3][T30817] netlink_sendmsg+0x644/0xd60 [ 1223.975082][T30817] ? netlink_getsockopt+0x5b0/0x5b0 [ 1223.980298][T30817] ? aa_sock_msg_perm+0x91/0x150 [ 1223.985249][T30817] ? bpf_lsm_socket_sendmsg+0x5/0x10 [ 1223.990544][T30817] ? security_socket_sendmsg+0x7d/0xa0 [ 1223.996014][T30817] ? netlink_getsockopt+0x5b0/0x5b0 [ 1224.001236][T30817] ____sys_sendmsg+0x59e/0x8f0 14:37:45 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00eaa0122003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) [ 1224.006013][T30817] ? iovec_from_user+0x300/0x390 [ 1224.010965][T30817] ? __sys_sendmsg_sock+0x30/0x30 [ 1224.016017][T30817] ___sys_sendmsg+0x252/0x2e0 [ 1224.020709][T30817] ? __sys_sendmsg+0x260/0x260 [ 1224.025520][T30817] ? __fdget+0x191/0x220 [ 1224.029771][T30817] __se_sys_sendmsg+0x19a/0x260 [ 1224.034634][T30817] ? __x64_sys_sendmsg+0x80/0x80 [ 1224.039595][T30817] ? syscall_enter_from_user_mode+0x2e/0x230 [ 1224.045592][T30817] ? lockdep_hardirqs_on+0x94/0x130 [ 1224.050808][T30817] ? syscall_enter_from_user_mode+0x2e/0x230 [ 1224.056805][T30817] do_syscall_64+0x3d/0xb0 [ 1224.061235][T30817] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1224.067141][T30817] RIP: 0033:0x7f2e29024da9 [ 1224.071574][T30817] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 1224.091194][T30817] RSP: 002b:00007f2e275a50c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1224.099640][T30817] RAX: ffffffffffffffda RBX: 00007f2e29152f80 RCX: 00007f2e29024da9 14:37:46 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00eac0122003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:37:46 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00eae0122003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) [ 1224.107632][T30817] RDX: 0000000002000000 RSI: 0000000020000000 RDI: 0000000000000003 [ 1224.115617][T30817] RBP: 00007f2e275a5120 R08: 0000000000000000 R09: 0000000000000000 [ 1224.123600][T30817] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1224.131584][T30817] R13: 000000000000000b R14: 00007f2e29152f80 R15: 00007ffd7693bd28 [ 1224.139580][T30817] [ 1224.152490][T30813] device sit0 entered promiscuous mode 14:37:46 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) (fail_nth: 61) 14:37:46 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00eb00122003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:37:46 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00eb20122003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) [ 1224.283220][T30812] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 1224.294262][T30812] platform regulatory.0: Falling back to sysfs fallback for: regulatory.db [ 1224.324544][T30829] FAULT_INJECTION: forcing a failure. [ 1224.324544][T30829] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1224.341670][T30829] CPU: 0 PID: 30829 Comm: syz-executor.0 Not tainted 5.15.151-syzkaller #0 [ 1224.350286][T30829] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/25/2024 [ 1224.360346][T30829] Call Trace: [ 1224.363627][T30829] [ 1224.366556][T30829] dump_stack_lvl+0x1e3/0x2cb 14:37:46 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00eb40122003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) [ 1224.371254][T30829] ? io_uring_drop_tctx_refs+0x19d/0x19d [ 1224.376914][T30829] ? panic+0x84d/0x84d [ 1224.381007][T30829] should_fail+0x38a/0x4c0 [ 1224.385443][T30829] prepare_alloc_pages+0x1db/0x5b0 [ 1224.390568][T30829] __alloc_pages+0x14f/0x700 [ 1224.395192][T30829] ? __rmqueue_pcplist+0x2030/0x2030 [ 1224.400501][T30829] ? alloc_pages+0x458/0x570 [ 1224.405108][T30829] __vmalloc_node_range+0x5ab/0x8c0 [ 1224.410337][T30829] ? netlink_sendmsg+0x644/0xd60 [ 1224.415290][T30829] vmalloc+0x75/0x80 [ 1224.419202][T30829] ? netlink_sendmsg+0x644/0xd60 [ 1224.424158][T30829] netlink_sendmsg+0x644/0xd60 [ 1224.428945][T30829] ? netlink_getsockopt+0x5b0/0x5b0 [ 1224.434145][T30829] ? aa_sock_msg_perm+0x91/0x150 [ 1224.439106][T30829] ? bpf_lsm_socket_sendmsg+0x5/0x10 [ 1224.444405][T30829] ? security_socket_sendmsg+0x7d/0xa0 [ 1224.449857][T30829] ? netlink_getsockopt+0x5b0/0x5b0 [ 1224.455064][T30829] ____sys_sendmsg+0x59e/0x8f0 [ 1224.459832][T30829] ? iovec_from_user+0x300/0x390 [ 1224.464775][T30829] ? __sys_sendmsg_sock+0x30/0x30 [ 1224.469825][T30829] ___sys_sendmsg+0x252/0x2e0 14:37:46 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00eb60122003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) [ 1224.474521][T30829] ? __sys_sendmsg+0x260/0x260 [ 1224.479336][T30829] ? __fdget+0x191/0x220 [ 1224.483595][T30829] __se_sys_sendmsg+0x19a/0x260 [ 1224.488462][T30829] ? __x64_sys_sendmsg+0x80/0x80 [ 1224.493433][T30829] ? syscall_enter_from_user_mode+0x2e/0x230 [ 1224.499425][T30829] ? lockdep_hardirqs_on+0x94/0x130 [ 1224.504632][T30829] ? syscall_enter_from_user_mode+0x2e/0x230 [ 1224.510631][T30829] do_syscall_64+0x3d/0xb0 [ 1224.515069][T30829] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1224.520966][T30829] RIP: 0033:0x7f2e29024da9 14:37:46 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00eb80122003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) [ 1224.525386][T30829] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 1224.544997][T30829] RSP: 002b:00007f2e275a50c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1224.553426][T30829] RAX: ffffffffffffffda RBX: 00007f2e29152f80 RCX: 00007f2e29024da9 [ 1224.561408][T30829] RDX: 0000000002000000 RSI: 0000000020000000 RDI: 0000000000000003 14:37:46 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r5 = openat$cgroup_ro(r1, &(0x7f00000000c0)='blkio.bfq.sectors\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={r3, 0xe0, &(0x7f0000000940)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000200)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x1, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000640)=[0x0], 0x0, 0x6a, &(0x7f0000000680)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x6e, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r7 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000a40)={0x1b, 0x0, 0x0, 0x7, 0x0, r0, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x5, 0x3}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x1c, 0x21, &(0x7f0000000440)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x905, 0x0, 0x0, 0x0, 0x1}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@generic={0x80, 0x6, 0x8, 0x3f, 0xda}, @map_val={0x18, 0x1, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x401}, @initr0={0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x2}, @ldst={0x2, 0x3, 0x2, 0x9, 0x3, 0x1, 0x4}, @tail_call={{0x18, 0x2, 0x1, 0x0, r2}}, @jmp={0x5, 0x1, 0xa, 0x9, 0x3, 0xffffffffffffffe0}, @generic={0x9, 0x1, 0x5, 0x4, 0x8001}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @ldst={0x2, 0x1, 0x1, 0xb, 0xb, 0x20, 0x8}, @map_idx={0x18, 0x6, 0x5, 0x0, 0x10}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000080)='GPL\x00', 0x800, 0xd4, &(0x7f00000002c0)=""/212, 0x41100, 0x6, '\x00', 0x0, 0x8, r5, 0x8, &(0x7f0000000100)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x2, 0x475f, 0x401}, 0x10, r6, 0xffffffffffffffff, 0x4, &(0x7f0000000800)=[0xffffffffffffffff, r7], &(0x7f0000000ac0)=[{0x3, 0x2, 0xc, 0x6}, {0x3, 0x4, 0xb, 0xa}, {0x2, 0x2, 0xe, 0x2}, {0x3, 0x1, 0x5, 0x8}], 0x10, 0x20}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) getpid() perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f00000005c0)={0x1, 0x80, 0x0, 0x0, 0xbe, 0x0, 0x0, 0x0, 0x28000, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x400, 0xd7, 0x5, 0x0, 0x965, 0x0, 0xfffffffffffffffb}, 0x0, 0xd, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f00000006c0)) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0xe5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) ioctl$SIOCSIFHWADDR(r8, 0x8914, &(0x7f0000000040)={'sit0\x00', @local}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f00000008c0)='\x00'}, 0x30) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000e00)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8890}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000840)={0x0, 0x80, 0x2, 0x1, 0x9, 0x0, 0x0, 0x7, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x3ff, 0x0, @perf_config_ext={0x67}, 0x200, 0x612, 0x0, 0x0, 0xa0, 0x0, 0xd171, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x3, r4, 0x1) ioctl$SIOCSIFHWADDR(r9, 0x8914, &(0x7f0000000040)={'sit0\x00', @random="4f33e363a4b1"}) 14:37:46 executing program 2: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x10) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x1a, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f97e24fc6004030e040a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x3, 0x5, 0x5, 0x0, 0x0, 0x8, 0x4000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x101, 0x1, @perf_config_ext={0x7fff, 0x8}, 0x4000, 0x3, 0x0, 0x3, 0x80000001, 0x80, 0x40, 0x0, 0x0, 0x0, 0x81}, 0xffffffffffffffff, 0x8, r0, 0x0) [ 1224.569392][T30829] RBP: 00007f2e275a5120 R08: 0000000000000000 R09: 0000000000000000 [ 1224.577385][T30829] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1224.585369][T30829] R13: 000000000000000b R14: 00007f2e29152f80 R15: 00007ffd7693bd28 [ 1224.593375][T30829] 14:37:46 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) (fail_nth: 62) [ 1224.637834][T30837] device sit0 left promiscuous mode 14:37:46 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00eba0122003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) [ 1224.721821][T30842] FAULT_INJECTION: forcing a failure. [ 1224.721821][T30842] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1224.735907][T30843] netlink: 134056 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1224.760270][T30844] device sit0 entered promiscuous mode [ 1224.760797][T30842] CPU: 0 PID: 30842 Comm: syz-executor.0 Not tainted 5.15.151-syzkaller #0 [ 1224.774336][T30842] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/25/2024 [ 1224.784409][T30842] Call Trace: [ 1224.787697][T30842] [ 1224.790641][T30842] dump_stack_lvl+0x1e3/0x2cb [ 1224.795343][T30842] ? io_uring_drop_tctx_refs+0x19d/0x19d [ 1224.800994][T30842] ? panic+0x84d/0x84d [ 1224.805088][T30842] should_fail+0x38a/0x4c0 [ 1224.809523][T30842] prepare_alloc_pages+0x1db/0x5b0 [ 1224.814657][T30842] __alloc_pages+0x14f/0x700 [ 1224.819263][T30842] ? __rmqueue_pcplist+0x2030/0x2030 [ 1224.824569][T30842] ? alloc_pages+0x458/0x570 [ 1224.829178][T30842] __vmalloc_node_range+0x5ab/0x8c0 [ 1224.834402][T30842] ? netlink_sendmsg+0x644/0xd60 [ 1224.839354][T30842] vmalloc+0x75/0x80 [ 1224.843263][T30842] ? netlink_sendmsg+0x644/0xd60 [ 1224.848212][T30842] netlink_sendmsg+0x644/0xd60 [ 1224.852999][T30842] ? netlink_getsockopt+0x5b0/0x5b0 [ 1224.858209][T30842] ? aa_sock_msg_perm+0x91/0x150 [ 1224.863159][T30842] ? bpf_lsm_socket_sendmsg+0x5/0x10 [ 1224.868452][T30842] ? security_socket_sendmsg+0x7d/0xa0 [ 1224.873926][T30842] ? netlink_getsockopt+0x5b0/0x5b0 [ 1224.874448][T30843] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 1224.879140][T30842] ____sys_sendmsg+0x59e/0x8f0 [ 1224.879167][T30842] ? iovec_from_user+0x300/0x390 [ 1224.879196][T30842] ? __sys_sendmsg_sock+0x30/0x30 [ 1224.879226][T30842] ___sys_sendmsg+0x252/0x2e0 [ 1224.907991][T30842] ? __sys_sendmsg+0x260/0x260 [ 1224.912812][T30842] ? __fdget+0x191/0x220 [ 1224.917070][T30842] __se_sys_sendmsg+0x19a/0x260 [ 1224.921959][T30842] ? __x64_sys_sendmsg+0x80/0x80 [ 1224.926922][T30842] ? syscall_enter_from_user_mode+0x2e/0x230 [ 1224.928923][T30843] platform regulatory.0: Falling back to sysfs fallback for: regulatory.db [ 1224.932912][T30842] ? lockdep_hardirqs_on+0x94/0x130 [ 1224.932940][T30842] ? syscall_enter_from_user_mode+0x2e/0x230 [ 1224.932962][T30842] do_syscall_64+0x3d/0xb0 [ 1224.932986][T30842] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1224.933009][T30842] RIP: 0033:0x7f2e29024da9 14:37:46 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) (fail_nth: 63) 14:37:46 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00ebc0122003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:37:46 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r5 = openat$cgroup_ro(r1, &(0x7f00000000c0)='blkio.bfq.sectors\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={r3, 0xe0, &(0x7f0000000940)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000200)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x1, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000640)=[0x0], 0x0, 0x6a, &(0x7f0000000680)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x6e, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r7 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000a40)={0x1b, 0x0, 0x0, 0x7, 0x0, r0, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x5, 0x3}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x1c, 0x21, &(0x7f0000000440)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x905, 0x0, 0x0, 0x0, 0x1}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@generic={0x80, 0x6, 0x8, 0x3f, 0xda}, @map_val={0x18, 0x1, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x401}, @initr0={0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x2}, @ldst={0x2, 0x3, 0x2, 0x9, 0x3, 0x1, 0x4}, @tail_call={{0x18, 0x2, 0x1, 0x0, r2}}, @jmp={0x5, 0x1, 0xa, 0x9, 0x3, 0xffffffffffffffe0}, @generic={0x9, 0x1, 0x5, 0x4, 0x8001}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @ldst={0x2, 0x1, 0x1, 0xb, 0xb, 0x20, 0x8}, @map_idx={0x18, 0x6, 0x5, 0x0, 0x10}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000080)='GPL\x00', 0x800, 0xd4, &(0x7f00000002c0)=""/212, 0x41100, 0x6, '\x00', 0x0, 0x8, r5, 0x8, &(0x7f0000000100)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x2, 0x475f, 0x401}, 0x10, r6, 0xffffffffffffffff, 0x4, &(0x7f0000000800)=[0xffffffffffffffff, r7], &(0x7f0000000ac0)=[{0x3, 0x2, 0xc, 0x6}, {0x3, 0x4, 0xb, 0xa}, {0x2, 0x2, 0xe, 0x2}, {0x3, 0x1, 0x5, 0x8}], 0x10, 0x20}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) getpid() perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f00000005c0)={0x1, 0x80, 0x0, 0x0, 0xbe, 0x0, 0x0, 0x0, 0x28000, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x400, 0xd7, 0x5, 0x0, 0x965, 0x0, 0xfffffffffffffffb}, 0x0, 0xd, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f00000006c0)) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0xe5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) ioctl$SIOCSIFHWADDR(r8, 0x8914, &(0x7f0000000040)={'sit0\x00', @local}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f00000008c0)='\x00'}, 0x30) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000e00)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000840)={0x0, 0x80, 0x2, 0x1, 0x9, 0x0, 0x0, 0x7, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x3ff, 0x0, @perf_config_ext={0x67}, 0x200, 0x612, 0x0, 0x0, 0xa0, 0x0, 0xd171, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x3, r4, 0x1) ioctl$SIOCSIFHWADDR(r9, 0x8914, &(0x7f0000000040)={'sit0\x00', @random="4f33e363a4b1"}) [ 1224.933026][T30842] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 1224.933042][T30842] RSP: 002b:00007f2e275a50c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1224.933064][T30842] RAX: ffffffffffffffda RBX: 00007f2e29152f80 RCX: 00007f2e29024da9 [ 1224.933080][T30842] RDX: 0000000002000000 RSI: 0000000020000000 RDI: 0000000000000003 [ 1224.933094][T30842] RBP: 00007f2e275a5120 R08: 0000000000000000 R09: 0000000000000000 [ 1224.933113][T30842] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1224.933126][T30842] R13: 000000000000000b R14: 00007f2e29152f80 R15: 00007ffd7693bd28 [ 1224.933154][T30842] [ 1225.046355][T30850] device sit0 left promiscuous mode [ 1225.051434][T30853] FAULT_INJECTION: forcing a failure. [ 1225.051434][T30853] name fail_page_alloc, interval 1, probability 0, space 0, times 0 14:37:47 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00ebe0122003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) [ 1225.108836][T30853] CPU: 1 PID: 30853 Comm: syz-executor.0 Not tainted 5.15.151-syzkaller #0 [ 1225.117465][T30853] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/25/2024 [ 1225.127536][T30853] Call Trace: [ 1225.130826][T30853] [ 1225.133767][T30853] dump_stack_lvl+0x1e3/0x2cb [ 1225.138467][T30853] ? io_uring_drop_tctx_refs+0x19d/0x19d [ 1225.139493][T30850] device sit0 entered promiscuous mode [ 1225.144117][T30853] ? panic+0x84d/0x84d [ 1225.144152][T30853] should_fail+0x38a/0x4c0 [ 1225.144180][T30853] prepare_alloc_pages+0x1db/0x5b0 [ 1225.144210][T30853] __alloc_pages+0x14f/0x700 [ 1225.144233][T30853] ? __rmqueue_pcplist+0x2030/0x2030 [ 1225.144265][T30853] ? alloc_pages+0x458/0x570 [ 1225.177680][T30853] __vmalloc_node_range+0x5ab/0x8c0 [ 1225.182914][T30853] ? netlink_sendmsg+0x644/0xd60 [ 1225.187878][T30853] vmalloc+0x75/0x80 [ 1225.191793][T30853] ? netlink_sendmsg+0x644/0xd60 [ 1225.196758][T30853] netlink_sendmsg+0x644/0xd60 [ 1225.201549][T30853] ? netlink_getsockopt+0x5b0/0x5b0 [ 1225.206765][T30853] ? aa_sock_msg_perm+0x91/0x150 [ 1225.211715][T30853] ? bpf_lsm_socket_sendmsg+0x5/0x10 [ 1225.217012][T30853] ? security_socket_sendmsg+0x7d/0xa0 [ 1225.222482][T30853] ? netlink_getsockopt+0x5b0/0x5b0 [ 1225.227702][T30853] ____sys_sendmsg+0x59e/0x8f0 [ 1225.232473][T30853] ? iovec_from_user+0x300/0x390 [ 1225.237439][T30853] ? __sys_sendmsg_sock+0x30/0x30 [ 1225.242487][T30853] ___sys_sendmsg+0x252/0x2e0 [ 1225.247189][T30853] ? __sys_sendmsg+0x260/0x260 [ 1225.251998][T30853] ? __fdget+0x191/0x220 [ 1225.256255][T30853] __se_sys_sendmsg+0x19a/0x260 [ 1225.261122][T30853] ? __x64_sys_sendmsg+0x80/0x80 [ 1225.266077][T30853] ? syscall_enter_from_user_mode+0x2e/0x230 [ 1225.272070][T30853] ? lockdep_hardirqs_on+0x94/0x130 [ 1225.277290][T30853] ? syscall_enter_from_user_mode+0x2e/0x230 [ 1225.283294][T30853] do_syscall_64+0x3d/0xb0 [ 1225.287728][T30853] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1225.293654][T30853] RIP: 0033:0x7f2e29024da9 14:37:47 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r5 = openat$cgroup_ro(r1, &(0x7f00000000c0)='blkio.bfq.sectors\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={r3, 0xe0, &(0x7f0000000940)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000200)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x1, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000640)=[0x0], 0x0, 0x6a, &(0x7f0000000680)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x6e, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r7 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000a40)={0x1b, 0x0, 0x0, 0x7, 0x0, r0, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x5, 0x3}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x1c, 0x21, &(0x7f0000000440)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x905, 0x0, 0x0, 0x0, 0x1}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@generic={0x80, 0x6, 0x8, 0x3f, 0xda}, @map_val={0x18, 0x1, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x401}, @initr0={0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x2}, @ldst={0x2, 0x3, 0x2, 0x9, 0x3, 0x1, 0x4}, @tail_call={{0x18, 0x2, 0x1, 0x0, r2}}, @jmp={0x5, 0x1, 0xa, 0x9, 0x3, 0xffffffffffffffe0}, @generic={0x9, 0x1, 0x5, 0x4, 0x8001}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @ldst={0x2, 0x1, 0x1, 0xb, 0xb, 0x20, 0x8}, @map_idx={0x18, 0x6, 0x5, 0x0, 0x10}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000080)='GPL\x00', 0x800, 0xd4, &(0x7f00000002c0)=""/212, 0x41100, 0x6, '\x00', 0x0, 0x8, r5, 0x8, &(0x7f0000000100)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x2, 0x475f, 0x401}, 0x10, r6, 0xffffffffffffffff, 0x4, &(0x7f0000000800)=[0xffffffffffffffff, r7], &(0x7f0000000ac0)=[{0x3, 0x2, 0xc, 0x6}, {0x3, 0x4, 0xb, 0xa}, {0x2, 0x2, 0xe, 0x2}, {0x3, 0x1, 0x5, 0x8}], 0x10, 0x20}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) getpid() perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f00000005c0)={0x1, 0x80, 0x0, 0x0, 0xbe, 0x0, 0x0, 0x0, 0x28000, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x400, 0xd7, 0x5, 0x0, 0x965, 0x0, 0xfffffffffffffffb}, 0x0, 0xd, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f00000006c0)) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0xe5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) ioctl$SIOCSIFHWADDR(r8, 0x8914, &(0x7f0000000040)={'sit0\x00', @local}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f00000008c0)='\x00'}, 0x30) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000e00)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000840)={0x0, 0x80, 0x2, 0x1, 0x9, 0x0, 0x0, 0x7, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x3ff, 0x0, @perf_config_ext={0x67}, 0x200, 0x612, 0x0, 0x0, 0xa0, 0x0, 0xd171, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x3, r4, 0x1) ioctl$SIOCSIFHWADDR(r9, 0x8914, &(0x7f0000000040)={'sit0\x00', @random="4f33e363a4b1"}) [ 1225.298076][T30853] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 1225.317704][T30853] RSP: 002b:00007f2e275a50c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1225.326136][T30853] RAX: ffffffffffffffda RBX: 00007f2e29152f80 RCX: 00007f2e29024da9 [ 1225.334124][T30853] RDX: 0000000002000000 RSI: 0000000020000000 RDI: 0000000000000003 [ 1225.342108][T30853] RBP: 00007f2e275a5120 R08: 0000000000000000 R09: 0000000000000000 [ 1225.350094][T30853] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 14:37:47 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00ec00122003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:37:47 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) (fail_nth: 64) [ 1225.358077][T30853] R13: 000000000000000b R14: 00007f2e29152f80 R15: 00007ffd7693bd28 [ 1225.366078][T30853] [ 1225.386894][T30856] device sit0 left promiscuous mode 14:37:47 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00ec20122003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:37:47 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00ec40122003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) [ 1225.474035][T30860] device sit0 entered promiscuous mode [ 1225.475687][T30862] FAULT_INJECTION: forcing a failure. [ 1225.475687][T30862] name fail_page_alloc, interval 1, probability 0, space 0, times 0 14:37:47 executing program 2: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x10) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x1a, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f97e24fc6004030e050a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x3, 0x5, 0x5, 0x0, 0x0, 0x8, 0x4000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x101, 0x1, @perf_config_ext={0x7fff, 0x8}, 0x4000, 0x3, 0x0, 0x3, 0x80000001, 0x80, 0x40, 0x0, 0x0, 0x0, 0x81}, 0xffffffffffffffff, 0x8, r0, 0x0) 14:37:47 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00ec60122003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) [ 1225.653201][T30868] netlink: 134056 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1225.674148][T30862] CPU: 1 PID: 30862 Comm: syz-executor.0 Not tainted 5.15.151-syzkaller #0 [ 1225.682780][T30862] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/25/2024 [ 1225.692866][T30862] Call Trace: [ 1225.696155][T30862] [ 1225.699093][T30862] dump_stack_lvl+0x1e3/0x2cb [ 1225.703268][T30868] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 1225.703826][T30862] ? io_uring_drop_tctx_refs+0x19d/0x19d [ 1225.703858][T30862] ? panic+0x84d/0x84d [ 1225.703889][T30862] should_fail+0x38a/0x4c0 [ 1225.703915][T30862] prepare_alloc_pages+0x1db/0x5b0 [ 1225.703945][T30862] __alloc_pages+0x14f/0x700 [ 1225.703968][T30862] ? __rmqueue_pcplist+0x2030/0x2030 [ 1225.704000][T30862] ? alloc_pages+0x458/0x570 [ 1225.704027][T30862] __vmalloc_node_range+0x5ab/0x8c0 14:37:47 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00ec80122003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) [ 1225.704058][T30862] ? netlink_sendmsg+0x644/0xd60 [ 1225.729824][T30868] platform regulatory.0: Falling back to sysfs fallback for: regulatory.db [ 1225.732668][T30862] vmalloc+0x75/0x80 [ 1225.732699][T30862] ? netlink_sendmsg+0x644/0xd60 [ 1225.732723][T30862] netlink_sendmsg+0x644/0xd60 [ 1225.732756][T30862] ? netlink_getsockopt+0x5b0/0x5b0 [ 1225.732781][T30862] ? aa_sock_msg_perm+0x91/0x150 [ 1225.732803][T30862] ? bpf_lsm_socket_sendmsg+0x5/0x10 [ 1225.732824][T30862] ? security_socket_sendmsg+0x7d/0xa0 14:37:47 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00eca0122003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) [ 1225.732847][T30862] ? netlink_getsockopt+0x5b0/0x5b0 [ 1225.732871][T30862] ____sys_sendmsg+0x59e/0x8f0 [ 1225.732892][T30862] ? iovec_from_user+0x300/0x390 [ 1225.732919][T30862] ? __sys_sendmsg_sock+0x30/0x30 [ 1225.732954][T30862] ___sys_sendmsg+0x252/0x2e0 [ 1225.732980][T30862] ? __sys_sendmsg+0x260/0x260 [ 1225.733038][T30862] ? __fdget+0x191/0x220 [ 1225.833980][T30862] __se_sys_sendmsg+0x19a/0x260 [ 1225.838852][T30862] ? __x64_sys_sendmsg+0x80/0x80 [ 1225.843814][T30862] ? syscall_enter_from_user_mode+0x2e/0x230 14:37:47 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00ecc0122003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) [ 1225.849818][T30862] ? lockdep_hardirqs_on+0x94/0x130 [ 1225.855053][T30862] ? syscall_enter_from_user_mode+0x2e/0x230 [ 1225.861058][T30862] do_syscall_64+0x3d/0xb0 [ 1225.865520][T30862] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1225.871432][T30862] RIP: 0033:0x7f2e29024da9 [ 1225.875855][T30862] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 1225.895490][T30862] RSP: 002b:00007f2e275a50c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e 14:37:47 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00ece0122003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:37:47 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r5 = openat$cgroup_ro(r1, &(0x7f00000000c0)='blkio.bfq.sectors\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={r3, 0xe0, &(0x7f0000000940)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000200)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x1, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000640)=[0x0], 0x0, 0x6a, &(0x7f0000000680)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x6e, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r7 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000a40)={0x1b, 0x0, 0x0, 0x7, 0x0, r0, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x5, 0x3}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x1c, 0x21, &(0x7f0000000440)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x905, 0x0, 0x0, 0x0, 0x1}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@generic={0x80, 0x6, 0x8, 0x3f, 0xda}, @map_val={0x18, 0x1, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x401}, @initr0={0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x2}, @ldst={0x2, 0x3, 0x2, 0x9, 0x3, 0x1, 0x4}, @tail_call={{0x18, 0x2, 0x1, 0x0, r2}}, @jmp={0x5, 0x1, 0xa, 0x9, 0x3, 0xffffffffffffffe0}, @generic={0x9, 0x1, 0x5, 0x4, 0x8001}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @ldst={0x2, 0x1, 0x1, 0xb, 0xb, 0x20, 0x8}, @map_idx={0x18, 0x6, 0x5, 0x0, 0x10}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000080)='GPL\x00', 0x800, 0xd4, &(0x7f00000002c0)=""/212, 0x41100, 0x6, '\x00', 0x0, 0x8, r5, 0x8, &(0x7f0000000100)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x2, 0x475f, 0x401}, 0x10, r6, 0xffffffffffffffff, 0x4, &(0x7f0000000800)=[0xffffffffffffffff, r7], &(0x7f0000000ac0)=[{0x3, 0x2, 0xc, 0x6}, {0x3, 0x4, 0xb, 0xa}, {0x2, 0x2, 0xe, 0x2}, {0x3, 0x1, 0x5, 0x8}], 0x10, 0x20}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) getpid() perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f00000005c0)={0x1, 0x80, 0x0, 0x0, 0xbe, 0x0, 0x0, 0x0, 0x28000, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x400, 0xd7, 0x5, 0x0, 0x965, 0x0, 0xfffffffffffffffb}, 0x0, 0xd, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f00000006c0)) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0xe5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) ioctl$SIOCSIFHWADDR(r8, 0x8914, &(0x7f0000000040)={'sit0\x00', @local}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f00000008c0)='\x00'}, 0x30) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000e00)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000840)={0x0, 0x80, 0x2, 0x1, 0x9, 0x0, 0x0, 0x7, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x3ff, 0x0, @perf_config_ext={0x67}, 0x200, 0x612, 0x0, 0x0, 0xa0, 0x0, 0xd171, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x3, r4, 0x1) ioctl$SIOCSIFHWADDR(r9, 0x8914, &(0x7f0000000040)={'sit0\x00', @random="4f33e363a4b1"}) [ 1225.903937][T30862] RAX: ffffffffffffffda RBX: 00007f2e29152f80 RCX: 00007f2e29024da9 [ 1225.911923][T30862] RDX: 0000000002000000 RSI: 0000000020000000 RDI: 0000000000000003 [ 1225.919905][T30862] RBP: 00007f2e275a5120 R08: 0000000000000000 R09: 0000000000000000 [ 1225.927885][T30862] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1225.935869][T30862] R13: 000000000000000b R14: 00007f2e29152f80 R15: 00007ffd7693bd28 [ 1225.943862][T30862] 14:37:47 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00ed00122003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) [ 1225.977988][T30880] device sit0 left promiscuous mode 14:37:47 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) (fail_nth: 65) 14:37:47 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00ed20122003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) [ 1226.096694][T30886] FAULT_INJECTION: forcing a failure. [ 1226.096694][T30886] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1226.121840][T30886] CPU: 1 PID: 30886 Comm: syz-executor.0 Not tainted 5.15.151-syzkaller #0 [ 1226.130475][T30886] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/25/2024 [ 1226.140552][T30886] Call Trace: [ 1226.143842][T30886] [ 1226.146803][T30886] dump_stack_lvl+0x1e3/0x2cb [ 1226.151529][T30886] ? io_uring_drop_tctx_refs+0x19d/0x19d [ 1226.157179][T30886] ? panic+0x84d/0x84d [ 1226.161272][T30886] should_fail+0x38a/0x4c0 [ 1226.165703][T30886] prepare_alloc_pages+0x1db/0x5b0 [ 1226.170833][T30886] __alloc_pages+0x14f/0x700 [ 1226.175439][T30886] ? __rmqueue_pcplist+0x2030/0x2030 [ 1226.180754][T30886] ? alloc_pages+0x458/0x570 [ 1226.185367][T30886] __vmalloc_node_range+0x5ab/0x8c0 [ 1226.190586][T30886] ? netlink_sendmsg+0x644/0xd60 [ 1226.195517][T30886] vmalloc+0x75/0x80 [ 1226.199416][T30886] ? netlink_sendmsg+0x644/0xd60 [ 1226.204340][T30886] netlink_sendmsg+0x644/0xd60 [ 1226.209092][T30886] ? netlink_getsockopt+0x5b0/0x5b0 [ 1226.214292][T30886] ? aa_sock_msg_perm+0x91/0x150 [ 1226.219222][T30886] ? bpf_lsm_socket_sendmsg+0x5/0x10 [ 1226.224494][T30886] ? security_socket_sendmsg+0x7d/0xa0 [ 1226.229944][T30886] ? netlink_getsockopt+0x5b0/0x5b0 [ 1226.235126][T30886] ____sys_sendmsg+0x59e/0x8f0 [ 1226.239876][T30886] ? iovec_from_user+0x300/0x390 [ 1226.244797][T30886] ? __sys_sendmsg_sock+0x30/0x30 [ 1226.249815][T30886] ___sys_sendmsg+0x252/0x2e0 [ 1226.254489][T30886] ? __sys_sendmsg+0x260/0x260 [ 1226.259263][T30886] ? __fdget+0x191/0x220 [ 1226.263494][T30886] __se_sys_sendmsg+0x19a/0x260 [ 1226.268327][T30886] ? __x64_sys_sendmsg+0x80/0x80 [ 1226.273263][T30886] ? syscall_enter_from_user_mode+0x2e/0x230 [ 1226.279239][T30886] ? lockdep_hardirqs_on+0x94/0x130 [ 1226.284443][T30886] ? syscall_enter_from_user_mode+0x2e/0x230 [ 1226.290441][T30886] do_syscall_64+0x3d/0xb0 [ 1226.294855][T30886] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1226.300792][T30886] RIP: 0033:0x7f2e29024da9 [ 1226.305192][T30886] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 1226.324780][T30886] RSP: 002b:00007f2e275a50c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1226.333177][T30886] RAX: ffffffffffffffda RBX: 00007f2e29152f80 RCX: 00007f2e29024da9 14:37:48 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00ed40122003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:37:48 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00ed60122003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) [ 1226.341130][T30886] RDX: 0000000002000000 RSI: 0000000020000000 RDI: 0000000000000003 [ 1226.349082][T30886] RBP: 00007f2e275a5120 R08: 0000000000000000 R09: 0000000000000000 [ 1226.357034][T30886] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1226.364987][T30886] R13: 000000000000000b R14: 00007f2e29152f80 R15: 00007ffd7693bd28 [ 1226.372951][T30886] [ 1226.390507][T30882] device sit0 entered promiscuous mode 14:37:48 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) (fail_nth: 66) 14:37:48 executing program 2: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x10) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x1a, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f97e24fc6004030e060a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x3, 0x5, 0x5, 0x0, 0x0, 0x8, 0x4000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x101, 0x1, @perf_config_ext={0x7fff, 0x8}, 0x4000, 0x3, 0x0, 0x3, 0x80000001, 0x80, 0x40, 0x0, 0x0, 0x0, 0x81}, 0xffffffffffffffff, 0x8, r0, 0x0) 14:37:48 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00ed80122003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) [ 1226.499184][T30894] FAULT_INJECTION: forcing a failure. [ 1226.499184][T30894] name failslab, interval 1, probability 0, space 0, times 0 [ 1226.548985][T30894] CPU: 1 PID: 30894 Comm: syz-executor.0 Not tainted 5.15.151-syzkaller #0 [ 1226.557613][T30894] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/25/2024 [ 1226.567685][T30894] Call Trace: [ 1226.570975][T30894] [ 1226.573912][T30894] dump_stack_lvl+0x1e3/0x2cb [ 1226.578611][T30894] ? io_uring_drop_tctx_refs+0x19d/0x19d [ 1226.584265][T30894] ? panic+0x84d/0x84d [ 1226.588357][T30894] ? vunmap_range+0x30/0x30 [ 1226.592878][T30894] should_fail+0x38a/0x4c0 [ 1226.597313][T30894] should_failslab+0x5/0x20 [ 1226.601831][T30894] slab_pre_alloc_hook+0x53/0xc0 [ 1226.606804][T30894] ? __build_skb+0x25/0x2f0 [ 1226.611345][T30894] kmem_cache_alloc+0x3f/0x280 [ 1226.616129][T30894] __build_skb+0x25/0x2f0 [ 1226.617730][T30896] netlink: 134056 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1226.620465][T30894] netlink_sendmsg+0x65a/0xd60 [ 1226.620503][T30894] ? netlink_getsockopt+0x5b0/0x5b0 [ 