd5fa470b20eff96ea602ca594f7f1a08a7b251002c49eac4221ab3012d6c7c4d8505140e10"], 0x0, 0x7d}, 0x20) socketpair$unix(0x1, 0x4, 0x0, &(0x7f0000000240)) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) r1 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r1, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) 21:46:29 executing program 4: gettid() r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, 0x0}, 0x0) 21:46:29 executing program 2: r0 = socket$kcm(0x10, 0x0, 0x10) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) [ 1008.025385][T20322] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 21:46:29 executing program 5: socket$kcm(0x2, 0x1, 0x84) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000900)=ANY=[@ANYBLOB="9f0d343f8f3672b246c5e3575e3bad29af7a982e5093be13037bae5e55d3901efcbad02c798684968abd7cd0f3463233c58a4171b61d275264b0c25a86770e422769c2240915668f9c27dcb8caa76b6b52bcf7f0234471abd5fa470b20eff96ea602ca594f7f1a08a7b251002c49eac4221ab3012d6c7c4d8505140e10"], 0x0, 0x7d}, 0x20) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz0\x00', 0x200002, 0x0) openat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) socketpair$unix(0x1, 0x4, 0x0, &(0x7f0000000240)) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) 21:46:29 executing program 3: socket$kcm(0x2, 0x1, 0x84) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000900)=ANY=[@ANYBLOB="9f0d343f8f3672b246c5e3575e3bad29af7a982e5093be13037bae5e55d3901efcbad02c798684968abd7cd0f3463233c58a4171b61d275264b0c25a86770e422769c2240915668f9c27dcb8caa76b6b52bcf7f0234471abd5fa470b20eff96ea602ca594f7f1a08a7b251002c49eac4221ab3012d6c7c4d8505140e10"], 0x0, 0x7d}, 0x20) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz0\x00', 0x200002, 0x0) openat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) sendmsg$kcm(r2, 0x0, 0xfffffffffffffffc) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup/syz1\x00', 0x200002, 0x0) r3 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r3, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) 21:46:29 executing program 1: socket$kcm(0x2, 0x1, 0x84) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000900)=ANY=[@ANYBLOB="9f0d343f8f3672b246c5e3575e3bad29af7a982e5093be13037bae5e55d3901efcbad02c798684968abd7cd0f3463233c58a4171b61d275264b0c25a86770e422769c2240915668f9c27dcb8caa76b6b52bcf7f0234471abd5fa470b20eff96ea602ca594f7f1a08a7b251002c49eac4221ab3012d6c7c4d8505140e10"], 0x0, 0x7d}, 0x20) socketpair$unix(0x1, 0x4, 0x0, &(0x7f0000000240)) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) r1 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r1, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) 21:46:29 executing program 4: gettid() r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, 0x0}, 0x0) 21:46:29 executing program 2: r0 = socket$kcm(0x10, 0x0, 0x10) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) 21:46:29 executing program 4: gettid() r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)}, 0x0) [ 1008.462407][T20342] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 21:46:29 executing program 5: socket$kcm(0x2, 0x1, 0x84) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000900)=ANY=[@ANYBLOB="9f0d343f8f3672b246c5e3575e3bad29af7a982e5093be13037bae5e55d3901efcbad02c798684968abd7cd0f3463233c58a4171b61d275264b0c25a86770e422769c2240915668f9c27dcb8caa76b6b52bcf7f0234471abd5fa470b20eff96ea602ca594f7f1a08a7b251002c49eac4221ab3012d6c7c4d8505140e10"], 0x0, 0x7d}, 0x20) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz0\x00', 0x200002, 0x0) openat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) socketpair$unix(0x1, 0x4, 0x0, &(0x7f0000000240)) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) 21:46:30 executing program 1: socket$kcm(0x2, 0x1, 0x84) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000900)=ANY=[@ANYBLOB="9f0d343f8f3672b246c5e3575e3bad29af7a982e5093be13037bae5e55d3901efcbad02c798684968abd7cd0f3463233c58a4171b61d275264b0c25a86770e422769c2240915668f9c27dcb8caa76b6b52bcf7f0234471abd5fa470b20eff96ea602ca594f7f1a08a7b251002c49eac4221ab3012d6c7c4d8505140e10"], 0x0, 0x7d}, 0x20) socketpair$unix(0x1, 0x4, 0x0, &(0x7f0000000240)) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) r1 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r1, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) 21:46:30 executing program 2: socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) 21:46:30 executing program 3: socket$kcm(0x2, 0x1, 0x84) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000900)=ANY=[@ANYBLOB="9f0d343f8f3672b246c5e3575e3bad29af7a982e5093be13037bae5e55d3901efcbad02c798684968abd7cd0f3463233c58a4171b61d275264b0c25a86770e422769c2240915668f9c27dcb8caa76b6b52bcf7f0234471abd5fa470b20eff96ea602ca594f7f1a08a7b251002c49eac4221ab3012d6c7c4d8505140e10"], 0x0, 0x7d}, 0x20) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz0\x00', 0x200002, 0x0) openat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) sendmsg$kcm(r2, 0x0, 0xfffffffffffffffc) r3 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r3, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) [ 1008.664249][T20453] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 21:46:30 executing program 4: gettid() r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)}, 0x0) 21:46:30 executing program 2: socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) [ 1008.819401][ T2836] libceph: mon1 (1)[::6]:6789 socket closed (con state CONNECTING) [ 1008.831552][T20463] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 21:46:30 executing program 5: socket$kcm(0x2, 0x1, 0x84) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000900)=ANY=[@ANYBLOB="9f0d343f8f3672b246c5e3575e3bad29af7a982e5093be13037bae5e55d3901efcbad02c798684968abd7cd0f3463233c58a4171b61d275264b0c25a86770e422769c2240915668f9c27dcb8caa76b6b52bcf7f0234471abd5fa470b20eff96ea602ca594f7f1a08a7b251002c49eac4221ab3012d6c7c4d8505140e10"], 0x0, 0x7d}, 0x20) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz0\x00', 0x200002, 0x0) openat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) socketpair$unix(0x1, 0x4, 0x0, &(0x7f0000000240)) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) 21:46:30 executing program 4: gettid() r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)}, 0x0) 21:46:30 executing program 3: socket$kcm(0x2, 0x1, 0x84) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000900)=ANY=[@ANYBLOB="9f0d343f8f3672b246c5e3575e3bad29af7a982e5093be13037bae5e55d3901efcbad02c798684968abd7cd0f3463233c58a4171b61d275264b0c25a86770e422769c2240915668f9c27dcb8caa76b6b52bcf7f0234471abd5fa470b20eff96ea602ca594f7f1a08a7b251002c49eac4221ab3012d6c7c4d8505140e10"], 0x0, 0x7d}, 0x20) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz0\x00', 0x200002, 0x0) openat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) sendmsg$kcm(r2, 0x0, 0xfffffffffffffffc) r3 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r3, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) 21:46:30 executing program 1: socket$kcm(0x2, 0x1, 0x84) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) socketpair$unix(0x1, 0x4, 0x0, &(0x7f0000000240)) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) r1 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r1, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) 21:46:30 executing program 2: socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) [ 1009.041344][T20473] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 21:46:30 executing program 4: gettid() r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{0x0}], 0x1}, 0x0) [ 1009.174696][T20482] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 21:46:30 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, 0x0, 0x0) 21:46:30 executing program 5: socket$kcm(0x2, 0x1, 0x84) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000900)=ANY=[@ANYBLOB="9f0d343f8f3672b246c5e3575e3bad29af7a982e5093be13037bae5e55d3901efcbad02c798684968abd7cd0f3463233c58a4171b61d275264b0c25a86770e422769c2240915668f9c27dcb8caa76b6b52bcf7f0234471abd5fa470b20eff96ea602ca594f7f1a08a7b251002c49eac4221ab3012d6c7c4d8505140e10"], 0x0, 0x7d}, 0x20) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz0\x00', 0x200002, 0x0) openat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) socketpair$unix(0x1, 0x4, 0x0, &(0x7f0000000240)) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) 21:46:30 executing program 3: socket$kcm(0x2, 0x1, 0x84) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000900)=ANY=[@ANYBLOB="9f0d343f8f3672b246c5e3575e3bad29af7a982e5093be13037bae5e55d3901efcbad02c798684968abd7cd0f3463233c58a4171b61d275264b0c25a86770e422769c2240915668f9c27dcb8caa76b6b52bcf7f0234471abd5fa470b20eff96ea602ca594f7f1a08a7b251002c49eac4221ab3012d6c7c4d8505140e10"], 0x0, 0x7d}, 0x20) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz0\x00', 0x200002, 0x0) openat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) sendmsg$kcm(r2, 0x0, 0xfffffffffffffffc) r3 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r3, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) 21:46:30 executing program 1: socket$kcm(0x2, 0x1, 0x84) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x4, 0x0, &(0x7f0000000240)) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) 21:46:30 executing program 4: gettid() r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{0x0}], 0x1}, 0x0) [ 1009.433537][T20500] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 21:46:30 executing program 3: socket$kcm(0x2, 0x1, 0x84) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000900)=ANY=[@ANYBLOB="9f0d343f8f3672b246c5e3575e3bad29af7a982e5093be13037bae5e55d3901efcbad02c798684968abd7cd0f3463233c58a4171b61d275264b0c25a86770e422769c2240915668f9c27dcb8caa76b6b52bcf7f0234471abd5fa470b20eff96ea602ca594f7f1a08a7b251002c49eac4221ab3012d6c7c4d8505140e10"], 0x0, 0x7d}, 0x20) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz0\x00', 0x200002, 0x0) openat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) 21:46:30 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, 0x0, 0x0) [ 1009.513707][T20501] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 21:46:31 executing program 5: socket$kcm(0x2, 0x1, 0x84) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000900)=ANY=[@ANYBLOB="9f0d343f8f3672b246c5e3575e3bad29af7a982e5093be13037bae5e55d3901efcbad02c798684968abd7cd0f3463233c58a4171b61d275264b0c25a86770e422769c2240915668f9c27dcb8caa76b6b52bcf7f0234471abd5fa470b20eff96ea602ca594f7f1a08a7b251002c49eac4221ab3012d6c7c4d8505140e10"], 0x0, 0x7d}, 0x20) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz0\x00', 0x200002, 0x0) openat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) 21:46:31 executing program 4: gettid() r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{0x0}], 0x1}, 0x0) 21:46:31 executing program 1: socket$kcm(0x2, 0x1, 0x84) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x4, 0x0, &(0x7f0000000240)) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) [ 1009.682011][T20508] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 21:46:31 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, 0x0, 0x0) 21:46:31 executing program 3: socket$kcm(0x2, 0x1, 0x84) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000900)=ANY=[@ANYBLOB="9f0d343f8f3672b246c5e3575e3bad29af7a982e5093be13037bae5e55d3901efcbad02c798684968abd7cd0f3463233c58a4171b61d275264b0c25a86770e422769c2240915668f9c27dcb8caa76b6b52bcf7f0234471abd5fa470b20eff96ea602ca594f7f1a08a7b251002c49eac4221ab3012d6c7c4d8505140e10"], 0x0, 0x7d}, 0x20) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz0\x00', 0x200002, 0x0) openat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) 21:46:31 executing program 4: gettid() r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)}], 0x1}, 0x0) [ 1009.848486][T20513] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 21:46:31 executing program 1: socket$kcm(0x2, 0x1, 0x84) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x4, 0x0, &(0x7f0000000240)) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) 21:46:31 executing program 5: socket$kcm(0x2, 0x1, 0x84) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000900)=ANY=[@ANYBLOB="9f0d343f8f3672b246c5e3575e3bad29af7a982e5093be13037bae5e55d3901efcbad02c798684968abd7cd0f3463233c58a4171b61d275264b0c25a86770e422769c2240915668f9c27dcb8caa76b6b52bcf7f0234471abd5fa470b20eff96ea602ca594f7f1a08a7b251002c49eac4221ab3012d6c7c4d8505140e10"], 0x0, 0x7d}, 0x20) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz0\x00', 0x200002, 0x0) openat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) [ 1010.056048][T20525] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 21:46:31 executing program 4: gettid() r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)}], 0x1}, 0x0) 21:46:31 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, 0x0}, 0x0) 21:46:31 executing program 3: socket$kcm(0x2, 0x1, 0x84) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000900)=ANY=[@ANYBLOB="9f0d343f8f3672b246c5e3575e3bad29af7a982e5093be13037bae5e55d3901efcbad02c798684968abd7cd0f3463233c58a4171b61d275264b0c25a86770e422769c2240915668f9c27dcb8caa76b6b52bcf7f0234471abd5fa470b20eff96ea602ca594f7f1a08a7b251002c49eac4221ab3012d6c7c4d8505140e10"], 0x0, 0x7d}, 0x20) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz0\x00', 0x200002, 0x0) r1 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r1, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) [ 1010.255472][T20574] __nla_validate_parse: 36 callbacks suppressed [ 1010.255519][T20574] netlink: 22 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1010.276087][T20574] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 21:46:31 executing program 4: gettid() r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)}], 0x1}, 0x0) 21:46:31 executing program 5: socket$kcm(0x2, 0x1, 0x84) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000900)=ANY=[@ANYBLOB="9f0d343f8f3672b246c5e3575e3bad29af7a982e5093be13037bae5e55d3901efcbad02c798684968abd7cd0f3463233c58a4171b61d275264b0c25a86770e422769c2240915668f9c27dcb8caa76b6b52bcf7f0234471abd5fa470b20eff96ea602ca594f7f1a08a7b251002c49eac4221ab3012d6c7c4d8505140e10"], 0x0, 0x7d}, 0x20) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz0\x00', 0x200002, 0x0) openat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) 21:46:31 executing program 1: socket$kcm(0x2, 0x1, 0x84) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x4, 0x0, &(0x7f0000000240)) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) 21:46:31 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, 0x0}, 0x0) [ 1010.392553][T20642] netlink: 22 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1010.477610][T20642] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 21:46:31 executing program 4: gettid() r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b", 0x17}], 0x1}, 0x0) [ 1010.596144][T20650] netlink: 22 bytes leftover after parsing attributes in process `syz-executor.5'. 21:46:32 executing program 3: socket$kcm(0x2, 0x1, 0x84) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000900)=ANY=[@ANYBLOB="9f0d343f8f3672b246c5e3575e3bad29af7a982e5093be13037bae5e55d3901efcbad02c798684968abd7cd0f3463233c58a4171b61d275264b0c25a86770e422769c2240915668f9c27dcb8caa76b6b52bcf7f0234471abd5fa470b20eff96ea602ca594f7f1a08a7b251002c49eac4221ab3012d6c7c4d8505140e10"], 0x0, 0x7d}, 0x20) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r1, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) [ 1010.636643][T20650] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 1010.652009][T20653] netlink: 22 bytes leftover after parsing attributes in process `syz-executor.1'. 21:46:32 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, 0x0}, 0x0) 21:46:32 executing program 5: socket$kcm(0x2, 0x1, 0x84) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000900)=ANY=[@ANYBLOB="9f0d343f8f3672b246c5e3575e3bad29af7a982e5093be13037bae5e55d3901efcbad02c798684968abd7cd0f3463233c58a4171b61d275264b0c25a86770e422769c2240915668f9c27dcb8caa76b6b52bcf7f0234471abd5fa470b20eff96ea602ca594f7f1a08a7b251002c49eac4221ab3012d6c7c4d8505140e10"], 0x0, 0x7d}, 0x20) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz0\x00', 0x200002, 0x0) openat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x4, 0x0, &(0x7f0000000240)) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) [ 1010.756174][T20653] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 21:46:32 executing program 4: gettid() r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b", 0x17}], 0x1}, 0x0) [ 1010.833744][ T2836] libceph: connect (1)[d::]:6789 error -101 [ 1010.870725][ T2836] libceph: mon0 (1)[d::]:6789 connect error [ 1010.900297][T20663] netlink: 22 bytes leftover after parsing attributes in process `syz-executor.3'. 21:46:32 executing program 1: socket$kcm(0x2, 0x1, 0x84) socketpair$unix(0x1, 0x4, 0x0, &(0x7f0000000240)) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) 21:46:32 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)}, 0x0) [ 1010.951862][T20669] netlink: 22 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1010.965258][T20663] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 21:46:32 executing program 3: socket$kcm(0x2, 0x1, 0x84) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000900)=ANY=[@ANYBLOB="9f0d343f8f3672b246c5e3575e3bad29af7a982e5093be13037bae5e55d3901efcbad02c798684968abd7cd0f3463233c58a4171b61d275264b0c25a86770e422769c2240915668f9c27dcb8caa76b6b52bcf7f0234471abd5fa470b20eff96ea602ca594f7f1a08a7b251002c49eac4221ab3012d6c7c4d8505140e10"], 0x0, 0x7d}, 0x20) r1 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r1, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) 21:46:32 executing program 4: gettid() r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b", 0x17}], 0x1}, 0x0) 21:46:32 executing program 5: socket$kcm(0x2, 0x1, 0x84) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000900)=ANY=[@ANYBLOB="9f0d343f8f3672b246c5e3575e3bad29af7a982e5093be13037bae5e55d3901efcbad02c798684968abd7cd0f3463233c58a4171b61d275264b0c25a86770e422769c2240915668f9c27dcb8caa76b6b52bcf7f0234471abd5fa470b20eff96ea602ca594f7f1a08a7b251002c49eac4221ab3012d6c7c4d8505140e10"], 0x0, 0x7d}, 0x20) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz0\x00', 0x200002, 0x0) openat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x4, 0x0, &(0x7f0000000240)) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) [ 1011.073205][T20674] netlink: 22 bytes leftover after parsing attributes in process `syz-executor.1'. 21:46:32 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)}, 0x0) [ 1011.138187][T20674] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 21:46:32 executing program 4: gettid() r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000", 0x23}], 0x1}, 0x0) [ 1011.250918][T20684] netlink: 22 bytes leftover after parsing attributes in process `syz-executor.3'. 21:46:32 executing program 1: socketpair$unix(0x1, 0x4, 0x0, &(0x7f0000000240)) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) [ 1011.338188][T20684] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 1011.373654][T20686] netlink: 22 bytes leftover after parsing attributes in process `syz-executor.5'. 