1226.620527][T30894] ? aa_sock_msg_perm+0x91/0x150 14:37:48 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r5 = openat$cgroup_ro(r1, &(0x7f00000000c0)='blkio.bfq.sectors\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={r3, 0xe0, &(0x7f0000000940)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000200)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x1, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000640)=[0x0], 0x0, 0x6a, &(0x7f0000000680)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x6e, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r7 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000a40)={0x1b, 0x0, 0x0, 0x7, 0x0, r0, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x5, 0x3}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x1c, 0x21, &(0x7f0000000440)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x905, 0x0, 0x0, 0x0, 0x1}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@generic={0x80, 0x6, 0x8, 0x3f, 0xda}, @map_val={0x18, 0x1, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x401}, @initr0={0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x2}, @ldst={0x2, 0x3, 0x2, 0x9, 0x3, 0x1, 0x4}, @tail_call={{0x18, 0x2, 0x1, 0x0, r2}}, @jmp={0x5, 0x1, 0xa, 0x9, 0x3, 0xffffffffffffffe0}, @generic={0x9, 0x1, 0x5, 0x4, 0x8001}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @ldst={0x2, 0x1, 0x1, 0xb, 0xb, 0x20, 0x8}, @map_idx={0x18, 0x6, 0x5, 0x0, 0x10}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000080)='GPL\x00', 0x800, 0xd4, &(0x7f00000002c0)=""/212, 0x41100, 0x6, '\x00', 0x0, 0x8, r5, 0x8, &(0x7f0000000100)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x2, 0x475f, 0x401}, 0x10, r6, 0xffffffffffffffff, 0x4, &(0x7f0000000800)=[0xffffffffffffffff, r7], &(0x7f0000000ac0)=[{0x3, 0x2, 0xc, 0x6}, {0x3, 0x4, 0xb, 0xa}, {0x2, 0x2, 0xe, 0x2}, {0x3, 0x1, 0x5, 0x8}], 0x10, 0x20}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) getpid() perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f00000005c0)={0x1, 0x80, 0x0, 0x0, 0xbe, 0x0, 0x0, 0x0, 0x28000, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x400, 0xd7, 0x5, 0x0, 0x965, 0x0, 0xfffffffffffffffb}, 0x0, 0xd, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f00000006c0)) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0xe5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) ioctl$SIOCSIFHWADDR(r8, 0x8914, &(0x7f0000000040)={'sit0\x00', @local}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f00000008c0)='\x00'}, 0x30) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000e00)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8890}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000840)={0x0, 0x80, 0x2, 0x1, 0x9, 0x0, 0x0, 0x7, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x3ff, 0x0, @perf_config_ext={0x67}, 0x200, 0x612, 0x0, 0x0, 0xa0, 0x0, 0xd171, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x3, r4, 0x1) ioctl$SIOCSIFHWADDR(r9, 0x8914, &(0x7f0000000040)={'sit0\x00', @random="4f33e363a4b1"}) [ 1226.620550][T30894] ? bpf_lsm_socket_sendmsg+0x5/0x10 [ 1226.620571][T30894] ? security_socket_sendmsg+0x7d/0xa0 [ 1226.620594][T30894] ? netlink_getsockopt+0x5b0/0x5b0 [ 1226.620618][T30894] ____sys_sendmsg+0x59e/0x8f0 [ 1226.620639][T30894] ? iovec_from_user+0x300/0x390 [ 1226.620664][T30894] ? __sys_sendmsg_sock+0x30/0x30 [ 1226.620699][T30894] ___sys_sendmsg+0x252/0x2e0 [ 1226.620725][T30894] ? __sys_sendmsg+0x260/0x260 [ 1226.620783][T30894] ? __fdget+0x191/0x220 [ 1226.620807][T30894] __se_sys_sendmsg+0x19a/0x260 [ 1226.620830][T30894] ? __x64_sys_sendmsg+0x80/0x80 [ 1226.620860][T30894] ? syscall_enter_from_user_mode+0x2e/0x230 [ 1226.620882][T30894] ? lockdep_hardirqs_on+0x94/0x130 [ 1226.620903][T30894] ? syscall_enter_from_user_mode+0x2e/0x230 [ 1226.620926][T30894] do_syscall_64+0x3d/0xb0 [ 1226.674961][T30896] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 1226.675923][T30894] entry_SYSCALL_64_after_hwframe+0x61/0xcb 14:37:48 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00eda0122003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) [ 1226.675954][T30894] RIP: 0033:0x7f2e29024da9 [ 1226.675975][T30894] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 1226.675994][T30894] RSP: 002b:00007f2e275a50c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1226.676018][T30894] RAX: ffffffffffffffda RBX: 00007f2e29152f80 RCX: 00007f2e29024da9 [ 1226.676034][T30894] RDX: 0000000002000000 RSI: 0000000020000000 RDI: 0000000000000003 14:37:48 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) (fail_nth: 67) 14:37:48 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00edc0122003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) [ 1226.676049][T30894] RBP: 00007f2e275a5120 R08: 0000000000000000 R09: 0000000000000000 [ 1226.676063][T30894] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1226.676076][T30894] R13: 000000000000000b R14: 00007f2e29152f80 R15: 00007ffd7693bd28 [ 1226.676105][T30894] [ 1226.826451][T30901] device sit0 left promiscuous mode [ 1226.834956][T30896] platform regulatory.0: Falling back to sysfs fallback for: regulatory.db [ 1226.875242][T30906] FAULT_INJECTION: forcing a failure. [ 1226.875242][T30906] name fail_usercopy, interval 1, probability 0, space 0, times 0 14:37:48 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) (fail_nth: 68) 14:37:48 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00ede0122003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) [ 1226.896576][T30906] CPU: 1 PID: 30906 Comm: syz-executor.0 Not tainted 5.15.151-syzkaller #0 [ 1226.896608][T30906] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/25/2024 [ 1226.896621][T30906] Call Trace: [ 1226.896629][T30906] [ 1226.896638][T30906] dump_stack_lvl+0x1e3/0x2cb [ 1226.896672][T30906] ? io_uring_drop_tctx_refs+0x19d/0x19d [ 1226.896696][T30906] ? panic+0x84d/0x84d [ 1226.896719][T30906] ? __lock_acquire+0x1ff0/0x1ff0 [ 1226.896748][T30906] should_fail+0x38a/0x4c0 [ 1226.896773][T30906] _copy_from_iter+0x243/0xe90 [ 1226.896804][T30906] ? copy_mc_pipe_to_iter+0x760/0x760 [ 1226.896824][T30906] ? __build_skb+0x25/0x2f0 14:37:48 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00ee00122003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) [ 1226.896843][T30906] ? rcu_is_watching+0x11/0xa0 [ 1226.896997][T30906] ? __build_skb+0x25/0x2f0 [ 1226.897015][T30906] ? kmem_cache_alloc+0x128/0x280 [ 1226.897037][T30906] ? __virt_addr_valid+0xb7/0x450 [ 1226.897095][T30906] ? 0xffffffff81000000 [ 1226.897111][T30906] ? __check_object_size+0x300/0x410 [ 1226.897171][T30906] netlink_sendmsg+0x800/0xd60 [ 1226.897206][T30906] ? netlink_getsockopt+0x5b0/0x5b0 [ 1226.897231][T30906] ? aa_sock_msg_perm+0x91/0x150 [ 1226.897253][T30906] ? bpf_lsm_socket_sendmsg+0x5/0x10 14:37:49 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00ee20122003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) [ 1226.897273][T30906] ? security_socket_sendmsg+0x7d/0xa0 [ 1226.897295][T30906] ? netlink_getsockopt+0x5b0/0x5b0 [ 1226.897319][T30906] ____sys_sendmsg+0x59e/0x8f0 [ 1226.897339][T30906] ? iovec_from_user+0x300/0x390 [ 1226.897365][T30906] ? __sys_sendmsg_sock+0x30/0x30 [ 1226.897400][T30906] ___sys_sendmsg+0x252/0x2e0 [ 1226.897426][T30906] ? __sys_sendmsg+0x260/0x260 [ 1226.897494][T30906] ? __fdget+0x191/0x220 [ 1226.897518][T30906] __se_sys_sendmsg+0x19a/0x260 [ 1226.897542][T30906] ? __x64_sys_sendmsg+0x80/0x80 [ 1226.897572][T30906] ? syscall_enter_from_user_mode+0x2e/0x230 [ 1226.897593][T30906] ? lockdep_hardirqs_on+0x94/0x130 [ 1226.897614][T30906] ? syscall_enter_from_user_mode+0x2e/0x230 [ 1226.897639][T30906] do_syscall_64+0x3d/0xb0 [ 1226.897662][T30906] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1226.897686][T30906] RIP: 0033:0x7f2e29024da9 [ 1226.897704][T30906] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 14:37:49 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00ee40122003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) [ 1226.897723][T30906] RSP: 002b:00007f2e275a50c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1226.897748][T30906] RAX: ffffffffffffffda RBX: 00007f2e29152f80 RCX: 00007f2e29024da9 [ 1226.897764][T30906] RDX: 0000000002000000 RSI: 0000000020000000 RDI: 0000000000000003 [ 1226.897778][T30906] RBP: 00007f2e275a5120 R08: 0000000000000000 R09: 0000000000000000 [ 1226.897793][T30906] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1226.897806][T30906] R13: 000000000000000b R14: 00007f2e29152f80 R15: 00007ffd7693bd28 [ 1226.897835][T30906] [ 1227.006102][T30912] FAULT_INJECTION: forcing a failure. [ 1227.006102][T30912] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1227.272570][T30904] device sit0 entered promiscuous mode [ 1227.274723][T30912] CPU: 0 PID: 30912 Comm: syz-executor.0 Not tainted 5.15.151-syzkaller #0 [ 1227.286640][T30912] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/25/2024 14:37:49 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00ee60122003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) [ 1227.296709][T30912] Call Trace: [ 1227.300001][T30912] [ 1227.302938][T30912] dump_stack_lvl+0x1e3/0x2cb [ 1227.307636][T30912] ? io_uring_drop_tctx_refs+0x19d/0x19d [ 1227.313287][T30912] ? panic+0x84d/0x84d [ 1227.317375][T30912] ? __lock_acquire+0x1ff0/0x1ff0 [ 1227.322433][T30912] should_fail+0x38a/0x4c0 [ 1227.326960][T30912] _copy_from_iter+0x243/0xe90 [ 1227.331767][T30912] ? copy_mc_pipe_to_iter+0x760/0x760 [ 1227.337155][T30912] ? __build_skb+0x25/0x2f0 [ 1227.341685][T30912] ? rcu_is_watching+0x11/0xa0 [ 1227.346465][T30912] ? __build_skb+0x25/0x2f0 [ 1227.350985][T30912] ? kmem_cache_alloc+0x128/0x280 [ 1227.356029][T30912] ? __virt_addr_valid+0xb7/0x450 [ 1227.361076][T30912] ? 0xffffffff81000000 [ 1227.365240][T30912] ? __check_object_size+0x300/0x410 [ 1227.370549][T30912] netlink_sendmsg+0x800/0xd60 [ 1227.375345][T30912] ? netlink_getsockopt+0x5b0/0x5b0 [ 1227.380568][T30912] ? aa_sock_msg_perm+0x91/0x150 [ 1227.385528][T30912] ? bpf_lsm_socket_sendmsg+0x5/0x10 [ 1227.390832][T30912] ? security_socket_sendmsg+0x7d/0xa0 [ 1227.396344][T30912] ? netlink_getsockopt+0x5b0/0x5b0 [ 1227.401565][T30912] ____sys_sendmsg+0x59e/0x8f0 [ 1227.406357][T30912] ? iovec_from_user+0x300/0x390 [ 1227.411447][T30912] ? __sys_sendmsg_sock+0x30/0x30 [ 1227.416504][T30912] ___sys_sendmsg+0x252/0x2e0 [ 1227.421200][T30912] ? __sys_sendmsg+0x260/0x260 [ 1227.426003][T30912] ? __fdget+0x191/0x220 [ 1227.430252][T30912] __se_sys_sendmsg+0x19a/0x260 [ 1227.435118][T30912] ? __x64_sys_sendmsg+0x80/0x80 [ 1227.440068][T30912] ? syscall_enter_from_user_mode+0x2e/0x230 [ 1227.446065][T30912] ? lockdep_hardirqs_on+0x94/0x130 [ 1227.451278][T30912] ? syscall_enter_from_user_mode+0x2e/0x230 [ 1227.457401][T30912] do_syscall_64+0x3d/0xb0 [ 1227.461821][T30912] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1227.467729][T30912] RIP: 0033:0x7f2e29024da9 [ 1227.472135][T30912] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 14:37:49 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r5 = openat$cgroup_ro(r1, &(0x7f00000000c0)='blkio.bfq.sectors\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={r3, 0xe0, &(0x7f0000000940)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000200)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x1, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000640)=[0x0], 0x0, 0x6a, &(0x7f0000000680)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x6e, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r7 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000a40)={0x1b, 0x0, 0x0, 0x7, 0x0, r0, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x5, 0x3}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x1c, 0x21, &(0x7f0000000440)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x905, 0x0, 0x0, 0x0, 0x1}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@generic={0x80, 0x6, 0x8, 0x3f, 0xda}, @map_val={0x18, 0x1, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x401}, @initr0={0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x2}, @ldst={0x2, 0x3, 0x2, 0x9, 0x3, 0x1, 0x4}, @tail_call={{0x18, 0x2, 0x1, 0x0, r2}}, @jmp={0x5, 0x1, 0xa, 0x9, 0x3, 0xffffffffffffffe0}, @generic={0x9, 0x1, 0x5, 0x4, 0x8001}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @ldst={0x2, 0x1, 0x1, 0xb, 0xb, 0x20, 0x8}, @map_idx={0x18, 0x6, 0x5, 0x0, 0x10}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000080)='GPL\x00', 0x800, 0xd4, &(0x7f00000002c0)=""/212, 0x41100, 0x6, '\x00', 0x0, 0x8, r5, 0x8, &(0x7f0000000100)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x2, 0x475f, 0x401}, 0x10, r6, 0xffffffffffffffff, 0x4, &(0x7f0000000800)=[0xffffffffffffffff, r7], &(0x7f0000000ac0)=[{0x3, 0x2, 0xc, 0x6}, {0x3, 0x4, 0xb, 0xa}, {0x2, 0x2, 0xe, 0x2}, {0x3, 0x1, 0x5, 0x8}], 0x10, 0x20}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) getpid() perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f00000005c0)={0x1, 0x80, 0x0, 0x0, 0xbe, 0x0, 0x0, 0x0, 0x28000, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x400, 0xd7, 0x5, 0x0, 0x965, 0x0, 0xfffffffffffffffb}, 0x0, 0xd, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f00000006c0)) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0xe5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) ioctl$SIOCSIFHWADDR(r8, 0x8914, &(0x7f0000000040)={'sit0\x00', @local}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f00000008c0)='\x00'}, 0x30) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000e00)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8890}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000840)={0x0, 0x80, 0x2, 0x1, 0x9, 0x0, 0x0, 0x7, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x3ff, 0x0, @perf_config_ext={0x67}, 0x200, 0x612, 0x0, 0x0, 0xa0, 0x0, 0xd171, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x3, r4, 0x1) ioctl$SIOCSIFHWADDR(r9, 0x8914, &(0x7f0000000040)={'sit0\x00', @random="4f33e363a4b1"}) 14:37:49 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00ee80122003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:37:49 executing program 2: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x10) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x1a, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f97e24fc6004030e070a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x3, 0x5, 0x5, 0x0, 0x0, 0x8, 0x4000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x101, 0x1, @perf_config_ext={0x7fff, 0x8}, 0x4000, 0x3, 0x0, 0x3, 0x80000001, 0x80, 0x40, 0x0, 0x0, 0x0, 0x81}, 0xffffffffffffffff, 0x8, r0, 0x0) [ 1227.491738][T30912] RSP: 002b:00007f2e275a50c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1227.500275][T30912] RAX: ffffffffffffffda RBX: 00007f2e29152f80 RCX: 00007f2e29024da9 [ 1227.508268][T30912] RDX: 0000000002000000 RSI: 0000000020000000 RDI: 0000000000000003 [ 1227.516259][T30912] RBP: 00007f2e275a5120 R08: 0000000000000000 R09: 0000000000000000 [ 1227.524234][T30912] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1227.532197][T30912] R13: 000000000000000b R14: 00007f2e29152f80 R15: 00007ffd7693bd28 [ 1227.540172][T30912] 14:37:49 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00eea0122003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) [ 1227.619277][T30924] device sit0 left promiscuous mode 14:37:49 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) (fail_nth: 69) 14:37:49 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00eec0122003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) [ 1227.660650][T30926] netlink: 134056 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1227.711535][T30933] FAULT_INJECTION: forcing a failure. [ 1227.711535][T30933] name failslab, interval 1, probability 0, space 0, times 0 [ 1227.744835][T30933] CPU: 0 PID: 30933 Comm: syz-executor.0 Not tainted 5.15.151-syzkaller #0 14:37:49 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00eee0122003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) [ 1227.753467][T30933] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/25/2024 [ 1227.763544][T30933] Call Trace: [ 1227.766838][T30933] [ 1227.769783][T30933] dump_stack_lvl+0x1e3/0x2cb [ 1227.774483][T30933] ? io_uring_drop_tctx_refs+0x19d/0x19d [ 1227.780139][T30933] ? panic+0x84d/0x84d [ 1227.784242][T30933] should_fail+0x38a/0x4c0 [ 1227.788687][T30933] should_failslab+0x5/0x20 [ 1227.793207][T30933] slab_pre_alloc_hook+0x53/0xc0 [ 1227.798168][T30933] __kmalloc+0x6e/0x300 [ 1227.802348][T30933] ? genl_family_rcv_msg_attrs_parse+0xa3/0x290 14:37:49 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00ef00122003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) [ 1227.808724][T30933] genl_family_rcv_msg_attrs_parse+0xa3/0x290 [ 1227.814854][T30933] genl_rcv_msg+0xbf6/0x14a0 [ 1227.819463][T30933] ? genl_bind+0x420/0x420 [ 1227.823888][T30933] ? local_bh_enable+0x5/0x20 [ 1227.828656][T30933] ? _local_bh_enable+0xa0/0xa0 [ 1227.833574][T30933] ? mark_lock+0x98/0x340 [ 1227.838034][T30933] ? __lock_acquire+0x1295/0x1ff0 [ 1227.843082][T30933] ? nl80211_del_key+0xac0/0xac0 [ 1227.848141][T30933] netlink_rcv_skb+0x1cf/0x410 [ 1227.852922][T30933] ? genl_bind+0x420/0x420 [ 1227.857367][T30933] ? netlink_ack+0xb10/0xb10 [ 1227.861986][T30933] ? down_read+0x1b3/0x2e0 [ 1227.866446][T30933] ? genl_rcv+0x9/0x40 [ 1227.870655][T30933] genl_rcv+0x24/0x40 [ 1227.874651][T30933] netlink_unicast+0x7b6/0x980 [ 1227.879430][T30933] ? netlink_detachskb+0x90/0x90 [ 1227.884374][T30933] ? __virt_addr_valid+0xb7/0x450 [ 1227.889419][T30933] ? 0xffffffff81000000 [ 1227.893593][T30933] ? __check_object_size+0x300/0x410 [ 1227.898905][T30933] ? bpf_lsm_netlink_send+0x5/0x10 [ 1227.904040][T30933] netlink_sendmsg+0xa30/0xd60 14:37:49 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00ef20122003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) [ 1227.908837][T30933] ? netlink_getsockopt+0x5b0/0x5b0 [ 1227.914057][T30933] ? aa_sock_msg_perm+0x91/0x150 [ 1227.919009][T30933] ? bpf_lsm_socket_sendmsg+0x5/0x10 [ 1227.924288][T30933] ? security_socket_sendmsg+0x7d/0xa0 [ 1227.929771][T30933] ? netlink_getsockopt+0x5b0/0x5b0 [ 1227.934993][T30933] ____sys_sendmsg+0x59e/0x8f0 [ 1227.939776][T30933] ? iovec_from_user+0x300/0x390 [ 1227.944739][T30933] ? __sys_sendmsg_sock+0x30/0x30 [ 1227.949799][T30933] ___sys_sendmsg+0x252/0x2e0 [ 1227.954495][T30933] ? __sys_sendmsg+0x260/0x260 14:37:49 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00ef40122003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) [ 1227.959319][T30933] ? __fdget+0x191/0x220 [ 1227.963588][T30933] __se_sys_sendmsg+0x19a/0x260 [ 1227.968462][T30933] ? __x64_sys_sendmsg+0x80/0x80 [ 1227.973432][T30933] ? syscall_enter_from_user_mode+0x2e/0x230 [ 1227.979431][T30933] ? lockdep_hardirqs_on+0x94/0x130 [ 1227.984650][T30933] ? syscall_enter_from_user_mode+0x2e/0x230 [ 1227.990656][T30933] do_syscall_64+0x3d/0xb0 [ 1227.995089][T30933] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1228.000995][T30933] RIP: 0033:0x7f2e29024da9 [ 1228.005427][T30933] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 1228.025670][T30933] RSP: 002b:00007f2e275a50c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1228.034106][T30933] RAX: ffffffffffffffda RBX: 00007f2e29152f80 RCX: 00007f2e29024da9 [ 1228.042096][T30933] RDX: 0000000002000000 RSI: 0000000020000000 RDI: 0000000000000003 [ 1228.050079][T30933] RBP: 00007f2e275a5120 R08: 0000000000000000 R09: 0000000000000000 14:37:49 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00ef60122003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) [ 1228.058069][T30933] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1228.066059][T30933] R13: 000000000000000b R14: 00007f2e29152f80 R15: 00007ffd7693bd28 [ 1228.074067][T30933] 14:37:50 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00ef80122003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:37:50 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00efa0122003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:37:50 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) (fail_nth: 70) [ 1228.177651][T30931] device sit0 entered promiscuous mode 14:37:50 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00efc0122003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:37:50 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00efe0122003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) [ 1228.273371][T30951] FAULT_INJECTION: forcing a failure. [ 1228.273371][T30951] name failslab, interval 1, probability 0, space 0, times 0 [ 1228.331142][T30951] CPU: 1 PID: 30951 Comm: syz-executor.0 Not tainted 5.15.151-syzkaller #0 [ 1228.339782][T30951] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/25/2024 [ 1228.349857][T30951] Call Trace: [ 1228.353250][T30951] [ 1228.356191][T30951] dump_stack_lvl+0x1e3/0x2cb [ 1228.360893][T30951] ? io_uring_drop_tctx_refs+0x19d/0x19d [ 1228.361872][T30926] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 1228.366544][T30951] ? panic+0x84d/0x84d [ 1228.366585][T30951] should_fail+0x38a/0x4c0 [ 1228.366614][T30951] should_failslab+0x5/0x20 [ 1228.366635][T30951] slab_pre_alloc_hook+0x53/0xc0 [ 1228.366663][T30951] __kmalloc+0x6e/0x300 [ 1228.366682][T30951] ? genl_family_rcv_msg_attrs_parse+0xa3/0x290 [ 1228.366715][T30951] genl_family_rcv_msg_attrs_parse+0xa3/0x290 [ 1228.366746][T30951] genl_rcv_msg+0xbf6/0x14a0 [ 1228.366775][T30951] ? genl_bind+0x420/0x420 [ 1228.366801][T30951] ? local_bh_enable+0x5/0x20 14:37:50 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r5 = openat$cgroup_ro(r1, &(0x7f00000000c0)='blkio.bfq.sectors\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={r3, 0xe0, &(0x7f0000000940)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000200)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x1, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000640)=[0x0], 0x0, 0x6a, &(0x7f0000000680)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x6e, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r7 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000a40)={0x1b, 0x0, 0x0, 0x7, 0x0, r0, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x5, 0x3}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x1c, 0x21, &(0x7f0000000440)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x905, 0x0, 0x0, 0x0, 0x1}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@generic={0x80, 0x6, 0x8, 0x3f, 0xda}, @map_val={0x18, 0x1, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x401}, @initr0={0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x2}, @ldst={0x2, 0x3, 0x2, 0x9, 0x3, 0x1, 0x4}, @tail_call={{0x18, 0x2, 0x1, 0x0, r2}}, @jmp={0x5, 0x1, 0xa, 0x9, 0x3, 0xffffffffffffffe0}, @generic={0x9, 0x1, 0x5, 0x4, 0x8001}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @ldst={0x2, 0x1, 0x1, 0xb, 0xb, 0x20, 0x8}, @map_idx={0x18, 0x6, 0x5, 0x0, 0x10}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000080)='GPL\x00', 0x800, 0xd4, &(0x7f00000002c0)=""/212, 0x41100, 0x6, '\x00', 0x0, 0x8, r5, 0x8, &(0x7f0000000100)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x2, 0x475f, 0x401}, 0x10, r6, 0xffffffffffffffff, 0x4, &(0x7f0000000800)=[0xffffffffffffffff, r7], &(0x7f0000000ac0)=[{0x3, 0x2, 0xc, 0x6}, {0x3, 0x4, 0xb, 0xa}, {0x2, 0x2, 0xe, 0x2}, {0x3, 0x1, 0x5, 0x8}], 0x10, 0x20}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) getpid() perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f00000005c0)={0x1, 0x80, 0x0, 0x0, 0xbe, 0x0, 0x0, 0x0, 0x28000, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x400, 0xd7, 0x5, 0x0, 0x965, 0x0, 0xfffffffffffffffb}, 0x0, 0xd, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f00000006c0)) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0xe5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) ioctl$SIOCSIFHWADDR(r8, 0x8914, &(0x7f0000000040)={'sit0\x00', @local}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f00000008c0)='\x00'}, 0x30) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000e00)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8890}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000840)={0x0, 0x80, 0x2, 0x1, 0x9, 0x0, 0x0, 0x7, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x3ff, 0x0, @perf_config_ext={0x67}, 0x200, 0x612, 0x0, 0x0, 0xa0, 0x0, 0xd171, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x3, r4, 0x1) ioctl$SIOCSIFHWADDR(r9, 0x8914, &(0x7f0000000040)={'sit0\x00', @random="4f33e363a4b1"}) [ 1228.389586][T30926] platform regulatory.0: Falling back to sysfs fallback for: regulatory.db [ 1228.394175][T30951] ? _local_bh_enable+0xa0/0xa0 [ 1228.394209][T30951] ? mark_lock+0x98/0x340 [ 1228.394234][T30951] ? __lock_acquire+0x1295/0x1ff0 [ 1228.394273][T30951] ? nl80211_del_key+0xac0/0xac0 [ 1228.394313][T30951] netlink_rcv_skb+0x1cf/0x410 [ 1228.394339][T30951] ? genl_bind+0x420/0x420 [ 1228.394363][T30951] ? netlink_ack+0xb10/0xb10 [ 1228.394396][T30951] ? down_read+0x1b3/0x2e0 [ 1228.394415][T30951] ? genl_rcv+0x9/0x40 [ 1228.394439][T30951] genl_rcv+0x24/0x40 14:37:50 executing program 2: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x10) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x1a, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f97e24fc6004030e080a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x3, 0x5, 0x5, 0x0, 0x0, 0x8, 0x4000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x101, 0x1, @perf_config_ext={0x7fff, 0x8}, 0x4000, 0x3, 0x0, 0x3, 0x80000001, 0x80, 0x40, 0x0, 0x0, 0x0, 0x81}, 0xffffffffffffffff, 0x8, r0, 0x0) [ 1228.394460][T30951] netlink_unicast+0x7b6/0x980 [ 1228.394490][T30951] ? netlink_detachskb+0x90/0x90 [ 1228.394512][T30951] ? __virt_addr_valid+0xb7/0x450 [ 1228.394537][T30951] ? 0xffffffff81000000 [ 1228.394553][T30951] ? __check_object_size+0x300/0x410 [ 1228.394578][T30951] ? bpf_lsm_netlink_send+0x5/0x10 [ 1228.394601][T30951] netlink_sendmsg+0xa30/0xd60 [ 1228.394635][T30951] ? netlink_getsockopt+0x5b0/0x5b0 [ 1228.394661][T30951] ? aa_sock_msg_perm+0x91/0x150 [ 1228.394683][T30951] ? bpf_lsm_socket_sendmsg+0x5/0x10 [ 1228.394702][T30951] ? security_socket_sendmsg+0x7d/0xa0 [ 1228.394724][T30951] ? netlink_getsockopt+0x5b0/0x5b0 [ 1228.394748][T30951] ____sys_sendmsg+0x59e/0x8f0 [ 1228.394802][T30951] ? iovec_from_user+0x300/0x390 [ 1228.394830][T30951] ? __sys_sendmsg_sock+0x30/0x30 [ 1228.394867][T30951] ___sys_sendmsg+0x252/0x2e0 [ 1228.394893][T30951] ? __sys_sendmsg+0x260/0x260 [ 1228.563075][T30951] ? __fdget+0x191/0x220 [ 1228.567372][T30951] __se_sys_sendmsg+0x19a/0x260 [ 1228.572247][T30951] ? __x64_sys_sendmsg+0x80/0x80 14:37:50 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020222003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) [ 1228.577248][T30951] ? syscall_enter_from_user_mode+0x2e/0x230 [ 1228.583245][T30951] ? lockdep_hardirqs_on+0x94/0x130 [ 1228.588468][T30951] ? syscall_enter_from_user_mode+0x2e/0x230 [ 1228.594476][T30951] do_syscall_64+0x3d/0xb0 [ 1228.596883][T30961] netlink: 134056 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1228.598926][T30951] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1228.598956][T30951] RIP: 0033:0x7f2e29024da9 [ 1228.598976][T30951] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 1228.598994][T30951] RSP: 002b:00007f2e275a50c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1228.599018][T30951] RAX: ffffffffffffffda RBX: 00007f2e29152f80 RCX: 00007f2e29024da9 [ 1228.599034][T30951] RDX: 0000000002000000 RSI: 0000000020000000 RDI: 0000000000000003 [ 1228.599049][T30951] RBP: 00007f2e275a5120 R08: 0000000000000000 R09: 0000000000000000 [ 1228.599063][T30951] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 14:37:50 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e040222003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) [ 1228.599076][T30951] R13: 000000000000000b R14: 00007f2e29152f80 R15: 00007ffd7693bd28 [ 1228.599106][T30951] [ 1228.692058][T30956] device sit0 left promiscuous mode 14:37:50 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) (fail_nth: 71) 14:37:50 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e060222003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:37:50 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e080222003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) [ 1228.780054][T30969] netlink: 134056 bytes leftover after parsing attributes in process `syz-executor.0'. 14:37:50 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e0a0222003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:37:50 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e0c0222003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:37:50 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e0e0222003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:37:50 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e100222003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) [ 1228.950916][T30958] device sit0 entered promiscuous mode [ 1228.976189][T30961] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 1229.001480][T30961] platform regulatory.0: Falling back to sysfs fallback for: regulatory.db 14:37:50 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r5 = openat$cgroup_ro(r1, &(0x7f00000000c0)='blkio.bfq.sectors\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={r3, 0xe0, &(0x7f0000000940)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000200)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x1, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000640)=[0x0], 0x0, 0x6a, &(0x7f0000000680)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x6e, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r7 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000a40)={0x1b, 0x0, 0x0, 0x7, 0x0, r0, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x5, 0x3}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x1c, 0x21, &(0x7f0000000440)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x905, 0x0, 0x0, 0x0, 0x1}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@generic={0x80, 0x6, 0x8, 0x3f, 0xda}, @map_val={0x18, 0x1, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x401}, @initr0={0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x2}, @ldst={0x2, 0x3, 0x2, 0x9, 0x3, 0x1, 0x4}, @tail_call={{0x18, 0x2, 0x1, 0x0, r2}}, @jmp={0x5, 0x1, 0xa, 0x9, 0x3, 0xffffffffffffffe0}, @generic={0x9, 0x1, 0x5, 0x4, 0x8001}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @ldst={0x2, 0x1, 0x1, 0xb, 0xb, 0x20, 0x8}, @map_idx={0x18, 0x6, 0x5, 0x0, 0x10}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000080)='GPL\x00', 0x800, 0xd4, &(0x7f00000002c0)=""/212, 0x41100, 0x6, '\x00', 0x0, 0x8, r5, 0x8, &(0x7f0000000100)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x2, 0x475f, 0x401}, 0x10, r6, 0xffffffffffffffff, 0x4, &(0x7f0000000800)=[0xffffffffffffffff, r7], &(0x7f0000000ac0)=[{0x3, 0x2, 0xc, 0x6}, {0x3, 0x4, 0xb, 0xa}, {0x2, 0x2, 0xe, 0x2}, {0x3, 0x1, 0x5, 0x8}], 0x10, 0x20}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) getpid() perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f00000005c0)={0x1, 0x80, 0x0, 0x0, 0xbe, 0x0, 0x0, 0x0, 0x28000, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x400, 0xd7, 0x5, 0x0, 0x965, 0x0, 0xfffffffffffffffb}, 0x0, 0xd, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f00000006c0)) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0xe5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) ioctl$SIOCSIFHWADDR(r8, 0x8914, &(0x7f0000000040)={'sit0\x00', @local}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f00000008c0)='\x00'}, 0x30) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000e00)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8890}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x3, r4, 0x1) ioctl$SIOCSIFHWADDR(r9, 0x8914, &(0x7f0000000040)={'sit0\x00', @random="4f33e363a4b1"}) [ 1229.057478][T30969] FAULT_INJECTION: forcing a failure. [ 1229.057478][T30969] name failslab, interval 1, probability 0, space 0, times 0 [ 1229.078348][T30969] CPU: 0 PID: 30969 Comm: syz-executor.0 Not tainted 5.15.151-syzkaller #0 [ 1229.086978][T30969] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/25/2024 [ 1229.097054][T30969] Call Trace: [ 1229.100348][T30969] [ 1229.103298][T30969] dump_stack_lvl+0x1e3/0x2cb 14:37:50 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e120222003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:37:51 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e140222003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) [ 1229.108007][T30969] ? io_uring_drop_tctx_refs+0x19d/0x19d [ 1229.113674][T30969] ? panic+0x84d/0x84d [ 1229.117771][T30969] ? __might_sleep+0xc0/0xc0 [ 1229.122386][T30969] ? genl_rcv_msg+0x1057/0x14a0 [ 1229.127267][T30969] should_fail+0x38a/0x4c0 [ 1229.131707][T30969] should_failslab+0x5/0x20 [ 1229.136236][T30969] slab_pre_alloc_hook+0x53/0xc0 [ 1229.141196][T30969] kmem_cache_alloc_node+0x49/0x2c0 [ 1229.146416][T30969] ? __alloc_skb+0xdd/0x590 [ 1229.150939][T30969] ? mark_lock+0x98/0x340 14:37:51 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e160222003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) [ 1229.155291][T30969] __alloc_skb+0xdd/0x590 [ 1229.159636][T30969] ? __lock_acquire+0x1295/0x1ff0 [ 1229.164678][T30969] netlink_ack+0x33c/0xb10 [ 1229.169263][T30969] ? netlink_dump+0xc40/0xc40 [ 1229.173969][T30969] netlink_rcv_skb+0x24c/0x410 [ 1229.178757][T30969] ? genl_bind+0x420/0x420 [ 1229.183197][T30969] ? netlink_ack+0xb10/0xb10 [ 1229.187817][T30969] ? down_read+0x1b3/0x2e0 [ 1229.192246][T30969] ? genl_rcv+0x9/0x40 [ 1229.196338][T30969] genl_rcv+0x24/0x40 [ 1229.200338][T30969] netlink_unicast+0x7b6/0x980 14:37:51 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e180222003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) [ 1229.205161][T30969] ? netlink_detachskb+0x90/0x90 [ 1229.210115][T30969] ? __virt_addr_valid+0xb7/0x450 [ 1229.215159][T30969] ? 0xffffffff81000000 [ 1229.219325][T30969] ? __check_object_size+0x300/0x410 [ 1229.224632][T30969] ? bpf_lsm_netlink_send+0x5/0x10 [ 1229.229766][T30969] netlink_sendmsg+0xa30/0xd60 [ 1229.234560][T30969] ? netlink_getsockopt+0x5b0/0x5b0 [ 1229.239780][T30969] ? aa_sock_msg_perm+0x91/0x150 [ 1229.244735][T30969] ? bpf_lsm_socket_sendmsg+0x5/0x10 [ 1229.250040][T30969] ? security_socket_sendmsg+0x7d/0xa0 14:37:51 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e1a0222003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) [ 1229.255518][T30969] ? netlink_getsockopt+0x5b0/0x5b0 [ 1229.260742][T30969] ____sys_sendmsg+0x59e/0x8f0 [ 1229.265525][T30969] ? iovec_from_user+0x300/0x390 [ 1229.270489][T30969] ? __sys_sendmsg_sock+0x30/0x30 [ 1229.275566][T30969] ___sys_sendmsg+0x252/0x2e0 [ 1229.280273][T30969] ? __sys_sendmsg+0x260/0x260 [ 1229.285122][T30969] ? __fdget+0x191/0x220 [ 1229.289386][T30969] __se_sys_sendmsg+0x19a/0x260 [ 1229.294254][T30969] ? __x64_sys_sendmsg+0x80/0x80 [ 1229.299221][T30969] ? syscall_enter_from_user_mode+0x2e/0x230 [ 1229.305217][T30969] ? lockdep_hardirqs_on+0x94/0x130 [ 1229.310425][T30969] ? syscall_enter_from_user_mode+0x2e/0x230 [ 1229.316397][T30969] do_syscall_64+0x3d/0xb0 [ 1229.320810][T30969] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1229.326743][T30969] RIP: 0033:0x7f2e29024da9 [ 1229.331149][T30969] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 1229.350753][T30969] RSP: 002b:00007f2e275a50c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e 14:37:51 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e1c0222003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:37:51 executing program 2: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x10) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x1a, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f97e24fc6004030e090a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x3, 0x5, 0x5, 0x0, 0x0, 0x8, 0x4000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x101, 0x1, @perf_config_ext={0x7fff, 0x8}, 0x4000, 0x3, 0x0, 0x3, 0x80000001, 0x80, 0x40, 0x0, 0x0, 0x0, 0x81}, 0xffffffffffffffff, 0x8, r0, 0x0) [ 1229.359188][T30969] RAX: ffffffffffffffda RBX: 00007f2e29152f80 RCX: 00007f2e29024da9 [ 1229.367184][T30969] RDX: 0000000002000000 RSI: 0000000020000000 RDI: 0000000000000003 [ 1229.375173][T30969] RBP: 00007f2e275a5120 R08: 0000000000000000 R09: 0000000000000000 [ 1229.383161][T30969] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1229.391144][T30969] R13: 000000000000000b R14: 00007f2e29152f80 R15: 00007ffd7693bd28 [ 1229.399143][T30969] [ 1229.403726][T30983] device sit0 left promiscuous mode 14:37:51 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e1e0222003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:37:51 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) (fail_nth: 72) 14:37:51 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e200222003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) [ 1229.550071][T30998] netlink: 134056 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1229.563208][T31002] netlink: 134056 bytes leftover after parsing attributes in process `syz-executor.0'. 14:37:51 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e220222003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:37:51 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e240222003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:37:51 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e260222003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) [ 1229.680416][T30986] device sit0 entered promiscuous mode 14:37:51 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e280222003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:37:51 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e2a0222003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:37:51 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e2c0222003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:37:51 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e2e0222003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:37:51 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e300222003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) [ 1229.967533][T31002] FAULT_INJECTION: forcing a failure. [ 1229.967533][T31002] name failslab, interval 1, probability 0, space 0, times 0 [ 1229.970468][T30998] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 1229.990249][T31002] CPU: 0 PID: 31002 Comm: syz-executor.0 Not tainted 5.15.151-syzkaller #0 [ 1229.998865][T31002] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/25/2024 [ 1229.999758][T30998] platform regulatory.0: Falling back to sysfs fallback for: regulatory.db [ 1230.008929][T31002] Call Trace: [ 1230.008966][T31002] [ 1230.008975][T31002] dump_stack_lvl+0x1e3/0x2cb [ 1230.009005][T31002] ? io_uring_drop_tctx_refs+0x19d/0x19d [ 1230.009029][T31002] ? panic+0x84d/0x84d [ 1230.009045][T31002] ? __lock_acquire+0x1295/0x1ff0 [ 1230.009076][T31002] should_fail+0x38a/0x4c0 [ 1230.009105][T31002] should_failslab+0x5/0x20 [ 1230.009127][T31002] slab_pre_alloc_hook+0x53/0xc0 [ 1230.009150][T31002] ? skb_clone+0x1bb/0x350 [ 1230.009178][T31002] kmem_cache_alloc+0x3f/0x280 14:37:51 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e320222003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) [ 1230.009199][T31002] ? read_lock_is_recursive+0x10/0x10 [ 1230.009222][T31002] skb_clone+0x1bb/0x350 [ 1230.009242][T31002] __netlink_deliver_tap+0x375/0x760 [ 1230.009271][T31002] netlink_deliver_tap+0x16c/0x180 [ 1230.009292][T31002] netlink_sendskb+0x5c/0x120 [ 1230.009313][T31002] netlink_unicast+0x3a1/0x980 [ 1230.095884][T31002] ? netlink_detachskb+0x90/0x90 [ 1230.100853][T31002] ? skb_put+0x110/0x1f0 [ 1230.105145][T31002] ? netlink_ack+0x56b/0xb10 [ 1230.109761][T31002] netlink_ack+0x834/0xb10 [ 1230.114212][T31002] ? netlink_dump+0xc40/0xc40 [ 1230.118920][T31002] netlink_rcv_skb+0x24c/0x410 [ 1230.123710][T31002] ? genl_bind+0x420/0x420 [ 1230.128148][T31002] ? netlink_ack+0xb10/0xb10 [ 1230.132776][T31002] ? down_read+0x1b3/0x2e0 [ 1230.137194][T31002] ? genl_rcv+0x9/0x40 [ 1230.141277][T31002] genl_rcv+0x24/0x40 [ 1230.145279][T31002] netlink_unicast+0x7b6/0x980 [ 1230.150178][T31002] ? netlink_detachskb+0x90/0x90 [ 1230.155148][T31002] ? __virt_addr_valid+0xb7/0x450 [ 1230.160209][T31002] ? 0xffffffff81000000 14:37:52 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e340222003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) [ 1230.164376][T31002] ? __check_object_size+0x300/0x410 [ 1230.169680][T31002] ? bpf_lsm_netlink_send+0x5/0x10 [ 1230.174817][T31002] netlink_sendmsg+0xa30/0xd60 [ 1230.179617][T31002] ? netlink_getsockopt+0x5b0/0x5b0 [ 1230.184839][T31002] ? aa_sock_msg_perm+0x91/0x150 [ 1230.189797][T31002] ? bpf_lsm_socket_sendmsg+0x5/0x10 [ 1230.195103][T31002] ? security_socket_sendmsg+0x7d/0xa0 [ 1230.200612][T31002] ? netlink_getsockopt+0x5b0/0x5b0 [ 1230.205825][T31002] ____sys_sendmsg+0x59e/0x8f0 [ 1230.210600][T31002] ? iovec_from_user+0x300/0x390 14:37:52 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e360222003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) [ 1230.215574][T31002] ? __sys_sendmsg_sock+0x30/0x30 [ 1230.220641][T31002] ___sys_sendmsg+0x252/0x2e0 [ 1230.225340][T31002] ? __sys_sendmsg+0x260/0x260 [ 1230.230159][T31002] ? __fdget+0x191/0x220 [ 1230.234454][T31002] __se_sys_sendmsg+0x19a/0x260 [ 1230.239320][T31002] ? __x64_sys_sendmsg+0x80/0x80 [ 1230.244283][T31002] ? syscall_enter_from_user_mode+0x2e/0x230 [ 1230.250382][T31002] ? lockdep_hardirqs_on+0x94/0x130 [ 1230.255597][T31002] ? syscall_enter_from_user_mode+0x2e/0x230 [ 1230.261607][T31002] do_syscall_64+0x3d/0xb0 14:37:52 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e380222003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) [ 1230.266049][T31002] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1230.271946][T31002] RIP: 0033:0x7f2e29024da9 [ 1230.276371][T31002] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 1230.296031][T31002] RSP: 002b:00007f2e275a50c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1230.304471][T31002] RAX: ffffffffffffffda RBX: 00007f2e29152f80 RCX: 00007f2e29024da9 14:37:52 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r5 = openat$cgroup_ro(r1, &(0x7f00000000c0)='blkio.bfq.sectors\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={r3, 0xe0, &(0x7f0000000940)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000200)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x1, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000640)=[0x0], 0x0, 0x6a, &(0x7f0000000680)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x6e, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r7 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000a40)={0x1b, 0x0, 0x0, 0x7, 0x0, r0, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x5, 0x3}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x1c, 0x21, &(0x7f0000000440)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x905, 0x0, 0x0, 0x0, 0x1}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@generic={0x80, 0x6, 0x8, 0x3f, 0xda}, @map_val={0x18, 0x1, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x401}, @initr0={0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x2}, @ldst={0x2, 0x3, 0x2, 0x9, 0x3, 0x1, 0x4}, @tail_call={{0x18, 0x2, 0x1, 0x0, r2}}, @jmp={0x5, 0x1, 0xa, 0x9, 0x3, 0xffffffffffffffe0}, @generic={0x9, 0x1, 0x5, 0x4, 0x8001}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @ldst={0x2, 0x1, 0x1, 0xb, 0xb, 0x20, 0x8}, @map_idx={0x18, 0x6, 0x5, 0x0, 0x10}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000080)='GPL\x00', 0x800, 0xd4, &(0x7f00000002c0)=""/212, 0x41100, 0x6, '\x00', 0x0, 0x8, r5, 0x8, &(0x7f0000000100)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x2, 0x475f, 0x401}, 0x10, r6, 0xffffffffffffffff, 0x4, &(0x7f0000000800)=[0xffffffffffffffff, r7], &(0x7f0000000ac0)=[{0x3, 0x2, 0xc, 0x6}, {0x3, 0x4, 0xb, 0xa}, {0x2, 0x2, 0xe, 0x2}, {0x3, 0x1, 0x5, 0x8}], 0x10, 0x20}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) getpid() perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f00000005c0)={0x1, 0x80, 0x0, 0x0, 0xbe, 0x0, 0x0, 0x0, 0x28000, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x400, 0xd7, 0x5, 0x0, 0x965, 0x0, 0xfffffffffffffffb}, 0x0, 0xd, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f00000006c0)) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0xe5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) ioctl$SIOCSIFHWADDR(r8, 0x8914, &(0x7f0000000040)={'sit0\x00', @local}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f00000008c0)='\x00'}, 0x30) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000e00)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8890}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x3, r4, 0x1) ioctl$SIOCSIFHWADDR(r9, 0x8914, &(0x7f0000000040)={'sit0\x00', @random="4f33e363a4b1"}) 14:37:52 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) (fail_nth: 73) 14:37:52 executing program 2: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x10) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x1a, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f97e24fc6004030e0a0a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x3, 0x5, 0x5, 0x0, 0x0, 0x8, 0x4000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x101, 0x1, @perf_config_ext={0x7fff, 0x8}, 0x4000, 0x3, 0x0, 0x3, 0x80000001, 0x80, 0x40, 0x0, 0x0, 0x0, 0x81}, 0xffffffffffffffff, 0x8, r0, 0x0) 14:37:52 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e3a0222003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) [ 1230.312486][T31002] RDX: 0000000002000000 RSI: 0000000020000000 RDI: 0000000000000003 [ 1230.320476][T31002] RBP: 00007f2e275a5120 R08: 0000000000000000 R09: 0000000000000000 [ 1230.328569][T31002] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1230.336571][T31002] R13: 000000000000000b R14: 00007f2e29152f80 R15: 00007ffd7693bd28 [ 1230.344576][T31002] [ 1230.414720][T31032] device sit0 left promiscuous mode [ 1230.438020][T31034] netlink: 134056 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1230.456814][T31036] netlink: 134056 bytes leftover after parsing attributes in process `syz-executor.2'. 14:37:52 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e3c0222003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) [ 1230.486803][T31038] device sit0 entered promiscuous mode 14:37:52 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e3e0222003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:37:52 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e400222003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:37:52 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e420222003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:37:52 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e440222003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:37:52 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e460222003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:37:52 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e480222003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) [ 1230.813648][T31034] FAULT_INJECTION: forcing a failure. [ 1230.813648][T31034] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1230.814266][T31036] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 1230.841789][T31036] platform regulatory.0: Falling back to sysfs fallback for: regulatory.db [ 1230.846739][T31034] CPU: 1 PID: 31034 Comm: syz-executor.0 Not tainted 5.15.151-syzkaller #0 14:37:52 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e4a0222003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) [ 1230.859342][T31034] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/25/2024 [ 1230.869415][T31034] Call Trace: [ 1230.872711][T31034] [ 1230.875664][T31034] dump_stack_lvl+0x1e3/0x2cb [ 1230.880493][T31034] ? io_uring_drop_tctx_refs+0x19d/0x19d [ 1230.886156][T31034] ? panic+0x84d/0x84d [ 1230.890254][T31034] ? __kasan_slab_alloc+0xa5/0xc0 [ 1230.895308][T31034] ? slab_post_alloc_hook+0x53/0x380 [ 1230.900630][T31034] should_fail+0x38a/0x4c0 [ 1230.905069][T31034] prepare_alloc_pages+0x1db/0x5b0 14:37:52 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e4c0222003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) [ 1230.910202][T31034] __alloc_pages+0x14f/0x700 [ 1230.914820][T31034] ? __rmqueue_pcplist+0x2030/0x2030 [ 1230.920137][T31034] kmalloc_large_node+0x7c/0x180 [ 1230.925100][T31034] ? netlink_ack+0x33c/0xb10 [ 1230.929712][T31034] __kmalloc_node_track_caller+0x229/0x390 [ 1230.935539][T31034] ? netlink_ack+0x33c/0xb10 [ 1230.940154][T31034] ? kmem_cache_alloc_node+0x154/0x2c0 [ 1230.945628][T31034] ? __alloc_skb+0xdd/0x590 [ 1230.950156][T31034] ? netlink_ack+0x33c/0xb10 [ 1230.954767][T31034] __alloc_skb+0x12c/0x590 [ 1230.959196][T31034] ? __lock_acquire+0x1295/0x1ff0 14:37:52 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e4e0222003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) [ 1230.964246][T31034] netlink_ack+0x33c/0xb10 [ 1230.968702][T31034] ? netlink_dump+0xc40/0xc40 [ 1230.973410][T31034] netlink_rcv_skb+0x24c/0x410 [ 1230.978195][T31034] ? genl_bind+0x420/0x420 [ 1230.982637][T31034] ? netlink_ack+0xb10/0xb10 [ 1230.987264][T31034] ? down_read+0x1b3/0x2e0 [ 1230.991700][T31034] ? genl_rcv+0x9/0x40 [ 1230.995795][T31034] genl_rcv+0x24/0x40 [ 1230.999810][T31034] netlink_unicast+0x7b6/0x980 [ 1231.004633][T31034] ? netlink_detachskb+0x90/0x90 [ 1231.009587][T31034] ? __virt_addr_valid+0xb7/0x450 14:37:52 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r5 = openat$cgroup_ro(r1, &(0x7f00000000c0)='blkio.bfq.sectors\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={r3, 0xe0, &(0x7f0000000940)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000200)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x1, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000640)=[0x0], 0x0, 0x6a, &(0x7f0000000680)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x6e, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r7 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000a40)={0x1b, 0x0, 0x0, 0x7, 0x0, r0, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x5, 0x3}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x1c, 0x21, &(0x7f0000000440)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x905, 0x0, 0x0, 0x0, 0x1}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@generic={0x80, 0x6, 0x8, 0x3f, 0xda}, @map_val={0x18, 0x1, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x401}, @initr0={0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x2}, @ldst={0x2, 0x3, 0x2, 0x9, 0x3, 0x1, 0x4}, @tail_call={{0x18, 0x2, 0x1, 0x0, r2}}, @jmp={0x5, 0x1, 0xa, 0x9, 0x3, 0xffffffffffffffe0}, @generic={0x9, 0x1, 0x5, 0x4, 0x8001}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @ldst={0x2, 0x1, 0x1, 0xb, 0xb, 0x20, 0x8}, @map_idx={0x18, 0x6, 0x5, 0x0, 0x10}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000080)='GPL\x00', 0x800, 0xd4, &(0x7f00000002c0)=""/212, 0x41100, 0x6, '\x00', 0x0, 0x8, r5, 0x8, &(0x7f0000000100)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x2, 0x475f, 0x401}, 0x10, r6, 0xffffffffffffffff, 0x4, &(0x7f0000000800)=[0xffffffffffffffff, r7], &(0x7f0000000ac0)=[{0x3, 0x2, 0xc, 0x6}, {0x3, 0x4, 0xb, 0xa}, {0x2, 0x2, 0xe, 0x2}, {0x3, 0x1, 0x5, 0x8}], 0x10, 0x20}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) getpid() perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f00000005c0)={0x1, 0x80, 0x0, 0x0, 0xbe, 0x0, 0x0, 0x0, 0x28000, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x400, 0xd7, 0x5, 0x0, 0x965, 0x0, 0xfffffffffffffffb}, 0x0, 0xd, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f00000006c0)) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0xe5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) ioctl$SIOCSIFHWADDR(r8, 0x8914, &(0x7f0000000040)={'sit0\x00', @local}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f00000008c0)='\x00'}, 0x30) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000e00)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8890}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x3, r4, 0x1) ioctl$SIOCSIFHWADDR(r9, 0x8914, &(0x7f0000000040)={'sit0\x00', @random="4f33e363a4b1"}) 14:37:52 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e500222003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) [ 1231.014631][T31034] ? 0xffffffff81000000 [ 1231.018794][T31034] ? __check_object_size+0x300/0x410 [ 1231.024089][T31034] ? bpf_lsm_netlink_send+0x5/0x10 [ 1231.029233][T31034] netlink_sendmsg+0xa30/0xd60 [ 1231.034030][T31034] ? netlink_getsockopt+0x5b0/0x5b0 [ 1231.039254][T31034] ? aa_sock_msg_perm+0x91/0x150 [ 1231.044214][T31034] ? bpf_lsm_socket_sendmsg+0x5/0x10 [ 1231.049515][T31034] ? security_socket_sendmsg+0x7d/0xa0 [ 1231.055002][T31034] ? netlink_getsockopt+0x5b0/0x5b0 [ 1231.060222][T31034] ____sys_sendmsg+0x59e/0x8f0 14:37:52 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e520222003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:37:52 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e540222003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) [ 1231.065006][T31034] ? iovec_from_user+0x300/0x390 [ 1231.069974][T31034] ? __sys_sendmsg_sock+0x30/0x30 [ 1231.075032][T31034] ___sys_sendmsg+0x252/0x2e0 [ 1231.079734][T31034] ? __sys_sendmsg+0x260/0x260 [ 1231.084555][T31034] ? __fdget+0x191/0x220 [ 1231.088829][T31034] __se_sys_sendmsg+0x19a/0x260 [ 1231.093706][T31034] ? __x64_sys_sendmsg+0x80/0x80 [ 1231.098678][T31034] ? syscall_enter_from_user_mode+0x2e/0x230 [ 1231.104680][T31034] ? lockdep_hardirqs_on+0x94/0x130 14:37:53 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e560222003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) [ 1231.109903][T31034] ? syscall_enter_from_user_mode+0x2e/0x230 [ 1231.115912][T31034] do_syscall_64+0x3d/0xb0 [ 1231.120353][T31034] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1231.126274][T31034] RIP: 0033:0x7f2e29024da9 [ 1231.130708][T31034] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 1231.150335][T31034] RSP: 002b:00007f2e275a50c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e 14:37:53 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e580222003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:37:53 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e5a0222003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) [ 1231.158772][T31034] RAX: ffffffffffffffda RBX: 00007f2e29152f80 RCX: 00007f2e29024da9 [ 1231.166892][T31034] RDX: 0000000002000000 RSI: 0000000020000000 RDI: 0000000000000003 [ 1231.174893][T31034] RBP: 00007f2e275a5120 R08: 0000000000000000 R09: 0000000000000000 [ 1231.182887][T31034] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1231.190879][T31034] R13: 000000000000000b R14: 00007f2e29152f80 R15: 00007ffd7693bd28 [ 1231.198887][T31034] 14:37:53 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) (fail_nth: 74) [ 1231.238174][T31071] device sit0 left promiscuous mode 14:37:53 executing program 2: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x10) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x1a, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f97e24fc6004030e0b0a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x3, 0x5, 0x5, 0x0, 0x0, 0x8, 0x4000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x101, 0x1, @perf_config_ext={0x7fff, 0x8}, 0x4000, 0x3, 0x0, 0x3, 0x80000001, 0x80, 0x40, 0x0, 0x0, 0x0, 0x81}, 0xffffffffffffffff, 0x8, r0, 0x0) 14:37:53 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e5c0222003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) [ 1231.334965][T31078] netlink: 134056 bytes leftover after parsing attributes in process `syz-executor.0'. 14:37:53 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e5e0222003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) [ 1231.380556][T31077] netlink: 134056 bytes leftover after parsing attributes in process `syz-executor.2'. 14:37:53 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e600222003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) [ 1231.481591][T31078] FAULT_INJECTION: forcing a failure. [ 1231.481591][T31078] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1231.496007][T31075] device sit0 entered promiscuous mode [ 1231.503951][T31078] CPU: 0 PID: 31078 Comm: syz-executor.0 Not tainted 5.15.151-syzkaller #0 [ 1231.512572][T31078] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/25/2024 [ 1231.522645][T31078] Call Trace: [ 1231.525945][T31078] [ 1231.528889][T31078] dump_stack_lvl+0x1e3/0x2cb [ 1231.533592][T31078] ? io_uring_drop_tctx_refs+0x19d/0x19d [ 1231.539246][T31078] ? panic+0x84d/0x84d [ 1231.543345][T31078] ? snprintf+0xd6/0x120 [ 1231.547676][T31078] should_fail+0x38a/0x4c0 [ 1231.552163][T31078] _copy_to_user+0x2d/0x130 [ 1231.556733][T31078] simple_read_from_buffer+0xc6/0x150 [ 1231.562193][T31078] proc_fail_nth_read+0x1a3/0x210 [ 1231.567308][T31078] ? proc_fault_inject_write+0x390/0x390 [ 1231.572966][T31078] ? fsnotify_perm+0x438/0x5a0 14:37:53 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e620222003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) [ 1231.577804][T31078] ? proc_fault_inject_write+0x390/0x390 [ 1231.583645][T31078] vfs_read+0x300/0xe10 [ 1231.587828][T31078] ? kernel_read+0x1f0/0x1f0 [ 1231.592441][T31078] ? __fget_files+0x413/0x480 [ 1231.597143][T31078] ? mutex_lock_nested+0x17/0x20 [ 1231.602099][T31078] ? __fdget_pos+0x2cb/0x380 [ 1231.606725][T31078] ? ksys_read+0x77/0x2c0 [ 1231.611141][T31078] ksys_read+0x1a2/0x2c0 [ 1231.615410][T31078] ? print_irqtrace_events+0x210/0x210 [ 1231.620890][T31078] ? vfs_write+0xe50/0xe50 [ 1231.625336][T31078] ? syscall_enter_from_user_mode+0x2e/0x230 14:37:53 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e640222003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) [ 1231.631336][T31078] ? lockdep_hardirqs_on+0x94/0x130 [ 1231.636552][T31078] ? syscall_enter_from_user_mode+0x2e/0x230 [ 1231.642553][T31078] do_syscall_64+0x3d/0xb0 [ 1231.646994][T31078] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1231.652910][T31078] RIP: 0033:0x7f2e29023a4c [ 1231.657340][T31078] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 59 81 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 af 81 02 00 48 14:37:53 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e660222003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:37:53 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r5 = openat$cgroup_ro(r1, &(0x7f00000000c0)='blkio.bfq.sectors\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={r3, 0xe0, &(0x7f0000000940)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000200)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x1, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000640)=[0x0], 0x0, 0x6a, &(0x7f0000000680)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x6e, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r7 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000a40)={0x1b, 0x0, 0x0, 0x7, 0x0, r0, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x5, 0x3}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x1c, 0x21, &(0x7f0000000440)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x905, 0x0, 0x0, 0x0, 0x1}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@generic={0x80, 0x6, 0x8, 0x3f, 0xda}, @map_val={0x18, 0x1, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x401}, @initr0={0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x2}, @ldst={0x2, 0x3, 0x2, 0x9, 0x3, 0x1, 0x4}, @tail_call={{0x18, 0x2, 0x1, 0x0, r2}}, @jmp={0x5, 0x1, 0xa, 0x9, 0x3, 0xffffffffffffffe0}, @generic={0x9, 0x1, 0x5, 0x4, 0x8001}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @ldst={0x2, 0x1, 0x1, 0xb, 0xb, 0x20, 0x8}, @map_idx={0x18, 0x6, 0x5, 0x0, 0x10}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000080)='GPL\x00', 0x800, 0xd4, &(0x7f00000002c0)=""/212, 0x41100, 0x6, '\x00', 0x0, 0x8, r5, 0x8, &(0x7f0000000100)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x2, 0x475f, 0x401}, 0x10, r6, 0xffffffffffffffff, 0x4, &(0x7f0000000800)=[0xffffffffffffffff, r7], &(0x7f0000000ac0)=[{0x3, 0x2, 0xc, 0x6}, {0x3, 0x4, 0xb, 0xa}, {0x2, 0x2, 0xe, 0x2}, {0x3, 0x1, 0x5, 0x8}], 0x10, 0x20}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) getpid() perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f00000005c0)={0x1, 0x80, 0x0, 0x0, 0xbe, 0x0, 0x0, 0x0, 0x28000, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x400, 0xd7, 0x5, 0x0, 0x965, 0x0, 0xfffffffffffffffb}, 0x0, 0xd, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f00000006c0)) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0xe5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) ioctl$SIOCSIFHWADDR(r8, 0x8914, &(0x7f0000000040)={'sit0\x00', @local}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f00000008c0)='\x00'}, 0x30) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000e00)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8890}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000840)={0x0, 0x80, 0x0, 0x1, 0x9, 0x0, 0x0, 0x7, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x3ff, 0x0, @perf_config_ext={0x67}, 0x200, 0x612, 0x0, 0x0, 0xa0, 0x0, 0xd171, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x3, r4, 0x1) ioctl$SIOCSIFHWADDR(r9, 0x8914, &(0x7f0000000040)={'sit0\x00', @random="4f33e363a4b1"}) [ 1231.677068][T31078] RSP: 002b:00007f2e275a50c0 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1231.685508][T31078] RAX: ffffffffffffffda RBX: 00007f2e29152f80 RCX: 00007f2e29023a4c [ 1231.693505][T31078] RDX: 000000000000000f RSI: 00007f2e275a5130 RDI: 0000000000000004 [ 1231.701497][T31078] RBP: 00007f2e275a5120 R08: 0000000000000000 R09: 0000000000000000 [ 1231.709493][T31078] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1231.717490][T31078] R13: 000000000000000b R14: 00007f2e29152f80 R15: 00007ffd7693bd28 [ 1231.725497][T31078] 14:37:53 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e680222003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) [ 1231.764488][T31077] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 1231.781748][T31077] platform regulatory.0: Falling back to sysfs fallback for: regulatory.db [ 1231.807978][T31093] device sit0 left promiscuous mode 14:37:53 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:37:53 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e6a0222003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) [ 1231.884132][T31098] netlink: 134056 bytes leftover after parsing attributes in process `syz-executor.0'. 14:37:53 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e6c0222003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:37:53 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e6e0222003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:37:53 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e700222003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) [ 1232.025043][T31097] device sit0 entered promiscuous mode 14:37:54 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e720222003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:37:54 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e740222003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:37:54 executing program 2: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x10) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x1a, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f97e24fc6004030e0c0a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x3, 0x5, 0x5, 0x0, 0x0, 0x8, 0x4000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x101, 0x1, @perf_config_ext={0x7fff, 0x8}, 0x4000, 0x3, 0x0, 0x3, 0x80000001, 0x80, 0x40, 0x0, 0x0, 0x0, 0x81}, 0xffffffffffffffff, 0x8, r0, 0x0) 14:37:54 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e760222003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) [ 1232.270380][T31112] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 1232.283956][T31112] platform regulatory.0: Falling back to sysfs fallback for: regulatory.db 14:37:54 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff0a, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:37:54 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e780222003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:37:54 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r5 = openat$cgroup_ro(r1, &(0x7f00000000c0)='blkio.bfq.sectors\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={r3, 0xe0, &(0x7f0000000940)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000200)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x1, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000640)=[0x0], 0x0, 0x6a, &(0x7f0000000680)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x6e, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r7 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000a40)={0x1b, 0x0, 0x0, 0x7, 0x0, r0, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x5, 0x3}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x1c, 0x21, &(0x7f0000000440)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x905, 0x0, 0x0, 0x0, 0x1}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@generic={0x80, 0x6, 0x8, 0x3f, 0xda}, @map_val={0x18, 0x1, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x401}, @initr0={0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x2}, @ldst={0x2, 0x3, 0x2, 0x9, 0x3, 0x1, 0x4}, @tail_call={{0x18, 0x2, 0x1, 0x0, r2}}, @jmp={0x5, 0x1, 0xa, 0x9, 0x3, 0xffffffffffffffe0}, @generic={0x9, 0x1, 0x5, 0x4, 0x8001}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @ldst={0x2, 0x1, 0x1, 0xb, 0xb, 0x20, 0x8}, @map_idx={0x18, 0x6, 0x5, 0x0, 0x10}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000080)='GPL\x00', 0x800, 0xd4, &(0x7f00000002c0)=""/212, 0x41100, 0x6, '\x00', 0x0, 0x8, r5, 0x8, &(0x7f0000000100)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x2, 0x475f, 0x401}, 0x10, r6, 0xffffffffffffffff, 0x4, &(0x7f0000000800)=[0xffffffffffffffff, r7], &(0x7f0000000ac0)=[{0x3, 0x2, 0xc, 0x6}, {0x3, 0x4, 0xb, 0xa}, {0x2, 0x2, 0xe, 0x2}, {0x3, 0x1, 0x5, 0x8}], 0x10, 0x20}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) getpid() perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f00000005c0)={0x1, 0x80, 0x0, 0x0, 0xbe, 0x0, 0x0, 0x0, 0x28000, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x400, 0xd7, 0x5, 0x0, 0x965, 0x0, 0xfffffffffffffffb}, 0x0, 0xd, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f00000006c0)) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0xe5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) ioctl$SIOCSIFHWADDR(r8, 0x8914, &(0x7f0000000040)={'sit0\x00', @local}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f00000008c0)='\x00'}, 0x30) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000e00)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8890}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000840)={0x0, 0x80, 0x0, 0x1, 0x9, 0x0, 0x0, 0x7, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x3ff, 0x0, @perf_config_ext={0x67}, 0x200, 0x612, 0x0, 0x0, 0xa0, 0x0, 0xd171, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x3, r4, 0x1) ioctl$SIOCSIFHWADDR(r9, 0x8914, &(0x7f0000000040)={'sit0\x00', @random="4f33e363a4b1"}) 14:37:54 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e7a0222003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:37:54 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="1000000022003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) [ 1232.419360][T31121] device sit0 left promiscuous mode 14:37:54 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e7c0222003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:37:54 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="1400000022003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) [ 1232.507480][T31126] device sit0 entered promiscuous mode 14:37:54 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e7e0222003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:37:54 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e800222003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:37:54 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e820222003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:37:54 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e840222003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:37:54 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="020e020022003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:37:54 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r5 = openat$cgroup_ro(r1, &(0x7f00000000c0)='blkio.bfq.sectors\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={r3, 0xe0, &(0x7f0000000940)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000200)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x1, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000640)=[0x0], 0x0, 0x6a, &(0x7f0000000680)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x6e, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r7 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000a40)={0x1b, 0x0, 0x0, 0x7, 0x0, r0, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x5, 0x3}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x1c, 0x21, &(0x7f0000000440)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x905, 0x0, 0x0, 0x0, 0x1}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@generic={0x80, 0x6, 0x8, 0x3f, 0xda}, @map_val={0x18, 0x1, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x401}, @initr0={0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x2}, @ldst={0x2, 0x3, 0x2, 0x9, 0x3, 0x1, 0x4}, @tail_call={{0x18, 0x2, 0x1, 0x0, r2}}, @jmp={0x5, 0x1, 0xa, 0x9, 0x3, 0xffffffffffffffe0}, @generic={0x9, 0x1, 0x5, 0x4, 0x8001}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @ldst={0x2, 0x1, 0x1, 0xb, 0xb, 0x20, 0x8}, @map_idx={0x18, 0x6, 0x5, 0x0, 0x10}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000080)='GPL\x00', 0x800, 0xd4, &(0x7f00000002c0)=""/212, 0x41100, 0x6, '\x00', 0x0, 0x8, r5, 0x8, &(0x7f0000000100)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x2, 0x475f, 0x401}, 0x10, r6, 0xffffffffffffffff, 0x4, &(0x7f0000000800)=[0xffffffffffffffff, r7], &(0x7f0000000ac0)=[{0x3, 0x2, 0xc, 0x6}, {0x3, 0x4, 0xb, 0xa}, {0x2, 0x2, 0xe, 0x2}, {0x3, 0x1, 0x5, 0x8}], 0x10, 0x20}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) getpid() perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f00000005c0)={0x1, 0x80, 0x0, 0x0, 0xbe, 0x0, 0x0, 0x0, 0x28000, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x400, 0xd7, 0x5, 0x0, 0x965, 0x0, 0xfffffffffffffffb}, 0x0, 0xd, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f00000006c0)) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0xe5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) ioctl$SIOCSIFHWADDR(r8, 0x8914, &(0x7f0000000040)={'sit0\x00', @local}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f00000008c0)='\x00'}, 0x30) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000e00)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8890}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000840)={0x0, 0x80, 0x0, 0x1, 0x9, 0x0, 0x0, 0x7, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x3ff, 0x0, @perf_config_ext={0x67}, 0x200, 0x612, 0x0, 0x0, 0xa0, 0x0, 0xd171, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x3, r4, 0x1) ioctl$SIOCSIFHWADDR(r9, 0x8914, &(0x7f0000000040)={'sit0\x00', @random="4f33e363a4b1"}) [ 1232.804339][T31140] device sit0 left promiscuous mode 14:37:54 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e860222003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) [ 1232.832114][T31142] __nla_validate_parse: 2 callbacks suppressed [ 1232.832132][T31142] netlink: 133866 bytes leftover after parsing attributes in process `syz-executor.0'. 