21:46:32 executing program 4: gettid() r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000", 0x23}], 0x1}, 0x0) 21:46:32 executing program 3: socket$kcm(0x2, 0x1, 0x84) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) r1 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r1, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) [ 1011.435982][T20686] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 21:46:32 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)}, 0x0) [ 1011.489922][T20695] netlink: 22 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1011.553780][T20695] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 21:46:33 executing program 5: socket$kcm(0x2, 0x1, 0x84) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000900)=ANY=[@ANYBLOB="9f0d343f8f3672b246c5e3575e3bad29af7a982e5093be13037bae5e55d3901efcbad02c798684968abd7cd0f3463233c58a4171b61d275264b0c25a86770e422769c2240915668f9c27dcb8caa76b6b52bcf7f0234471abd5fa470b20eff96ea602ca594f7f1a08a7b251002c49eac4221ab3012d6c7c4d8505140e10"], 0x0, 0x7d}, 0x20) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz0\x00', 0x200002, 0x0) openat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x4, 0x0, &(0x7f0000000240)) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) 21:46:33 executing program 4: gettid() r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000", 0x23}], 0x1}, 0x0) 21:46:33 executing program 1: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000240)) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) 21:46:33 executing program 3: socket$kcm(0x2, 0x1, 0x84) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) r1 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r1, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) 21:46:33 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{0x0}], 0x1}, 0x0) [ 1011.796307][T20707] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 1011.812063][ T2836] libceph: connect (1)[d::]:6789 error -101 21:46:33 executing program 4: gettid() r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000", 0x29}], 0x1}, 0x0) [ 1011.852850][ T2836] libceph: mon0 (1)[d::]:6789 connect error [ 1011.884527][T20715] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 21:46:33 executing program 5: socket$kcm(0x2, 0x1, 0x84) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000900)=ANY=[@ANYBLOB="9f0d343f8f3672b246c5e3575e3bad29af7a982e5093be13037bae5e55d3901efcbad02c798684968abd7cd0f3463233c58a4171b61d275264b0c25a86770e422769c2240915668f9c27dcb8caa76b6b52bcf7f0234471abd5fa470b20eff96ea602ca594f7f1a08a7b251002c49eac4221ab3012d6c7c4d8505140e10"], 0x0, 0x7d}, 0x20) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) socketpair$unix(0x1, 0x4, 0x0, &(0x7f0000000240)) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) r1 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r1, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) 21:46:33 executing program 1: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000240)) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) 21:46:33 executing program 3: socket$kcm(0x2, 0x1, 0x84) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) 21:46:33 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{0x0}], 0x1}, 0x0) [ 1012.087155][T20726] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 21:46:33 executing program 4: gettid() r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000", 0x29}], 0x1}, 0x0) 21:46:33 executing program 1: socketpair$unix(0x1, 0x0, 0x0, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) 21:46:33 executing program 3: socket$kcm(0x2, 0x1, 0x84) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) 21:46:33 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{0x0}], 0x1}, 0x0) 21:46:33 executing program 5: socket$kcm(0x2, 0x1, 0x84) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000900)=ANY=[@ANYBLOB="9f0d343f8f3672b246c5e3575e3bad29af7a982e5093be13037bae5e55d3901efcbad02c798684968abd7cd0f3463233c58a4171b61d275264b0c25a86770e422769c2240915668f9c27dcb8caa76b6b52bcf7f0234471abd5fa470b20eff96ea602ca594f7f1a08a7b251002c49eac4221ab3012d6c7c4d8505140e10"], 0x0, 0x7d}, 0x20) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) socketpair$unix(0x1, 0x4, 0x0, &(0x7f0000000240)) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) r1 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r1, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) 21:46:33 executing program 4: gettid() r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000", 0x29}], 0x1}, 0x0) [ 1012.341350][T20741] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 21:46:33 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)}], 0x1}, 0x0) 21:46:33 executing program 3: socket$kcm(0x2, 0x1, 0x84) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) 21:46:33 executing program 1: socketpair$unix(0x1, 0x0, 0x0, 0x0) socketpair(0x0, 0x2000000003, 0x0, &(0x7f00000005c0)) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) [ 1012.589857][T20748] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 21:46:34 executing program 4: gettid() r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700", 0x2c}], 0x1}, 0x0) [ 1012.646816][T20759] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 21:46:34 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)}], 0x1}, 0x0) 21:46:34 executing program 5: socket$kcm(0x2, 0x1, 0x84) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000900)=ANY=[@ANYBLOB="9f0d343f8f3672b246c5e3575e3bad29af7a982e5093be13037bae5e55d3901efcbad02c798684968abd7cd0f3463233c58a4171b61d275264b0c25a86770e422769c2240915668f9c27dcb8caa76b6b52bcf7f0234471abd5fa470b20eff96ea602ca594f7f1a08a7b251002c49eac4221ab3012d6c7c4d8505140e10"], 0x0, 0x7d}, 0x20) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) socketpair$unix(0x1, 0x4, 0x0, &(0x7f0000000240)) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) r1 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r1, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) [ 1012.818971][ T2836] libceph: connect (1)[d::]:6789 error -101 [ 1012.825001][ T2836] libceph: mon0 (1)[d::]:6789 connect error 21:46:34 executing program 4: gettid() r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700", 0x2c}], 0x1}, 0x0) 21:46:34 executing program 1: socketpair$unix(0x1, 0x0, 0x0, 0x0) socketpair(0x0, 0x2000000003, 0x0, &(0x7f00000005c0)) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) 21:46:34 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)}], 0x1}, 0x0) 21:46:34 executing program 3: socket$kcm(0x2, 0x1, 0x84) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) [ 1013.006548][T20878] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 21:46:34 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b", 0x17}], 0x1}, 0x0) 21:46:34 executing program 3: socket$kcm(0x2, 0x1, 0x84) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) 21:46:34 executing program 1: socketpair$unix(0x1, 0x0, 0x0, 0x0) socketpair(0x0, 0x2000000003, 0x0, &(0x7f00000005c0)) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) 21:46:34 executing program 4: gettid() r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700", 0x2c}], 0x1}, 0x0) 21:46:34 executing program 5: socket$kcm(0x2, 0x1, 0x84) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000900)=ANY=[@ANYBLOB="9f0d343f8f3672b246c5e3575e3bad29af7a982e5093be13037bae5e55d3901efcbad02c798684968abd7cd0f3463233c58a4171b61d275264b0c25a86770e422769c2240915668f9c27dcb8caa76b6b52bcf7f0234471abd5fa470b20eff96ea602ca594f7f1a08a7b251002c49eac4221ab3012d6c7c4d8505140e10"], 0x0, 0x7d}, 0x20) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) socketpair$unix(0x1, 0x4, 0x0, &(0x7f0000000240)) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) r1 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r1, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) [ 1013.351011][T20895] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 21:46:34 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b", 0x17}], 0x1}, 0x0) 21:46:34 executing program 1: socketpair$unix(0x1, 0x0, 0x0, 0x0) socketpair(0x1, 0x0, 0x0, &(0x7f00000005c0)) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) 21:46:34 executing program 4: gettid() r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0", 0x2d}], 0x1}, 0x0) 21:46:35 executing program 3: socket$kcm(0x2, 0x1, 0x84) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) [ 1013.592210][T21000] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 21:46:35 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b", 0x17}], 0x1}, 0x0) 21:46:35 executing program 4: gettid() r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0", 0x2d}], 0x1}, 0x0) 21:46:35 executing program 1: socketpair$unix(0x1, 0x0, 0x0, 0x0) socketpair(0x1, 0x0, 0x0, &(0x7f00000005c0)) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) [ 1013.715312][T21013] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 21:46:35 executing program 5: socket$kcm(0x2, 0x1, 0x84) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000900)=ANY=[@ANYBLOB="9f0d343f8f3672b246c5e3575e3bad29af7a982e5093be13037bae5e55d3901efcbad02c798684968abd7cd0f3463233c58a4171b61d275264b0c25a86770e422769c2240915668f9c27dcb8caa76b6b52bcf7f0234471abd5fa470b20eff96ea602ca594f7f1a08a7b251002c49eac4221ab3012d6c7c4d8505140e10"], 0x0, 0x7d}, 0x20) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) socketpair$unix(0x1, 0x4, 0x0, &(0x7f0000000240)) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) r1 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r1, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) 21:46:35 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) [ 1013.932520][T21024] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 21:46:35 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000", 0x23}], 0x1}, 0x0) 21:46:35 executing program 4: gettid() r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0", 0x2d}], 0x1}, 0x0) 21:46:35 executing program 1: socketpair$unix(0x1, 0x0, 0x0, 0x0) socketpair(0x1, 0x0, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) [ 1014.101608][T21025] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 21:46:35 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) 21:46:35 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000", 0x23}], 0x1}, 0x0) 21:46:35 executing program 5: socket$kcm(0x2, 0x1, 0x84) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000900)=ANY=[@ANYBLOB="9f0d343f8f3672b246c5e3575e3bad29af7a982e5093be13037bae5e55d3901efcbad02c798684968abd7cd0f3463233c58a4171b61d275264b0c25a86770e422769c2240915668f9c27dcb8caa76b6b52bcf7f0234471abd5fa470b20eff96ea602ca594f7f1a08a7b251002c49eac4221ab3012d6c7c4d8505140e10"], 0x0, 0x7d}, 0x20) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) socketpair$unix(0x1, 0x4, 0x0, &(0x7f0000000240)) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) r1 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r1, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) [ 1014.307266][T21038] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 21:46:35 executing program 4: socket$kcm(0x2, 0x1, 0x84) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000900)=ANY=[@ANYBLOB="9f0d343f8f3672b246c5e3575e3bad29af7a982e5093be13037bae5e55d3901efcbad02c798684968abd7cd0f3463233c58a4171b61d275264b0c25a86770e422769c2240915668f9c27dcb8caa76b6b52bcf7f0234471abd5fa470b20eff96ea602ca594f7f1a08a7b251002c49eac4221ab3012d6c7c4d8505140e10"], 0x0, 0x7d}, 0x20) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz0\x00', 0x200002, 0x0) openat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) 21:46:35 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000", 0x23}], 0x1}, 0x0) 21:46:35 executing program 1: socketpair$unix(0x1, 0x0, 0x0, 0x0) socketpair(0x1, 0x0, 0x0, 0x0) r0 = socket$kcm(0x10, 0x0, 0x10) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) [ 1014.498946][T21044] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 1014.640539][T21048] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 21:46:36 executing program 3: r0 = socket$kcm(0x10, 0x0, 0x10) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) 21:46:36 executing program 4: socket$kcm(0x2, 0x1, 0x84) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000900)=ANY=[@ANYBLOB="9f0d343f8f3672b246c5e3575e3bad29af7a982e5093be13037bae5e55d3901efcbad02c798684968abd7cd0f3463233c58a4171b61d275264b0c25a86770e422769c2240915668f9c27dcb8caa76b6b52bcf7f0234471abd5fa470b20eff96ea602ca594f7f1a08a7b251002c49eac4221ab3012d6c7c4d8505140e10"], 0x0, 0x7d}, 0x20) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz0\x00', 0x200002, 0x0) openat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) 21:46:36 executing program 1: socketpair$unix(0x1, 0x0, 0x0, 0x0) socketpair(0x1, 0x0, 0x0, 0x0) r0 = socket$kcm(0x10, 0x0, 0x10) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) [ 1014.849131][ T2836] libceph: mon1 (1)[::6]:6789 socket closed (con state CONNECTING) 21:46:36 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000", 0x29}], 0x1}, 0x0) 21:46:36 executing program 5: socket$kcm(0x2, 0x1, 0x84) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000900)=ANY=[@ANYBLOB="9f0d343f8f3672b246c5e3575e3bad29af7a982e5093be13037bae5e55d3901efcbad02c798684968abd7cd0f3463233c58a4171b61d275264b0c25a86770e422769c2240915668f9c27dcb8caa76b6b52bcf7f0234471abd5fa470b20eff96ea602ca594f7f1a08a7b251002c49eac4221ab3012d6c7c4d8505140e10"], 0x0, 0x7d}, 0x20) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz0\x00', 0x200002, 0x0) openat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) socketpair$unix(0x1, 0x4, 0x0, &(0x7f0000000240)) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) 21:46:36 executing program 3: r0 = socket$kcm(0x10, 0x0, 0x10) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) 21:46:36 executing program 1: socketpair$unix(0x1, 0x0, 0x0, 0x0) socketpair(0x1, 0x0, 0x0, 0x0) r0 = socket$kcm(0x10, 0x0, 0x10) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) 21:46:36 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000", 0x29}], 0x1}, 0x0) [ 1015.119938][T21063] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 21:46:36 executing program 3: r0 = socket$kcm(0x10, 0x0, 0x10) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) 21:46:36 executing program 5: socket$kcm(0x2, 0x1, 0x84) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000900)=ANY=[@ANYBLOB="9f0d343f8f3672b246c5e3575e3bad29af7a982e5093be13037bae5e55d3901efcbad02c798684968abd7cd0f3463233c58a4171b61d275264b0c25a86770e422769c2240915668f9c27dcb8caa76b6b52bcf7f0234471abd5fa470b20eff96ea602ca594f7f1a08a7b251002c49eac4221ab3012d6c7c4d8505140e10"], 0x0, 0x7d}, 0x20) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz0\x00', 0x200002, 0x0) openat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) socketpair$unix(0x1, 0x4, 0x0, &(0x7f0000000240)) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) 21:46:36 executing program 1: socketpair$unix(0x1, 0x0, 0x0, 0x0) socketpair(0x1, 0x0, 0x0, 0x0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) 21:46:36 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000", 0x29}], 0x1}, 0x0) 21:46:36 executing program 4: socket$kcm(0x2, 0x1, 0x84) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000900)=ANY=[@ANYBLOB="9f0d343f8f3672b246c5e3575e3bad29af7a982e5093be13037bae5e55d3901efcbad02c798684968abd7cd0f3463233c58a4171b61d275264b0c25a86770e422769c2240915668f9c27dcb8caa76b6b52bcf7f0234471abd5fa470b20eff96ea602ca594f7f1a08a7b251002c49eac4221ab3012d6c7c4d8505140e10"], 0x0, 0x7d}, 0x20) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz0\x00', 0x200002, 0x0) openat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) socketpair$unix(0x1, 0x4, 0x0, &(0x7f0000000240)) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) 21:46:36 executing program 1: socketpair$unix(0x1, 0x0, 0x0, 0x0) socketpair(0x1, 0x0, 0x0, 0x0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) [ 1015.433116][T21089] __nla_validate_parse: 27 callbacks suppressed [ 1015.433126][T21089] netlink: 22 bytes leftover after parsing attributes in process `syz-executor.5'. 21:46:36 executing program 3: socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) [ 1015.499590][T21089] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 1015.514304][T21093] netlink: 22 bytes leftover after parsing attributes in process `syz-executor.4'. 21:46:37 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700", 0x2c}], 0x1}, 0x0) [ 1015.583365][T21093] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 21:46:37 executing program 5: socket$kcm(0x2, 0x1, 0x84) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000900)=ANY=[@ANYBLOB="9f0d343f8f3672b246c5e3575e3bad29af7a982e5093be13037bae5e55d3901efcbad02c798684968abd7cd0f3463233c58a4171b61d275264b0c25a86770e422769c2240915668f9c27dcb8caa76b6b52bcf7f0234471abd5fa470b20eff96ea602ca594f7f1a08a7b251002c49eac4221ab3012d6c7c4d8505140e10"], 0x0, 0x7d}, 0x20) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz0\x00', 0x200002, 0x0) openat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) socketpair$unix(0x1, 0x4, 0x0, &(0x7f0000000240)) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) 21:46:37 executing program 3: socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) 21:46:37 executing program 1: socketpair$unix(0x1, 0x0, 0x0, 0x0) socketpair(0x1, 0x0, 0x0, 0x0) socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) 21:46:37 executing program 4: socket$kcm(0x2, 0x1, 0x84) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000900)=ANY=[@ANYBLOB="9f0d343f8f3672b246c5e3575e3bad29af7a982e5093be13037bae5e55d3901efcbad02c798684968abd7cd0f3463233c58a4171b61d275264b0c25a86770e422769c2240915668f9c27dcb8caa76b6b52bcf7f0234471abd5fa470b20eff96ea602ca594f7f1a08a7b251002c49eac4221ab3012d6c7c4d8505140e10"], 0x0, 0x7d}, 0x20) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz0\x00', 0x200002, 0x0) openat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) sendmsg$kcm(r2, 0x0, 0xfffffffffffffffc) r3 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r3, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) [ 1015.810585][T21107] netlink: 22 bytes leftover after parsing attributes in process `syz-executor.5'. 21:46:37 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700", 0x2c}], 0x1}, 0x0) [ 1015.909090][T21107] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 1015.930228][T21112] netlink: 22 bytes leftover after parsing attributes in process `syz-executor.4'. 21:46:37 executing program 3: socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) 21:46:37 executing program 1: socketpair$unix(0x1, 0x0, 0x0, 0x0) socketpair(0x1, 0x0, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, 0x0, 0x0) [ 1015.990461][T21112] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 21:46:37 executing program 5: socket$kcm(0x2, 0x1, 0x84) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz0\x00', 0x200002, 0x0) openat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) socketpair$unix(0x1, 0x4, 0x0, &(0x7f0000000240)) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) 21:46:37 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700", 0x2c}], 0x1}, 0x0) 21:46:37 executing program 1: socketpair$unix(0x1, 0x0, 0x0, 0x0) socketpair(0x1, 0x0, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, 0x0, 0x0) 21:46:37 executing program 4: socket$kcm(0x2, 0x1, 0x84) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000900)=ANY=[@ANYBLOB="9f0d343f8f3672b246c5e3575e3bad29af7a982e5093be13037bae5e55d3901efcbad02c798684968abd7cd0f3463233c58a4171b61d275264b0c25a86770e422769c2240915668f9c27dcb8caa76b6b52bcf7f0234471abd5fa470b20eff96ea602ca594f7f1a08a7b251002c49eac4221ab3012d6c7c4d8505140e10"], 0x0, 0x7d}, 0x20) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz0\x00', 0x200002, 0x0) openat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) socketpair$unix(0x1, 0x4, 0x0, &(0x7f0000000240)) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) 21:46:37 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, 0x0, 0x0) [ 1016.289819][T21128] netlink: 22 bytes leftover after parsing attributes in process `syz-executor.5'. 