14:37:54 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030022003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:37:54 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e880222003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) [ 1232.927865][T31140] device sit0 entered promiscuous mode [ 1232.955620][T31146] netlink: 212168 bytes leftover after parsing attributes in process `syz-executor.0'. 14:37:54 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e8a0222003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:37:54 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e8c0222003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:37:54 executing program 2: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x10) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x1a, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f97e24fc6004030e0d0a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x3, 0x5, 0x5, 0x0, 0x0, 0x8, 0x4000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x101, 0x1, @perf_config_ext={0x7fff, 0x8}, 0x4000, 0x3, 0x0, 0x3, 0x80000001, 0x80, 0x40, 0x0, 0x0, 0x0, 0x81}, 0xffffffffffffffff, 0x8, r0, 0x0) 14:37:54 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e8e0222003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:37:55 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e900222003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) [ 1233.182509][T31156] netlink: 134056 bytes leftover after parsing attributes in process `syz-executor.2'. 14:37:55 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c002000022003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:37:55 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e920222003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:37:55 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r5 = openat$cgroup_ro(r1, &(0x7f00000000c0)='blkio.bfq.sectors\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={r3, 0xe0, &(0x7f0000000940)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000200)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x1, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000640)=[0x0], 0x0, 0x6a, &(0x7f0000000680)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x6e, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r7 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000a40)={0x1b, 0x0, 0x0, 0x7, 0x0, r0, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x5, 0x3}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x1c, 0x21, &(0x7f0000000440)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x905, 0x0, 0x0, 0x0, 0x1}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@generic={0x80, 0x6, 0x8, 0x3f, 0xda}, @map_val={0x18, 0x1, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x401}, @initr0={0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x2}, @ldst={0x2, 0x3, 0x2, 0x9, 0x3, 0x1, 0x4}, @tail_call={{0x18, 0x2, 0x1, 0x0, r2}}, @jmp={0x5, 0x1, 0xa, 0x9, 0x3, 0xffffffffffffffe0}, @generic={0x9, 0x1, 0x5, 0x4, 0x8001}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @ldst={0x2, 0x1, 0x1, 0xb, 0xb, 0x20, 0x8}, @map_idx={0x18, 0x6, 0x5, 0x0, 0x10}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000080)='GPL\x00', 0x800, 0xd4, &(0x7f00000002c0)=""/212, 0x41100, 0x6, '\x00', 0x0, 0x8, r5, 0x8, &(0x7f0000000100)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x2, 0x475f, 0x401}, 0x10, r6, 0xffffffffffffffff, 0x4, &(0x7f0000000800)=[0xffffffffffffffff, r7], &(0x7f0000000ac0)=[{0x3, 0x2, 0xc, 0x6}, {0x3, 0x4, 0xb, 0xa}, {0x2, 0x2, 0xe, 0x2}, {0x3, 0x1, 0x5, 0x8}], 0x10, 0x20}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) getpid() perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f00000005c0)={0x1, 0x80, 0x0, 0x0, 0xbe, 0x0, 0x0, 0x0, 0x28000, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x400, 0xd7, 0x5, 0x0, 0x965, 0x0, 0xfffffffffffffffb}, 0x0, 0xd, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f00000006c0)) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0xe5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) ioctl$SIOCSIFHWADDR(r8, 0x8914, &(0x7f0000000040)={'sit0\x00', @local}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f00000008c0)='\x00'}, 0x30) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000e00)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8890}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000840)={0x0, 0x80, 0x2, 0x0, 0x9, 0x0, 0x0, 0x7, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x3ff, 0x0, @perf_config_ext={0x67}, 0x200, 0x612, 0x0, 0x0, 0xa0, 0x0, 0xd171, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x3, r4, 0x1) ioctl$SIOCSIFHWADDR(r9, 0x8914, &(0x7f0000000040)={'sit0\x00', @random="4f33e363a4b1"}) [ 1233.234120][T31156] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 1233.257743][T31156] platform regulatory.0: Falling back to sysfs fallback for: regulatory.db 14:37:55 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c002020022003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:37:55 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e940222003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) [ 1233.298449][T31162] netlink: 684 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1233.325676][T31165] device sit0 left promiscuous mode 14:37:55 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e960222003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) [ 1233.362647][T31167] netlink: 130984 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1233.396903][T31168] device sit0 entered promiscuous mode 14:37:55 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e980222003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:37:55 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e9a0222003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:37:55 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e9c0222003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:37:55 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c005020022003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:37:55 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r5 = openat$cgroup_ro(r1, &(0x7f00000000c0)='blkio.bfq.sectors\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={r3, 0xe0, &(0x7f0000000940)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000200)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x1, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000640)=[0x0], 0x0, 0x6a, &(0x7f0000000680)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x6e, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r7 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000a40)={0x1b, 0x0, 0x0, 0x7, 0x0, r0, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x5, 0x3}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x1c, 0x21, &(0x7f0000000440)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x905, 0x0, 0x0, 0x0, 0x1}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@generic={0x80, 0x6, 0x8, 0x3f, 0xda}, @map_val={0x18, 0x1, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x401}, @initr0={0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x2}, @ldst={0x2, 0x3, 0x2, 0x9, 0x3, 0x1, 0x4}, @tail_call={{0x18, 0x2, 0x1, 0x0, r2}}, @jmp={0x5, 0x1, 0xa, 0x9, 0x3, 0xffffffffffffffe0}, @generic={0x9, 0x1, 0x5, 0x4, 0x8001}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @ldst={0x2, 0x1, 0x1, 0xb, 0xb, 0x20, 0x8}, @map_idx={0x18, 0x6, 0x5, 0x0, 0x10}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000080)='GPL\x00', 0x800, 0xd4, &(0x7f00000002c0)=""/212, 0x41100, 0x6, '\x00', 0x0, 0x8, r5, 0x8, &(0x7f0000000100)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x2, 0x475f, 0x401}, 0x10, r6, 0xffffffffffffffff, 0x4, &(0x7f0000000800)=[0xffffffffffffffff, r7], &(0x7f0000000ac0)=[{0x3, 0x2, 0xc, 0x6}, {0x3, 0x4, 0xb, 0xa}, {0x2, 0x2, 0xe, 0x2}, {0x3, 0x1, 0x5, 0x8}], 0x10, 0x20}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) getpid() perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f00000005c0)={0x1, 0x80, 0x0, 0x0, 0xbe, 0x0, 0x0, 0x0, 0x28000, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x400, 0xd7, 0x5, 0x0, 0x965, 0x0, 0xfffffffffffffffb}, 0x0, 0xd, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f00000006c0)) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0xe5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) ioctl$SIOCSIFHWADDR(r8, 0x8914, &(0x7f0000000040)={'sit0\x00', @local}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f00000008c0)='\x00'}, 0x30) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000e00)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8890}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000840)={0x0, 0x80, 0x2, 0x0, 0x9, 0x0, 0x0, 0x7, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x3ff, 0x0, @perf_config_ext={0x67}, 0x200, 0x612, 0x0, 0x0, 0xa0, 0x0, 0xd171, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x3, r4, 0x1) ioctl$SIOCSIFHWADDR(r9, 0x8914, &(0x7f0000000040)={'sit0\x00', @random="4f33e363a4b1"}) 14:37:55 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e9e0222003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:37:55 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00ea00222003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) [ 1233.674402][T31180] netlink: 131752 bytes leftover after parsing attributes in process `syz-executor.0'. 14:37:55 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00ea20222003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:37:55 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c006020022003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) [ 1233.751963][T31184] device sit0 left promiscuous mode 14:37:55 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00ea40222003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) [ 1233.785230][T31188] netlink: 132008 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1233.837348][T31191] device sit0 entered promiscuous mode 14:37:55 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00ea60222003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:37:55 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00ea80222003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:37:55 executing program 2: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x10) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x1a, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f97e24fc6004030e0e0a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x3, 0x5, 0x5, 0x0, 0x0, 0x8, 0x4000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x101, 0x1, @perf_config_ext={0x7fff, 0x8}, 0x4000, 0x3, 0x0, 0x3, 0x80000001, 0x80, 0x40, 0x0, 0x0, 0x0, 0x81}, 0xffffffffffffffff, 0x8, r0, 0x0) 14:37:55 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00eaa0222003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:37:56 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c007020022003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) [ 1234.123733][T31199] netlink: 134056 bytes leftover after parsing attributes in process `syz-executor.2'. 14:37:56 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r5 = openat$cgroup_ro(r1, &(0x7f00000000c0)='blkio.bfq.sectors\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={r3, 0xe0, &(0x7f0000000940)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000200)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x1, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000640)=[0x0], 0x0, 0x6a, &(0x7f0000000680)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x6e, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r7 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000a40)={0x1b, 0x0, 0x0, 0x7, 0x0, r0, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x5, 0x3}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x1c, 0x21, &(0x7f0000000440)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x905, 0x0, 0x0, 0x0, 0x1}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@generic={0x80, 0x6, 0x8, 0x3f, 0xda}, @map_val={0x18, 0x1, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x401}, @initr0={0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x2}, @ldst={0x2, 0x3, 0x2, 0x9, 0x3, 0x1, 0x4}, @tail_call={{0x18, 0x2, 0x1, 0x0, r2}}, @jmp={0x5, 0x1, 0xa, 0x9, 0x3, 0xffffffffffffffe0}, @generic={0x9, 0x1, 0x5, 0x4, 0x8001}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @ldst={0x2, 0x1, 0x1, 0xb, 0xb, 0x20, 0x8}, @map_idx={0x18, 0x6, 0x5, 0x0, 0x10}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000080)='GPL\x00', 0x800, 0xd4, &(0x7f00000002c0)=""/212, 0x41100, 0x6, '\x00', 0x0, 0x8, r5, 0x8, &(0x7f0000000100)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x2, 0x475f, 0x401}, 0x10, r6, 0xffffffffffffffff, 0x4, &(0x7f0000000800)=[0xffffffffffffffff, r7], &(0x7f0000000ac0)=[{0x3, 0x2, 0xc, 0x6}, {0x3, 0x4, 0xb, 0xa}, {0x2, 0x2, 0xe, 0x2}, {0x3, 0x1, 0x5, 0x8}], 0x10, 0x20}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) getpid() perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f00000005c0)={0x1, 0x80, 0x0, 0x0, 0xbe, 0x0, 0x0, 0x0, 0x28000, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x400, 0xd7, 0x5, 0x0, 0x965, 0x0, 0xfffffffffffffffb}, 0x0, 0xd, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f00000006c0)) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0xe5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) ioctl$SIOCSIFHWADDR(r8, 0x8914, &(0x7f0000000040)={'sit0\x00', @local}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f00000008c0)='\x00'}, 0x30) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000e00)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8890}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000840)={0x0, 0x80, 0x2, 0x0, 0x9, 0x0, 0x0, 0x7, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x3ff, 0x0, @perf_config_ext={0x67}, 0x200, 0x612, 0x0, 0x0, 0xa0, 0x0, 0xd171, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x3, r4, 0x1) ioctl$SIOCSIFHWADDR(r9, 0x8914, &(0x7f0000000040)={'sit0\x00', @random="4f33e363a4b1"}) 14:37:56 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00eac0222003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:37:56 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c008020022003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) [ 1234.193616][T31199] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 1234.206913][T31204] netlink: 132264 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1234.214974][T31199] platform regulatory.0: Falling back to sysfs fallback for: regulatory.db 14:37:56 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00eae0222003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) [ 1234.271638][T31208] device sit0 left promiscuous mode [ 1234.283799][T31210] netlink: 132520 bytes leftover after parsing attributes in process `syz-executor.0'. 14:37:56 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00eb00222003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:37:56 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00eb20222003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:37:56 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00eb40222003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:37:56 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c009020022003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) [ 1234.460868][T31211] device sit0 entered promiscuous mode 14:37:56 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00ed80222003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:37:56 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00eda0222003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:37:56 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00edc0222003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:37:56 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00a020022003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:37:56 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r5 = openat$cgroup_ro(r1, &(0x7f00000000c0)='blkio.bfq.sectors\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={r3, 0xe0, &(0x7f0000000940)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000200)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x1, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000640)=[0x0], 0x0, 0x6a, &(0x7f0000000680)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x6e, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r7 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000a40)={0x1b, 0x0, 0x0, 0x7, 0x0, r0, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x5, 0x3}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x1c, 0x21, &(0x7f0000000440)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x905, 0x0, 0x0, 0x0, 0x1}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@generic={0x80, 0x6, 0x8, 0x3f, 0xda}, @map_val={0x18, 0x1, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x401}, @initr0={0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x2}, @ldst={0x2, 0x3, 0x2, 0x9, 0x3, 0x1, 0x4}, @tail_call={{0x18, 0x2, 0x1, 0x0, r2}}, @jmp={0x5, 0x1, 0xa, 0x9, 0x3, 0xffffffffffffffe0}, @generic={0x9, 0x1, 0x5, 0x4, 0x8001}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @ldst={0x2, 0x1, 0x1, 0xb, 0xb, 0x20, 0x8}, @map_idx={0x18, 0x6, 0x5, 0x0, 0x10}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000080)='GPL\x00', 0x800, 0xd4, &(0x7f00000002c0)=""/212, 0x41100, 0x6, '\x00', 0x0, 0x8, r5, 0x8, &(0x7f0000000100)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x2, 0x475f, 0x401}, 0x10, r6, 0xffffffffffffffff, 0x4, &(0x7f0000000800)=[0xffffffffffffffff, r7], &(0x7f0000000ac0)=[{0x3, 0x2, 0xc, 0x6}, {0x3, 0x4, 0xb, 0xa}, {0x2, 0x2, 0xe, 0x2}, {0x3, 0x1, 0x5, 0x8}], 0x10, 0x20}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) getpid() perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f00000005c0)={0x1, 0x80, 0x0, 0x0, 0xbe, 0x0, 0x0, 0x0, 0x28000, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x400, 0xd7, 0x5, 0x0, 0x965, 0x0, 0xfffffffffffffffb}, 0x0, 0xd, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f00000006c0)) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0xe5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) ioctl$SIOCSIFHWADDR(r8, 0x8914, &(0x7f0000000040)={'sit0\x00', @local}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f00000008c0)='\x00'}, 0x30) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000e00)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8890}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000840)={0x0, 0x80, 0x2, 0x1, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x3ff, 0x0, @perf_config_ext={0x67}, 0x200, 0x612, 0x0, 0x0, 0xa0, 0x0, 0xd171, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x3, r4, 0x1) ioctl$SIOCSIFHWADDR(r9, 0x8914, &(0x7f0000000040)={'sit0\x00', @random="4f33e363a4b1"}) 14:37:56 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020222003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:37:56 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00b020022003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:37:56 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020322003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) [ 1234.770990][T31232] device sit0 left promiscuous mode 14:37:56 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020422003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:37:56 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00c020022003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:37:56 executing program 2: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x10) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x1a, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f97e24fc6004030e0f0a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x3, 0x5, 0x5, 0x0, 0x0, 0x8, 0x4000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x101, 0x1, @perf_config_ext={0x7fff, 0x8}, 0x4000, 0x3, 0x0, 0x3, 0x80000001, 0x80, 0x40, 0x0, 0x0, 0x0, 0x81}, 0xffffffffffffffff, 0x8, r0, 0x0) [ 1234.851794][T31236] device sit0 entered promiscuous mode 14:37:56 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020522003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:37:56 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020622003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:37:57 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020722003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:37:57 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020822003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:37:57 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020922003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:37:57 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e030022003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:37:57 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r5 = openat$cgroup_ro(r1, &(0x7f00000000c0)='blkio.bfq.sectors\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={r3, 0xe0, &(0x7f0000000940)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000200)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x1, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000640)=[0x0], 0x0, 0x6a, &(0x7f0000000680)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x6e, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r7 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000a40)={0x1b, 0x0, 0x0, 0x7, 0x0, r0, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x5, 0x3}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x1c, 0x21, &(0x7f0000000440)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x905, 0x0, 0x0, 0x0, 0x1}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@generic={0x80, 0x6, 0x8, 0x3f, 0xda}, @map_val={0x18, 0x1, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x401}, @initr0={0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x2}, @ldst={0x2, 0x3, 0x2, 0x9, 0x3, 0x1, 0x4}, @tail_call={{0x18, 0x2, 0x1, 0x0, r2}}, @jmp={0x5, 0x1, 0xa, 0x9, 0x3, 0xffffffffffffffe0}, @generic={0x9, 0x1, 0x5, 0x4, 0x8001}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @ldst={0x2, 0x1, 0x1, 0xb, 0xb, 0x20, 0x8}, @map_idx={0x18, 0x6, 0x5, 0x0, 0x10}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000080)='GPL\x00', 0x800, 0xd4, &(0x7f00000002c0)=""/212, 0x41100, 0x6, '\x00', 0x0, 0x8, r5, 0x8, &(0x7f0000000100)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x2, 0x475f, 0x401}, 0x10, r6, 0xffffffffffffffff, 0x4, &(0x7f0000000800)=[0xffffffffffffffff, r7], &(0x7f0000000ac0)=[{0x3, 0x2, 0xc, 0x6}, {0x3, 0x4, 0xb, 0xa}, {0x2, 0x2, 0xe, 0x2}, {0x3, 0x1, 0x5, 0x8}], 0x10, 0x20}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) getpid() perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f00000005c0)={0x1, 0x80, 0x0, 0x0, 0xbe, 0x0, 0x0, 0x0, 0x28000, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x400, 0xd7, 0x5, 0x0, 0x965, 0x0, 0xfffffffffffffffb}, 0x0, 0xd, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f00000006c0)) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0xe5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) ioctl$SIOCSIFHWADDR(r8, 0x8914, &(0x7f0000000040)={'sit0\x00', @local}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f00000008c0)='\x00'}, 0x30) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000e00)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8890}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000840)={0x0, 0x80, 0x2, 0x1, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x3ff, 0x0, @perf_config_ext={0x67}, 0x200, 0x612, 0x0, 0x0, 0xa0, 0x0, 0xd171, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x3, r4, 0x1) ioctl$SIOCSIFHWADDR(r9, 0x8914, &(0x7f0000000040)={'sit0\x00', @random="4f33e363a4b1"}) [ 1235.184584][T31244] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 1235.219813][T31244] platform regulatory.0: Falling back to sysfs fallback for: regulatory.db 14:37:57 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e040022003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) [ 1235.282382][T31260] device sit0 left promiscuous mode 14:37:57 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020a22003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:37:57 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e060022003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) [ 1235.349121][T31263] device sit0 entered promiscuous mode 14:37:57 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020b22003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:37:57 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e080022003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:37:57 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020c22003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:37:57 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e0a0022003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:37:57 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r5 = openat$cgroup_ro(r1, &(0x7f00000000c0)='blkio.bfq.sectors\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={r3, 0xe0, &(0x7f0000000940)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000200)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x1, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000640)=[0x0], 0x0, 0x6a, &(0x7f0000000680)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x6e, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r7 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000a40)={0x1b, 0x0, 0x0, 0x7, 0x0, r0, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x5, 0x3}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x1c, 0x21, &(0x7f0000000440)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x905, 0x0, 0x0, 0x0, 0x1}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@generic={0x80, 0x6, 0x8, 0x3f, 0xda}, @map_val={0x18, 0x1, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x401}, @initr0={0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x2}, @ldst={0x2, 0x3, 0x2, 0x9, 0x3, 0x1, 0x4}, @tail_call={{0x18, 0x2, 0x1, 0x0, r2}}, @jmp={0x5, 0x1, 0xa, 0x9, 0x3, 0xffffffffffffffe0}, @generic={0x9, 0x1, 0x5, 0x4, 0x8001}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @ldst={0x2, 0x1, 0x1, 0xb, 0xb, 0x20, 0x8}, @map_idx={0x18, 0x6, 0x5, 0x0, 0x10}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000080)='GPL\x00', 0x800, 0xd4, &(0x7f00000002c0)=""/212, 0x41100, 0x6, '\x00', 0x0, 0x8, r5, 0x8, &(0x7f0000000100)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x2, 0x475f, 0x401}, 0x10, r6, 0xffffffffffffffff, 0x4, &(0x7f0000000800)=[0xffffffffffffffff, r7], &(0x7f0000000ac0)=[{0x3, 0x2, 0xc, 0x6}, {0x3, 0x4, 0xb, 0xa}, {0x2, 0x2, 0xe, 0x2}, {0x3, 0x1, 0x5, 0x8}], 0x10, 0x20}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) getpid() perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f00000005c0)={0x1, 0x80, 0x0, 0x0, 0xbe, 0x0, 0x0, 0x0, 0x28000, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x400, 0xd7, 0x5, 0x0, 0x965, 0x0, 0xfffffffffffffffb}, 0x0, 0xd, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f00000006c0)) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0xe5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) ioctl$SIOCSIFHWADDR(r8, 0x8914, &(0x7f0000000040)={'sit0\x00', @local}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f00000008c0)='\x00'}, 0x30) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000e00)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8890}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000840)={0x0, 0x80, 0x2, 0x1, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x3ff, 0x0, @perf_config_ext={0x67}, 0x200, 0x612, 0x0, 0x0, 0xa0, 0x0, 0xd171, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x3, r4, 0x1) ioctl$SIOCSIFHWADDR(r9, 0x8914, &(0x7f0000000040)={'sit0\x00', @random="4f33e363a4b1"}) 14:37:57 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e0c0022003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:37:57 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020d22003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:37:57 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e0e0022003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) [ 1235.653366][T31279] device sit0 left promiscuous mode 14:37:57 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020e22003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:37:57 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e100022003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:37:57 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020f22003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) [ 1235.787859][T31283] device sit0 entered promiscuous mode 14:37:57 executing program 2: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x10) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x1a, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f97e24fc6004030e100a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x3, 0x5, 0x5, 0x0, 0x0, 0x8, 0x4000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x101, 0x1, @perf_config_ext={0x7fff, 0x8}, 0x4000, 0x3, 0x0, 0x3, 0x80000001, 0x80, 0x40, 0x0, 0x0, 0x0, 0x81}, 0xffffffffffffffff, 0x8, r0, 0x0) 14:37:57 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e120022003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:37:57 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e021022003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:37:57 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e140022003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:37:57 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e021122003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:37:57 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r5 = openat$cgroup_ro(r1, &(0x7f00000000c0)='blkio.bfq.sectors\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={r3, 0xe0, &(0x7f0000000940)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000200)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x1, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000640)=[0x0], 0x0, 0x6a, &(0x7f0000000680)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x6e, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r7 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000a40)={0x1b, 0x0, 0x0, 0x7, 0x0, r0, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x5, 0x3}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x1c, 0x21, &(0x7f0000000440)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x905, 0x0, 0x0, 0x0, 0x1}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@generic={0x80, 0x6, 0x8, 0x3f, 0xda}, @map_val={0x18, 0x1, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x401}, @initr0={0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x2}, @ldst={0x2, 0x3, 0x2, 0x9, 0x3, 0x1, 0x4}, @tail_call={{0x18, 0x2, 0x1, 0x0, r2}}, @jmp={0x5, 0x1, 0xa, 0x9, 0x3, 0xffffffffffffffe0}, @generic={0x9, 0x1, 0x5, 0x4, 0x8001}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @ldst={0x2, 0x1, 0x1, 0xb, 0xb, 0x20, 0x8}, @map_idx={0x18, 0x6, 0x5, 0x0, 0x10}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000080)='GPL\x00', 0x800, 0xd4, &(0x7f00000002c0)=""/212, 0x41100, 0x6, '\x00', 0x0, 0x8, r5, 0x8, &(0x7f0000000100)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x2, 0x475f, 0x401}, 0x10, r6, 0xffffffffffffffff, 0x4, &(0x7f0000000800)=[0xffffffffffffffff, r7], &(0x7f0000000ac0)=[{0x3, 0x2, 0xc, 0x6}, {0x3, 0x4, 0xb, 0xa}, {0x2, 0x2, 0xe, 0x2}, {0x3, 0x1, 0x5, 0x8}], 0x10, 0x20}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) getpid() perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f00000005c0)={0x1, 0x80, 0x0, 0x0, 0xbe, 0x0, 0x0, 0x0, 0x28000, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x400, 0xd7, 0x5, 0x0, 0x965, 0x0, 0xfffffffffffffffb}, 0x0, 0xd, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f00000006c0)) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0xe5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) ioctl$SIOCSIFHWADDR(r8, 0x8914, &(0x7f0000000040)={'sit0\x00', @local}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f00000008c0)='\x00'}, 0x30) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000e00)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8890}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000840)={0x0, 0x80, 0x2, 0x1, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x3ff, 0x0, @perf_config_ext={0x67}, 0x200, 0x612, 0x0, 0x0, 0xa0, 0x0, 0xd171, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x3, r4, 0x1) ioctl$SIOCSIFHWADDR(r9, 0x8914, &(0x7f0000000040)={'sit0\x00', @random="4f33e363a4b1"}) 14:37:57 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e021222003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) [ 1236.008680][T31293] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 1236.044984][T31293] platform regulatory.0: Falling back to sysfs fallback for: regulatory.db 14:37:57 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e160022003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:37:58 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e021822003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:37:58 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e180022003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) [ 1236.156061][T31306] device sit0 left promiscuous mode 14:37:58 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e1a0022003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:37:58 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e022122003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:37:58 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e1c0022003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:37:58 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e1e0022003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) [ 1236.240272][T31313] device sit0 entered promiscuous mode 14:37:58 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e022522003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:37:58 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e220022003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:37:58 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e023522003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:37:58 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e240022003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:37:58 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r5 = openat$cgroup_ro(r1, &(0x7f00000000c0)='blkio.bfq.sectors\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={r3, 0xe0, &(0x7f0000000940)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000200)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x1, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000640)=[0x0], 0x0, 0x6a, &(0x7f0000000680)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x6e, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r7 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000a40)={0x1b, 0x0, 0x0, 0x7, 0x0, r0, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x5, 0x3}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x1c, 0x21, &(0x7f0000000440)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x905, 0x0, 0x0, 0x0, 0x1}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@generic={0x80, 0x6, 0x8, 0x3f, 0xda}, @map_val={0x18, 0x1, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x401}, @initr0={0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x2}, @ldst={0x2, 0x3, 0x2, 0x9, 0x3, 0x1, 0x4}, @tail_call={{0x18, 0x2, 0x1, 0x0, r2}}, @jmp={0x5, 0x1, 0xa, 0x9, 0x3, 0xffffffffffffffe0}, @generic={0x9, 0x1, 0x5, 0x4, 0x8001}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @ldst={0x2, 0x1, 0x1, 0xb, 0xb, 0x20, 0x8}, @map_idx={0x18, 0x6, 0x5, 0x0, 0x10}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000080)='GPL\x00', 0x800, 0xd4, &(0x7f00000002c0)=""/212, 0x41100, 0x6, '\x00', 0x0, 0x8, r5, 0x8, &(0x7f0000000100)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x2, 0x475f, 0x401}, 0x10, r6, 0xffffffffffffffff, 0x4, &(0x7f0000000800)=[0xffffffffffffffff, r7], &(0x7f0000000ac0)=[{0x3, 0x2, 0xc, 0x6}, {0x3, 0x4, 0xb, 0xa}, {0x2, 0x2, 0xe, 0x2}, {0x3, 0x1, 0x5, 0x8}], 0x10, 0x20}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) getpid() perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f00000005c0)={0x1, 0x80, 0x0, 0x0, 0xbe, 0x0, 0x0, 0x0, 0x28000, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x400, 0xd7, 0x5, 0x0, 0x965, 0x0, 0xfffffffffffffffb}, 0x0, 0xd, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f00000006c0)) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0xe5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) ioctl$SIOCSIFHWADDR(r8, 0x8914, &(0x7f0000000040)={'sit0\x00', @local}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f00000008c0)='\x00'}, 0x30) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000e00)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8890}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000840)={0x0, 0x80, 0x2, 0x1, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x3ff, 0x0, @perf_config_ext={0x67}, 0x200, 0x612, 0x0, 0x0, 0xa0, 0x0, 0xd171, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x3, r4, 0x1) ioctl$SIOCSIFHWADDR(r9, 0x8914, &(0x7f0000000040)={'sit0\x00', @random="4f33e363a4b1"}) 14:37:58 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e260022003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:37:58 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e024122003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:37:58 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e024822003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:37:58 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e280022003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) [ 1236.575437][T31331] device sit0 left promiscuous mode 14:37:58 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e024c22003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:37:58 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e2a0022003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:37:58 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e026022003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) [ 1236.701973][T31337] device sit0 entered promiscuous mode 14:37:58 executing program 2: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x10) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x1a, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f97e24fc6004030e110a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x3, 0x5, 0x5, 0x0, 0x0, 0x8, 0x4000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x101, 0x1, @perf_config_ext={0x7fff, 0x8}, 0x4000, 0x3, 0x0, 0x3, 0x80000001, 0x80, 0x40, 0x0, 0x0, 0x0, 0x81}, 0xffffffffffffffff, 0x8, r0, 0x0) 14:37:58 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e2c0022003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:37:58 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e2e0022003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:37:58 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e026422003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:37:58 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e300022003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:37:58 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e026822003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:37:58 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e320022003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:37:58 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e026c22003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:37:58 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r5 = openat$cgroup_ro(r1, &(0x7f00000000c0)='blkio.bfq.sectors\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={r3, 0xe0, &(0x7f0000000940)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000200)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x1, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000640)=[0x0], 0x0, 0x6a, &(0x7f0000000680)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x6e, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r7 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000a40)={0x1b, 0x0, 0x0, 0x7, 0x0, r0, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x5, 0x3}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x1c, 0x21, &(0x7f0000000440)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x905, 0x0, 0x0, 0x0, 0x1}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@generic={0x80, 0x6, 0x8, 0x3f, 0xda}, @map_val={0x18, 0x1, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x401}, @initr0={0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x2}, @ldst={0x2, 0x3, 0x2, 0x9, 0x3, 0x1, 0x4}, @tail_call={{0x18, 0x2, 0x1, 0x0, r2}}, @jmp={0x5, 0x1, 0xa, 0x9, 0x3, 0xffffffffffffffe0}, @generic={0x9, 0x1, 0x5, 0x4, 0x8001}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @ldst={0x2, 0x1, 0x1, 0xb, 0xb, 0x20, 0x8}, @map_idx={0x18, 0x6, 0x5, 0x0, 0x10}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000080)='GPL\x00', 0x800, 0xd4, &(0x7f00000002c0)=""/212, 0x41100, 0x6, '\x00', 0x0, 0x8, r5, 0x8, &(0x7f0000000100)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x2, 0x475f, 0x401}, 0x10, r6, 0xffffffffffffffff, 0x4, &(0x7f0000000800)=[0xffffffffffffffff, r7], &(0x7f0000000ac0)=[{0x3, 0x2, 0xc, 0x6}, {0x3, 0x4, 0xb, 0xa}, {0x2, 0x2, 0xe, 0x2}, {0x3, 0x1, 0x5, 0x8}], 0x10, 0x20}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) getpid() perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f00000005c0)={0x1, 0x80, 0x0, 0x0, 0xbe, 0x0, 0x0, 0x0, 0x28000, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x400, 0xd7, 0x5, 0x0, 0x965, 0x0, 0xfffffffffffffffb}, 0x0, 0xd, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f00000006c0)) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0xe5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) ioctl$SIOCSIFHWADDR(r8, 0x8914, &(0x7f0000000040)={'sit0\x00', @local}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f00000008c0)='\x00'}, 0x30) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000e00)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8890}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000840)={0x0, 0x80, 0x2, 0x1, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x3ff, 0x0, @perf_config_ext={0x67}, 0x200, 0x612, 0x0, 0x0, 0xa0, 0x0, 0xd171, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x3, r4, 0x1) ioctl$SIOCSIFHWADDR(r9, 0x8914, &(0x7f0000000040)={'sit0\x00', @random="4f33e363a4b1"}) 14:37:58 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e340022003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) [ 1237.036368][T31350] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 1237.062520][T31350] platform regulatory.0: Falling back to sysfs fallback for: regulatory.db 14:37:59 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e027422003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) [ 1237.118868][T31366] device sit0 left promiscuous mode 14:37:59 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e360022003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:37:59 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e027a22003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:37:59 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020040003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:37:59 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e380022003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:37:59 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e0202d6003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) [ 1237.349366][T31371] device sit0 entered promiscuous mode 14:37:59 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e3a0022003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:37:59 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e3c0022003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:37:59 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020fff003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:37:59 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020002003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:37:59 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e3e0022003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:37:59 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020010003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:37:59 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e420022003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:37:59 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r5 = openat$cgroup_ro(r1, &(0x7f00000000c0)='blkio.bfq.sectors\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={r3, 0xe0, &(0x7f0000000940)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000200)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x1, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000640)=[0x0], 0x0, 0x6a, &(0x7f0000000680)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x6e, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r7 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000a40)={0x1b, 0x0, 0x0, 0x7, 0x0, r0, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x5, 0x3}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x1c, 0x21, &(0x7f0000000440)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x905, 0x0, 0x0, 0x0, 0x1}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@generic={0x80, 0x6, 0x8, 0x3f, 0xda}, @map_val={0x18, 0x1, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x401}, @initr0={0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x2}, @ldst={0x2, 0x3, 0x2, 0x9, 0x3, 0x1, 0x4}, @tail_call={{0x18, 0x2, 0x1, 0x0, r2}}, @jmp={0x5, 0x1, 0xa, 0x9, 0x3, 0xffffffffffffffe0}, @generic={0x9, 0x1, 0x5, 0x4, 0x8001}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @ldst={0x2, 0x1, 0x1, 0xb, 0xb, 0x20, 0x8}, @map_idx={0x18, 0x6, 0x5, 0x0, 0x10}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000080)='GPL\x00', 0x800, 0xd4, &(0x7f00000002c0)=""/212, 0x41100, 0x6, '\x00', 0x0, 0x8, r5, 0x8, &(0x7f0000000100)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x2, 0x475f, 0x401}, 0x10, r6, 0xffffffffffffffff, 0x4, &(0x7f0000000800)=[0xffffffffffffffff, r7], &(0x7f0000000ac0)=[{0x3, 0x2, 0xc, 0x6}, {0x3, 0x4, 0xb, 0xa}, {0x2, 0x2, 0xe, 0x2}, {0x3, 0x1, 0x5, 0x8}], 0x10, 0x20}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) getpid() perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f00000005c0)={0x1, 0x80, 0x0, 0x0, 0xbe, 0x0, 0x0, 0x0, 0x28000, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x400, 0xd7, 0x5, 0x0, 0x965, 0x0, 0xfffffffffffffffb}, 0x0, 0xd, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f00000006c0)) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0xe5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) ioctl$SIOCSIFHWADDR(r8, 0x8914, &(0x7f0000000040)={'sit0\x00', @local}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f00000008c0)='\x00'}, 0x30) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000e00)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8890}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000840)={0x0, 0x80, 0x2, 0x1, 0x9, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x3ff, 0x0, @perf_config_ext={0x67}, 0x200, 0x612, 0x0, 0x0, 0xa0, 0x0, 0xd171, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x3, r4, 0x1) ioctl$SIOCSIFHWADDR(r9, 0x8914, &(0x7f0000000040)={'sit0\x00', @random="4f33e363a4b1"}) 14:37:59 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e0200d6023505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:37:59 executing program 2: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x10) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x1a, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f97e24fc6004030e120a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x3, 0x5, 0x5, 0x0, 0x0, 0x8, 0x4000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x101, 0x1, @perf_config_ext={0x7fff, 0x8}, 0x4000, 0x3, 0x0, 0x3, 0x80000001, 0x80, 0x40, 0x0, 0x0, 0x0, 0x81}, 0xffffffffffffffff, 0x8, r0, 0x0) [ 1237.661707][T31399] device sit0 left promiscuous mode 14:37:59 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e440022003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:37:59 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022020005d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:37:59 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e460022003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:37:59 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022000a05d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:37:59 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e480022003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) [ 1237.860576][T31401] device sit0 entered promiscuous mode 14:37:59 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022002005d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:37:59 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e4a0022003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:37:59 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022002305d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:37:59 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e4c0022003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:00 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e4e0022003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:00 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r5 = openat$cgroup_ro(r1, &(0x7f00000000c0)='blkio.bfq.sectors\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={r3, 0xe0, &(0x7f0000000940)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000200)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x1, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000640)=[0x0], 0x0, 0x6a, &(0x7f0000000680)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x6e, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r7 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000a40)={0x1b, 0x0, 0x0, 0x7, 0x0, r0, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x5, 0x3}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x1c, 0x21, &(0x7f0000000440)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x905, 0x0, 0x0, 0x0, 0x1}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@generic={0x80, 0x6, 0x8, 0x3f, 0xda}, @map_val={0x18, 0x1, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x401}, @initr0={0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x2}, @ldst={0x2, 0x3, 0x2, 0x9, 0x3, 0x1, 0x4}, @tail_call={{0x18, 0x2, 0x1, 0x0, r2}}, @jmp={0x5, 0x1, 0xa, 0x9, 0x3, 0xffffffffffffffe0}, @generic={0x9, 0x1, 0x5, 0x4, 0x8001}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @ldst={0x2, 0x1, 0x1, 0xb, 0xb, 0x20, 0x8}, @map_idx={0x18, 0x6, 0x5, 0x0, 0x10}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000080)='GPL\x00', 0x800, 0xd4, &(0x7f00000002c0)=""/212, 0x41100, 0x6, '\x00', 0x0, 0x8, r5, 0x8, &(0x7f0000000100)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x2, 0x475f, 0x401}, 0x10, r6, 0xffffffffffffffff, 0x4, &(0x7f0000000800)=[0xffffffffffffffff, r7], &(0x7f0000000ac0)=[{0x3, 0x2, 0xc, 0x6}, {0x3, 0x4, 0xb, 0xa}, {0x2, 0x2, 0xe, 0x2}, {0x3, 0x1, 0x5, 0x8}], 0x10, 0x20}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) getpid() perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f00000005c0)={0x1, 0x80, 0x0, 0x0, 0xbe, 0x0, 0x0, 0x0, 0x28000, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x400, 0xd7, 0x5, 0x0, 0x965, 0x0, 0xfffffffffffffffb}, 0x0, 0xd, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f00000006c0)) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0xe5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) ioctl$SIOCSIFHWADDR(r8, 0x8914, &(0x7f0000000040)={'sit0\x00', @local}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f00000008c0)='\x00'}, 0x30) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000e00)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8890}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000840)={0x0, 0x80, 0x2, 0x1, 0x9, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x3ff, 0x0, @perf_config_ext={0x67}, 0x200, 0x612, 0x0, 0x0, 0xa0, 0x0, 0xd171, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x3, r4, 0x1) ioctl$SIOCSIFHWADDR(r9, 0x8914, &(0x7f0000000040)={'sit0\x00', @random="4f33e363a4b1"}) [ 1238.080195][T31403] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 1238.100176][T31403] platform regulatory.0: Falling back to sysfs fallback for: regulatory.db [ 1238.106391][T31424] __nla_validate_parse: 9 callbacks suppressed [ 1238.106407][T31424] netlink: 134056 bytes leftover after parsing attributes in process `syz-executor.4'. 14:38:00 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e500022003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:00 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022002b05d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) [ 1238.164642][T31427] device sit0 left promiscuous mode 14:38:00 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e520022003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) [ 1238.207667][T31430] netlink: 134056 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1238.240826][T31431] device sit0 entered promiscuous mode 14:38:00 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e540022003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:00 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e560022003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:00 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e580022003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:00 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e5a0022003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:00 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022002d05d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:00 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r5 = openat$cgroup_ro(r1, &(0x7f00000000c0)='blkio.bfq.sectors\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={r3, 0xe0, &(0x7f0000000940)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000200)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x1, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000640)=[0x0], 0x0, 0x6a, &(0x7f0000000680)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x6e, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r7 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000a40)={0x1b, 0x0, 0x0, 0x7, 0x0, r0, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x5, 0x3}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x1c, 0x21, &(0x7f0000000440)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x905, 0x0, 0x0, 0x0, 0x1}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@generic={0x80, 0x6, 0x8, 0x3f, 0xda}, @map_val={0x18, 0x1, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x401}, @initr0={0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x2}, @ldst={0x2, 0x3, 0x2, 0x9, 0x3, 0x1, 0x4}, @tail_call={{0x18, 0x2, 0x1, 0x0, r2}}, @jmp={0x5, 0x1, 0xa, 0x9, 0x3, 0xffffffffffffffe0}, @generic={0x9, 0x1, 0x5, 0x4, 0x8001}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @ldst={0x2, 0x1, 0x1, 0xb, 0xb, 0x20, 0x8}, @map_idx={0x18, 0x6, 0x5, 0x0, 0x10}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000080)='GPL\x00', 0x800, 0xd4, &(0x7f00000002c0)=""/212, 0x41100, 0x6, '\x00', 0x0, 0x8, r5, 0x8, &(0x7f0000000100)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x2, 0x475f, 0x401}, 0x10, r6, 0xffffffffffffffff, 0x4, &(0x7f0000000800)=[0xffffffffffffffff, r7], &(0x7f0000000ac0)=[{0x3, 0x2, 0xc, 0x6}, {0x3, 0x4, 0xb, 0xa}, {0x2, 0x2, 0xe, 0x2}, {0x3, 0x1, 0x5, 0x8}], 0x10, 0x20}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) getpid() perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f00000005c0)={0x1, 0x80, 0x0, 0x0, 0xbe, 0x0, 0x0, 0x0, 0x28000, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x400, 0xd7, 0x5, 0x0, 0x965, 0x0, 0xfffffffffffffffb}, 0x0, 0xd, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f00000006c0)) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0xe5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) ioctl$SIOCSIFHWADDR(r8, 0x8914, &(0x7f0000000040)={'sit0\x00', @local}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f00000008c0)='\x00'}, 0x30) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000e00)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8890}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000840)={0x0, 0x80, 0x2, 0x1, 0x9, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x3ff, 0x0, @perf_config_ext={0x67}, 0x200, 0x612, 0x0, 0x0, 0xa0, 0x0, 0xd171, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x3, r4, 0x1) ioctl$SIOCSIFHWADDR(r9, 0x8914, &(0x7f0000000040)={'sit0\x00', @random="4f33e363a4b1"}) 14:38:00 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e5c0022003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:00 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003005d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) [ 1238.509157][T31445] netlink: 134056 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1238.525311][T31447] device sit0 left promiscuous mode [ 1238.532266][ T1373] ieee802154 phy0 wpan0: encryption failed: -22 [ 1238.538606][ T1373] ieee802154 phy1 wpan1: encryption failed: -22 14:38:00 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e5e0022003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:00 executing program 2: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x10) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x1a, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f97e24fc6004030e180a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x3, 0x5, 0x5, 0x0, 0x0, 0x8, 0x4000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x101, 0x1, @perf_config_ext={0x7fff, 0x8}, 0x4000, 0x3, 0x0, 0x3, 0x80000001, 0x80, 0x40, 0x0, 0x0, 0x0, 0x81}, 0xffffffffffffffff, 0x8, r0, 0x0) 14:38:00 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022023505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:00 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e600022003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:00 executing program 2: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x10) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x1a, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f97e24fc6004030e210a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x3, 0x5, 0x5, 0x0, 0x0, 0x8, 0x4000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x101, 0x1, @perf_config_ext={0x7fff, 0x8}, 0x4000, 0x3, 0x0, 0x3, 0x80000001, 0x80, 0x40, 0x0, 0x0, 0x0, 0x81}, 0xffffffffffffffff, 0x8, r0, 0x0) 14:38:00 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e620022003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:00 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022033505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:00 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022043505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:00 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e640022003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:00 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022053505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) [ 1238.969335][T31464] netlink: 134056 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1238.998713][T31450] device sit0 entered promiscuous mode 14:38:00 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022063505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:00 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e660022003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:01 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022073505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:01 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e680022003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:01 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022083505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:01 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e6a0022003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:01 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022093505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:01 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r5 = openat$cgroup_ro(r1, &(0x7f00000000c0)='blkio.bfq.sectors\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={r3, 0xe0, &(0x7f0000000940)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000200)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x1, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000640)=[0x0], 0x0, 0x6a, &(0x7f0000000680)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x6e, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r7 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000a40)={0x1b, 0x0, 0x0, 0x7, 0x0, r0, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x5, 0x3}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x1c, 0x21, &(0x7f0000000440)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x905, 0x0, 0x0, 0x0, 0x1}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@generic={0x80, 0x6, 0x8, 0x3f, 0xda}, @map_val={0x18, 0x1, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x401}, @initr0={0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x2}, @ldst={0x2, 0x3, 0x2, 0x9, 0x3, 0x1, 0x4}, @tail_call={{0x18, 0x2, 0x1, 0x0, r2}}, @jmp={0x5, 0x1, 0xa, 0x9, 0x3, 0xffffffffffffffe0}, @generic={0x9, 0x1, 0x5, 0x4, 0x8001}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @ldst={0x2, 0x1, 0x1, 0xb, 0xb, 0x20, 0x8}, @map_idx={0x18, 0x6, 0x5, 0x0, 0x10}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000080)='GPL\x00', 0x800, 0xd4, &(0x7f00000002c0)=""/212, 0x41100, 0x6, '\x00', 0x0, 0x8, r5, 0x8, &(0x7f0000000100)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x2, 0x475f, 0x401}, 0x10, r6, 0xffffffffffffffff, 0x4, &(0x7f0000000800)=[0xffffffffffffffff, r7], &(0x7f0000000ac0)=[{0x3, 0x2, 0xc, 0x6}, {0x3, 0x4, 0xb, 0xa}, {0x2, 0x2, 0xe, 0x2}, {0x3, 0x1, 0x5, 0x8}], 0x10, 0x20}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) getpid() perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f00000005c0)={0x1, 0x80, 0x0, 0x0, 0xbe, 0x0, 0x0, 0x0, 0x28000, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x400, 0xd7, 0x5, 0x0, 0x965, 0x0, 0xfffffffffffffffb}, 0x0, 0xd, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f00000006c0)) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0xe5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) ioctl$SIOCSIFHWADDR(r8, 0x8914, &(0x7f0000000040)={'sit0\x00', @local}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f00000008c0)='\x00'}, 0x30) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000e00)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8890}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000840)={0x0, 0x80, 0x2, 0x1, 0x9, 0x0, 0x0, 0x7, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x3ff, 0x0, @perf_config_ext={0x67}, 0x200, 0x612, 0x0, 0x0, 0xa0, 0x0, 0xd171, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x3, r4, 0x1) ioctl$SIOCSIFHWADDR(r9, 0x8914, &(0x7f0000000040)={'sit0\x00', @random="4f33e363a4b1"}) 14:38:01 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e6c0022003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) [ 1239.377634][T31464] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 1239.388418][T31464] platform regulatory.0: Falling back to sysfs fallback for: regulatory.db 14:38:01 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e0200220a3505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:01 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e0200220b3505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:01 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e6e0022003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) [ 1239.484844][T31494] device sit0 left promiscuous mode 14:38:01 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e0200220c3505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:01 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e700022003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:01 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e0200220d3505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:01 executing program 2: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x10) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x1a, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f97e24fc6004030e250a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x3, 0x5, 0x5, 0x0, 0x0, 0x8, 0x4000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x101, 0x1, @perf_config_ext={0x7fff, 0x8}, 0x4000, 0x3, 0x0, 0x3, 0x80000001, 0x80, 0x40, 0x0, 0x0, 0x0, 0x81}, 0xffffffffffffffff, 0x8, r0, 0x0) 14:38:01 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e720022003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:01 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e0200220e3505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:01 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e740022003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) [ 1239.732393][T31508] netlink: 134056 bytes leftover after parsing attributes in process `syz-executor.2'. 