21:46:37 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0", 0x2d}], 0x1}, 0x0) [ 1016.352297][T21128] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 1016.412873][T21135] netlink: 22 bytes leftover after parsing attributes in process `syz-executor.4'. 21:46:37 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, 0x0, 0x0) 21:46:37 executing program 5: socket$kcm(0x2, 0x1, 0x84) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz0\x00', 0x200002, 0x0) openat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) socketpair$unix(0x1, 0x4, 0x0, &(0x7f0000000240)) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) [ 1016.462845][T21135] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 21:46:37 executing program 1: socketpair$unix(0x1, 0x0, 0x0, 0x0) socketpair(0x1, 0x0, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, 0x0, 0x0) 21:46:38 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0", 0x2d}], 0x1}, 0x0) [ 1016.687652][T21151] netlink: 22 bytes leftover after parsing attributes in process `syz-executor.5'. 21:46:38 executing program 1: socketpair$unix(0x1, 0x0, 0x0, 0x0) socketpair(0x1, 0x0, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, 0x0}, 0x0) 21:46:38 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, 0x0, 0x0) [ 1016.737608][T21151] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 21:46:38 executing program 4: socket$kcm(0x2, 0x1, 0x84) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000900)=ANY=[@ANYBLOB="9f0d343f8f3672b246c5e3575e3bad29af7a982e5093be13037bae5e55d3901efcbad02c798684968abd7cd0f3463233c58a4171b61d275264b0c25a86770e422769c2240915668f9c27dcb8caa76b6b52bcf7f0234471abd5fa470b20eff96ea602ca594f7f1a08a7b251002c49eac4221ab3012d6c7c4d8505140e10"], 0x0, 0x7d}, 0x20) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz0\x00', 0x200002, 0x0) openat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) socketpair$unix(0x1, 0x4, 0x0, &(0x7f0000000240)) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) [ 1016.819097][ T2836] libceph: mon1 (1)[::6]:6789 socket error on write 21:46:38 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0", 0x2d}], 0x1}, 0x0) 21:46:38 executing program 5: socket$kcm(0x2, 0x1, 0x84) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz0\x00', 0x200002, 0x0) openat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) socketpair$unix(0x1, 0x4, 0x0, &(0x7f0000000240)) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) [ 1016.863435][ T2836] libceph: connect (1)[d::]:6789 error -101 [ 1016.883513][ T2836] libceph: mon0 (1)[d::]:6789 connect error 21:46:38 executing program 1: socketpair$unix(0x1, 0x0, 0x0, 0x0) socketpair(0x1, 0x0, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, 0x0}, 0x0) [ 1016.995775][T21162] netlink: 22 bytes leftover after parsing attributes in process `syz-executor.4'. 21:46:38 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, 0x0}, 0x0) 21:46:38 executing program 2: socket$kcm(0x2, 0x1, 0x84) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz0\x00', 0x200002, 0x0) openat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) socketpair$unix(0x1, 0x4, 0x0, &(0x7f0000000240)) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) [ 1017.097600][T21170] netlink: 22 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1017.102636][T21162] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 21:46:38 executing program 1: socketpair$unix(0x1, 0x0, 0x0, 0x0) socketpair(0x1, 0x0, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, 0x0}, 0x0) 21:46:38 executing program 5: socket$kcm(0x2, 0x1, 0x84) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz0\x00', 0x200002, 0x0) openat$cgroup(r0, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) socketpair$unix(0x1, 0x4, 0x0, &(0x7f0000000240)) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) r1 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r1, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) 21:46:38 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, 0x0}, 0x0) 21:46:38 executing program 4: socket$kcm(0x2, 0x1, 0x84) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000900)=ANY=[@ANYBLOB="9f0d343f8f3672b246c5e3575e3bad29af7a982e5093be13037bae5e55d3901efcbad02c798684968abd7cd0f3463233c58a4171b61d275264b0c25a86770e422769c2240915668f9c27dcb8caa76b6b52bcf7f0234471abd5fa470b20eff96ea602ca594f7f1a08a7b251002c49eac4221ab3012d6c7c4d8505140e10"], 0x0, 0x7d}, 0x20) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz0\x00', 0x200002, 0x0) openat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) socketpair$unix(0x1, 0x4, 0x0, &(0x7f0000000240)) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) [ 1017.358278][T21179] netlink: 22 bytes leftover after parsing attributes in process `syz-executor.2'. 21:46:38 executing program 1: socketpair$unix(0x1, 0x0, 0x0, 0x0) socketpair(0x1, 0x0, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)}, 0x0) [ 1017.431241][T21179] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 21:46:38 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, 0x0}, 0x0) 21:46:39 executing program 5: socket$kcm(0x2, 0x1, 0x84) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz0\x00', 0x200002, 0x0) openat$cgroup(r0, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) socketpair$unix(0x1, 0x4, 0x0, &(0x7f0000000240)) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) r1 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r1, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) 21:46:39 executing program 2: socket$kcm(0x2, 0x1, 0x84) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000900)=ANY=[@ANYBLOB="9f0d343f8f3672b246c5e3575e3bad29af7a982e5093be13037bae5e55d3901efcbad02c798684968abd7cd0f3463233c58a4171b61d275264b0c25a86770e422769c2240915668f9c27dcb8caa76b6b52bcf7f0234471abd5fa470b20eff96ea602ca594f7f1a08a7b251002c49eac4221ab3012d6c7c4d8505140e10"], 0x0, 0x7d}, 0x20) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz0\x00', 0x200002, 0x0) openat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) socketpair$unix(0x1, 0x4, 0x0, &(0x7f0000000240)) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) [ 1017.589106][T21188] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 21:46:39 executing program 1: socketpair$unix(0x1, 0x0, 0x0, 0x0) socketpair(0x1, 0x0, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)}, 0x0) 21:46:39 executing program 4: socket$kcm(0x2, 0x1, 0x84) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000900)=ANY=[@ANYBLOB="9f0d343f8f3672b246c5e3575e3bad29af7a982e5093be13037bae5e55d3901efcbad02c798684968abd7cd0f3463233c58a4171b61d275264b0c25a86770e422769c2240915668f9c27dcb8caa76b6b52bcf7f0234471abd5fa470b20eff96ea602ca594f7f1a08a7b251002c49eac4221ab3012d6c7c4d8505140e10"], 0x0, 0x7d}, 0x20) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz0\x00', 0x200002, 0x0) openat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) socketpair$unix(0x1, 0x4, 0x0, &(0x7f0000000240)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) [ 1017.785182][T21203] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 1017.788992][ T2836] libceph: connect (1)[d::]:6789 error -101 21:46:39 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)}, 0x0) [ 1017.836455][ T2836] libceph: mon0 (1)[d::]:6789 connect error [ 1017.844627][T21201] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 21:46:39 executing program 1: socketpair$unix(0x1, 0x0, 0x0, 0x0) socketpair(0x1, 0x0, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)}, 0x0) 21:46:39 executing program 2: socket$kcm(0x2, 0x1, 0x84) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) 21:46:39 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)}, 0x0) 21:46:39 executing program 5: socket$kcm(0x2, 0x1, 0x84) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz0\x00', 0x200002, 0x0) openat$cgroup(r0, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) socketpair$unix(0x1, 0x4, 0x0, &(0x7f0000000240)) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) r1 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r1, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) 21:46:39 executing program 1: socketpair$unix(0x1, 0x0, 0x0, 0x0) socketpair(0x1, 0x0, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{0x0}], 0x1}, 0x0) [ 1018.084638][T21216] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 21:46:39 executing program 4: socket$kcm(0x2, 0x1, 0x84) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000900)=ANY=[@ANYBLOB="9f0d343f8f3672b246c5e3575e3bad29af7a982e5093be13037bae5e55d3901efcbad02c798684968abd7cd0f3463233c58a4171b61d275264b0c25a86770e422769c2240915668f9c27dcb8caa76b6b52bcf7f0234471abd5fa470b20eff96ea602ca594f7f1a08a7b251002c49eac4221ab3012d6c7c4d8505140e10"], 0x0, 0x7d}, 0x20) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz0\x00', 0x200002, 0x0) openat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) socketpair$unix(0x1, 0x4, 0x0, &(0x7f0000000240)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) 21:46:39 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)}, 0x0) 21:46:39 executing program 2: socket$kcm(0x2, 0x1, 0x84) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000900)=ANY=[@ANYBLOB="9f0d343f8f3672b246c5e3575e3bad29af7a982e5093be13037bae5e55d3901efcbad02c798684968abd7cd0f3463233c58a4171b61d275264b0c25a86770e422769c2240915668f9c27dcb8caa76b6b52bcf7f0234471abd5fa470b20eff96ea602ca594f7f1a08a7b251002c49eac4221ab3012d6c7c4d8505140e10"], 0x0, 0x7d}, 0x20) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz0\x00', 0x200002, 0x0) openat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) socketpair$unix(0x1, 0x4, 0x0, &(0x7f0000000240)) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) 21:46:39 executing program 1: socketpair$unix(0x1, 0x0, 0x0, 0x0) socketpair(0x1, 0x0, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{0x0}], 0x1}, 0x0) 21:46:39 executing program 4: socket$kcm(0x2, 0x1, 0x84) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000900)=ANY=[@ANYBLOB="9f0d343f8f3672b246c5e3575e3bad29af7a982e5093be13037bae5e55d3901efcbad02c798684968abd7cd0f3463233c58a4171b61d275264b0c25a86770e422769c2240915668f9c27dcb8caa76b6b52bcf7f0234471abd5fa470b20eff96ea602ca594f7f1a08a7b251002c49eac4221ab3012d6c7c4d8505140e10"], 0x0, 0x7d}, 0x20) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz0\x00', 0x200002, 0x0) openat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) socketpair$unix(0x1, 0x4, 0x0, &(0x7f0000000240)) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) [ 1018.339739][T21228] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 21:46:39 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{0x0}], 0x1}, 0x0) 21:46:39 executing program 5: socket$kcm(0x2, 0x1, 0x84) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz0\x00', 0x200002, 0x0) openat$cgroup(r0, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) socketpair$unix(0x1, 0x4, 0x0, &(0x7f0000000240)) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) r1 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r1, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) [ 1018.478170][T21236] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 21:46:40 executing program 4: socket$kcm(0x2, 0x1, 0x84) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000900)=ANY=[@ANYBLOB="9f0d343f8f3672b246c5e3575e3bad29af7a982e5093be13037bae5e55d3901efcbad02c798684968abd7cd0f3463233c58a4171b61d275264b0c25a86770e422769c2240915668f9c27dcb8caa76b6b52bcf7f0234471abd5fa470b20eff96ea602ca594f7f1a08a7b251002c49eac4221ab3012d6c7c4d8505140e10"], 0x0, 0x7d}, 0x20) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz0\x00', 0x200002, 0x0) openat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) 21:46:40 executing program 1: socketpair$unix(0x1, 0x0, 0x0, 0x0) socketpair(0x1, 0x0, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{0x0}], 0x1}, 0x0) 21:46:40 executing program 1: socketpair$unix(0x1, 0x0, 0x0, 0x0) socketpair(0x1, 0x0, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)}], 0x1}, 0x0) 21:46:40 executing program 2: socket$kcm(0x2, 0x1, 0x84) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000900)=ANY=[@ANYBLOB="9f0d343f8f3672b246c5e3575e3bad29af7a982e5093be13037bae5e55d3901efcbad02c798684968abd7cd0f3463233c58a4171b61d275264b0c25a86770e422769c2240915668f9c27dcb8caa76b6b52bcf7f0234471abd5fa470b20eff96ea602ca594f7f1a08a7b251002c49eac4221ab3012d6c7c4d8505140e10"], 0x0, 0x7d}, 0x20) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz0\x00', 0x200002, 0x0) openat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) sendmsg$kcm(r2, 0x0, 0xfffffffffffffffc) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup/syz1\x00', 0x200002, 0x0) gettid() r3 = socket$kcm(0x11, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000000200)={&(0x7f0000000040)=@nfc, 0x80, 0x0}, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r4 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r4, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) [ 1018.764174][T21254] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 21:46:40 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{0x0}], 0x1}, 0x0) 21:46:40 executing program 4: socket$kcm(0x2, 0x1, 0x84) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000900)=ANY=[@ANYBLOB="9f0d343f8f3672b246c5e3575e3bad29af7a982e5093be13037bae5e55d3901efcbad02c798684968abd7cd0f3463233c58a4171b61d275264b0c25a86770e422769c2240915668f9c27dcb8caa76b6b52bcf7f0234471abd5fa470b20eff96ea602ca594f7f1a08a7b251002c49eac4221ab3012d6c7c4d8505140e10"], 0x0, 0x7d}, 0x20) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz0\x00', 0x200002, 0x0) openat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) [ 1018.839819][T21250] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 21:46:40 executing program 1: socketpair$unix(0x1, 0x0, 0x0, 0x0) socketpair(0x1, 0x0, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)}], 0x1}, 0x0) 21:46:40 executing program 5: socket$kcm(0x2, 0x1, 0x84) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz0\x00', 0x200002, 0x0) openat$cgroup(r0, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) socketpair$unix(0x1, 0x4, 0x0, &(0x7f0000000240)) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) r1 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r1, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) 21:46:40 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{0x0}], 0x1}, 0x0) [ 1019.033435][T21259] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 21:46:40 executing program 1: socketpair$unix(0x1, 0x0, 0x0, 0x0) socketpair(0x1, 0x0, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)}], 0x1}, 0x0) [ 1019.097060][T21268] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 21:46:40 executing program 2: socket$kcm(0x2, 0x1, 0x84) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz0\x00', 0x200002, 0x0) openat$cgroup(r0, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) socketpair$unix(0x1, 0x4, 0x0, &(0x7f0000000240)) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) r1 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r1, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) 21:46:40 executing program 4: socket$kcm(0x2, 0x1, 0x84) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000900)=ANY=[@ANYBLOB="9f0d343f8f3672b246c5e3575e3bad29af7a982e5093be13037bae5e55d3901efcbad02c798684968abd7cd0f3463233c58a4171b61d275264b0c25a86770e422769c2240915668f9c27dcb8caa76b6b52bcf7f0234471abd5fa470b20eff96ea602ca594f7f1a08a7b251002c49eac4221ab3012d6c7c4d8505140e10"], 0x0, 0x7d}, 0x20) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz0\x00', 0x200002, 0x0) r1 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r1, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) [ 1019.277373][T21280] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 21:46:40 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)}], 0x1}, 0x0) 21:46:40 executing program 1: socketpair$unix(0x1, 0x0, 0x0, 0x0) socketpair(0x1, 0x0, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b", 0x17}], 0x1}, 0x0) 21:46:40 executing program 2: socket$kcm(0x2, 0x1, 0x84) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000900)=ANY=[@ANYBLOB="9f0d343f8f3672b246c5e3575e3bad29af7a982e5093be13037bae5e55d3901efcbad02c798684968abd7cd0f3463233c58a4171b61d275264b0c25a86770e422769c2240915668f9c27dcb8caa76b6b52bcf7f0234471abd5fa470b20eff96ea602ca594f7f1a08a7b251002c49eac4221ab3012d6c7c4d8505140e10"], 0x0, 0x7d}, 0x20) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz0\x00', 0x200002, 0x0) r2 = openat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) sendmsg$kcm(r3, 0x0, 0xfffffffffffffffc) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup/syz1\x00', 0x200002, 0x0) gettid() r4 = socket$kcm(0x11, 0x2, 0x0) sendmsg$kcm(r4, &(0x7f0000000200)={&(0x7f0000000040)=@nfc, 0x80, 0x0}, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) mkdirat$cgroup(r5, 0x0, 0x1ff) socket$kcm(0x11, 0x2, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000140)={r2, 0xc, 0x1, 0xd8, 0x0}, 0x20) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x2, 0x1c, &(0x7f0000000980)=ANY=[@ANYBLOB="8500000f7d00b7e1ff9724002ac8991601ad814eeb7b4fd5ee25ba83a72ba28f97cb0c9ad407e03f98a2f54eaabb372d8199ad6306ede43a67863593c59251df04459fa354dc3b820501f3ffb58bc4730f78e709652743498eae4839051b2c3d0510147acda9508c01c6dbdaf0a0ee718e67d02249d4d17ee4bbb35ba26fe4aba8fbbcc6d66b645c1671ebadcb84b4fe35d132e5f9a948606f334c3886bfbaf2a0bc045aa7f78f20f94bd9f0658ade293b596d237ddc80d851ec788ba03bdf1a552e3dff57c71a71f10e65802308ac57ae9ab961c16910be5f00c31095d821339125"], &(0x7f0000000340)='syzkaller\x00', 0x1, 0x82, &(0x7f0000000480)=""/130, 0x40f00, 0x4, [], 0x0, 0x10, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000000580)={0x4, 0x7, 0x6, 0xffffffff}, 0x10}, 0x70) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r6, 0xc0, &(0x7f0000000800)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)=0x4, 0x0, 0x0, 0x0, &(0x7f0000000440)={0x1, 0x4}, 0x0, 0x0, &(0x7f0000000740)={0x4, 0x3, 0x3, 0x553}, &(0x7f0000000780)=0x5, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=0x100000001}}, 0x10) r7 = syz_open_dev$adsp(&(0x7f0000000300)='/dev/adsp#\x00', 0x0, 0x10080) write$FUSE_INTERRUPT(r7, &(0x7f0000000400)={0x10, 0x0, 0x5}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0xffffffffffffffcf) close(r3) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) r8 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r8, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) 21:46:40 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)}], 0x1}, 0x0) [ 1019.509961][T21285] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 21:46:41 executing program 5: socket$kcm(0x2, 0x1, 0x84) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz0\x00', 0x200002, 0x0) openat$cgroup(r0, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) socketpair$unix(0x1, 0x4, 0x0, &(0x7f0000000240)) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) r1 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r1, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) 21:46:41 executing program 1: socketpair$unix(0x1, 0x0, 0x0, 0x0) socketpair(0x1, 0x0, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b", 0x17}], 0x1}, 0x0) 21:46:41 executing program 4: socket$kcm(0x2, 0x1, 