14:38:01 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e0200220f3505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:01 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e760022003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:01 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022103505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) [ 1239.838234][T31497] device sit0 entered promiscuous mode 14:38:01 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e780022003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:01 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022113505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:01 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e7a0022003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:01 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022123505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:02 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022183505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:02 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r5 = openat$cgroup_ro(r1, &(0x7f00000000c0)='blkio.bfq.sectors\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={r3, 0xe0, &(0x7f0000000940)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000200)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x1, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000640)=[0x0], 0x0, 0x6a, &(0x7f0000000680)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x6e, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r7 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000a40)={0x1b, 0x0, 0x0, 0x7, 0x0, r0, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x5, 0x3}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x1c, 0x21, &(0x7f0000000440)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x905, 0x0, 0x0, 0x0, 0x1}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@generic={0x80, 0x6, 0x8, 0x3f, 0xda}, @map_val={0x18, 0x1, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x401}, @initr0={0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x2}, @ldst={0x2, 0x3, 0x2, 0x9, 0x3, 0x1, 0x4}, @tail_call={{0x18, 0x2, 0x1, 0x0, r2}}, @jmp={0x5, 0x1, 0xa, 0x9, 0x3, 0xffffffffffffffe0}, @generic={0x9, 0x1, 0x5, 0x4, 0x8001}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @ldst={0x2, 0x1, 0x1, 0xb, 0xb, 0x20, 0x8}, @map_idx={0x18, 0x6, 0x5, 0x0, 0x10}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000080)='GPL\x00', 0x800, 0xd4, &(0x7f00000002c0)=""/212, 0x41100, 0x6, '\x00', 0x0, 0x8, r5, 0x8, &(0x7f0000000100)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x2, 0x475f, 0x401}, 0x10, r6, 0xffffffffffffffff, 0x4, &(0x7f0000000800)=[0xffffffffffffffff, r7], &(0x7f0000000ac0)=[{0x3, 0x2, 0xc, 0x6}, {0x3, 0x4, 0xb, 0xa}, {0x2, 0x2, 0xe, 0x2}, {0x3, 0x1, 0x5, 0x8}], 0x10, 0x20}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) getpid() perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f00000005c0)={0x1, 0x80, 0x0, 0x0, 0xbe, 0x0, 0x0, 0x0, 0x28000, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x400, 0xd7, 0x5, 0x0, 0x965, 0x0, 0xfffffffffffffffb}, 0x0, 0xd, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f00000006c0)) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0xe5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) ioctl$SIOCSIFHWADDR(r8, 0x8914, &(0x7f0000000040)={'sit0\x00', @local}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f00000008c0)='\x00'}, 0x30) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000e00)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8890}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000840)={0x0, 0x80, 0x2, 0x1, 0x9, 0x0, 0x0, 0x7, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x3ff, 0x0, @perf_config_ext={0x67}, 0x200, 0x612, 0x0, 0x0, 0xa0, 0x0, 0xd171, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x3, r4, 0x1) ioctl$SIOCSIFHWADDR(r9, 0x8914, &(0x7f0000000040)={'sit0\x00', @random="4f33e363a4b1"}) [ 1240.103490][T31508] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 1240.137128][T31508] platform regulatory.0: Falling back to sysfs fallback for: regulatory.db 14:38:02 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e7c0022003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) [ 1240.215238][T31530] device sit0 left promiscuous mode 14:38:02 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022213505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:02 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e7e0022003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:02 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e820022003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:02 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022253505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:02 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022353505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:02 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e840022003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:02 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022413505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:02 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e860022003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) [ 1240.469016][T31535] device sit0 entered promiscuous mode 14:38:02 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022483505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:02 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e880022003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:02 executing program 2: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x10) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x1a, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f97e24fc6004030e350a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x3, 0x5, 0x5, 0x0, 0x0, 0x8, 0x4000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x101, 0x1, @perf_config_ext={0x7fff, 0x8}, 0x4000, 0x3, 0x0, 0x3, 0x80000001, 0x80, 0x40, 0x0, 0x0, 0x0, 0x81}, 0xffffffffffffffff, 0x8, r0, 0x0) 14:38:02 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e8a0022003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:02 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e0200224c3505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:02 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022603505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:02 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e8c0022003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:02 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r5 = openat$cgroup_ro(r1, &(0x7f00000000c0)='blkio.bfq.sectors\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={r3, 0xe0, &(0x7f0000000940)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000200)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x1, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000640)=[0x0], 0x0, 0x6a, &(0x7f0000000680)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x6e, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r7 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000a40)={0x1b, 0x0, 0x0, 0x7, 0x0, r0, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x5, 0x3}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x1c, 0x21, &(0x7f0000000440)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x905, 0x0, 0x0, 0x0, 0x1}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@generic={0x80, 0x6, 0x8, 0x3f, 0xda}, @map_val={0x18, 0x1, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x401}, @initr0={0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x2}, @ldst={0x2, 0x3, 0x2, 0x9, 0x3, 0x1, 0x4}, @tail_call={{0x18, 0x2, 0x1, 0x0, r2}}, @jmp={0x5, 0x1, 0xa, 0x9, 0x3, 0xffffffffffffffe0}, @generic={0x9, 0x1, 0x5, 0x4, 0x8001}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @ldst={0x2, 0x1, 0x1, 0xb, 0xb, 0x20, 0x8}, @map_idx={0x18, 0x6, 0x5, 0x0, 0x10}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000080)='GPL\x00', 0x800, 0xd4, &(0x7f00000002c0)=""/212, 0x41100, 0x6, '\x00', 0x0, 0x8, r5, 0x8, &(0x7f0000000100)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x2, 0x475f, 0x401}, 0x10, r6, 0xffffffffffffffff, 0x4, &(0x7f0000000800)=[0xffffffffffffffff, r7], &(0x7f0000000ac0)=[{0x3, 0x2, 0xc, 0x6}, {0x3, 0x4, 0xb, 0xa}, {0x2, 0x2, 0xe, 0x2}, {0x3, 0x1, 0x5, 0x8}], 0x10, 0x20}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) getpid() perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f00000005c0)={0x1, 0x80, 0x0, 0x0, 0xbe, 0x0, 0x0, 0x0, 0x28000, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x400, 0xd7, 0x5, 0x0, 0x965, 0x0, 0xfffffffffffffffb}, 0x0, 0xd, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f00000006c0)) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0xe5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) ioctl$SIOCSIFHWADDR(r8, 0x8914, &(0x7f0000000040)={'sit0\x00', @local}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f00000008c0)='\x00'}, 0x30) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000e00)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8890}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000840)={0x0, 0x80, 0x2, 0x1, 0x9, 0x0, 0x0, 0x7, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x3ff, 0x0, @perf_config_ext={0x67}, 0x200, 0x612, 0x0, 0x0, 0xa0, 0x0, 0xd171, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x3, r4, 0x1) ioctl$SIOCSIFHWADDR(r9, 0x8914, &(0x7f0000000040)={'sit0\x00', @random="4f33e363a4b1"}) [ 1240.716222][T31558] netlink: 134056 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1240.738571][T31558] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 1240.757352][T31558] platform regulatory.0: Falling back to sysfs fallback for: regulatory.db [ 1240.796205][T31566] device sit0 left promiscuous mode 14:38:02 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e8e0022003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:02 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022643505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:02 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e900022003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) [ 1240.889040][T31569] device sit0 entered promiscuous mode 14:38:02 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022683505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:02 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e920022003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:02 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e0200226c3505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:03 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e940022003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:03 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022743505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:03 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e960022003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:03 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e0200227a3505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:03 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r5 = openat$cgroup_ro(r1, &(0x7f00000000c0)='blkio.bfq.sectors\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={r3, 0xe0, &(0x7f0000000940)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000200)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x1, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000640)=[0x0], 0x0, 0x6a, &(0x7f0000000680)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x6e, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r7 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000a40)={0x1b, 0x0, 0x0, 0x7, 0x0, r0, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x5, 0x3}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x1c, 0x21, &(0x7f0000000440)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x905, 0x0, 0x0, 0x0, 0x1}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@generic={0x80, 0x6, 0x8, 0x3f, 0xda}, @map_val={0x18, 0x1, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x401}, @initr0={0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x2}, @ldst={0x2, 0x3, 0x2, 0x9, 0x3, 0x1, 0x4}, @tail_call={{0x18, 0x2, 0x1, 0x0, r2}}, @jmp={0x5, 0x1, 0xa, 0x9, 0x3, 0xffffffffffffffe0}, @generic={0x9, 0x1, 0x5, 0x4, 0x8001}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @ldst={0x2, 0x1, 0x1, 0xb, 0xb, 0x20, 0x8}, @map_idx={0x18, 0x6, 0x5, 0x0, 0x10}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000080)='GPL\x00', 0x800, 0xd4, &(0x7f00000002c0)=""/212, 0x41100, 0x6, '\x00', 0x0, 0x8, r5, 0x8, &(0x7f0000000100)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x2, 0x475f, 0x401}, 0x10, r6, 0xffffffffffffffff, 0x4, &(0x7f0000000800)=[0xffffffffffffffff, r7], &(0x7f0000000ac0)=[{0x3, 0x2, 0xc, 0x6}, {0x3, 0x4, 0xb, 0xa}, {0x2, 0x2, 0xe, 0x2}, {0x3, 0x1, 0x5, 0x8}], 0x10, 0x20}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) getpid() perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f00000005c0)={0x1, 0x80, 0x0, 0x0, 0xbe, 0x0, 0x0, 0x0, 0x28000, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x400, 0xd7, 0x5, 0x0, 0x965, 0x0, 0xfffffffffffffffb}, 0x0, 0xd, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f00000006c0)) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0xe5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) ioctl$SIOCSIFHWADDR(r8, 0x8914, &(0x7f0000000040)={'sit0\x00', @local}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f00000008c0)='\x00'}, 0x30) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000e00)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8890}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000840)={0x0, 0x80, 0x2, 0x1, 0x9, 0x0, 0x0, 0x7, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x3ff, 0x0, @perf_config_ext={0x67}, 0x200, 0x612, 0x0, 0x0, 0xa0, 0x0, 0xd171, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x3, r4, 0x1) ioctl$SIOCSIFHWADDR(r9, 0x8914, &(0x7f0000000040)={'sit0\x00', @random="4f33e363a4b1"}) 14:38:03 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022004705d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:03 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e980022003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:03 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e9a0022003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) [ 1241.424629][T31593] device sit0 left promiscuous mode [ 1241.426143][T31595] netlink: 134056 bytes leftover after parsing attributes in process `syz-executor.4'. 14:38:03 executing program 2: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x10) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x1a, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f97e24fc6004030e410a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x3, 0x5, 0x5, 0x0, 0x0, 0x8, 0x4000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x101, 0x1, @perf_config_ext={0x7fff, 0x8}, 0x4000, 0x3, 0x0, 0x3, 0x80000001, 0x80, 0x40, 0x0, 0x0, 0x0, 0x81}, 0xffffffffffffffff, 0x8, r0, 0x0) 14:38:03 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022000a05d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:03 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e9c0022003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) [ 1241.568694][T31593] device sit0 entered promiscuous mode 14:38:03 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e9e0022003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) [ 1241.664313][T31600] netlink: 768 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1241.677359][T31600] netlink: 134056 bytes leftover after parsing attributes in process `syz-executor.2'. 14:38:03 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022002305d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:03 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00ea00022003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) [ 1241.814343][T31608] netlink: 134056 bytes leftover after parsing attributes in process `syz-executor.4'. 14:38:03 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00ea20022003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:03 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00ea40022003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:03 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r5 = openat$cgroup_ro(r1, &(0x7f00000000c0)='blkio.bfq.sectors\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={r3, 0xe0, &(0x7f0000000940)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000200)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x1, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000640)=[0x0], 0x0, 0x6a, &(0x7f0000000680)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x6e, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r7 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000a40)={0x1b, 0x0, 0x0, 0x7, 0x0, r0, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x5, 0x3}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x1c, 0x21, &(0x7f0000000440)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x905, 0x0, 0x0, 0x0, 0x1}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@generic={0x80, 0x6, 0x8, 0x3f, 0xda}, @map_val={0x18, 0x1, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x401}, @initr0={0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x2}, @ldst={0x2, 0x3, 0x2, 0x9, 0x3, 0x1, 0x4}, @tail_call={{0x18, 0x2, 0x1, 0x0, r2}}, @jmp={0x5, 0x1, 0xa, 0x9, 0x3, 0xffffffffffffffe0}, @generic={0x9, 0x1, 0x5, 0x4, 0x8001}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @ldst={0x2, 0x1, 0x1, 0xb, 0xb, 0x20, 0x8}, @map_idx={0x18, 0x6, 0x5, 0x0, 0x10}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000080)='GPL\x00', 0x800, 0xd4, &(0x7f00000002c0)=""/212, 0x41100, 0x6, '\x00', 0x0, 0x8, r5, 0x8, &(0x7f0000000100)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x2, 0x475f, 0x401}, 0x10, r6, 0xffffffffffffffff, 0x4, &(0x7f0000000800)=[0xffffffffffffffff, r7], &(0x7f0000000ac0)=[{0x3, 0x2, 0xc, 0x6}, {0x3, 0x4, 0xb, 0xa}, {0x2, 0x2, 0xe, 0x2}, {0x3, 0x1, 0x5, 0x8}], 0x10, 0x20}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) getpid() perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f00000005c0)={0x1, 0x80, 0x0, 0x0, 0xbe, 0x0, 0x0, 0x0, 0x28000, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x400, 0xd7, 0x5, 0x0, 0x965, 0x0, 0xfffffffffffffffb}, 0x0, 0xd, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f00000006c0)) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0xe5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) ioctl$SIOCSIFHWADDR(r8, 0x8914, &(0x7f0000000040)={'sit0\x00', @local}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f00000008c0)='\x00'}, 0x30) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000e00)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8890}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000840)={0x0, 0x80, 0x2, 0x1, 0x9, 0x0, 0x0, 0x7, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x3ff, 0x0, @perf_config_ext={0x67}, 0x200, 0x612, 0x0, 0x0, 0xa0, 0x0, 0xd171, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x3, r4, 0x1) ioctl$SIOCSIFHWADDR(r9, 0x8914, &(0x7f0000000040)={'sit0\x00', @random="4f33e363a4b1"}) 14:38:03 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022002b05d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:03 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00ea60022003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) [ 1241.982020][T31600] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 1242.022052][T31600] platform regulatory.0: Falling back to sysfs fallback for: regulatory.db [ 1242.059655][T31619] device sit0 left promiscuous mode 14:38:04 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00ea80022003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:04 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00eaa0022003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:04 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022002d05d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) [ 1242.153579][T31622] device sit0 entered promiscuous mode 14:38:04 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00eac0022003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:04 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00eae0022003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:04 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00eb00022003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:04 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003005d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:04 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r5 = openat$cgroup_ro(r1, &(0x7f00000000c0)='blkio.bfq.sectors\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={r3, 0xe0, &(0x7f0000000940)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000200)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x1, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000640)=[0x0], 0x0, 0x6a, &(0x7f0000000680)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x6e, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r7 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000a40)={0x1b, 0x0, 0x0, 0x7, 0x0, r0, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x5, 0x3}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x1c, 0x21, &(0x7f0000000440)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x905, 0x0, 0x0, 0x0, 0x1}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@generic={0x80, 0x6, 0x8, 0x3f, 0xda}, @map_val={0x18, 0x1, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x401}, @initr0={0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x2}, @ldst={0x2, 0x3, 0x2, 0x9, 0x3, 0x1, 0x4}, @tail_call={{0x18, 0x2, 0x1, 0x0, r2}}, @jmp={0x5, 0x1, 0xa, 0x9, 0x3, 0xffffffffffffffe0}, @generic={0x9, 0x1, 0x5, 0x4, 0x8001}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @ldst={0x2, 0x1, 0x1, 0xb, 0xb, 0x20, 0x8}, @map_idx={0x18, 0x6, 0x5, 0x0, 0x10}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000080)='GPL\x00', 0x800, 0xd4, &(0x7f00000002c0)=""/212, 0x41100, 0x6, '\x00', 0x0, 0x8, r5, 0x8, &(0x7f0000000100)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x2, 0x475f, 0x401}, 0x10, r6, 0xffffffffffffffff, 0x4, &(0x7f0000000800)=[0xffffffffffffffff, r7], &(0x7f0000000ac0)=[{0x3, 0x2, 0xc, 0x6}, {0x3, 0x4, 0xb, 0xa}, {0x2, 0x2, 0xe, 0x2}, {0x3, 0x1, 0x5, 0x8}], 0x10, 0x20}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) getpid() perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f00000005c0)={0x1, 0x80, 0x0, 0x0, 0xbe, 0x0, 0x0, 0x0, 0x28000, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x400, 0xd7, 0x5, 0x0, 0x965, 0x0, 0xfffffffffffffffb}, 0x0, 0xd, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f00000006c0)) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0xe5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) ioctl$SIOCSIFHWADDR(r8, 0x8914, &(0x7f0000000040)={'sit0\x00', @local}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f00000008c0)='\x00'}, 0x30) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000e00)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8890}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000840)={0x0, 0x80, 0x2, 0x1, 0x9, 0x0, 0x0, 0x7, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x3ff, 0x0, @perf_config_ext={0x67}, 0x200, 0x612, 0x0, 0x0, 0xa0, 0x0, 0xd171, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x3, r4, 0x1) ioctl$SIOCSIFHWADDR(r9, 0x8914, &(0x7f0000000040)={'sit0\x00', @random="4f33e363a4b1"}) 14:38:04 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022004705d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:04 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00eb20022003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:04 executing program 2: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x10) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x1a, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f97e24fc6004030e480a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x3, 0x5, 0x5, 0x0, 0x0, 0x8, 0x4000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x101, 0x1, @perf_config_ext={0x7fff, 0x8}, 0x4000, 0x3, 0x0, 0x3, 0x80000001, 0x80, 0x40, 0x0, 0x0, 0x0, 0x81}, 0xffffffffffffffff, 0x8, r0, 0x0) [ 1242.470558][T31638] device sit0 left promiscuous mode 14:38:04 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00eb40022003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:04 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00eb60022003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:04 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00eb80022003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:04 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003502d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:04 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00eba0022003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) [ 1242.650094][T31644] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 1242.660582][T31645] device sit0 entered promiscuous mode [ 1242.669864][T31644] platform regulatory.0: Falling back to sysfs fallback for: regulatory.db 14:38:04 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00ebc0022003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:04 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00ebe0022003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:04 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00ec00022003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:04 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003504d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:04 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r5 = openat$cgroup_ro(r1, &(0x7f00000000c0)='blkio.bfq.sectors\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={r3, 0xe0, &(0x7f0000000940)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000200)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x1, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000640)=[0x0], 0x0, 0x6a, &(0x7f0000000680)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x6e, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r7 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000a40)={0x1b, 0x0, 0x0, 0x7, 0x0, r0, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x5, 0x3}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x1c, 0x21, &(0x7f0000000440)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x905, 0x0, 0x0, 0x0, 0x1}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@generic={0x80, 0x6, 0x8, 0x3f, 0xda}, @map_val={0x18, 0x1, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x401}, @initr0={0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x2}, @ldst={0x2, 0x3, 0x2, 0x9, 0x3, 0x1, 0x4}, @tail_call={{0x18, 0x2, 0x1, 0x0, r2}}, @jmp={0x5, 0x1, 0xa, 0x9, 0x3, 0xffffffffffffffe0}, @generic={0x9, 0x1, 0x5, 0x4, 0x8001}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @ldst={0x2, 0x1, 0x1, 0xb, 0xb, 0x20, 0x8}, @map_idx={0x18, 0x6, 0x5, 0x0, 0x10}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000080)='GPL\x00', 0x800, 0xd4, &(0x7f00000002c0)=""/212, 0x41100, 0x6, '\x00', 0x0, 0x8, r5, 0x8, &(0x7f0000000100)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x2, 0x475f, 0x401}, 0x10, r6, 0xffffffffffffffff, 0x4, &(0x7f0000000800)=[0xffffffffffffffff, r7], &(0x7f0000000ac0)=[{0x3, 0x2, 0xc, 0x6}, {0x3, 0x4, 0xb, 0xa}, {0x2, 0x2, 0xe, 0x2}, {0x3, 0x1, 0x5, 0x8}], 0x10, 0x20}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) getpid() perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f00000005c0)={0x1, 0x80, 0x0, 0x0, 0xbe, 0x0, 0x0, 0x0, 0x28000, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x400, 0xd7, 0x5, 0x0, 0x965, 0x0, 0xfffffffffffffffb}, 0x0, 0xd, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f00000006c0)) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0xe5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) ioctl$SIOCSIFHWADDR(r8, 0x8914, &(0x7f0000000040)={'sit0\x00', @local}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f00000008c0)='\x00'}, 0x30) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000e00)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8890}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000840)={0x0, 0x80, 0x2, 0x1, 0x9, 0x0, 0x0, 0x7, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x3ff, 0x0, @perf_config_ext={0x67}, 0x200, 0x612, 0x0, 0x0, 0xa0, 0x0, 0xd171, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x3, r4, 0x1) ioctl$SIOCSIFHWADDR(r9, 0x8914, &(0x7f0000000040)={'sit0\x00', @random="4f33e363a4b1"}) 14:38:04 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00ec20022003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) [ 1242.905333][T31663] device sit0 left promiscuous mode 14:38:04 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00ec40022003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:04 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003506d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) [ 1243.005212][T31669] device sit0 entered promiscuous mode 14:38:04 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00ec60022003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:05 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003518d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:05 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00ec80022003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:05 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r5 = openat$cgroup_ro(r1, &(0x7f00000000c0)='blkio.bfq.sectors\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={r3, 0xe0, &(0x7f0000000940)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000200)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x1, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000640)=[0x0], 0x0, 0x6a, &(0x7f0000000680)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x6e, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r7 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000a40)={0x1b, 0x0, 0x0, 0x7, 0x0, r0, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x5, 0x3}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x1c, 0x21, &(0x7f0000000440)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x905, 0x0, 0x0, 0x0, 0x1}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@generic={0x80, 0x6, 0x8, 0x3f, 0xda}, @map_val={0x18, 0x1, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x401}, @initr0={0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x2}, @ldst={0x2, 0x3, 0x2, 0x9, 0x3, 0x1, 0x4}, @tail_call={{0x18, 0x2, 0x1, 0x0, r2}}, @jmp={0x5, 0x1, 0xa, 0x9, 0x3, 0xffffffffffffffe0}, @generic={0x9, 0x1, 0x5, 0x4, 0x8001}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @ldst={0x2, 0x1, 0x1, 0xb, 0xb, 0x20, 0x8}, @map_idx={0x18, 0x6, 0x5, 0x0, 0x10}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000080)='GPL\x00', 0x800, 0xd4, &(0x7f00000002c0)=""/212, 0x41100, 0x6, '\x00', 0x0, 0x8, r5, 0x8, &(0x7f0000000100)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x2, 0x475f, 0x401}, 0x10, r6, 0xffffffffffffffff, 0x4, &(0x7f0000000800)=[0xffffffffffffffff, r7], &(0x7f0000000ac0)=[{0x3, 0x2, 0xc, 0x6}, {0x3, 0x4, 0xb, 0xa}, {0x2, 0x2, 0xe, 0x2}, {0x3, 0x1, 0x5, 0x8}], 0x10, 0x20}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) getpid() perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f00000005c0)={0x1, 0x80, 0x0, 0x0, 0xbe, 0x0, 0x0, 0x0, 0x28000, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x400, 0xd7, 0x5, 0x0, 0x965, 0x0, 0xfffffffffffffffb}, 0x0, 0xd, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f00000006c0)) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0xe5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) ioctl$SIOCSIFHWADDR(r8, 0x8914, &(0x7f0000000040)={'sit0\x00', @local}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f00000008c0)='\x00'}, 0x30) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000e00)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8890}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000840)={0x0, 0x80, 0x2, 0x1, 0x9, 0x0, 0x0, 0x7, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x3ff, 0x0, @perf_config_ext={0x67}, 0x200, 0x612, 0x0, 0x0, 0xa0, 0x0, 0xd171, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x3, r4, 0x1) ioctl$SIOCSIFHWADDR(r9, 0x8914, &(0x7f0000000040)={'sit0\x00', @random="4f33e363a4b1"}) 14:38:05 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00eca0022003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) [ 1243.269292][T31679] device sit0 left promiscuous mode [ 1243.277290][T31681] __nla_validate_parse: 7 callbacks suppressed [ 1243.277308][T31681] netlink: 134056 bytes leftover after parsing attributes in process `syz-executor.4'. 14:38:05 executing program 2: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x10) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x1a, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f97e24fc6004030e4c0a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x3, 0x5, 0x5, 0x0, 0x0, 0x8, 0x4000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x101, 0x1, @perf_config_ext={0x7fff, 0x8}, 0x4000, 0x3, 0x0, 0x3, 0x80000001, 0x80, 0x40, 0x0, 0x0, 0x0, 0x81}, 0xffffffffffffffff, 0x8, r0, 0x0) 14:38:05 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00ecc0022003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:05 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00ece0022003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) [ 1243.478202][T31687] netlink: 134056 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1243.540050][T31683] device sit0 entered promiscuous mode 14:38:05 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00ed00022003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:05 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00ed20022003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:05 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003564d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) [ 1243.735798][T31687] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 14:38:05 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r5 = openat$cgroup_ro(r1, &(0x7f00000000c0)='blkio.bfq.sectors\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={r3, 0xe0, &(0x7f0000000940)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000200)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x1, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000640)=[0x0], 0x0, 0x6a, &(0x7f0000000680)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x6e, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r7 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000a40)={0x1b, 0x0, 0x0, 0x7, 0x0, r0, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x5, 0x3}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x1c, 0x21, &(0x7f0000000440)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x905, 0x0, 0x0, 0x0, 0x1}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@generic={0x80, 0x6, 0x8, 0x3f, 0xda}, @map_val={0x18, 0x1, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x401}, @initr0={0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x2}, @ldst={0x2, 0x3, 0x2, 0x9, 0x3, 0x1, 0x4}, @tail_call={{0x18, 0x2, 0x1, 0x0, r2}}, @jmp={0x5, 0x1, 0xa, 0x9, 0x3, 0xffffffffffffffe0}, @generic={0x9, 0x1, 0x5, 0x4, 0x8001}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @ldst={0x2, 0x1, 0x1, 0xb, 0xb, 0x20, 0x8}, @map_idx={0x18, 0x6, 0x5, 0x0, 0x10}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000080)='GPL\x00', 0x800, 0xd4, &(0x7f00000002c0)=""/212, 0x41100, 0x6, '\x00', 0x0, 0x8, r5, 0x8, &(0x7f0000000100)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x2, 0x475f, 0x401}, 0x10, r6, 0xffffffffffffffff, 0x4, &(0x7f0000000800)=[0xffffffffffffffff, r7], &(0x7f0000000ac0)=[{0x3, 0x2, 0xc, 0x6}, {0x3, 0x4, 0xb, 0xa}, {0x2, 0x2, 0xe, 0x2}, {0x3, 0x1, 0x5, 0x8}], 0x10, 0x20}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) getpid() perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f00000005c0)={0x1, 0x80, 0x0, 0x0, 0xbe, 0x0, 0x0, 0x0, 0x28000, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x400, 0xd7, 0x5, 0x0, 0x965, 0x0, 0xfffffffffffffffb}, 0x0, 0xd, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f00000006c0)) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0xe5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) ioctl$SIOCSIFHWADDR(r8, 0x8914, &(0x7f0000000040)={'sit0\x00', @local}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f00000008c0)='\x00'}, 0x30) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000e00)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8890}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000840)={0x0, 0x80, 0x2, 0x1, 0x9, 0x0, 0x0, 0x7, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x3ff, 0x0, @perf_config_ext={0x67}, 0x200, 0x612, 0x0, 0x0, 0xa0, 0x0, 0xd171, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x3, r4, 0x1) ioctl$SIOCSIFHWADDR(r9, 0x8914, &(0x7f0000000040)={'sit0\x00', @random="4f33e363a4b1"}) 14:38:05 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00ed40022003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) [ 1243.790194][T31687] platform regulatory.0: Falling back to sysfs fallback for: regulatory.db 14:38:05 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00ed60022003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) [ 1243.841624][T31701] netlink: 134056 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1243.872936][T31704] device sit0 left promiscuous mode 14:38:05 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505025a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:05 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00ed80022003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) [ 1243.950968][T31693] chnl_net:caif_netlink_parms(): no params data found [ 1244.023575][T31707] device sit0 entered promiscuous mode 14:38:05 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00eda0022003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:05 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00edc0022003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) [ 1244.065234][T31713] netlink: 134056 bytes leftover after parsing attributes in process `syz-executor.4'. 14:38:06 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00ede0022003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:06 executing program 2: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x10) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x1a, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f97e24fc6004030e600a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x3, 0x5, 0x5, 0x0, 0x0, 0x8, 0x4000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x101, 0x1, @perf_config_ext={0x7fff, 0x8}, 0x4000, 0x3, 0x0, 0x3, 0x80000001, 0x80, 0x40, 0x0, 0x0, 0x0, 0x81}, 0xffffffffffffffff, 0x8, r0, 0x0) 14:38:06 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00ee00022003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:06 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d202806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:06 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r5 = openat$cgroup_ro(r1, &(0x7f00000000c0)='blkio.bfq.sectors\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={r3, 0xe0, &(0x7f0000000940)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000200)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x1, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000640)=[0x0], 0x0, 0x6a, &(0x7f0000000680)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x6e, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r7 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000a40)={0x1b, 0x0, 0x0, 0x7, 0x0, r0, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x5, 0x3}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x1c, 0x21, &(0x7f0000000440)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x905, 0x0, 0x0, 0x0, 0x1}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@generic={0x80, 0x6, 0x8, 0x3f, 0xda}, @map_val={0x18, 0x1, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x401}, @initr0={0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x2}, @ldst={0x2, 0x3, 0x2, 0x9, 0x3, 0x1, 0x4}, @tail_call={{0x18, 0x2, 0x1, 0x0, r2}}, @jmp={0x5, 0x1, 0xa, 0x9, 0x3, 0xffffffffffffffe0}, @generic={0x9, 0x1, 0x5, 0x4, 0x8001}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @ldst={0x2, 0x1, 0x1, 0xb, 0xb, 0x20, 0x8}, @map_idx={0x18, 0x6, 0x5, 0x0, 0x10}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000080)='GPL\x00', 0x800, 0xd4, &(0x7f00000002c0)=""/212, 0x41100, 0x6, '\x00', 0x0, 0x8, r5, 0x8, &(0x7f0000000100)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x2, 0x475f, 0x401}, 0x10, r6, 0xffffffffffffffff, 0x4, &(0x7f0000000800)=[0xffffffffffffffff, r7], &(0x7f0000000ac0)=[{0x3, 0x2, 0xc, 0x6}, {0x3, 0x4, 0xb, 0xa}, {0x2, 0x2, 0xe, 0x2}, {0x3, 0x1, 0x5, 0x8}], 0x10, 0x20}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) getpid() perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f00000005c0)={0x1, 0x80, 0x0, 0x0, 0xbe, 0x0, 0x0, 0x0, 0x28000, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x400, 0xd7, 0x5, 0x0, 0x965, 0x0, 0xfffffffffffffffb}, 0x0, 0xd, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f00000006c0)) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0xe5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) ioctl$SIOCSIFHWADDR(r8, 0x8914, &(0x7f0000000040)={'sit0\x00', @local}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f00000008c0)='\x00'}, 0x30) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000e00)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8890}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000840)={0x0, 0x80, 0x2, 0x1, 0x9, 0x0, 0x0, 0x7, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x3ff, 0x0, @perf_config_ext={0x67}, 0x200, 0x612, 0x0, 0x0, 0xa0, 0x0, 0xd171, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x3, r4, 0x1) ioctl$SIOCSIFHWADDR(r9, 0x8914, &(0x7f0000000040)={'sit0\x00', @random="4f33e363a4b1"}) 14:38:06 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00ee20022003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) [ 1244.348679][T31724] netlink: 134056 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1244.358878][T31721] netlink: 134056 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1244.372652][T31729] device sit0 left promiscuous mode 14:38:06 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00ee40022003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:06 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00ee60022003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:06 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00ee80022003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:06 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00eea0022003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:06 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a026f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) [ 1244.533123][T31721] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 1244.559711][T31721] platform regulatory.0: Falling back to sysfs fallback for: regulatory.db [ 1244.571359][T31732] device sit0 entered promiscuous mode 14:38:06 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00eec0022003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:06 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00eee0022003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:06 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00ef00022003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:06 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00ef20022003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) [ 1244.673641][T31746] netlink: 134056 bytes leftover after parsing attributes in process `syz-executor.4'. 14:38:06 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00ef40022003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:06 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r5 = openat$cgroup_ro(r1, &(0x7f00000000c0)='blkio.bfq.sectors\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={r3, 0xe0, &(0x7f0000000940)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000200)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x1, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000640)=[0x0], 0x0, 0x6a, &(0x7f0000000680)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x6e, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r7 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000a40)={0x1b, 0x0, 0x0, 0x7, 0x0, r0, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x5, 0x3}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x1c, 0x21, &(0x7f0000000440)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x905, 0x0, 0x0, 0x0, 0x1}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@generic={0x80, 0x6, 0x8, 0x3f, 0xda}, @map_val={0x18, 0x1, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x401}, @initr0={0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x2}, @ldst={0x2, 0x3, 0x2, 0x9, 0x3, 0x1, 0x4}, @tail_call={{0x18, 0x2, 0x1, 0x0, r2}}, @jmp={0x5, 0x1, 0xa, 0x9, 0x3, 0xffffffffffffffe0}, @generic={0x9, 0x1, 0x5, 0x4, 0x8001}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @ldst={0x2, 0x1, 0x1, 0xb, 0xb, 0x20, 0x8}, @map_idx={0x18, 0x6, 0x5, 0x0, 0x10}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000080)='GPL\x00', 0x800, 0xd4, &(0x7f00000002c0)=""/212, 0x41100, 0x6, '\x00', 0x0, 0x8, r5, 0x8, &(0x7f0000000100)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x2, 0x475f, 0x401}, 0x10, r6, 0xffffffffffffffff, 0x4, &(0x7f0000000800)=[0xffffffffffffffff, r7], &(0x7f0000000ac0)=[{0x3, 0x2, 0xc, 0x6}, {0x3, 0x4, 0xb, 0xa}, {0x2, 0x2, 0xe, 0x2}, {0x3, 0x1, 0x5, 0x8}], 0x10, 0x20}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) getpid() perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f00000005c0)={0x1, 0x80, 0x0, 0x0, 0xbe, 0x0, 0x0, 0x0, 0x28000, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x400, 0xd7, 0x5, 0x0, 0x965, 0x0, 0xfffffffffffffffb}, 0x0, 0xd, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f00000006c0)) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0xe5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) ioctl$SIOCSIFHWADDR(r8, 0x8914, &(0x7f0000000040)={'sit0\x00', @local}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f00000008c0)='\x00'}, 0x30) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000e00)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8890}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000840)={0x0, 0x80, 0x2, 0x1, 0x9, 0x0, 0x0, 0x7, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x3ff, 0x0, @perf_config_ext={0x67}, 0x200, 0x612, 0x0, 0x0, 0xa0, 0x0, 0xd171, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x3, r4, 0x1) ioctl$SIOCSIFHWADDR(r9, 0x8914, &(0x7f0000000040)={'sit0\x00', @random="4f33e363a4b1"}) 14:38:06 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a800a8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:06 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00ef60022003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) [ 1244.786738][T31693] bridge0: port 1(bridge_slave_0) entered blocking state [ 1244.803198][T31693] bridge0: port 1(bridge_slave_0) entered disabled state 14:38:06 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00ef80022003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) [ 1244.845685][T31757] netlink: 134056 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1244.848354][T31693] device bridge_slave_0 entered promiscuous mode [ 1244.879305][T31758] device sit0 left promiscuous mode 14:38:06 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a80258c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) [ 1244.932660][T31693] bridge0: port 2(bridge_slave_1) entered blocking state [ 1244.950681][T31693] bridge0: port 2(bridge_slave_1) entered disabled state 14:38:06 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00efa0022003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) [ 1244.985139][T31693] device bridge_slave_1 entered promiscuous mode [ 1245.005882][T31765] netlink: 134056 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1245.014704][T31763] device sit0 entered promiscuous mode 14:38:06 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00efc0022003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:07 executing program 2: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x10) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x1a, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f97e24fc6004030e680a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x3, 0x5, 0x5, 0x0, 0x0, 0x8, 0x4000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x101, 0x1, @perf_config_ext={0x7fff, 0x8}, 0x4000, 0x3, 0x0, 0x3, 0x80000001, 0x80, 0x40, 0x0, 0x0, 0x0, 0x81}, 0xffffffffffffffff, 0x8, r0, 0x0) 14:38:07 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00efe0022003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:07 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f026394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:07 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r5 = openat$cgroup_ro(r1, &(0x7f00000000c0)='blkio.bfq.sectors\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={r3, 0xe0, &(0x7f0000000940)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000200)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x1, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000640)=[0x0], 0x0, 0x6a, &(0x7f0000000680)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x6e, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r7 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000a40)={0x1b, 0x0, 0x0, 0x7, 0x0, r0, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x5, 0x3}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x1c, 0x21, &(0x7f0000000440)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x905, 0x0, 0x0, 0x0, 0x1}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@generic={0x80, 0x6, 0x8, 0x3f, 0xda}, @map_val={0x18, 0x1, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x401}, @initr0={0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x2}, @ldst={0x2, 0x3, 0x2, 0x9, 0x3, 0x1, 0x4}, @tail_call={{0x18, 0x2, 0x1, 0x0, r2}}, @jmp={0x5, 0x1, 0xa, 0x9, 0x3, 0xffffffffffffffe0}, @generic={0x9, 0x1, 0x5, 0x4, 0x8001}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @ldst={0x2, 0x1, 0x1, 0xb, 0xb, 0x20, 0x8}, @map_idx={0x18, 0x6, 0x5, 0x0, 0x10}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000080)='GPL\x00', 0x800, 0xd4, &(0x7f00000002c0)=""/212, 0x41100, 0x6, '\x00', 0x0, 0x8, r5, 0x8, &(0x7f0000000100)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x2, 0x475f, 0x401}, 0x10, r6, 0xffffffffffffffff, 0x4, &(0x7f0000000800)=[0xffffffffffffffff, r7], &(0x7f0000000ac0)=[{0x3, 0x2, 0xc, 0x6}, {0x3, 0x4, 0xb, 0xa}, {0x2, 0x2, 0xe, 0x2}, {0x3, 0x1, 0x5, 0x8}], 0x10, 0x20}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) getpid() perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f00000005c0)={0x1, 0x80, 0x0, 0x0, 0xbe, 0x0, 0x0, 0x0, 0x28000, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x400, 0xd7, 0x5, 0x0, 0x965, 0x0, 0xfffffffffffffffb}, 0x0, 0xd, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f00000006c0)) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0xe5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) ioctl$SIOCSIFHWADDR(r8, 0x8914, &(0x7f0000000040)={'sit0\x00', @local}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f00000008c0)='\x00'}, 0x30) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000e00)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8890}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000840)={0x0, 0x80, 0x2, 0x1, 0x9, 0x0, 0x0, 0x7, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x3ff, 0x0, @perf_config_ext={0x67}, 0x200, 0x612, 0x0, 0x0, 0xa0, 0x0, 0xd171, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x3, r4, 0x1) ioctl$SIOCSIFHWADDR(r9, 0x8914, &(0x7f0000000040)={'sit0\x00', @random="4f33e363a4b1"}) 14:38:07 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020122003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:07 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c0a94f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) [ 1245.222372][T31774] netlink: 134056 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1245.258679][T31693] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1245.284160][T31777] device sit0 left promiscuous mode 14:38:07 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e040122003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:07 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e060122003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:07 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e080122003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:07 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c2394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) [ 1245.454165][T31693] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 14:38:07 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e0a0122003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) [ 1245.497638][T31782] device sit0 entered promiscuous mode [ 1245.500714][T31774] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 1245.524278][T31774] platform regulatory.0: Falling back to sysfs fallback for: regulatory.db 14:38:07 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e0c0122003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:07 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r5 = openat$cgroup_ro(r1, &(0x7f00000000c0)='blkio.bfq.sectors\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={r3, 0xe0, &(0x7f0000000940)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000200)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x1, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000640)=[0x0], 0x0, 0x6a, &(0x7f0000000680)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x6e, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r7 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000a40)={0x1b, 0x0, 0x0, 0x7, 0x0, r0, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x5, 0x3}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x1c, 0x21, &(0x7f0000000440)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x905, 0x0, 0x0, 0x0, 0x1}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@generic={0x80, 0x6, 0x8, 0x3f, 0xda}, @map_val={0x18, 0x1, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x401}, @initr0={0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x2}, @ldst={0x2, 0x3, 0x2, 0x9, 0x3, 0x1, 0x4}, @tail_call={{0x18, 0x2, 0x1, 0x0, r2}}, @jmp={0x5, 0x1, 0xa, 0x9, 0x3, 0xffffffffffffffe0}, @generic={0x9, 0x1, 0x5, 0x4, 0x8001}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @ldst={0x2, 0x1, 0x1, 0xb, 0xb, 0x20, 0x8}, @map_idx={0x18, 0x6, 0x5, 0x0, 0x10}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000080)='GPL\x00', 0x800, 0xd4, &(0x7f00000002c0)=""/212, 0x41100, 0x6, '\x00', 0x0, 0x8, r5, 0x8, &(0x7f0000000100)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x2, 0x475f, 0x401}, 0x10, r6, 0xffffffffffffffff, 0x4, &(0x7f0000000800)=[0xffffffffffffffff, r7], &(0x7f0000000ac0)=[{0x3, 0x2, 0xc, 0x6}, {0x3, 0x4, 0xb, 0xa}, {0x2, 0x2, 0xe, 0x2}, {0x3, 0x1, 0x5, 0x8}], 0x10, 0x20}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) getpid() perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f00000005c0)={0x1, 0x80, 0x0, 0x0, 0xbe, 0x0, 0x0, 0x0, 0x28000, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x400, 0xd7, 0x5, 0x0, 0x965, 0x0, 0xfffffffffffffffb}, 0x0, 0xd, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f00000006c0)) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0xe5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) ioctl$SIOCSIFHWADDR(r8, 0x8914, &(0x7f0000000040)={'sit0\x00', @local}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f00000008c0)='\x00'}, 0x30) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000e00)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8890}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000840)={0x0, 0x80, 0x2, 0x1, 0x9, 0x0, 0x0, 0x7, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x3ff, 0x0, @perf_config_ext={0x67}, 0x200, 0x612, 0x0, 0x0, 0xa0, 0x0, 0xd171, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x3, r4, 0x1) ioctl$SIOCSIFHWADDR(r9, 0x8914, &(0x7f0000000040)={'sit0\x00', @random="4f33e363a4b1"}) 14:38:07 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e0e0122003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:07 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c2594f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:07 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e100122003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:07 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e120122003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) [ 1245.729759][T29377] Bluetooth: hci6: command 0x0409 tx timeout [ 1245.747424][T31693] team0: Port device team_slave_0 added [ 1245.763900][T31797] device sit0 left promiscuous mode 14:38:07 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e140122003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:07 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e160122003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:07 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e180122003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:07 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e1a0122003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:07 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e1c0122003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:07 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e1e0122003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:07 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c2a94f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) [ 1245.985284][T31693] team0: Port device team_slave_1 added [ 1246.021072][T31804] device sit0 entered promiscuous mode 14:38:07 executing program 2: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x10) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x1a, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f97e24fc6004030e6c0a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x3, 0x5, 0x5, 0x0, 0x0, 0x8, 0x4000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x101, 0x1, @perf_config_ext={0x7fff, 0x8}, 0x4000, 0x3, 0x0, 0x3, 0x80000001, 0x80, 0x40, 0x0, 0x0, 0x0, 0x81}, 0xffffffffffffffff, 0x8, r0, 0x0) 14:38:07 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e200122003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:08 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e220122003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:08 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e240122003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:08 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e260122003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:08 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c2b94f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:08 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r5 = openat$cgroup_ro(r1, &(0x7f00000000c0)='blkio.bfq.sectors\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={r3, 0xe0, &(0x7f0000000940)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000200)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x1, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000640)=[0x0], 0x0, 0x6a, &(0x7f0000000680)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x6e, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r7 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000a40)={0x1b, 0x0, 0x0, 0x7, 0x0, r0, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x5, 0x3}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x1c, 0x21, &(0x7f0000000440)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x905, 0x0, 0x0, 0x0, 0x1}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@generic={0x80, 0x6, 0x8, 0x3f, 0xda}, @map_val={0x18, 0x1, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x401}, @initr0={0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x2}, @ldst={0x2, 0x3, 0x2, 0x9, 0x3, 0x1, 0x4}, @tail_call={{0x18, 0x2, 0x1, 0x0, r2}}, @jmp={0x5, 0x1, 0xa, 0x9, 0x3, 0xffffffffffffffe0}, @generic={0x9, 0x1, 0x5, 0x4, 0x8001}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @ldst={0x2, 0x1, 0x1, 0xb, 0xb, 0x20, 0x8}, @map_idx={0x18, 0x6, 0x5, 0x0, 0x10}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000080)='GPL\x00', 0x800, 0xd4, &(0x7f00000002c0)=""/212, 0x41100, 0x6, '\x00', 0x0, 0x8, r5, 0x8, &(0x7f0000000100)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x2, 0x475f, 0x401}, 0x10, r6, 0xffffffffffffffff, 0x4, &(0x7f0000000800)=[0xffffffffffffffff, r7], &(0x7f0000000ac0)=[{0x3, 0x2, 0xc, 0x6}, {0x3, 0x4, 0xb, 0xa}, {0x2, 0x2, 0xe, 0x2}, {0x3, 0x1, 0x5, 0x8}], 0x10, 0x20}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) getpid() perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f00000005c0)={0x1, 0x80, 0x0, 0x0, 0xbe, 0x0, 0x0, 0x0, 0x28000, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x400, 0xd7, 0x5, 0x0, 0x965, 0x0, 0xfffffffffffffffb}, 0x0, 0xd, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f00000006c0)) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0xe5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) ioctl$SIOCSIFHWADDR(r8, 0x8914, &(0x7f0000000040)={'sit0\x00', @local}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f00000008c0)='\x00'}, 0x30) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000e00)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8890}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000840)={0x0, 0x80, 0x2, 0x1, 0x9, 0x0, 0x0, 0x7, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x3ff, 0x0, @perf_config_ext={0x67}, 0x200, 0x612, 0x0, 0x0, 0xa0, 0x0, 0xd171, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x3, r4, 0x1) ioctl$SIOCSIFHWADDR(r9, 0x8914, &(0x7f0000000040)={'sit0\x00', @random="4f33e363a4b1"}) [ 1246.317455][T31826] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 1246.331172][T31693] batman_adv: batadv0: Adding interface: batadv_slave_0 14:38:08 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e280122003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) [ 1246.345419][T31693] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1246.369745][T31826] platform regulatory.0: Falling back to sysfs fallback for: regulatory.db [ 1246.386234][T31693] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1246.406375][T31693] batman_adv: batadv0: Adding interface: batadv_slave_1 14:38:08 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e2a0122003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) [ 1246.417298][T31693] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1246.445512][T31693] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active 14:38:08 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c2d94f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) [ 1246.465652][T31835] device sit0 left promiscuous mode 14:38:08 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e2c0122003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:08 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e2e0122003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:08 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e300122003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:08 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e320122003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:08 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e340122003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:08 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e360122003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) [ 1246.657011][T31838] device sit0 entered promiscuous mode 14:38:08 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e380122003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:08 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e3a0122003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:08 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e3c0122003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:08 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e3e0122003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:08 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c2e94f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:08 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e400122003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:08 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r5 = openat$cgroup_ro(r1, &(0x7f00000000c0)='blkio.bfq.sectors\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={r3, 0xe0, &(0x7f0000000940)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000200)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x1, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000640)=[0x0], 0x0, 0x6a, &(0x7f0000000680)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x6e, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r7 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000a40)={0x1b, 0x0, 0x0, 0x7, 0x0, r0, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x5, 0x3}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x1c, 0x21, &(0x7f0000000440)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x905, 0x0, 0x0, 0x0, 0x1}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@generic={0x80, 0x6, 0x8, 0x3f, 0xda}, @map_val={0x18, 0x1, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x401}, @initr0={0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x2}, @ldst={0x2, 0x3, 0x2, 0x9, 0x3, 0x1, 0x4}, @tail_call={{0x18, 0x2, 0x1, 0x0, r2}}, @jmp={0x5, 0x1, 0xa, 0x9, 0x3, 0xffffffffffffffe0}, @generic={0x9, 0x1, 0x5, 0x4, 0x8001}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @ldst={0x2, 0x1, 0x1, 0xb, 0xb, 0x20, 0x8}, @map_idx={0x18, 0x6, 0x5, 0x0, 0x10}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000080)='GPL\x00', 0x800, 0xd4, &(0x7f00000002c0)=""/212, 0x41100, 0x6, '\x00', 0x0, 0x8, r5, 0x8, &(0x7f0000000100)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x2, 0x475f, 0x401}, 0x10, r6, 0xffffffffffffffff, 0x4, &(0x7f0000000800)=[0xffffffffffffffff, r7], &(0x7f0000000ac0)=[{0x3, 0x2, 0xc, 0x6}, {0x3, 0x4, 0xb, 0xa}, {0x2, 0x2, 0xe, 0x2}, {0x3, 0x1, 0x5, 0x8}], 0x10, 0x20}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) getpid() perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f00000005c0)={0x1, 0x80, 0x0, 0x0, 0xbe, 0x0, 0x0, 0x0, 0x28000, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x400, 0xd7, 0x5, 0x0, 0x965, 0x0, 0xfffffffffffffffb}, 0x0, 0xd, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f00000006c0)) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0xe5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) ioctl$SIOCSIFHWADDR(r8, 0x8914, &(0x7f0000000040)={'sit0\x00', @local}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f00000008c0)='\x00'}, 0x30) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000e00)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8890}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000840)={0x0, 0x80, 0x2, 0x1, 0x9, 0x0, 0x0, 0x7, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x3ff, 0x0, @perf_config_ext={0x67}, 0x200, 0x612, 0x0, 0x0, 0xa0, 0x0, 0xd171, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x3, r4, 0x1) ioctl$SIOCSIFHWADDR(r9, 0x8914, &(0x7f0000000040)={'sit0\x00', @random="4f33e363a4b1"}) 14:38:08 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c3094f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) [ 1246.951237][T31693] device