0x84) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000900)=ANY=[@ANYBLOB="9f0d343f8f3672b246c5e3575e3bad29af7a982e5093be13037bae5e55d3901efcbad02c798684968abd7cd0f3463233c58a4171b61d275264b0c25a86770e422769c2240915668f9c27dcb8caa76b6b52bcf7f0234471abd5fa470b20eff96ea602ca594f7f1a08a7b251002c49eac4221ab3012d6c7c4d8505140e10"], 0x0, 0x7d}, 0x20) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz0\x00', 0x200002, 0x0) r1 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r1, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) 21:46:41 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)}], 0x1}, 0x0) 21:46:41 executing program 1: socketpair$unix(0x1, 0x0, 0x0, 0x0) socketpair(0x1, 0x0, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b", 0x17}], 0x1}, 0x0) [ 1019.839525][T21299] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 1019.967088][T21297] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 21:46:41 executing program 5: socket$kcm(0x2, 0x1, 0x84) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz0\x00', 0x200002, 0x0) openat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) socketpair$unix(0x1, 0x4, 0x0, &(0x7f0000000240)) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) 21:46:41 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b", 0x17}], 0x1}, 0x0) 21:46:41 executing program 1: socketpair$unix(0x1, 0x0, 0x0, 0x0) socketpair(0x1, 0x0, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000", 0x23}], 0x1}, 0x0) 21:46:41 executing program 4: socket$kcm(0x2, 0x1, 0x84) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000900)=ANY=[@ANYBLOB="9f0d343f8f3672b246c5e3575e3bad29af7a982e5093be13037bae5e55d3901efcbad02c798684968abd7cd0f3463233c58a4171b61d275264b0c25a86770e422769c2240915668f9c27dcb8caa76b6b52bcf7f0234471abd5fa470b20eff96ea602ca594f7f1a08a7b251002c49eac4221ab3012d6c7c4d8505140e10"], 0x0, 0x7d}, 0x20) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz0\x00', 0x200002, 0x0) r1 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r1, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) [ 1020.151175][T21314] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 21:46:41 executing program 2: socket$kcm(0x2, 0x1, 0x84) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz0\x00', 0x200002, 0x0) openat$cgroup(r0, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) socketpair$unix(0x1, 0x4, 0x0, &(0x7f0000000240)) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) r1 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r1, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) 21:46:41 executing program 5: socket$kcm(0x2, 0x1, 0x84) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz0\x00', 0x200002, 0x0) openat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) socketpair$unix(0x1, 0x4, 0x0, &(0x7f0000000240)) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) [ 1020.257027][T21321] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 21:46:41 executing program 1: socketpair$unix(0x1, 0x0, 0x0, 0x0) socketpair(0x1, 0x0, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000", 0x23}], 0x1}, 0x0) 21:46:41 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b", 0x17}], 0x1}, 0x0) [ 1020.425257][T21330] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 1020.442718][T21327] __nla_validate_parse: 20 callbacks suppressed [ 1020.442729][T21327] netlink: 22 bytes leftover after parsing attributes in process `syz-executor.2'. 21:46:41 executing program 4: socket$kcm(0x2, 0x1, 0x84) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000900)=ANY=[@ANYBLOB="9f0d343f8f3672b246c5e3575e3bad29af7a982e5093be13037bae5e55d3901efcbad02c798684968abd7cd0f3463233c58a4171b61d275264b0c25a86770e422769c2240915668f9c27dcb8caa76b6b52bcf7f0234471abd5fa470b20eff96ea602ca594f7f1a08a7b251002c49eac4221ab3012d6c7c4d8505140e10"], 0x0, 0x7d}, 0x20) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) r1 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r1, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) 21:46:42 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b", 0x17}], 0x1}, 0x0) 21:46:42 executing program 1: socketpair$unix(0x1, 0x0, 0x0, 0x0) socketpair(0x1, 0x0, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000", 0x23}], 0x1}, 0x0) [ 1020.553633][T21327] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 21:46:42 executing program 5: socket$kcm(0x2, 0x1, 0x84) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz0\x00', 0x200002, 0x0) openat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) socketpair$unix(0x1, 0x4, 0x0, &(0x7f0000000240)) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) [ 1020.637511][T21339] netlink: 22 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1020.699754][T21339] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 21:46:42 executing program 2: socket$kcm(0x2, 0x1, 0x84) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000900)=ANY=[@ANYBLOB="9f0d343f8f3672b246c5e3575e3bad29af7a982e5093be13037bae5e55d3901efcbad02c798684968abd7cd0f3463233c58a4171b61d275264b0c25a86770e422769c2240915668f9c27dcb8caa76b6b52bcf7f0234471abd5fa470b20eff96ea602ca594f7f1a08a7b251002c49eac4221ab3012d6c7c4d8505140e10"], 0x0, 0x7d}, 0x20) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz0\x00', 0x200002, 0x0) r1 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r1, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) 21:46:42 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000", 0x23}], 0x1}, 0x0) 21:46:42 executing program 1: socketpair$unix(0x1, 0x0, 0x0, 0x0) socketpair(0x1, 0x0, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000", 0x29}], 0x1}, 0x0) [ 1020.820535][T21348] netlink: 22 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1020.852535][T21348] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 21:46:42 executing program 4: socket$kcm(0x2, 0x1, 0x84) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000900)=ANY=[@ANYBLOB="9f0d343f8f3672b246c5e3575e3bad29af7a982e5093be13037bae5e55d3901efcbad02c798684968abd7cd0f3463233c58a4171b61d275264b0c25a86770e422769c2240915668f9c27dcb8caa76b6b52bcf7f0234471abd5fa470b20eff96ea602ca594f7f1a08a7b251002c49eac4221ab3012d6c7c4d8505140e10"], 0x0, 0x7d}, 0x20) openat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) r1 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r1, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) 21:46:42 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000", 0x23}], 0x1}, 0x0) [ 1021.034204][T21360] netlink: 22 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1021.039792][T21357] netlink: 22 bytes leftover after parsing attributes in process `syz-executor.2'. 21:46:42 executing program 1: socketpair$unix(0x1, 0x0, 0x0, 0x0) socketpair(0x1, 0x0, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000", 0x29}], 0x1}, 0x0) [ 1021.080216][T21360] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 21:46:42 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz0\x00', 0x200002, 0x0) openat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) socketpair$unix(0x1, 0x4, 0x0, &(0x7f0000000240)) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) 21:46:42 executing program 2: socket$kcm(0x2, 0x1, 0x84) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz0\x00', 0x200002, 0x0) openat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) socketpair$unix(0x1, 0x4, 0x0, &(0x7f0000000240)) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) 21:46:42 executing program 1: socketpair$unix(0x1, 0x0, 0x0, 0x0) socketpair(0x1, 0x0, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000", 0x29}], 0x1}, 0x0) 21:46:42 executing program 4: socket$kcm(0x2, 0x1, 0x84) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000900)=ANY=[@ANYBLOB="9f0d343f8f3672b246c5e3575e3bad29af7a982e5093be13037bae5e55d3901efcbad02c798684968abd7cd0f3463233c58a4171b61d275264b0c25a86770e422769c2240915668f9c27dcb8caa76b6b52bcf7f0234471abd5fa470b20eff96ea602ca594f7f1a08a7b251002c49eac4221ab3012d6c7c4d8505140e10"], 0x0, 0x7d}, 0x20) openat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) r1 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r1, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) 21:46:42 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000", 0x23}], 0x1}, 0x0) [ 1021.279523][T21369] netlink: 22 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1021.386180][T21369] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 21:46:42 executing program 1: socketpair$unix(0x1, 0x0, 0x0, 0x0) socketpair(0x1, 0x0, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700", 0x2c}], 0x1}, 0x0) [ 1021.441132][T21377] netlink: 22 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1021.456044][T21381] netlink: 22 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1021.465324][T21377] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 21:46:42 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz0\x00', 0x200002, 0x0) openat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) socketpair$unix(0x1, 0x4, 0x0, &(0x7f0000000240)) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) 21:46:42 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000", 0x29}], 0x1}, 0x0) [ 1021.533730][T21381] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 21:46:43 executing program 1: socketpair$unix(0x1, 0x0, 0x0, 0x0) socketpair(0x1, 0x0, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700", 0x2c}], 0x1}, 0x0) 21:46:43 executing program 2 (fault-call:1 fault-nth:0): r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) 21:46:43 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000", 0x29}], 0x1}, 0x0) [ 1021.734580][T21394] FAULT_INJECTION: forcing a failure. [ 1021.734580][T21394] name failslab, interval 1, probability 0, space 0, times 0 [ 1021.777234][T21394] CPU: 1 PID: 21394 Comm: syz-executor.2 Not tainted 5.4.0-rc7+ #0 [ 1021.785179][T21394] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1021.795248][T21394] Call Trace: [ 1021.798552][T21394] dump_stack+0x197/0x210 [ 1021.801527][T21390] netlink: 22 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1021.802899][T21394] should_fail.cold+0xa/0x15 [ 1021.802922][T21394] ? fault_create_debugfs_attr+0x180/0x180 [ 1021.822586][T21394] ? ___might_sleep+0x163/0x2c0 [ 1021.827450][T21394] __should_failslab+0x121/0x190 [ 1021.832409][T21394] should_failslab+0x9/0x14 [ 1021.836918][T21394] kmem_cache_alloc_node+0x268/0x740 [ 1021.842270][T21394] __alloc_skb+0xd5/0x5e0 [ 1021.842290][T21394] ? __kmalloc_reserve.isra.0+0xf0/0xf0 [ 1021.852155][T21394] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1021.858485][T21394] ? netlink_autobind.isra.0+0x228/0x310 [ 1021.864141][T21394] netlink_sendmsg+0x972/0xd60 [ 1021.868922][T21394] ? netlink_unicast+0x710/0x710 [ 1021.873868][T21394] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 1021.879443][T21394] ? apparmor_socket_sendmsg+0x2a/0x30 [ 1021.885032][T21394] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1021.886426][T21390] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 1021.891277][T21394] ? security_socket_sendmsg+0x8d/0xc0 [ 1021.891296][T21394] ? netlink_unicast+0x710/0x710 [ 1021.891314][T21394] sock_sendmsg+0xd7/0x130 [ 1021.891332][T21394] ___sys_sendmsg+0x803/0x920 [ 1021.891352][T21394] ? copy_msghdr_from_user+0x440/0x440 [ 1021.891378][T21394] ? __kasan_check_read+0x11/0x20 [ 1021.891397][T21394] ? __fget+0x384/0x560 [ 1021.891420][T21394] ? ksys_dup3+0x3e0/0x3e0 [ 1021.891446][T21394] ? __fget_light+0x1a9/0x230 [ 1021.891462][T21394] ? __fdget+0x1b/0x20 [ 1021.891478][T21394] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1021.891501][T21394] __sys_sendmsg+0x105/0x1d0 [ 1021.958887][T21394] ? __sys_sendmsg_sock+0xd0/0xd0 [ 1021.963916][T21394] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 1021.969365][T21394] ? do_syscall_64+0x26/0x760 [ 1021.974036][T21394] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1021.980093][T21394] ? do_syscall_64+0x26/0x760 [ 1021.984765][T21394] __x64_sys_sendmsg+0x78/0xb0 [ 1021.989519][T21394] do_syscall_64+0xfa/0x760 [ 1021.994011][T21394] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1021.999891][T21394] RIP: 0033:0x45a219 [ 1022.003770][T21394] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 21:46:43 executing program 4: socket$kcm(0x2, 0x1, 0x84) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000900)=ANY=[@ANYBLOB="9f0d343f8f3672b246c5e3575e3bad29af7a982e5093be13037bae5e55d3901efcbad02c798684968abd7cd0f3463233c58a4171b61d275264b0c25a86770e422769c2240915668f9c27dcb8caa76b6b52bcf7f0234471abd5fa470b20eff96ea602ca594f7f1a08a7b251002c49eac4221ab3012d6c7c4d8505140e10"], 0x0, 0x7d}, 0x20) openat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) r1 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r1, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) [ 1022.023369][T21394] RSP: 002b:00007f4cb7e40c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1022.031768][T21394] RAX: ffffffffffffffda RBX: 00007f4cb7e40c90 RCX: 000000000045a219 [ 1022.039724][T21394] RDX: 0000000000000000 RSI: 0000000020000600 RDI: 0000000000000003 [ 1022.047681][T21394] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1022.055648][T21394] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4cb7e416d4 [ 1022.063608][T21394] R13: 00000000004c86ec R14: 00000000004decb0 R15: 0000000000000004 21:46:43 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000", 0x29}], 0x1}, 0x0) 21:46:43 executing program 1: socketpair$unix(0x1, 0x0, 0x0, 0x0) socketpair(0x1, 0x0, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700", 0x2c}], 0x1}, 0x0) [ 1022.156515][T21404] netlink: 22 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1022.169862][T21404] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 21:46:43 executing program 2 (fault-call:1 fault-nth:1): r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) 21:46:43 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz0\x00', 0x200002, 0x0) openat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) socketpair$unix(0x1, 0x4, 0x0, &(0x7f0000000240)) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) 21:46:43 executing program 1: socketpair$unix(0x1, 0x0, 0x0, 0x0) socketpair(0x1, 0x0, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0", 0x2d}], 0x1}, 0x0) 21:46:43 executing program 4: socket$kcm(0x2, 0x1, 0x84) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) r1 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r1, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) [ 1022.354871][T21413] FAULT_INJECTION: forcing a failure. [ 1022.354871][T21413] name failslab, interval 1, probability 0, space 0, times 0 [ 1022.408794][T21413] CPU: 0 PID: 21413 Comm: syz-executor.2 Not tainted 5.4.0-rc7+ #0 [ 1022.416728][T21413] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1022.426787][T21413] Call Trace: [ 1022.430097][T21413] dump_stack+0x197/0x210 [ 1022.434450][T21413] should_fail.cold+0xa/0x15 [ 1022.439058][T21413] ? fault_create_debugfs_attr+0x180/0x180 [ 1022.444880][T21413] ? ___might_sleep+0x163/0x2c0 [ 1022.449743][T21413] __should_failslab+0x121/0x190 [ 1022.454692][T21413] should_failslab+0x9/0x14 [ 1022.459204][T21413] kmem_cache_alloc_node_trace+0x274/0x750 [ 1022.465022][T21413] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 1022.470188][T21419] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 1022.471098][T21413] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1022.471123][T21413] __kmalloc_node_track_caller+0x3d/0x70 [ 1022.471148][T21413] __kmalloc_reserve.isra.0+0x40/0xf0 [ 1022.497476][T21413] __alloc_skb+0x10b/0x5e0 [ 1022.501916][T21413] ? __kmalloc_reserve.isra.0+0xf0/0xf0 [ 1022.507479][T21413] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1022.513739][T21413] ? netlink_autobind.isra.0+0x228/0x310 [ 1022.519398][T21413] netlink_sendmsg+0x972/0xd60 [ 1022.524206][T21413] ? netlink_unicast+0x710/0x710 [ 1022.529156][T21413] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 1022.534966][T21413] ? apparmor_socket_sendmsg+0x2a/0x30 [ 1022.540425][T21413] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1022.546681][T21413] ? security_socket_sendmsg+0x8d/0xc0 [ 1022.552153][T21413] ? netlink_unicast+0x710/0x710 [ 1022.557111][T21413] sock_sendmsg+0xd7/0x130 [ 1022.561536][T21413] ___sys_sendmsg+0x803/0x920 [ 1022.566211][T21413] ? copy_msghdr_from_user+0x440/0x440 [ 1022.571672][T21413] ? __kasan_check_read+0x11/0x20 [ 1022.576700][T21413] ? __fget+0x384/0x560 [ 1022.580910][T21413] ? ksys_dup3+0x3e0/0x3e0 [ 1022.585320][T21413] ? __fget_light+0x1a9/0x230 [ 1022.589986][T21413] ? __fdget+0x1b/0x20 [ 1022.594039][T21413] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1022.600283][T21413] __sys_sendmsg+0x105/0x1d0 [ 1022.604860][T21413] ? __sys_sendmsg_sock+0xd0/0xd0 [ 1022.609887][T21413] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 1022.615328][T21413] ? do_syscall_64+0x26/0x760 [ 1022.619987][T21413] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1022.626035][T21413] ? do_syscall_64+0x26/0x760 [ 1022.630702][T21413] __x64_sys_sendmsg+0x78/0xb0 [ 1022.635454][T21413] do_syscall_64+0xfa/0x760 [ 1022.640034][T21413] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1022.645908][T21413] RIP: 0033:0x45a219 [ 1022.649787][T21413] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1022.669373][T21413] RSP: 002b:00007f4cb7e40c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1022.678726][T21413] RAX: ffffffffffffffda RBX: 00007f4cb7e40c90 RCX: 000000000045a219 [ 1022.686693][T21413] RDX: 0000000000000000 RSI: 0000000020000600 RDI: 0000000000000003 [ 1022.694650][T21413] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1022.702605][T21413] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4cb7e416d4 21:46:44 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700", 0x2c}], 0x1}, 0x0) 21:46:44 executing program 1: socketpair$unix(0x1, 0x0, 0x0, 0x0) socketpair(0x1, 0x0, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0", 0x2d}], 0x1}, 0x0) [ 1022.710564][T21413] R13: 00000000004c86ec R14: 00000000004decb0 R15: 0000000000000004 21:46:44 executing program 2 (fault-call:1 fault-nth:2): r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) 21:46:44 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700", 0x2c}], 0x1}, 0x0) 21:46:44 executing program 1: socketpair$unix(0x1, 0x0, 0x0, 0x0) socketpair(0x1, 0x0, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0", 0x2d}], 0x1}, 0x0) 21:46:44 executing program 5: socket$kcm(0x2, 0x0, 0x84) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz0\x00', 0x200002, 0x0) openat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) socketpair$unix(0x1, 0x4, 0x0, &(0x7f0000000240)) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) 21:46:44 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700", 0x2c}], 0x1}, 0x0) [ 1023.002483][T21422] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 1023.009053][T21436] FAULT_INJECTION: forcing a failure. [ 1023.009053][T21436] name failslab, interval 1, probability 0, space 0, times 0 21:46:44 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz0\x00', 0x200002, 0x0) openat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) socketpair$unix(0x1, 0x4, 0x0, &(0x7f0000000240)) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) 21:46:44 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0", 0x2d}], 0x1}, 0x0) [ 1023.194529][T21446] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 1023.326394][T21450] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 1023.332280][T21436] CPU: 1 PID: 21436 Comm: syz-executor.2 Not tainted 5.4.0-rc7+ #0 [ 1023.344020][T21436] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1023.354106][T21436] Call Trace: [ 1023.357412][T21436] dump_stack+0x197/0x210 [ 1023.361764][T21436] should_fail.cold+0xa/0x15 [ 1023.366381][T21436] ? fault_create_debugfs_attr+0x180/0x180 [ 1023.372213][T21436] __should_failslab+0x121/0x190 [ 1023.377335][T21436] should_failslab+0x9/0x14 [ 1023.381846][T21436] kmem_cache_alloc+0x47/0x710 [ 1023.386619][T21436] ? lock_acquire+0x190/0x410 [ 1023.391286][T21436] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1023.397523][T21436] skb_clone+0x154/0x3d0 [ 1023.401761][T21436] netlink_deliver_tap+0x94d/0xbf0 [ 1023.406873][T21436] netlink_unicast+0x5a2/0x710 [ 1023.411631][T21436] ? netlink_attachskb+0x7c0/0x7c0 [ 1023.416729][T21436] ? _copy_from_iter_full+0x25d/0x8c0 [ 1023.422694][T21436] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 1023.428403][T21436] ? __check_object_size+0x3d/0x437 [ 1023.433601][T21436] netlink_sendmsg+0x8a5/0xd60 [ 1023.438362][T21436] ? netlink_unicast+0x710/0x710 [ 1023.443308][T21436] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 1023.448846][T21436] ? apparmor_socket_sendmsg+0x2a/0x30 [ 1023.454291][T21436] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1023.460518][T21436] ? security_socket_sendmsg+0x8d/0xc0 [ 1023.465967][T21436] ? netlink_unicast+0x710/0x710 [ 1023.470895][T21436] sock_sendmsg+0xd7/0x130 [ 1023.475301][T21436] ___sys_sendmsg+0x803/0x920 [ 1023.479974][T21436] ? copy_msghdr_from_user+0x440/0x440 [ 1023.485429][T21436] ? __kasan_check_read+0x11/0x20 [ 1023.490455][T21436] ? __fget+0x384/0x560 [ 1023.494603][T21436] ? ksys_dup3+0x3e0/0x3e0 [ 1023.499016][T21436] ? __fget_light+0x1a9/0x230 [ 1023.503681][T21436] ? __fdget+0x1b/0x20 [ 1023.507732][T21436] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1023.513967][T21436] __sys_sendmsg+0x105/0x1d0 [ 1023.518545][T21436] ? __sys_sendmsg_sock+0xd0/0xd0 [ 1023.523569][T21436] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 1023.529104][T21436] ? do_syscall_64+0x26/0x760 [ 1023.533770][T21436] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1023.539835][T21436] ? do_syscall_64+0x26/0x760 [ 1023.544504][T21436] __x64_sys_sendmsg+0x78/0xb0 [ 1023.549258][T21436] do_syscall_64+0xfa/0x760 [ 1023.553750][T21436] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1023.559658][T21436] RIP: 0033:0x45a219 [ 1023.563542][T21436] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1023.583131][T21436] RSP: 002b:00007f4cb7e40c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1023.591525][T21436] RAX: ffffffffffffffda RBX: 00007f4cb7e40c90 RCX: 000000000045a219 [ 1023.599482][T21436] RDX: 0000000000000000 RSI: 0000000020000600 RDI: 0000000000000003 [ 1023.607450][T21436] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1023.615407][T21436] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4cb7e416d4 21:46:45 executing program 1 (fault-call:3 fault-nth:0): socketpair$unix(0x1, 0x0, 0x0, 0x0) socketpair(0x1, 0x0, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) 21:46:45 executing program 5: socket$kcm(0x2, 0x0, 0x84) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz0\x00', 0x200002, 0x0) openat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) socketpair$unix(0x1, 0x4, 0x0, &(0x7f0000000240)) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) [ 1023.623366][T21436] R13: 00000000004c86ec R14: 00000000004decb0 R15: 0000000000000004 [ 1023.719078][T21436] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 21:46:45 executing program 4: socket$kcm(0x2, 0x1, 0x84) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) r1 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r1, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) 21:46:45 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0", 0x2d}], 0x1}, 0x0) 21:46:45 executing program 2 (fault-call:1 fault-nth:3): r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) [ 1023.772865][T21461] FAULT_INJECTION: forcing a failure. [ 1023.772865][T21461] name failslab, interval 1, probability 0, space 0, times 0 [ 1023.804895][T21455] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 1023.848895][T21461] CPU: 1 PID: 21461 Comm: syz-executor.1 Not tainted 5.4.0-rc7+ #0 [ 1023.856850][T21461] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1023.866938][T21461] Call Trace: [ 1023.870243][T21461] dump_stack+0x197/0x210 [ 1023.874603][T21461] should_fail.cold+0xa/0x15 [ 1023.879216][T21461] ? fault_create_debugfs_attr+0x180/0x180 [ 1023.885044][T21461] ? ___might_sleep+0x163/0x2c0 [ 1023.889924][T21461] __should_failslab+0x121/0x190 [ 1023.894874][T21461] should_failslab+0x9/0x14 [ 1023.899384][T21461] kmem_cache_alloc_node+0x268/0x740 [ 1023.904688][T21461] __alloc_skb+0xd5/0x5e0 [ 1023.909040][T21461] ? __kmalloc_reserve.isra.0+0xf0/0xf0 [ 1023.914640][T21461] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1023.920895][T21461] ? netlink_autobind.isra.0+0x228/0x310 [ 1023.926548][T21461] netlink_sendmsg+0x972/0xd60 [ 1023.931332][T21461] ? netlink_unicast+0x710/0x710 [ 1023.936286][T21461] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 1023.941847][T21461] ? apparmor_socket_sendmsg+0x2a/0x30 [ 1023.947312][T21461] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1023.953559][T21461] ? security_socket_sendmsg+0x8d/0xc0 [ 1023.959036][T21461] ? netlink_unicast+0x710/0x710 [ 1023.963984][T21461] sock_sendmsg+0xd7/0x130 [ 1023.968414][T21461] ___sys_sendmsg+0x803/0x920 [ 1023.973116][T21461] ? copy_msghdr_from_user+0x440/0x440 [ 1023.978600][T21461] ? __kasan_check_read+0x11/0x20 [ 1023.983640][T21461] ? __fget+0x384/0x560 [ 1023.987816][T21461] ? ksys_dup3+0x3e0/0x3e0 [ 1023.992261][T21461] ? __fget_light+0x1a9/0x230 [ 1023.996959][T21461] ? __fdget+0x1b/0x20 [ 1024.001044][T21461] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1024.007326][T21461] __sys_sendmsg+0x105/0x1d0 [ 1024.011942][T21461] ? __sys_sendmsg_sock+0xd0/0xd0 [ 1024.016993][T21461] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 1024.022469][T21461] ? do_syscall_64+0x26/0x760 [ 1024.027159][T21461] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1024.033245][T21461] ? do_syscall_64+0x26/0x760 [ 1024.038053][T21461] __x64_sys_sendmsg+0x78/0xb0 [ 1024.042837][T21461] do_syscall_64+0xfa/0x760 [ 1024.047358][T21461] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1024.053270][T21461] RIP: 0033:0x45a219 [ 1024.057177][T21461] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1024.076878][T21461] RSP: 002b:00007f17238f2c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1024.085312][T21461] RAX: ffffffffffffffda RBX: 00007f17238f2c90 RCX: 000000000045a219 [ 1024.093305][T21461] RDX: 0000000000000000 RSI: 0000000020000600 RDI: 0000000000000003 [ 1024.101317][T21461] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1024.109309][T21461] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f17238f36d4 [ 1024.117302][T21461] R13: 00000000004c86ec R14: 00000000004decb0 R15: 0000000000000004 21:46:45 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0", 0x2d}], 0x1}, 0x0) [ 1024.142648][T21468] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 21:46:45 executing program 5: socket$kcm(0x2, 0x0, 0x84) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz0\x00', 0x200002, 0x0) openat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) socketpair$unix(0x1, 0x4, 0x0, &(0x7f0000000240)) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) 21:46:45 executing program 4: socket$kcm(0x2, 0x1, 0x84) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) r1 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r1, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) 21:46:45 executing program 1 (fault-call:3 fault-nth:1): socketpair$unix(0x1, 0x0, 0x0, 0x0) socketpair(0x1, 0x0, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) 21:46:45 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) [ 1024.481379][T21486] FAULT_INJECTION: forcing a failure. [ 1024.481379][T21486] name failslab, interval 1, probability 0, space 0, times 0 [ 1024.540351][T21480] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 1024.560403][T21486] CPU: 0 PID: 21486 Comm: syz-executor.1 Not tainted 5.4.0-rc7+ #0 [ 1024.568328][T21486] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1024.578393][T21486] Call Trace: [ 1024.581707][T21486] dump_stack+0x197/0x210 [ 1024.586065][T21486] should_fail.cold+0xa/0x15 [ 1024.590681][T21486] ? fault_create_debugfs_attr+0x180/0x180 [ 1024.596593][T21486] ? ___might_sleep+0x163/0x2c0 [ 1024.601460][T21486] __should_failslab+0x121/0x190 [ 1024.606438][T21486] should_failslab+0x9/0x14 [ 1024.610952][T21486] kmem_cache_alloc_node_trace+0x274/0x750 [ 1024.616769][T21486] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 1024.622760][T21486] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1024.628589][T21486] __kmalloc_node_track_caller+0x3d/0x70 [ 1024.634237][T21486] __kmalloc_reserve.isra.0+0x40/0xf0 [ 1024.639627][T21486] __alloc_skb+0x10b/0x5e0 [ 1024.644041][T21486] ? __kmalloc_reserve.isra.0+0xf0/0xf0 [ 1024.649574][T21486] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1024.655800][T21486] ? netlink_autobind.isra.0+0x228/0x310 [ 1024.661426][T21486] netlink_sendmsg+0x972/0xd60 [ 1024.666186][T21486] ? netlink_unicast+0x710/0x710 [ 1024.671112][T21486] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 1024.676649][T21486] ? apparmor_socket_sendmsg+0x2a/0x30 [ 1024.682092][T21486] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1024.688329][T21486] ? security_socket_sendmsg+0x8d/0xc0 [ 1024.693775][T21486] ? netlink_unicast+0x710/0x710 [ 1024.698698][T21486] sock_sendmsg+0xd7/0x130 [ 1024.703103][T21486] ___sys_sendmsg+0x803/0x920 [ 1024.707768][T21486] ? copy_msghdr_from_user+0x440/0x440 [ 1024.713223][T21486] ? __kasan_check_read+0x11/0x20 [ 1024.718235][T21486] ? __fget+0x384/0x560 [ 1024.722386][T21486] ? ksys_dup3+0x3e0/0x3e0 [ 1024.726805][T21486] ? __fget_light+0x1a9/0x230 [ 1024.731468][T21486] ? __fdget+0x1b/0x20 [ 1024.735521][T21486] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1024.741751][T21486] __sys_sendmsg+0x105/0x1d0 [ 1024.746331][T21486] ? __sys_sendmsg_sock+0xd0/0xd0 [ 1024.751354][T21486] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 1024.756885][T21486] ? do_syscall_64+0x26/0x760 [ 1024.761544][T21486] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1024.767617][T21486] ? do_syscall_64+0x26/0x760 [ 1024.772297][T21486] __x64_sys_sendmsg+0x78/0xb0 [ 1024.777059][T21486] do_syscall_64+0xfa/0x760 [ 1024.781574][T21486] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1024.787458][T21486] RIP: 0033:0x45a219 [ 1024.791355][T21486] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1024.810947][T21486] RSP: 002b:00007f17238f2c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1024.819347][T21486] RAX: ffffffffffffffda RBX: 00007f17238f2c90 RCX: 000000000045a219 [ 1024.827304][T21486] RDX: 0000000000000000 RSI: 0000000020000600 RDI: 0000000000000003 [ 1024.835260][T21486] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1024.843218][T21486] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f17238f36d4 [ 1024.851174][T21486] R13: 00000000004c86ec R14: 00000000004decb0 R15: 0000000000000004 21:46:46 executing program 3: socket$kcm(0x2, 0x1, 0x84) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) r1 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r1, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) 21:46:46 executing program 4: socket$kcm(0x2, 0x1, 0x84) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000900)=ANY=[@ANYBLOB="9f0d343f8f3672b246c5e3575e3bad29af7a982e5093be13037bae5e55d3901efcbad02c798684968abd7cd0f3463233c58a4171b61d275264b0c25a86770e422769c2240915668f9c27dcb8caa76b6b52bcf7f0234471abd5fa470b20eff96ea602ca594f7f1a08a7b251002c49eac4221ab3012d6c7c4d8505140e10"], 0x0, 0x7d}, 0x20) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) 21:46:46 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) 21:46:46 executing program 5: socket$kcm(0x2, 0x1, 0x84) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz0\x00', 0x200002, 0x0) openat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) socketpair$unix(0x1, 0x4, 0x0, &(0x7f0000000240)) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) [ 1025.028045][T21493] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 1025.086180][T21496] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 21:46:46 executing program 3 (fault-call:1 fault-nth:0): r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) 21:46:46 executing program 1 (fault-call:3 fault-nth:2): socketpair$unix(0x1, 0x0, 0x0, 0x0) socketpair(0x1, 0x0, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) 21:46:46 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x2, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) [ 1025.183970][T21501] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 1025.252335][T21504] FAULT_INJECTION: forcing a failure. [ 1025.252335][T21504] name failslab, interval 1, probability 0, space 0, times 0 21:46:46 executing program 4: socket$kcm(0x2, 0x1, 0x84) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000900)=ANY=[@ANYBLOB="9f0d343f8f3672b246c5e3575e3bad29af7a982e5093be13037bae5e55d3901efcbad02c798684968abd7cd0f3463233c58a4171b61d275264b0c25a86770e422769c2240915668f9c27dcb8caa76b6b52bcf7f0234471abd5fa470b20eff96ea602ca594f7f1a08a7b251002c49eac4221ab3012d6c7c4d8505140e10"], 0x0, 0x7d}, 0x20) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) [ 1025.294935][T21509] FAULT_INJECTION: forcing a failure. [ 1025.294935][T21509] name failslab, interval 1, probability 0, space 0, times 0 [ 1025.343792][T21504] CPU: 0 PID: 21504 Comm: syz-executor.3 Not tainted 5.4.0-rc7+ #0 [ 1025.351728][T21504] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1025.356682][T21510] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 1025.361786][T21504] Call Trace: [ 1025.361813][T21504] dump_stack+0x197/0x210 [ 1025.361837][T21504] should_fail.cold+0xa/0x15 [ 1025.361857][T21504] ? fault_create_debugfs_attr+0x180/0x180 [ 1025.361878][T21504] ? ___might_sleep+0x163/0x2c0 [ 1025.361898][T21504] __should_failslab+0x121/0x190 [ 1025.361918][T21504] should_failslab+0x9/0x14 [ 1025.399241][T21504] kmem_cache_alloc_node+0x268/0x740 [ 1025.399267][T21504] __alloc_skb+0xd5/0x5e0 [ 1025.399283][T21504] ? __kmalloc_reserve.isra.0+0xf0/0xf0 [ 1025.399298][T21504] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1025.399321][T21504] ? netlink_autobind.isra.0+0x228/0x310 [ 1025.399345][T21504] netlink_sendmsg+0x972/0xd60 [ 1025.413535][T21504] ? netlink_unicast+0x710/0x710 [ 1025.413550][T21504] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 1025.413569][T21504] ? apparmor_socket_sendmsg+0x2a/0x30 [ 1025.451677][T21504] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1025.457928][T21504] ? security_socket_sendmsg+0x8d/0xc0 [ 1025.463392][T21504] ? netlink_unicast+0x710/0x710 [ 1025.468327][T21504] sock_sendmsg+0xd7/0x130 [ 1025.472749][T21504] ___sys_sendmsg+0x803/0x920 [ 1025.477439][T21504] ? copy_msghdr_from_user+0x440/0x440 [ 1025.482918][T21504] ? __kasan_check_read+0x11/0x20 [ 1025.487970][T21504] ? __fget+0x384/0x560 [ 1025.492143][T21504] ? ksys_dup3+0x3e0/0x3e0 [ 1025.496574][T21504] ? __fget_light+0x1a9/0x230 [ 1025.501255][T21504] ? __fdget+0x1b/0x20 [ 1025.505326][T21504] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1025.511581][T21504] __sys_sendmsg+0x105/0x1d0 [ 1025.516179][T21504] ? __sys_sendmsg_sock+0xd0/0xd0 [ 1025.521218][T21504] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 1025.526676][T21504] ? do_syscall_64+0x26/0x760 [ 1025.531352][T21504] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1025.537425][T21504] ? do_syscall_64+0x26/0x760 [ 1025.542119][T21504] __x64_sys_sendmsg+0x78/0xb0 [ 1025.546892][T21504] do_syscall_64+0xfa/0x760 [ 1025.551403][T21504] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1025.557291][T21504] RIP: 0033:0x45a219 [ 1025.561180][T21504] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1025.580786][T21504] RSP: 002b:00007f2287e24c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e 21:46:47 executing program 5: socket$kcm(0x2, 0x1, 0x84) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz0\x00', 0x200002, 0x0) openat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) socketpair$unix(0x1, 0x4, 0x0, &(0x7f0000000240)) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) 21:46:47 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x3, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) [ 1025.589224][T21504] RAX: ffffffffffffffda RBX: 00007f2287e24c90 RCX: 000000000045a219 [ 1025.597203][T21504] RDX: 0000000000000000 RSI: 0000000020000600 RDI: 0000000000000003 [ 1025.605179][T21504] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1025.613141][T21504] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f2287e256d4 [ 1025.613149][T21504] R13: 00000000004c86ec R14: 00000000004decb0 R15: 0000000000000004 [ 1025.665177][T21516] __nla_validate_parse: 15 callbacks suppressed [ 1025.665187][T21516] netlink: 22 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1025.696314][T21517] netlink: 22 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1025.724546][T21514] netlink: 22 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1025.749298][T21517] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 21:46:47 executing program 3 (fault-call:1 fault-nth:1): r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) [ 1025.804562][T21514] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 1025.829247][T21509] CPU: 1 PID: 21509 Comm: syz-executor.1 Not tainted 5.4.0-rc7+ #0 [ 1025.837180][T21509] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1025.847334][T21509] Call Trace: [ 1025.850639][T21509] dump_stack+0x197/0x210 21:46:47 executing program 5: socket$kcm(0x2, 0x1, 0x84) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz0\x00', 0x200002, 0x0) openat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) socketpair$unix(0x1, 0x4, 0x0, &(0x7f0000000240)) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) 21:46:47 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x4, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) [ 1025.855001][T21509] should_fail.cold+0xa/0x15 [ 1025.859611][T21509] ? fault_create_debugfs_attr+0x180/0x180 [ 1025.865449][T21509] __should_failslab+0x121/0x190 [ 1025.870403][T21509] should_failslab+0x9/0x14 [ 1025.874918][T21509] kmem_cache_alloc+0x47/0x710 [ 1025.879706][T21509] ? lock_acquire+0x190/0x410 [ 1025.884387][T21509] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1025.890650][T21509] skb_clone+0x154/0x3d0 [ 1025.894916][T21509] netlink_deliver_tap+0x94d/0xbf0 [ 1025.900064][T21509] netlink_unicast+0x5a2/0x710 [ 1025.904849][T21509] ? netlink_attachskb+0x7c0/0x7c0 [ 1025.910080][T21509] ? _copy_from_iter_full+0x25d/0x8c0 [ 1025.915560][T21509] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 1025.921294][T21509] ? __check_object_size+0x3d/0x437 [ 1025.926609][T21509] netlink_sendmsg+0x8a5/0xd60 [ 1025.931402][T21509] ? netlink_unicast+0x710/0x710 [ 1025.936360][T21509] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 1025.939247][T21522] netlink: 22 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1025.942002][T21509] ? apparmor_socket_sendmsg+0x2a/0x30 [ 1025.942019][T21509] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1025.942042][T21509] ? security_socket_sendmsg+0x8d/0xc0 [ 1025.964483][T21523] netlink: 22 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1025.968466][T21509] ? netlink_unicast+0x710/0x710 [ 1025.968486][T21509] sock_sendmsg+0xd7/0x130 [ 1025.968504][T21509] ___sys_sendmsg+0x803/0x920 [ 1025.968524][T21509] ? copy_msghdr_from_user+0x440/0x440 [ 1025.968552][T21509] ? __kasan_check_read+0x11/0x20 [ 1025.968572][T21509] ? __fget+0x384/0x560 [ 1025.968596][T21509] ? ksys_dup3+0x3e0/0x3e0 [ 1025.998714][T21522] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 1026.002347][T21509] ? __fget_light+0x1a9/0x230 [ 1026.002365][T21509] ? __fdget+0x1b/0x20 [ 1026.002384][T21509] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1026.035334][T21509] __sys_sendmsg+0x105/0x1d0 [ 1026.039943][T21509] ? __sys_sendmsg_sock+0xd0/0xd0 [ 1026.044991][T21509] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 1026.050461][T21509] ? do_syscall_64+0x26/0x760 [ 1026.055142][T21509] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1026.061212][T21509] ? do_syscall_64+0x26/0x760 [ 1026.065910][T21509] __x64_sys_sendmsg+0x78/0xb0 [ 1026.070685][T21509] do_syscall_64+0xfa/0x760 [ 1026.075196][T21509] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1026.081091][T21509] RIP: 0033:0x45a219 [ 1026.084998][T21509] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 21:46:47 executing program 5: socket$kcm(0x2, 0x1, 0x84) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz0\x00', 0x200002, 0x0) openat$cgroup(r0, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) socketpair$unix(0x1, 0x4, 0x0, &(0x7f0000000240)) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) r1 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r1, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) 21:46:47 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xa, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) [ 1026.104611][T21509] RSP: 002b:00007f17238f2c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1026.113039][T21509] RAX: ffffffffffffffda RBX: 00007f17238f2c90 RCX: 000000000045a219 [ 1026.121020][T21509] RDX: 0000000000000000 RSI: 0000000020000600 RDI: 0000000000000003 [ 1026.128998][T21509] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1026.136981][T21509] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f17238f36d4 [ 1026.144962][T21509] R13: 00000000004c86ec R14: 00000000004decb0 R15: 0000000000000004 [ 1026.189974][T21528] netlink: 22 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1026.220216][T21529] netlink: 22 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1026.222202][T21528] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 21:46:47 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xe, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) [ 1026.285636][T21529] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 21:46:47 executing program 5: socket$kcm(0x2, 0x1, 0x84) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz0\x00', 0x200002, 0x0) openat$cgroup(r0, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) socketpair$unix(0x1, 0x4, 0x0, &(0x7f0000000240)) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) r1 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r1, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) [ 1026.391361][T21509] netlink: 22 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1026.435126][T21536] netlink: 22 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1026.442107][T21509] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 21:46:47 executing program 1: socketpair$unix(0x1, 0x0, 0x0, 0x0) socketpair(0x1, 0x0, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) 21:46:47 executing program 4: socket$kcm(0x2, 0x1, 0x84) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000900)=ANY=[@ANYBLOB="9f0d343f8f3672b246c5e3575e3bad29af7a982e5093be13037bae5e55d3901efcbad02c798684968abd7cd0f3463233c58a4171b61d275264b0c25a86770e422769c2240915668f9c27dcb8caa76b6b52bcf7f0234471abd5fa470b20eff96ea602ca594f7f1a08a7b251002c49eac4221ab3012d6c7c4d8505140e10"], 0x0, 0x7d}, 0x20) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) [ 1026.497295][T21538] netlink: 22 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1026.500061][T21536] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 21:46:48 executing program 5: socket$kcm(0x2, 0x1, 0x84) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz0\x00', 0x200002, 0x0) openat$cgroup(r0, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) socketpair$unix(0x1, 0x4, 0x0, &(0x7f0000000240)) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) r1 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r1, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) [ 1026.624457][T21542] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 21:46:48 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xf, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) 21:46:48 executing program 1: socketpair$unix(0x1, 0x0, 0x0, 0x0) socketpair(0x1, 0x0, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) [ 1026.823471][T21548] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 1026.876612][T21554] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 1026.988613][T21557] FAULT_INJECTION: forcing a failure. [ 1026.988613][T21557] name failslab, interval 1, probability 0, space 0, times 0 [ 1027.052714][T21557] CPU: 0 PID: 21557 Comm: syz-executor.3 Not tainted 5.4.0-rc7+ #0 [ 1027.060649][T21557] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1027.070707][T21557] Call Trace: [ 1027.074011][T21557] dump_stack+0x197/0x210 [ 1027.078357][T21557] should_fail.cold+0xa/0x15 [ 1027.082966][T21557] ? fault_create_debugfs_attr+0x180/0x180 [ 1027.088791][T21557] ? ___might_sleep+0x163/0x2c0 [ 1027.093662][T21557] __should_failslab+0x121/0x190 [ 1027.098610][T21557] should_failslab+0x9/0x14 [ 1027.103123][T21557] kmem_cache_alloc_node_trace+0x274/0x750 [ 1027.108938][T21557] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 1027.114922][T21557] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1027.120741][T21557] __kmalloc_node_track_caller+0x3d/0x70 [ 1027.126385][T21557] __kmalloc_reserve.isra.0+0x40/0xf0 [ 1027.131772][T21557] __alloc_skb+0x10b/0x5e0 [ 1027.136211][T21557] ? __kmalloc_reserve.isra.0+0xf0/0xf0 [ 1027.141769][T21557] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1027.148027][T21557] ? netlink_autobind.isra.0+0x228/0x310 [ 1027.153677][T21557] netlink_sendmsg+0x972/0xd60 [ 1027.158460][T21557] ? netlink_unicast+0x710/0x710 [ 1027.163415][T21557] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 1027.168978][T21557] ? apparmor_socket_sendmsg+0x2a/0x30 [ 1027.174621][T21557] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1027.180871][T21557] ? security_socket_sendmsg+0x8d/0xc0 [ 1027.186527][T21557] ? netlink_unicast+0x710/0x710 [ 1027.191474][T21557] sock_sendmsg+0xd7/0x130 [ 1027.195904][T21557] ___sys_sendmsg+0x803/0x920 [ 1027.200597][T21557] ? copy_msghdr_from_user+0x440/0x440 [ 1027.206160][T21557] ? __kasan_check_read+0x11/0x20 [ 1027.211198][T21557] ? __fget+0x384/0x560 [ 1027.215371][T21557] ? ksys_dup3+0x3e0/0x3e0 [ 1027.219816][T21557] ? __fget_light+0x1a9/0x230 [ 1027.224502][T21557] ? __fdget+0x1b/0x20 [ 1027.228577][T21557] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1027.234831][T21557] __sys_sendmsg+0x105/0x1d0 [ 1027.239432][T21557] ? __sys_sendmsg_sock+0xd0/0xd0 [ 1027.244485][T21557] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 1027.249952][T21557] ? do_syscall_64+0x26/0x760 [ 1027.254634][T21557] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1027.260713][T21557] ? do_syscall_64+0x26/0x760 [ 1027.265415][T21557] __x64_sys_sendmsg+0x78/0xb0 [ 1027.270372][T21557] do_syscall_64+0xfa/0x760 [ 1027.274889][T21557] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1027.280787][T21557] RIP: 0033:0x45a219 [ 1027.284692][T21557] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1027.304325][T21557] RSP: 002b:00007f2287e24c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1027.312751][T21557] RAX: ffffffffffffffda RBX: 00007f2287e24c90 RCX: 000000000045a219 [ 1027.320759][T21557] RDX: 0000000000000000 RSI: 0000000020000600 RDI: 0000000000000003 [ 1027.328832][T21557] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1027.336818][T21557] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f2287e256d4 [ 1027.344828][T21557] R13: 00000000004c86ec R14: 00000000004decb0 R15: 0000000000000004 21:46:48 executing program 3 (fault-call:1 fault-nth:2): r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) 21:46:48 executing program 4: socket$kcm(0x2, 0x1, 0x84) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000900)=ANY=[@ANYBLOB="9f0d343f8f3672b246c5e3575e3bad29af7a982e5093be13037bae5e55d3901efcbad02c798684968abd7cd0f3463233c58a4171b61d275264b0c25a86770e422769c2240915668f9c27dcb8caa76b6b52bcf7f0234471abd5fa470b20eff96ea602ca594f7f1a08a7b251002c49eac4221ab3012d6c7c4d8505140e10"], 0x0, 0x7d}, 0x20) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) 21:46:48 executing program 5: socket$kcm(0x2, 0x1, 0x84) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz0\x00', 0x200002, 0x0) openat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) socketpair$unix(0x1, 0x4, 0x0, &(0x7f0000000240)) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) 21:46:48 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x60, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) 21:46:48 executing program 1: socketpair$unix(0x1, 0x0, 0x0, 0x0) socketpair(0x1, 0x0, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x2, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) [ 1027.425934][T21663] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 21:46:48 executing program 5: socket$kcm(0x2, 0x1, 0x84) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz0\x00', 0x200002, 0x0) openat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) socketpair$unix(0x1, 0x4, 0x0, &(0x7f0000000240)) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) [ 1027.509316][T21671] FAULT_INJECTION: forcing a failure. [ 1027.509316][T21671] name failslab, interval 1, probability 0, space 0, times 0 21:46:49 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xf0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) [ 1027.608852][T21671] CPU: 1 PID: 21671 Comm: syz-executor.3 Not tainted 5.4.0-rc7+ #0 [ 1027.616801][T21671] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1027.626870][T21671] Call Trace: [ 1027.630162][T21671] dump_stack+0x197/0x210 [ 1027.630185][T21671] should_fail.cold+0xa/0x15 [ 1027.630206][T21671] ? fault_create_debugfs_attr+0x180/0x180 [ 1027.630231][T21671] __should_failslab+0x121/0x190 [ 1027.630246][T21671] should_failslab+0x9/0x14 [ 1027.630262][T21671] kmem_cache_alloc+0x47/0x710 [ 1027.659142][T21671] ? lock_acquire+0x190/0x410 [ 1027.663830][T21671] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1027.670093][T21671] skb_clone+0x154/0x3d0 [ 1027.674359][T21671] netlink_deliver_tap+0x94d/0xbf0 [ 1027.679490][T21671] netlink_unicast+0x5a2/0x710 [ 1027.684274][T21671] ? netlink_attachskb+0x7c0/0x7c0 [ 1027.689392][T21671] ? _copy_from_iter_full+0x25d/0x8c0 [ 1027.694856][T21671] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 1027.700594][T21671] ? __check_object_size+0x3d/0x437 21:46:49 executing program 4: socket$kcm(0x2, 0x1, 0x84) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000900)=ANY=[@ANYBLOB="9f0d343f8f3672b246c5e3575e3bad29af7a982e5093be13037bae5e55d3901efcbad02c798684968abd7cd0f3463233c58a4171b61d275264b0c25a86770e422769c2240915668f9c27dcb8caa76b6b52bcf7f0234471abd5fa470b20eff96ea602ca594f7f1a08a7b251002c49eac4221ab3012d6c7c4d8505140e10"], 0x0, 0x7d}, 0x20) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) [ 1027.703687][T21773] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 1027.705803][T21671] netlink_sendmsg+0x8a5/0xd60 [ 1027.705824][T21671] ? netlink_unicast+0x710/0x710 [ 1027.705838][T21671] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 1027.705904][T21671] ? apparmor_socket_sendmsg+0x2a/0x30 [ 1027.736001][T21671] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1027.742239][T21671] ? security_socket_sendmsg+0x8d/0xc0 [ 1027.747698][T21671] ? netlink_unicast+0x710/0x710 [ 1027.752643][T21671] sock_sendmsg+0xd7/0x130 21:46:49 executing program 1: socketpair$unix(0x1, 0x0, 0x0, 0x0) socketpair(0x1, 0x0, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x3, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) 21:46:49 executing program 5: socket$kcm(0x2, 0x1, 0x84) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz0\x00', 0x200002, 0x0) openat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) socketpair$unix(0x1, 0x4, 0x0, &(0x7f0000000240)) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) [ 1027.757078][T21671] ___sys_sendmsg+0x803/0x920 [ 1027.761767][T21671] ? copy_msghdr_from_user+0x440/0x440 [ 1027.767247][T21671] ? __kasan_check_read+0x11/0x20 [ 1027.772279][T21671] ? __fget+0x384/0x560 [ 1027.776448][T21671] ? ksys_dup3+0x3e0/0x3e0 [ 1027.780882][T21671] ? __fget_light+0x1a9/0x230 [ 1027.785563][T21671] ? __fdget+0x1b/0x20 [ 1027.789623][T21671] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1027.789646][T21671] __sys_sendmsg+0x105/0x1d0 [ 1027.789662][T21671] ? __sys_sendmsg_sock+0xd0/0xd0 [ 1027.789694][T21671] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 1027.811118][T21671] ? do_syscall_64+0x26/0x760 [ 1027.815786][T21671] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1027.815858][T21671] ? do_syscall_64+0x26/0x760 [ 1027.826583][T21671] __x64_sys_sendmsg+0x78/0xb0 [ 1027.831360][T21671] do_syscall_64+0xfa/0x760 [ 1027.835868][T21671] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1027.841759][T21671] RIP: 0033:0x45a219 [ 1027.845658][T21671] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1027.865261][T21671] RSP: 002b:00007f2287e24c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1027.873672][T21671] RAX: ffffffffffffffda RBX: 00007f2287e24c90 RCX: 000000000045a219 [ 1027.881636][T21671] RDX: 0000000000000000 RSI: 0000000020000600 RDI: 0000000000000003 [ 1027.889616][T21671] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1027.897583][T21671] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f2287e256d4 [ 1027.905542][T21671] R13: 00000000004c86ec R14: 00000000004decb0 R15: 0000000000000004 [ 1027.944048][T21782] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 21:46:49 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x300, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) [ 1028.019826][T21840] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 21:46:49 executing program 5: socket$kcm(0x2, 0x1, 0x84) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz0\x00', 0x200002, 0x0) openat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) socketpair$unix(0x1, 0x4, 0x0, &(0x7f0000000240)) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) 21:46:49 executing program 3 (fault-call:1 fault-nth:3): r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) 21:46:49 executing program 1: socketpair$unix(0x1, 0x0, 0x0, 0x0) socketpair(0x1, 0x0, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x4, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) 21:46:49 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x68a, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) 21:46:49 executing program 4: socket$kcm(0x2, 0x1, 0x84) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000900)=ANY=[@ANYBLOB="9f0d343f8f3672b246c5e3575e3bad29af7a982e5093be13037bae5e55d3901efcbad02c798684968abd7cd0f3463233c58a4171b61d275264b0c25a86770e422769c2240915668f9c27dcb8caa76b6b52bcf7f0234471abd5fa470b20eff96ea602ca594f7f1a08a7b251002c49eac4221ab3012d6c7c4d8505140e10"], 0x0, 0x7d}, 0x20) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) [ 1028.242914][T21894] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 1028.309017][T21901] FAULT_INJECTION: forcing a failure. [ 1028.309017][T21901] name failslab, interval 1, probability 0, space 0, times 0 21:46:49 executing program 4: socket$kcm(0x2, 0x1, 0x84) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000900)=ANY=[@ANYBLOB="9f0d343f8f3672b246c5e3575e3bad29af7a982e5093be13037bae5e55d3901efcbad02c798684968abd7cd0f3463233c58a4171b61d275264b0c25a86770e422769c2240915668f9c27dcb8caa76b6b52bcf7f0234471abd5fa470b20eff96ea602ca594f7f1a08a7b251002c49eac4221ab3012d6c7c4d8505140e10"], 0x0, 0x7d}, 0x20) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) 21:46:49 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xa00, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) 21:46:49 executing program 5: socket$kcm(0x2, 0x1, 0x84) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz0\x00', 0x200002, 0x0) openat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) socketpair$unix(0x1, 0x4, 0x0, &(0x7f0000000240)) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) [ 1028.404063][T21901] CPU: 0 PID: 21901 Comm: syz-executor.3 Not tainted 5.4.0-rc7+ #0 [ 1028.412009][T21901] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1028.422082][T21901] Call Trace: [ 1028.422108][T21901] dump_stack+0x197/0x210 [ 1028.422131][T21901] should_fail.cold+0xa/0x15 [ 1028.422150][T21901] ? fault_create_debugfs_attr+0x180/0x180 [ 1028.422177][T21901] ? ___might_sleep+0x163/0x2c0 [ 1028.440161][T21901] __should_failslab+0x121/0x190 [ 1028.449921][T21901] should_failslab+0x9/0x14 [ 1028.454429][T21901] __kmalloc+0x2e0/0x770 [ 1028.458692][T21901] ? ns_capable+0x20/0x30 [ 1028.463034][T21901] ? __netlink_ns_capable+0x104/0x140 [ 1028.468420][T21901] ? genl_family_rcv_msg+0x8b8/0xf90 [ 1028.473717][T21901] genl_family_rcv_msg+0x8b8/0xf90 [ 1028.478857][T21901] ? genl_unregister_family+0x7c0/0x7c0 [ 1028.484420][T21901] ? __kasan_check_read+0x11/0x20 [ 1028.489440][T21901] ? __lock_acquire+0x16f2/0x4a00 [ 1028.489497][T21901] ? __dev_queue_xmit+0xbb5/0x3720 [ 1028.489516][T21901] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1028.505870][T21901] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1028.512208][T21901] ? __radix_tree_lookup+0x1ef/0x260 [ 1028.517510][T21901] ? radix_tree_lookup+0x22/0x30 [ 1028.522454][T21901] genl_rcv_msg+0xca/0x170 [ 1028.522472][T21901] netlink_rcv_skb+0x177/0x450 [ 1028.522491][T21901] ? genl_family_rcv_msg+0xf90/0xf90 [ 1028.531020][T22009] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 1028.531673][T21901] ? netlink_ack+0xb50/0xb50 [ 1028.546373][T21901] ? __kasan_check_write+0x14/0x20 [ 1028.546405][T21901] ? netlink_deliver_tap+0x254/0xbf0 [ 1028.561362][T21901] genl_rcv+0x29/0x40 [ 1028.565453][T21901] netlink_unicast+0x531/0x710 [ 1028.570235][T21901] ? netlink_attachskb+0x7c0/0x7c0 [ 1028.575361][T21901] ? _copy_from_iter_full+0x25d/0x8c0 [ 1028.580745][T21901] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 1028.586475][T21901] ? __check_object_size+0x3d/0x437 [ 1028.591701][T21901] netlink_sendmsg+0x8a5/0xd60 [ 1028.596486][T21901] ? netlink_unicast+0x710/0x710 [ 1028.601428][T21901] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 1028.607124][T21901] ? apparmor_socket_sendmsg+0x2a/0x30 [ 1028.612603][T21901] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1028.618868][T21901] ? security_socket_sendmsg+0x8d/0xc0 [ 1028.624373][T21901] ? netlink_unicast+0x710/0x710 [ 1028.629325][T21901] sock_sendmsg+0xd7/0x130 [ 1028.633760][T21901] ___sys_sendmsg+0x803/0x920 [ 1028.638459][T21901] ? copy_msghdr_from_user+0x440/0x440 [ 1028.643942][T21901] ? __kasan_check_read+0x11/0x20 [ 1028.649008][T21901] ? __fget+0x384/0x560 [ 1028.653184][T21901] ? ksys_dup3+0x3e0/0x3e0 [ 1028.657809][T21901] ? __fget_light+0x1a9/0x230 [ 1028.664937][T21901] ? __fdget+0x1b/0x20 [ 1028.669021][T21901] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1028.675278][T21901] __sys_sendmsg+0x105/0x1d0 [ 1028.679898][T21901] ? __sys_sendmsg_sock+0xd0/0xd0 [ 1028.684957][T21901] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 1028.690427][T21901] ? do_syscall_64+0x26/0x760 [ 1028.695114][T21901] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe 21:46:49 executing program 1: socketpair$unix(0x1, 0x0, 0x0, 0x0) socketpair(0x1, 0x0, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xa, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) [ 1028.701187][T21901] ? do_syscall_64+0x26/0x760 [ 1028.701211][T21901] __x64_sys_sendmsg+0x78/0xb0 [ 1028.701226][T21901] do_syscall_64+0xfa/0x760 [ 1028.701245][T21901] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1028.701257][T21901] RIP: 0033:0x45a219 [ 1028.701272][T21901] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1028.701280][T21901] RSP: 002b:00007f2287e24c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e 21:46:50 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xe00, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) 21:46:50 executing program 1: socketpair$unix(0x1, 0x0, 0x0, 0x0) socketpair(0x1, 0x0, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xe, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) [ 1028.701300][T21901] RAX: ffffffffffffffda RBX: 00007f2287e24c90 RCX: 000000000045a219 [ 1028.710720][T21901] RDX: 0000000000000000 RSI: 0000000020000600 RDI: 0000000000000003 [ 1028.710729][T21901] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1028.710736][T21901] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f2287e256d4 [ 1028.710744][T21901] R13: 00000000004c86ec R14: 00000000004decb0 R15: 0000000000000004 [ 1028.741647][T22115] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 21:46:50 executing program 4: socket$kcm(0x2, 0x1, 0x84) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000900)=ANY=[@ANYBLOB="9f0d343f8f3672b246c5e3575e3bad29af7a982e5093be13037bae5e55d3901efcbad02c798684968abd7cd0f3463233c58a4171b61d275264b0c25a86770e422769c2240915668f9c27dcb8caa76b6b52bcf7f0234471abd5fa470b20eff96ea602ca594f7f1a08a7b251002c49eac4221ab3012d6c7c4d8505140e10"], 0x0, 0x7d}, 0x20) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) [ 1028.906888][T22121] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 21:46:50 executing program 3 (fault-call:1 fault-nth:4): r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) 21:46:50 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xf00, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) 21:46:50 executing program 5: socket$kcm(0x2, 0x1, 0x84) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz0\x00', 0x200002, 0x0) openat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) socketpair$unix(0x1, 0x4, 0x0, &(0x7f0000000240)) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) [ 1029.097905][T22201] FAULT_INJECTION: forcing a failure. [ 1029.097905][T22201] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1029.103663][T22179] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 1029.111469][T22201] CPU: 1 PID: 22201 Comm: syz-executor.3 Not tainted 5.4.0-rc7+ #0 [ 1029.111479][T22201] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1029.111486][T22201] Call Trace: [ 1029.111511][T22201] dump_stack+0x197/0x210 [ 1029.111534][T22201] should_fail.cold+0xa/0x15 [ 1029.111555][T22201] ? fault_create_debugfs_attr+0x180/0x180 [ 1029.111574][T22201] ? __kasan_check_read+0x11/0x20 [ 1029.111595][T22201] ? __lock_acquire+0x16f2/0x4a00 [ 1029.167620][T22201] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1029.173718][T22201] should_fail_alloc_page+0x50/0x60 [ 1029.178943][T22201] __alloc_pages_nodemask+0x1a1/0x900 [ 1029.184346][T22201] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 1029.190099][T22201] ? __alloc_pages_slowpath+0x2920/0x2920 21:46:50 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000900)=ANY=[@ANYBLOB="9f0d343f8f3672b246c5e3575e3bad29af7a982e5093be13037bae5e55d3901efcbad02c798684968abd7cd0f3463233c58a4171b61d275264b0c25a86770e422769c2240915668f9c27dcb8caa76b6b52bcf7f0234471abd5fa470b20eff96ea602ca594f7f1a08a7b251002c49eac4221ab3012d6c7c4d8505140e10"], 0x0, 0x7d}, 0x20) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) [ 1029.195841][T22201] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 1029.202874][T22201] ? fault_create_debugfs_attr+0x180/0x180 [ 1029.208795][T22201] cache_grow_begin+0x90/0xd20 [ 1029.213854][T22201] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1029.220349][T22201] __kmalloc+0x6b2/0x770 [ 1029.225106][T22201] ? ns_capable+0x20/0x30 [ 1029.229462][T22201] ? genl_family_rcv_msg+0x8b8/0xf90 [ 1029.234863][T22201] genl_family_rcv_msg+0x8b8/0xf90 [ 1029.240001][T22201] ? genl_unregister_family+0x7c0/0x7c0 [ 1029.245768][T22201] ? __kasan_check_read+0x11/0x20 [ 1029.250815][T22201] ? __lock_acquire+0x16f2/0x4a00 [ 1029.256607][T22201] ? __dev_queue_xmit+0xbb5/0x3720 [ 1029.261742][T22201] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1029.268095][T22201] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1029.274341][T22201] ? __radix_tree_lookup+0x1ef/0x260 [ 1029.279896][T22201] ? radix_tree_lookup+0x22/0x30 [ 1029.284842][T22201] genl_rcv_msg+0xca/0x170 [ 1029.289269][T22201] netlink_rcv_skb+0x177/0x450 [ 1029.294127][T22201] ? genl_family_rcv_msg+0xf90/0xf90 [ 1029.299630][T22201] ? netlink_ack+0xb50/0xb50 [ 1029.304224][T22201] ? __kasan_check_write+0x14/0x20 [ 1029.309412][T22201] ? netlink_deliver_tap+0x254/0xbf0 [ 1029.314800][T22201] genl_rcv+0x29/0x40 [ 1029.318932][T22201] netlink_unicast+0x531/0x710 [ 1029.323723][T22201] ? netlink_attachskb+0x7c0/0x7c0 [ 1029.330580][T22201] ? _copy_from_iter_full+0x25d/0x8c0 [ 1029.336040][T22201] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 1029.341815][T22201] ? __check_object_size+0x3d/0x437 [ 1029.347242][T22201] netlink_sendmsg+0x8a5/0xd60 [ 1029.352018][T22201] ? netlink_unicast+0x710/0x710 [ 1029.357075][T22201] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 1029.362628][T22201] ? apparmor_socket_sendmsg+0x2a/0x30 [ 1029.368091][T22201] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1029.374333][T22201] ? security_socket_sendmsg+0x8d/0xc0 [ 1029.380707][T22201] ? netlink_unicast+0x710/0x710 [ 1029.385651][T22201] sock_sendmsg+0xd7/0x130 [ 1029.390073][T22201] ___sys_sendmsg+0x803/0x920 [ 1029.394764][T22201] ? copy_msghdr_from_user+0x440/0x440 [ 1029.400234][T22201] ? __kasan_check_read+0x11/0x20 [ 1029.405272][T22201] ? __fget+0x384/0x560 [ 1029.409876][T22201] ? ksys_dup3+0x3e0/0x3e0 [ 1029.414388][T22201] ? __fget_light+0x1a9/0x230 [ 1029.419148][T22201] ? __fdget+0x1b/0x20 [ 1029.423372][T22201] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1029.429614][T22201] __sys_sendmsg+0x105/0x1d0 [ 1029.434226][T22201] ? __sys_sendmsg_sock+0xd0/0xd0 [ 1029.440693][T22201] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 1029.446236][T22201] ? do_syscall_64+0x26/0x760 [ 1029.450909][T22201] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1029.456983][T22201] ? do_syscall_64+0x26/0x760 [ 1029.461878][T22201] __x64_sys_sendmsg+0x78/0xb0 [ 1029.466674][T22201] do_syscall_64+0xfa/0x760 [ 1029.471631][T22201] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1029.477614][T22201] RIP: 0033:0x45a219 [ 1029.481687][T22201] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1029.501774][T22201] RSP: 002b:00007f2287e24c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1029.510230][T22201] RAX: ffffffffffffffda RBX: 00007f2287e24c90 RCX: 000000000045a219 [ 1029.518287][T22201] RDX: 0000000000000000 RSI: 0000000020000600 RDI: 0000000000000003 [ 1029.526255][T22201] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1029.534279][T22201] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f2287e256d4 [ 1029.542257][T22201] R13: 00000000004c86ec R14: 00000000004decb0 R15: 0000000000000004 21:46:51 executing program 1: socketpair$unix(0x1, 0x0, 0x0, 0x0) socketpair(0x1, 0x0, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xf, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) [ 1029.592650][T22235] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 21:46:51 executing program 5: socket$kcm(0x2, 0x1, 0x84) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz0\x00', 0x200002, 0x0) openat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) socketpair$unix(0x1, 0x4, 0x0, &(0x7f0000000240)) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) [ 1029.727728][T22232] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 21:46:51 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x4000, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) 21:46:51 executing program 1: socketpair$unix(0x1, 0x0, 0x0, 0x0) socketpair(0x1, 0x0, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x60, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) 21:46:51 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x6000, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) 21:46:51 executing program 5: socket$kcm(0x2, 0x1, 0x84) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz0\x00', 0x200002, 0x0) openat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) socketpair$unix(0x1, 0x4, 0x0, &(0x7f0000000240)) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) 21:46:51 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000900)=ANY=[@ANYBLOB="9f0d343f8f3672b246c5e3575e3bad29af7a982e5093be13037bae5e55d3901efcbad02c798684968abd7cd0f3463233c58a4171b61d275264b0c25a86770e422769c2240915668f9c27dcb8caa76b6b52bcf7f0234471abd5fa470b20eff96ea602ca594f7f1a08a7b251002c49eac4221ab3012d6c7c4d8505140e10"], 0x0, 0x7d}, 0x20) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) [ 1030.032118][T22351] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 21:46:51 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x8a06, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) [ 1030.140684][T22370] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 1030.288896][T22461] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 1030.378865][T22201] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 21:46:51 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) 21:46:51 executing program 1: socketpair$unix(0x1, 0x0, 0x0, 0x0) socketpair(0x1, 0x0, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xf0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) 21:46:51 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000900)=ANY=[@ANYBLOB="9f0d343f8f3672b246c5e3575e3bad29af7a982e5093be13037bae5e55d3901efcbad02c798684968abd7cd0f3463233c58a4171b61d275264b0c25a86770e422769c2240915668f9c27dcb8caa76b6b52bcf7f0234471abd5fa470b20eff96ea602ca594f7f1a08a7b251002c49eac4221ab3012d6c7c4d8505140e10"], 0x0, 0x7d}, 0x20) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) 21:46:51 executing program 5: socket$kcm(0x2, 0x1, 0x84) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz0\x00', 0x200002, 0x0) openat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) socketpair$unix(0x1, 0x4, 0x0, &(0x7f0000000240)) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) 21:46:52 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xf000, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) [ 1030.550074][T22467] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 21:46:52 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x30000, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) 21:46:52 executing program 5: socket$kcm(0x2, 0x1, 0x84) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz0\x00', 0x200002, 0x0) openat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) socketpair$unix(0x1, 0x4, 0x0, &(0x7f0000000240)) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) [ 1030.690545][T22481] __nla_validate_parse: 43 callbacks suppressed [ 1030.690557][T22481] netlink: 22 bytes leftover after parsing attributes in process `syz-executor.3'. 21:46:52 executing program 4: socket$kcm(0x2, 0x0, 0x84) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000900)=ANY=[@ANYBLOB="9f0d343f8f3672b246c5e3575e3bad29af7a982e5093be13037bae5e55d3901efcbad02c798684968abd7cd0f3463233c58a4171b61d275264b0c25a86770e422769c2240915668f9c27dcb8caa76b6b52bcf7f0234471abd5fa470b20eff96ea602ca594f7f1a08a7b251002c49eac4221ab3012d6c7c4d8505140e10"], 0x0, 0x7d}, 0x20) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) [ 1030.746455][T22481] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 1030.793565][T22580] netlink: 22 bytes leftover after parsing attributes in process `syz-executor.2'. 21:46:52 executing program 1: socketpair$unix(0x1, 0x0, 0x0, 0x0) socketpair(0x1, 0x0, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x300, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) [ 1030.860750][T22584] netlink: 22 bytes leftover after parsing attributes in process `syz-executor.5'. 21:46:52 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x34000, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) [ 1030.916352][T22589] netlink: 22 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1030.955290][T22591] netlink: 22 bytes leftover after parsing attributes in process `syz-executor.1'. 21:46:52 executing program 5: socket$kcm(0x2, 0x1, 0x84) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz0\x00', 0x200002, 0x0) openat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) socketpair$unix(0x1, 0x4, 0x0, &(0x7f0000000240)) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) [ 1030.991636][T22589] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 21:46:52 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) [ 1031.102192][T22630] netlink: 22 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1031.113948][T22622] netlink: 22 bytes leftover after parsing attributes in process `syz-executor.5'. 21:46:52 executing program 1: socketpair$unix(0x1, 0x0, 0x0, 0x0) socketpair(0x1, 0x0, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xa00, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) [ 1031.151600][T22630] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 1031.183816][T22700] netlink: 22 bytes leftover after parsing attributes in process `syz-executor.3'. 21:46:52 executing program 5: socket$kcm(0x2, 0x1, 0x84) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz0\x00', 0x200002, 0x0) openat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) socketpair$unix(0x1, 0x4, 0x0, &(0x7f0000000240)) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) 21:46:52 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x400300, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) [ 1031.277960][T22700] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 21:46:52 executing program 4: socket$kcm(0x2, 0x0, 0x84) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000900)=ANY=[@ANYBLOB="9f0d343f8f3672b246c5e3575e3bad29af7a982e5093be13037bae5e55d3901efcbad02c798684968abd7cd0f3463233c58a4171b61d275264b0c25a86770e422769c2240915668f9c27dcb8caa76b6b52bcf7f0234471abd5fa470b20eff96ea602ca594f7f1a08a7b251002c49eac4221ab3012d6c7c4d8505140e10"], 0x0, 0x7d}, 0x20) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) [ 1031.370825][T22705] netlink: 22 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1031.376523][T22707] netlink: 22 bytes leftover after parsing attributes in process `syz-executor.5'. 21:46:52 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x2, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) [ 1031.422831][T22705] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 21:46:52 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xf0ffff, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) [ 1031.478188][T22707] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 21:46:53 executing program 5: socket$kcm(0x2, 0x1, 0x84) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz0\x00', 0x200002, 0x0) openat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) socketpair$unix(0x1, 0x4, 0x0, &(0x7f0000000240)) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) 21:46:53 executing program 1: socketpair$unix(0x1, 0x0, 0x0, 0x0) socketpair(0x1, 0x0, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xe00, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) 21:46:53 executing program 4: socket$kcm(0x2, 0x0, 0x84) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000900)=ANY=[@ANYBLOB="9f0d343f8f3672b246c5e3575e3bad29af7a982e5093be13037bae5e55d3901efcbad02c798684968abd7cd0f3463233c58a4171b61d275264b0c25a86770e422769c2240915668f9c27dcb8caa76b6b52bcf7f0234471abd5fa470b20eff96ea602ca594f7f1a08a7b251002c49eac4221ab3012d6c7c4d8505140e10"], 0x0, 0x7d}, 0x20) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) [ 1031.582748][T22818] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 21:46:53 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vfio/vfio\x00', 0x703203, 0x0) r2 = dup(r0) ioctl$DRM_IOCTL_GEM_OPEN(r2, 0xc010640b, &(0x7f00000001c0)={0x0, 0x0, 0xde}) r4 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r5 = creat(&(0x7f0000000300)='./file0\x00', 0x0) ioctl$EXT4_IOC_MOVE_EXT(r4, 0xc028660f, &(0x7f0000000200)={0x0, r5}) ioctl$DRM_IOCTL_GEM_FLINK(r5, 0xc008640a, &(0x7f0000000240)={r3}) ioctl$DRM_IOCTL_GEM_FLINK(r2, 0xc008640a, &(0x7f0000000200)={r6}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) close(r1) ioctl$KVM_GET_MP_STATE(r2, 0x8004ae98, &(0x7f0000000000)) r7 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f00000000c0)=@assoc_value, &(0x7f0000000140)=0x8) ioctl$EXT4_IOC_GROUP_EXTEND(r7, 0x40086607, &(0x7f0000000100)=0xfffffffffffff800) ioctl$SIOCRSACCEPT(r2, 0x89e3) 21:46:53 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x3, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) 21:46:53 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x1000000, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) [ 1031.719369][T22828] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 1031.794818][T22827] EXT4-fs warning (device sda1): ext4_group_extend:1791: will only finish group (524288 blocks, 256 new) 21:46:53 executing program 5: socket$kcm(0x2, 0x1, 0x84) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz0\x00', 0x200002, 0x0) openat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) socketpair$unix(0x1, 0x4, 0x0, &(0x7f0000000240)) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) [ 1031.846497][T22827] EXT4-fs warning (device sda1): ext4_group_extend:1797: can't read last block, resize aborted 21:46:53 executing program 1: socketpair$unix(0x1, 0x0, 0x0, 0x0) socketpair(0x1, 0x0, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xf00, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) [ 1031.890933][T22913] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 1031.926917][T22914] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 21:46:53 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x2000000, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) 21:46:53 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x4, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) 21:46:53 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x4001fd) r2 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x1ab) ioctl$EXT4_IOC_GROUP_EXTEND(r2, 0x40086607, &(0x7f0000000100)=0xfffffffffffff800) [ 1031.999115][T22911] EXT4-fs warning (device sda1): ext4_group_extend:1791: will only finish group (524288 blocks, 256 new) [ 1032.017668][T22946] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 1032.022113][T22911] EXT4-fs warning (device sda1): ext4_group_extend:1797: can't read last block, resize aborted 21:46:53 executing program 4: socket$kcm(0x2, 0x0, 0x84) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000900)=ANY=[@ANYBLOB="9f0d343f8f3672b246c5e3575e3bad29af7a982e5093be13037bae5e55d3901efcbad02c798684968abd7cd0f3463233c58a4171b61d275264b0c25a86770e422769c2240915668f9c27dcb8caa76b6b52bcf7f0234471abd5fa470b20eff96ea602ca594f7f1a08a7b251002c49eac4221ab3012d6c7c4d8505140e10"], 0x0, 0x7d}, 0x20) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) 21:46:53 executing program 1: socketpair$unix(0x1, 0x0, 0x0, 0x0) socketpair(0x1, 0x0, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x4000, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) [ 1032.141345][T23043] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 21:46:53 executing program 5: socket$kcm(0x2, 0x1, 0x84) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz0\x00', 0x200002, 0x0) openat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) socketpair$unix(0x1, 0x4, 0x0, &(0x7f0000000240)) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) 21:46:53 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x5, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) 21:46:53 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x3000000, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) [ 1032.265427][T23058] EXT4-fs warning (device sda1): ext4_group_extend:1791: will only finish group (524288 blocks, 256 new) [ 1032.338724][T23058] EXT4-fs warning (device sda1): ext4_group_extend:1797: can't read last block, resize aborted [ 1032.349006][T23067] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 1032.414337][T23099] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 21:46:53 executing program 5: socket$kcm(0x2, 0x1, 0x84) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) socketpair$unix(0x1, 0x4, 0x0, &(0x7f0000000240)) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) 21:46:53 executing program 4: socket$kcm(0x2, 0x0, 0x84) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000900)=ANY=[@ANYBLOB="9f0d343f8f3672b246c5e3575e3bad29af7a982e5093be13037bae5e55d3901efcbad02c798684968abd7cd0f3463233c58a4171b61d275264b0c25a86770e422769c2240915668f9c27dcb8caa76b6b52bcf7f0234471abd5fa470b20eff96ea602ca594f7f1a08a7b251002c49eac4221ab3012d6c7c4d8505140e10"], 0x0, 0x7d}, 0x20) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) 21:46:53 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) r3 = socket$kcm(0x2, 0x2, 0x73) bind$inet(r3, &(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10) connect(r3, &(0x7f0000000000)=@pppol2tpv3={0x2, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80) getpeername$packet(r3, 0x0, &(0x7f0000000140)) r4 = socket$can_raw(0x1d, 0x3, 0x1) setsockopt$CAN_RAW_FD_FRAMES(r4, 0x65, 0x5, &(0x7f0000000100)=0x1, 0x4) r5 = socket(0x11, 0x800000003, 0x0) bind(r5, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2ac5000000012e0b3836005404b0e0301a060075f2e3ff5f163ee340b700000080000000000000fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c65400"}, 0x80) getsockname$packet(r5, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$can_raw(r4, &(0x7f0000000200)={&(0x7f0000000000)={0x1d, r6}, 0x10, &(0x7f0000000280)={0x0}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r3, 0x8933, &(0x7f0000000000)={'vxcan0\x00', r6}) ioctl$EXT4_IOC_GROUP_EXTEND(r2, 0x40086607, &(0x7f0000000100)=0xfffffffffffff800) r7 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r8 = creat(&(0x7f0000000300)='./file0\x00', 0x0) ioctl$EXT4_IOC_MOVE_EXT(r7, 0xc028660f, &(0x7f0000000200)={0x0, r8}) ioctl$VIDIOC_PREPARE_BUF(r1, 0xc058565d, &(0x7f0000000140)={0x400, 0x4, 0x4, 0x40, {0x77359400}, {0x3, 0xc, 0xff, 0xdc, 0x20, 0x9, "35c53415"}, 0x1, 0x4, @fd=r8, 0x4}) 21:46:53 executing program 1: socketpair$unix(0x1, 0x0, 0x0, 0x0) socketpair(0x1, 0x0, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x5ed4, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) 21:46:54 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x4000000, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) 21:46:54 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) [ 1032.569578][T23182] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 21:46:54 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xa000000, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) [ 1032.712775][T23195] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 1032.733751][T23190] EXT4-fs warning (device sda1): ext4_group_extend:1791: will only finish group (524288 blocks, 256 new) 21:46:54 executing program 5: socket$kcm(0x2, 0x1, 0x84) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) socketpair$unix(0x1, 0x4, 0x0, &(0x7f0000000240)) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) [ 1032.772503][T23208] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 1032.808863][T23190] EXT4-fs warning (device sda1): ext4_group_extend:1797: can't read last block, resize aborted 21:46:54 executing program 4: socket$kcm(0x2, 0x0, 0x84) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000900)=ANY=[@ANYBLOB="9f0d343f8f3672b246c5e3575e3bad29af7a982e5093be13037bae5e55d3901efcbad02c798684968abd7cd0f3463233c58a4171b61d275264b0c25a86770e422769c2240915668f9c27dcb8caa76b6b52bcf7f0234471abd5fa470b20eff96ea602ca594f7f1a08a7b251002c49eac4221ab3012d6c7c4d8505140e10"], 0x0, 0x7d}, 0x20) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) 21:46:54 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x7, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) [ 1032.858222][T23276] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 21:46:54 executing program 1: socketpair$unix(0x1, 0x0, 0x0, 0x0) socketpair(0x1, 0x0, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x6000, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) 21:46:54 executing program 5: socket$kcm(0x2, 0x1, 0x84) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup(r1, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) socketpair$unix(0x1, 0x4, 0x0, &(0x7f0000000240)) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) 21:46:54 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xe000000, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) [ 1033.000118][T23190] EXT4-fs warning (device sda1): ext4_group_extend:1791: will only finish group (524288 blocks, 256 new) [ 1033.021388][T23316] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 1033.049491][T23190] EXT4-fs warning (device sda1): ext4_group_extend:1797: can't read last block, resize aborted 21:46:54 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xa, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) [ 1033.117419][T23323] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 21:46:54 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r3 = creat(&(0x7f0000000300)='./file0\x00', 0x0) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000000200)={0x0, r3}) sendmsg$nl_route_sched(r2, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000140)=@deltaction={0x124, 0x31, 0x100, 0x70bd29, 0x25dfdbfe, {}, [@TCA_ACT_TAB={0x6c, 0x1, [{0x10, 0x18, @TCA_ACT_INDEX={0x8, 0x3, 0x5}}, {0x10, 0x1a, @TCA_ACT_KIND={0x8, 0x1, 'ife\x00'}}, {0x18, 0xf, @TCA_ACT_KIND={0x10, 0x1, 'connmark\x00'}}, {0x10, 0x2, @TCA_ACT_INDEX={0x8, 0x3, 0xfffffffe}}, {0x10, 0x7, @TCA_ACT_INDEX={0x8, 0x3, 0x80000000}}, {0x10, 0x9, @TCA_ACT_KIND={0x8, 0x1, 'bpf\x00'}}]}, @TCA_ACT_TAB={0x14, 0x1, [{0x10, 0x1a, @TCA_ACT_INDEX={0x8, 0x3, 0x1}}]}, @TCA_ACT_TAB={0x90, 0x1, [{0x14, 0x1b, @TCA_ACT_KIND={0xc, 0x1, 'csum\x00'}}, {0x10, 0x1d, @TCA_ACT_INDEX={0x8, 0x3, 0x8}}, {0x14, 0xd, @TCA_ACT_KIND={0xc, 0x1, 'skbmod\x00'}}, {0x10, 0x13, @TCA_ACT_KIND={0x8, 0x1, 'bpf\x00'}}, {0x10, 0x6, @TCA_ACT_INDEX={0x8, 0x3, 0x7}}, {0x14, 0x1a, @TCA_ACT_KIND={0xc, 0x1, 'skbmod\x00'}}, {0x10, 0x1a, @TCA_ACT_INDEX={0x8, 0x3, 0x6}}, {0x10, 0x4, @TCA_ACT_INDEX={0x8, 0x3, 0x1000}}]}]}, 0x124}, 0x1, 0x0, 0x0, 0x24000001}, 0x1) r4 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r4, 0x40086607, &(0x7f0000000100)=0xfffffffffffff800) 21:46:54 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xf000000, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) 21:46:54 executing program 4: socket$kcm(0x2, 0x0, 0x84) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000900)=ANY=[@ANYBLOB="9f0d343f8f3672b246c5e3575e3bad29af7a982e5093be13037bae5e55d3901efcbad02c798684968abd7cd0f3463233c58a4171b61d275264b0c25a86770e422769c2240915668f9c27dcb8caa76b6b52bcf7f0234471abd5fa470b20eff96ea602ca594f7f1a08a7b251002c49eac4221ab3012d6c7c4d8505140e10"], 0x0, 0x7d}, 0x20) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) 21:46:54 executing program 5: socket$kcm(0x2, 0x1, 0x84) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz0\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) socketpair$unix(0x1, 0x4, 0x0, &(0x7f0000000240)) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) r1 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r1, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) [ 1033.267704][T23405] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 21:46:54 executing program 1: socketpair$unix(0x1, 0x0, 0x0, 0x0) socketpair(0x1, 0x0, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xd45e, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) [ 1033.341724][T23435] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 21:46:54 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xe, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) 21:46:54 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x40000000, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) 21:46:54 executing program 4: socket$kcm(0x2, 0x0, 0x84) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000900)=ANY=[@ANYBLOB="9f0d343f8f3672b246c5e3575e3bad29af7a982e5093be13037bae5e55d3901efcbad02c798684968abd7cd0f3463233c58a4171b61d275264b0c25a86770e422769c2240915668f9c27dcb8caa76b6b52bcf7f0234471abd5fa470b20eff96ea602ca594f7f1a08a7b251002c49eac4221ab3012d6c7c4d8505140e10"], 0x0, 0x7d}, 0x20) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) [ 1033.494495][T23444] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 1033.543162][T23448] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 21:46:55 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = open(&(0x7f00000000c0)='./bus\x00', 0x32200, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r2, 0x40086607, &(0x7f0000000100)=0xfffffffffffff800) 21:46:55 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xf, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) 21:46:55 executing program 5: socket$kcm(0x2, 0x1, 0x84) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz0\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) socketpair$unix(0x1, 0x4, 0x0, &(0x7f0000000240)) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) r1 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r1, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) [ 1033.645065][T23486] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 1033.731616][T23493] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 21:46:55 executing program 4: socket$kcm(0x2, 0x0, 0x84) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000900)=ANY=[@ANYBLOB="9f0d343f8f3672b246c5e3575e3bad29af7a982e5093be13037bae5e55d3901efcbad02c798684968abd7cd0f3463233c58a4171b61d275264b0c25a86770e422769c2240915668f9c27dcb8caa76b6b52bcf7f0234471abd5fa470b20eff96ea602ca594f7f1a08a7b251002c49eac4221ab3012d6c7c4d8505140e10"], 0x0, 0x7d}, 0x20) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) [ 1033.803576][T23567] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 21:46:55 executing program 1: socketpair$unix(0x1, 0x0, 0x0, 0x0) socketpair(0x1, 0x0, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xf000, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) 21:46:55 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x48, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) 21:46:55 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x60000000, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) 21:46:55 executing program 5: socket$kcm(0x2, 0x1, 0x84) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz0\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) socketpair$unix(0x1, 0x4, 0x0, &(0x7f0000000240)) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) r1 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r1, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) [ 1033.962675][T23577] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 21:46:55 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) r0 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r1 = creat(&(0x7f0000000300)='./file0\x00', 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000200)={0x0, r1}) r2 = accept$nfc_llcp(r1, 0x0, &(0x7f0000000280)) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r4, 0x40086607, &(0x7f0000000100)=0xfffffffffffff800) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f00000000c0)='./bus\x00', &(0x7f0000000140)='exfat\x00', 0x10000, &(0x7f0000000180)='\x00') r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r5, 0x5423, &(0x7f00000003c0)=0x1) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000001c0)={0x0, 0x0}) fcntl$setownex(r5, 0xf, &(0x7f0000000240)={0x0, r6}) [ 1034.055391][T23584] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 21:46:55 executing program 4: socket$kcm(0x2, 0x0, 0x84) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000900)=ANY=[@ANYBLOB="9f0d343f8f3672b246c5e3575e3bad29af7a982e5093be13037bae5e55d3901efcbad02c798684968abd7cd0f3463233c58a4171b61d275264b0c25a86770e422769c2240915668f9c27dcb8caa76b6b52bcf7f0234471abd5fa470b20eff96ea602ca594f7f1a08a7b251002c49eac4221ab3012d6c7c4d8505140e10"], 0x0, 0x7d}, 0x20) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) [ 1034.114846][T23608] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 21:46:55 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x4c, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) [ 1034.167915][T23616] [EXFAT] trying to mount... 21:46:55 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x8a060000, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) 21:46:55 executing program 5: socket$kcm(0x2, 0x1, 0x84) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000380)='syz0\x00', 0x200002, 0x0) openat$cgroup(r1, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_sys\x00', 0x0, 0x0) socketpair$unix(0x1, 0x4, 0x0, &(0x7f0000000240)) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) 21:46:55 executing program 1: socketpair$unix(0x1, 0x0, 0x0, 0x0) socketpair(0x1, 0x0, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x30000, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) [ 1034.228837][ T2502] block nbd0: Attempted send on invalid socket [ 1034.236188][ T2502] blk_update_request: I/O error, dev nbd0, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1034.263163][T23616] ------------[ cut here ]------------ [ 1034.314312][T23616] [EXFAT] No bh, device seems wrong or to be ejected. [ 1034.329174][T23699] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 1034.349832][T23616] WARNING: CPU: 0 PID: 23616 at drivers/staging/exfat/exfat_blkdev.c:62 bdev_read+0x258/0x2b0 [ 1034.357614][T23693] kobject: 'queues' (00000000dd299a00): kobject_add_internal: parent: 'sl0', set: '' [ 1034.360373][T23616] Kernel panic - not syncing: panic_on_warn set ... [ 1034.360403][T23616] CPU: 0 PID: 23616 Comm: syz-executor.0 Not tainted 5.4.0-rc7+ #0 [ 1034.360411][T23616] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1034.360416][T23616] Call Trace: [ 1034.360437][T23616] dump_stack+0x197/0x210 [ 1034.360456][T23616] ? bdev_read+0x1d0/0x2b0 [ 1034.360468][T23616] panic+0x2e3/0x75c [ 1034.360485][T23616] ? add_taint.cold+0x16/0x16 [ 1034.416382][T23616] ? __kasan_check_write+0x14/0x20 [ 1034.421515][T23616] ? __warn.cold+0x14/0x35 [ 1034.426095][T23616] ? bdev_read+0x258/0x2b0 [ 1034.430628][T23616] __warn.cold+0x2f/0x35 [ 1034.435748][T23616] ? bdev_read+0x258/0x2b0 [ 1034.440188][T23616] report_bug+0x289/0x300 [ 1034.444536][T23616] do_error_trap+0x11b/0x200 [ 1034.449147][T23616] do_invalid_op+0x37/0x50 [ 1034.453594][T23616] ? bdev_read+0x258/0x2b0 [ 1034.458030][T23616] invalid_op+0x23/0x30 21:46:55 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x9effffff, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) [ 1034.462846][T23616] RIP: 0010:bdev_read+0x258/0x2b0 [ 1034.466161][ T3902] kobject: 'loop2' (00000000772f1c13): kobject_uevent_env [ 1034.467969][T23616] Code: ff df 80 3c 02 00 0f 84 51 ff ff ff 4c 89 e7 e8 8e a6 39 fc e9 44 ff ff ff e8 74 43 fe fb 48 c7 c7 20 20 3d 88 e8 50 75 cf fb <0f> 0b eb 8a e8 6f a5 39 fc e9 17 fe ff ff e8 a5 a5 39 fc e9 99 fe [ 1034.495234][T23616] RSP: 0018:ffff8880573afad0 EFLAGS: 00010282 [ 1034.501324][T23616] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 0000000000000000 [ 1034.501742][ T3902] kobject: 'loop2' (00000000772f1c13): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 1034.509304][T23616] RDX: 000000000002df8b RSI: ffffffff815cf8a6 RDI: ffffed100ae75f4c [ 1034.509310][T23616] RBP: ffff8880573afb10 R08: ffff8880594ac580 R09: ffffed1015d06159 [ 1034.509316][T23616] R10: ffffed1015d06158 R11: ffff8880ae830ac7 R12: 0000000000000000 [ 1034.509323][T23616] R13: ffff8880622a0000 R14: 0000000000000001 R15: 0000000000000200 [ 1034.509354][T23616] ? vprintk_func+0x86/0x189 [ 1034.509383][T23616] sector_read+0x156/0x1e0 [ 1034.509401][T23616] exfat_fill_super.cold+0x4d6/0xdba [ 1034.509420][T23616] ? exfat_read_root+0x8d0/0x8d0 [ 1034.509438][T23616] ? vsprintf+0x40/0x40 [ 1034.509455][T23616] ? wait_for_completion+0x440/0x440 [ 1034.509472][T23616] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1034.509485][T23616] ? set_blocksize+0x2bf/0x340 [ 1034.509500][T23616] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1034.509521][T23616] mount_bdev+0x304/0x3c0 [ 1034.565817][T23747] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 1034.568375][T23616] ? exfat_read_root+0x8d0/0x8d0 [ 1034.568397][T23616] exfat_fs_mount+0x35/0x40 [ 1034.568412][T23616] ? exfat_remount+0x50/0x50 [ 1034.568429][T23616] legacy_get_tree+0x108/0x220 [ 1034.568447][T23616] vfs_get_tree+0x8e/0x300 [ 1034.568463][T23616] do_mount+0x143d/0x1d10 [ 1034.568481][T23616] ? copy_mount_string+0x40/0x40 [ 1034.568504][T23616] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1034.568518][T23616] ? copy_mount_options+0x2e8/0x3f0 [ 1034.568544][T23616] ksys_mount+0xdb/0x150 [ 1034.587920][T23693] kobject: 'queues' (00000000dd299a00): kobject_uevent_env [ 1034.591083][T23616] __x64_sys_mount+0xbe/0x150 [ 1034.591103][T23616] do_syscall_64+0xfa/0x760 [ 1034.591121][T23616] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1034.591133][T23616] RIP: 0033:0x45a219 [ 1034.591148][T23616] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1034.591156][T23616] RSP: 002b:00007f88d8052c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1034.591170][T23616] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 000000000045a219 [ 1034.591178][T23616] RDX: 0000000020000140 RSI: 00000000200000c0 RDI: 0000000020000000 [ 1034.591185][T23616] RBP: 000000000075bf20 R08: 0000000020000180 R09: 0000000000000000 [ 1034.591198][T23616] R10: 0000000000010000 R11: 0000000000000246 R12: 00007f88d80536d4 [ 1034.591206][T23616] R13: 00000000004c6d95 R14: 00000000004dc508 R15: 00000000ffffffff [ 1034.597938][T23616] Kernel Offset: disabled [ 1034.778140][T23616] Rebooting in 86400 seconds..