hsr_slave_0 entered promiscuous mode [ 1246.987333][T31693] device hsr_slave_1 entered promiscuous mode 14:38:08 executing program 2: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x10) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x1a, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f97e24fc6004030e740a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x3, 0x5, 0x5, 0x0, 0x0, 0x8, 0x4000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x101, 0x1, @perf_config_ext={0x7fff, 0x8}, 0x4000, 0x3, 0x0, 0x3, 0x80000001, 0x80, 0x40, 0x0, 0x0, 0x0, 0x81}, 0xffffffffffffffff, 0x8, r0, 0x0) 14:38:08 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e420122003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) [ 1246.995691][T31693] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 1247.016679][T31693] Cannot create hsr debugfs directory 14:38:08 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e440122003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) [ 1247.052017][T31870] device sit0 left promiscuous mode 14:38:08 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e460122003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:09 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e480122003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:09 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c4c94f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) [ 1247.180140][T31874] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 1247.194229][T31875] device sit0 entered promiscuous mode [ 1247.208523][T31874] platform regulatory.0: Falling back to sysfs fallback for: regulatory.db 14:38:09 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e4a0122003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:09 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e4c0122003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:09 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e4e0122003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:09 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e500122003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:09 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e520122003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:09 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c5894f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:09 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r5 = openat$cgroup_ro(r1, &(0x7f00000000c0)='blkio.bfq.sectors\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={r3, 0xe0, &(0x7f0000000940)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000200)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x1, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000640)=[0x0], 0x0, 0x6a, &(0x7f0000000680)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x6e, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r7 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000a40)={0x1b, 0x0, 0x0, 0x7, 0x0, r0, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x5, 0x3}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x1c, 0x21, &(0x7f0000000440)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x905, 0x0, 0x0, 0x0, 0x1}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@generic={0x80, 0x6, 0x8, 0x3f, 0xda}, @map_val={0x18, 0x1, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x401}, @initr0={0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x2}, @ldst={0x2, 0x3, 0x2, 0x9, 0x3, 0x1, 0x4}, @tail_call={{0x18, 0x2, 0x1, 0x0, r2}}, @jmp={0x5, 0x1, 0xa, 0x9, 0x3, 0xffffffffffffffe0}, @generic={0x9, 0x1, 0x5, 0x4, 0x8001}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @ldst={0x2, 0x1, 0x1, 0xb, 0xb, 0x20, 0x8}, @map_idx={0x18, 0x6, 0x5, 0x0, 0x10}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000080)='GPL\x00', 0x800, 0xd4, &(0x7f00000002c0)=""/212, 0x41100, 0x6, '\x00', 0x0, 0x8, r5, 0x8, &(0x7f0000000100)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x2, 0x475f, 0x401}, 0x10, r6, 0xffffffffffffffff, 0x4, &(0x7f0000000800)=[0xffffffffffffffff, r7], &(0x7f0000000ac0)=[{0x3, 0x2, 0xc, 0x6}, {0x3, 0x4, 0xb, 0xa}, {0x2, 0x2, 0xe, 0x2}, {0x3, 0x1, 0x5, 0x8}], 0x10, 0x20}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) getpid() perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f00000005c0)={0x1, 0x80, 0x0, 0x0, 0xbe, 0x0, 0x0, 0x0, 0x28000, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x400, 0xd7, 0x5, 0x0, 0x965, 0x0, 0xfffffffffffffffb}, 0x0, 0xd, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f00000006c0)) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0xe5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) ioctl$SIOCSIFHWADDR(r8, 0x8914, &(0x7f0000000040)={'sit0\x00', @local}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f00000008c0)='\x00'}, 0x30) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000e00)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8890}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000840)={0x0, 0x80, 0x2, 0x1, 0x9, 0x0, 0x0, 0x7, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x3ff, 0x0, @perf_config_ext={0x67}, 0x200, 0x612, 0x0, 0x0, 0xa0, 0x0, 0xd171, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x3, r4, 0x1) ioctl$SIOCSIFHWADDR(r9, 0x8914, &(0x7f0000000040)={'sit0\x00', @random="4f33e363a4b1"}) 14:38:09 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e540122003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:09 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6494f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:09 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e560122003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) [ 1247.536529][T31898] device sit0 left promiscuous mode 14:38:09 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e580122003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:09 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e5a0122003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:09 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e5c0122003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:09 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6894f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:09 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e5e0122003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) [ 1247.710256][T31903] device sit0 entered promiscuous mode 14:38:09 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e600122003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:09 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e620122003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) [ 1247.809957][T14377] Bluetooth: hci6: command 0x041b tx timeout 14:38:09 executing program 2: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x10) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x1a, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f97e24fc6004030e7a0a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x3, 0x5, 0x5, 0x0, 0x0, 0x8, 0x4000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x101, 0x1, @perf_config_ext={0x7fff, 0x8}, 0x4000, 0x3, 0x0, 0x3, 0x80000001, 0x80, 0x40, 0x0, 0x0, 0x0, 0x81}, 0xffffffffffffffff, 0x8, r0, 0x0) 14:38:09 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e640122003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:09 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6994f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:09 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r5 = openat$cgroup_ro(r1, &(0x7f00000000c0)='blkio.bfq.sectors\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={r3, 0xe0, &(0x7f0000000940)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000200)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x1, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000640)=[0x0], 0x0, 0x6a, &(0x7f0000000680)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x6e, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r7 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000a40)={0x1b, 0x0, 0x0, 0x7, 0x0, r0, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x5, 0x3}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x1c, 0x21, &(0x7f0000000440)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x905, 0x0, 0x0, 0x0, 0x1}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@generic={0x80, 0x6, 0x8, 0x3f, 0xda}, @map_val={0x18, 0x1, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x401}, @initr0={0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x2}, @ldst={0x2, 0x3, 0x2, 0x9, 0x3, 0x1, 0x4}, @tail_call={{0x18, 0x2, 0x1, 0x0, r2}}, @jmp={0x5, 0x1, 0xa, 0x9, 0x3, 0xffffffffffffffe0}, @generic={0x9, 0x1, 0x5, 0x4, 0x8001}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @ldst={0x2, 0x1, 0x1, 0xb, 0xb, 0x20, 0x8}, @map_idx={0x18, 0x6, 0x5, 0x0, 0x10}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000080)='GPL\x00', 0x800, 0xd4, &(0x7f00000002c0)=""/212, 0x41100, 0x6, '\x00', 0x0, 0x8, r5, 0x8, &(0x7f0000000100)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x2, 0x475f, 0x401}, 0x10, r6, 0xffffffffffffffff, 0x4, &(0x7f0000000800)=[0xffffffffffffffff, r7], &(0x7f0000000ac0)=[{0x3, 0x2, 0xc, 0x6}, {0x3, 0x4, 0xb, 0xa}, {0x2, 0x2, 0xe, 0x2}, {0x3, 0x1, 0x5, 0x8}], 0x10, 0x20}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) getpid() perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f00000005c0)={0x1, 0x80, 0x0, 0x0, 0xbe, 0x0, 0x0, 0x0, 0x28000, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x400, 0xd7, 0x5, 0x0, 0x965, 0x0, 0xfffffffffffffffb}, 0x0, 0xd, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f00000006c0)) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0xe5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) ioctl$SIOCSIFHWADDR(r8, 0x8914, &(0x7f0000000040)={'sit0\x00', @local}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f00000008c0)='\x00'}, 0x30) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000e00)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8890}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000840)={0x0, 0x80, 0x2, 0x1, 0x9, 0x0, 0x0, 0x7, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x3ff, 0x0, @perf_config_ext={0x67}, 0x200, 0x612, 0x0, 0x0, 0xa0, 0x0, 0xd171, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x3, r4, 0x1) ioctl$SIOCSIFHWADDR(r9, 0x8914, &(0x7f0000000040)={'sit0\x00', @random="4f33e363a4b1"}) 14:38:09 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e660122003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:09 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e680122003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) [ 1247.988078][T31922] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 1248.022908][T31928] device sit0 left promiscuous mode [ 1248.027765][T31922] platform regulatory.0: Falling back to sysfs fallback for: regulatory.db 14:38:10 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e6a0122003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:10 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6c94f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) [ 1248.103334][T31931] device sit0 entered promiscuous mode 14:38:10 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e6c0122003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:10 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e6e0122003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:10 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e700122003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:10 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e720122003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:10 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6f94f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:10 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r5 = openat$cgroup_ro(r1, &(0x7f00000000c0)='blkio.bfq.sectors\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={r3, 0xe0, &(0x7f0000000940)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000200)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x1, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000640)=[0x0], 0x0, 0x6a, &(0x7f0000000680)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x6e, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r7 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000a40)={0x1b, 0x0, 0x0, 0x7, 0x0, r0, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x5, 0x3}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x1c, 0x21, &(0x7f0000000440)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x905, 0x0, 0x0, 0x0, 0x1}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@generic={0x80, 0x6, 0x8, 0x3f, 0xda}, @map_val={0x18, 0x1, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x401}, @initr0={0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x2}, @ldst={0x2, 0x3, 0x2, 0x9, 0x3, 0x1, 0x4}, @tail_call={{0x18, 0x2, 0x1, 0x0, r2}}, @jmp={0x5, 0x1, 0xa, 0x9, 0x3, 0xffffffffffffffe0}, @generic={0x9, 0x1, 0x5, 0x4, 0x8001}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @ldst={0x2, 0x1, 0x1, 0xb, 0xb, 0x20, 0x8}, @map_idx={0x18, 0x6, 0x5, 0x0, 0x10}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000080)='GPL\x00', 0x800, 0xd4, &(0x7f00000002c0)=""/212, 0x41100, 0x6, '\x00', 0x0, 0x8, r5, 0x8, &(0x7f0000000100)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x2, 0x475f, 0x401}, 0x10, r6, 0xffffffffffffffff, 0x4, &(0x7f0000000800)=[0xffffffffffffffff, r7], &(0x7f0000000ac0)=[{0x3, 0x2, 0xc, 0x6}, {0x3, 0x4, 0xb, 0xa}, {0x2, 0x2, 0xe, 0x2}, {0x3, 0x1, 0x5, 0x8}], 0x10, 0x20}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) getpid() perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f00000005c0)={0x1, 0x80, 0x0, 0x0, 0xbe, 0x0, 0x0, 0x0, 0x28000, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x400, 0xd7, 0x5, 0x0, 0x965, 0x0, 0xfffffffffffffffb}, 0x0, 0xd, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f00000006c0)) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0xe5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) ioctl$SIOCSIFHWADDR(r8, 0x8914, &(0x7f0000000040)={'sit0\x00', @local}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f00000008c0)='\x00'}, 0x30) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000e00)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8890}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000840)={0x0, 0x80, 0x2, 0x1, 0x9, 0x0, 0x0, 0x7, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x3ff, 0x0, @perf_config_ext={0x67}, 0x200, 0x612, 0x0, 0x0, 0xa0, 0x0, 0xd171, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x3, r4, 0x1) ioctl$SIOCSIFHWADDR(r9, 0x8914, &(0x7f0000000040)={'sit0\x00', @random="4f33e363a4b1"}) 14:38:10 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e740122003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:10 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c7094f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) [ 1248.389005][T31947] __nla_validate_parse: 18 callbacks suppressed [ 1248.389024][T31947] netlink: 134056 bytes leftover after parsing attributes in process `syz-executor.4'. 14:38:10 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e760122003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:10 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e780122003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) [ 1248.455230][T31949] device sit0 left promiscuous mode [ 1248.473516][T31953] netlink: 134056 bytes leftover after parsing attributes in process `syz-executor.4'. 14:38:10 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e7a0122003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) [ 1248.530430][T31956] device sit0 entered promiscuous mode 14:38:10 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e7c0122003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:10 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e7e0122003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:10 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e800122003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:10 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c7394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:10 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e820122003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:10 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r5 = openat$cgroup_ro(r1, &(0x7f00000000c0)='blkio.bfq.sectors\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={r3, 0xe0, &(0x7f0000000940)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000200)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x1, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000640)=[0x0], 0x0, 0x6a, &(0x7f0000000680)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x6e, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r7 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000a40)={0x1b, 0x0, 0x0, 0x7, 0x0, r0, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x5, 0x3}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x1c, 0x21, &(0x7f0000000440)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x905, 0x0, 0x0, 0x0, 0x1}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@generic={0x80, 0x6, 0x8, 0x3f, 0xda}, @map_val={0x18, 0x1, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x401}, @initr0={0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x2}, @ldst={0x2, 0x3, 0x2, 0x9, 0x3, 0x1, 0x4}, @tail_call={{0x18, 0x2, 0x1, 0x0, r2}}, @jmp={0x5, 0x1, 0xa, 0x9, 0x3, 0xffffffffffffffe0}, @generic={0x9, 0x1, 0x5, 0x4, 0x8001}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @ldst={0x2, 0x1, 0x1, 0xb, 0xb, 0x20, 0x8}, @map_idx={0x18, 0x6, 0x5, 0x0, 0x10}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000080)='GPL\x00', 0x800, 0xd4, &(0x7f00000002c0)=""/212, 0x41100, 0x6, '\x00', 0x0, 0x8, r5, 0x8, &(0x7f0000000100)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x2, 0x475f, 0x401}, 0x10, r6, 0xffffffffffffffff, 0x4, &(0x7f0000000800)=[0xffffffffffffffff, r7], &(0x7f0000000ac0)=[{0x3, 0x2, 0xc, 0x6}, {0x3, 0x4, 0xb, 0xa}, {0x2, 0x2, 0xe, 0x2}, {0x3, 0x1, 0x5, 0x8}], 0x10, 0x20}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) getpid() perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f00000005c0)={0x1, 0x80, 0x0, 0x0, 0xbe, 0x0, 0x0, 0x0, 0x28000, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x400, 0xd7, 0x5, 0x0, 0x965, 0x0, 0xfffffffffffffffb}, 0x0, 0xd, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f00000006c0)) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0xe5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) ioctl$SIOCSIFHWADDR(r8, 0x8914, &(0x7f0000000040)={'sit0\x00', @local}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f00000008c0)='\x00'}, 0x30) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000e00)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8890}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000840)={0x0, 0x80, 0x2, 0x1, 0x9, 0x0, 0x0, 0x7, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x3ff, 0x0, @perf_config_ext={0x67}, 0x200, 0x612, 0x0, 0x0, 0xa0, 0x0, 0xd171, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x3, r4, 0x1) ioctl$SIOCSIFHWADDR(r9, 0x8914, &(0x7f0000000040)={'sit0\x00', @random="4f33e363a4b1"}) 14:38:10 executing program 2: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x10) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x1a, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f97e24fc6004030e0410740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x3, 0x5, 0x5, 0x0, 0x0, 0x8, 0x4000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x101, 0x1, @perf_config_ext={0x7fff, 0x8}, 0x4000, 0x3, 0x0, 0x3, 0x80000001, 0x80, 0x40, 0x0, 0x0, 0x0, 0x81}, 0xffffffffffffffff, 0x8, r0, 0x0) 14:38:10 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e840122003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) [ 1248.795474][T31968] netlink: 134056 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1248.829879][T31970] device sit0 left promiscuous mode 14:38:10 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e860122003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) [ 1248.855840][T31974] netlink: 134056 bytes leftover after parsing attributes in process `syz-executor.2'. 14:38:10 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e880122003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:10 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e8a0122003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:10 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c7494f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) [ 1249.002864][T31977] device sit0 entered promiscuous mode 14:38:10 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e8c0122003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) [ 1249.079931][T31986] netlink: 134056 bytes leftover after parsing attributes in process `syz-executor.4'. 14:38:11 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e8e0122003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:11 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c7594f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:11 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r5 = openat$cgroup_ro(r1, &(0x7f00000000c0)='blkio.bfq.sectors\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={r3, 0xe0, &(0x7f0000000940)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000200)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x1, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000640)=[0x0], 0x0, 0x6a, &(0x7f0000000680)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x6e, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r7 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000a40)={0x1b, 0x0, 0x0, 0x7, 0x0, r0, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x5, 0x3}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x1c, 0x21, &(0x7f0000000440)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x905, 0x0, 0x0, 0x0, 0x1}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@generic={0x80, 0x6, 0x8, 0x3f, 0xda}, @map_val={0x18, 0x1, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x401}, @initr0={0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x2}, @ldst={0x2, 0x3, 0x2, 0x9, 0x3, 0x1, 0x4}, @tail_call={{0x18, 0x2, 0x1, 0x0, r2}}, @jmp={0x5, 0x1, 0xa, 0x9, 0x3, 0xffffffffffffffe0}, @generic={0x9, 0x1, 0x5, 0x4, 0x8001}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @ldst={0x2, 0x1, 0x1, 0xb, 0xb, 0x20, 0x8}, @map_idx={0x18, 0x6, 0x5, 0x0, 0x10}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000080)='GPL\x00', 0x800, 0xd4, &(0x7f00000002c0)=""/212, 0x41100, 0x6, '\x00', 0x0, 0x8, r5, 0x8, &(0x7f0000000100)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x2, 0x475f, 0x401}, 0x10, r6, 0xffffffffffffffff, 0x4, &(0x7f0000000800)=[0xffffffffffffffff, r7], &(0x7f0000000ac0)=[{0x3, 0x2, 0xc, 0x6}, {0x3, 0x4, 0xb, 0xa}, {0x2, 0x2, 0xe, 0x2}, {0x3, 0x1, 0x5, 0x8}], 0x10, 0x20}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) getpid() perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f00000005c0)={0x1, 0x80, 0x0, 0x0, 0xbe, 0x0, 0x0, 0x0, 0x28000, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x400, 0xd7, 0x5, 0x0, 0x965, 0x0, 0xfffffffffffffffb}, 0x0, 0xd, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f00000006c0)) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0xe5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) ioctl$SIOCSIFHWADDR(r8, 0x8914, &(0x7f0000000040)={'sit0\x00', @local}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f00000008c0)='\x00'}, 0x30) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000e00)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8890}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000840)={0x0, 0x80, 0x2, 0x1, 0x9, 0x0, 0x0, 0x7, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x3ff, 0x0, @perf_config_ext={0x67}, 0x200, 0x612, 0x0, 0x0, 0xa0, 0x0, 0xd171, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x3, r4, 0x1) ioctl$SIOCSIFHWADDR(r9, 0x8914, &(0x7f0000000040)={'sit0\x00', @random="4f33e363a4b1"}) 14:38:11 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e900122003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) [ 1249.183072][T31974] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 1249.194269][T31974] platform regulatory.0: Falling back to sysfs fallback for: regulatory.db 14:38:11 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e920122003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:11 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e940122003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) [ 1249.258039][T31993] netlink: 134056 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1249.281741][T31996] device sit0 left promiscuous mode 14:38:11 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c7894f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) [ 1249.352620][T31996] device sit0 entered promiscuous mode 14:38:11 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e960122003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) [ 1249.412033][T32001] netlink: 134056 bytes leftover after parsing attributes in process `syz-executor.4'. 14:38:11 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e980122003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:11 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e9a0122003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:11 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r5 = openat$cgroup_ro(r1, &(0x7f00000000c0)='blkio.bfq.sectors\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={r3, 0xe0, &(0x7f0000000940)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000200)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x1, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000640)=[0x0], 0x0, 0x6a, &(0x7f0000000680)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x6e, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r7 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000a40)={0x1b, 0x0, 0x0, 0x7, 0x0, r0, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x5, 0x3}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x1c, 0x21, &(0x7f0000000440)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x905, 0x0, 0x0, 0x0, 0x1}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@generic={0x80, 0x6, 0x8, 0x3f, 0xda}, @map_val={0x18, 0x1, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x401}, @initr0={0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x2}, @ldst={0x2, 0x3, 0x2, 0x9, 0x3, 0x1, 0x4}, @tail_call={{0x18, 0x2, 0x1, 0x0, r2}}, @jmp={0x5, 0x1, 0xa, 0x9, 0x3, 0xffffffffffffffe0}, @generic={0x9, 0x1, 0x5, 0x4, 0x8001}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @ldst={0x2, 0x1, 0x1, 0xb, 0xb, 0x20, 0x8}, @map_idx={0x18, 0x6, 0x5, 0x0, 0x10}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000080)='GPL\x00', 0x800, 0xd4, &(0x7f00000002c0)=""/212, 0x41100, 0x6, '\x00', 0x0, 0x8, r5, 0x8, &(0x7f0000000100)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x2, 0x475f, 0x401}, 0x10, r6, 0xffffffffffffffff, 0x4, &(0x7f0000000800)=[0xffffffffffffffff, r7], &(0x7f0000000ac0)=[{0x3, 0x2, 0xc, 0x6}, {0x3, 0x4, 0xb, 0xa}, {0x2, 0x2, 0xe, 0x2}, {0x3, 0x1, 0x5, 0x8}], 0x10, 0x20}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) getpid() perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f00000005c0)={0x1, 0x80, 0x0, 0x0, 0xbe, 0x0, 0x0, 0x0, 0x28000, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x400, 0xd7, 0x5, 0x0, 0x965, 0x0, 0xfffffffffffffffb}, 0x0, 0xd, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f00000006c0)) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0xe5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) ioctl$SIOCSIFHWADDR(r8, 0x8914, &(0x7f0000000040)={'sit0\x00', @local}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f00000008c0)='\x00'}, 0x30) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000e00)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8890}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000840)={0x0, 0x80, 0x2, 0x1, 0x9, 0x0, 0x0, 0x7, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x3ff, 0x0, @perf_config_ext={0x67}, 0x200, 0x612, 0x0, 0x0, 0xa0, 0x0, 0xd171, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x3, r4, 0x1) ioctl$SIOCSIFHWADDR(r9, 0x8914, &(0x7f0000000040)={'sit0\x00', @random="4f33e363a4b1"}) 14:38:11 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c7a94f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:11 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e9c0122003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) [ 1249.621704][T32010] device sit0 left promiscuous mode 14:38:11 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e9e0122003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:11 executing program 2: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x10) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x1a, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f97e24fc6004030e0025740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x3, 0x5, 0x5, 0x0, 0x0, 0x8, 0x4000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x101, 0x1, @perf_config_ext={0x7fff, 0x8}, 0x4000, 0x3, 0x0, 0x3, 0x80000001, 0x80, 0x40, 0x0, 0x0, 0x0, 0x81}, 0xffffffffffffffff, 0x8, r0, 0x0) [ 1249.643422][T32014] netlink: 134056 bytes leftover after parsing attributes in process `syz-executor.4'. 14:38:11 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00ea00122003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:11 executing program 2: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x10) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x1a, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f97e24fc6004030e003c740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x3, 0x5, 0x5, 0x0, 0x0, 0x8, 0x4000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x101, 0x1, @perf_config_ext={0x7fff, 0x8}, 0x4000, 0x3, 0x0, 0x3, 0x80000001, 0x80, 0x40, 0x0, 0x0, 0x0, 0x81}, 0xffffffffffffffff, 0x8, r0, 0x0) 14:38:11 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00ea20122003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:11 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00ea40122003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:11 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00ea60122003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:11 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6302f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:11 executing program 2: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x10) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x1a, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f97e24fc6004030e0040740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x3, 0x5, 0x5, 0x0, 0x0, 0x8, 0x4000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x101, 0x1, @perf_config_ext={0x7fff, 0x8}, 0x4000, 0x3, 0x0, 0x3, 0x80000001, 0x80, 0x40, 0x0, 0x0, 0x0, 0x81}, 0xffffffffffffffff, 0x8, r0, 0x0) [ 1249.906950][T14377] Bluetooth: hci6: command 0x040f tx timeout [ 1249.915005][T32015] device sit0 entered promiscuous mode 14:38:11 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00ea80122003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:12 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00eaa0122003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) [ 1250.042573][T32034] netlink: 134056 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1250.070052][T32031] netlink: 134056 bytes leftover after parsing attributes in process `syz-executor.2'. 14:38:12 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90224fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:12 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r5 = openat$cgroup_ro(r1, &(0x7f00000000c0)='blkio.bfq.sectors\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={r3, 0xe0, &(0x7f0000000940)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000200)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x1, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000640)=[0x0], 0x0, 0x6a, &(0x7f0000000680)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x6e, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r7 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000a40)={0x1b, 0x0, 0x0, 0x7, 0x0, r0, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x5, 0x3}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x1c, 0x21, &(0x7f0000000440)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x905, 0x0, 0x0, 0x0, 0x1}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@generic={0x80, 0x6, 0x8, 0x3f, 0xda}, @map_val={0x18, 0x1, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x401}, @initr0={0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x2}, @ldst={0x2, 0x3, 0x2, 0x9, 0x3, 0x1, 0x4}, @tail_call={{0x18, 0x2, 0x1, 0x0, r2}}, @jmp={0x5, 0x1, 0xa, 0x9, 0x3, 0xffffffffffffffe0}, @generic={0x9, 0x1, 0x5, 0x4, 0x8001}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @ldst={0x2, 0x1, 0x1, 0xb, 0xb, 0x20, 0x8}, @map_idx={0x18, 0x6, 0x5, 0x0, 0x10}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000080)='GPL\x00', 0x800, 0xd4, &(0x7f00000002c0)=""/212, 0x41100, 0x6, '\x00', 0x0, 0x8, r5, 0x8, &(0x7f0000000100)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x2, 0x475f, 0x401}, 0x10, r6, 0xffffffffffffffff, 0x4, &(0x7f0000000800)=[0xffffffffffffffff, r7], &(0x7f0000000ac0)=[{0x3, 0x2, 0xc, 0x6}, {0x3, 0x4, 0xb, 0xa}, {0x2, 0x2, 0xe, 0x2}, {0x3, 0x1, 0x5, 0x8}], 0x10, 0x20}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) getpid() perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f00000005c0)={0x1, 0x80, 0x0, 0x0, 0xbe, 0x0, 0x0, 0x0, 0x28000, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x400, 0xd7, 0x5, 0x0, 0x965, 0x0, 0xfffffffffffffffb}, 0x0, 0xd, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f00000006c0)) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0xe5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) ioctl$SIOCSIFHWADDR(r8, 0x8914, &(0x7f0000000040)={'sit0\x00', @local}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f00000008c0)='\x00'}, 0x30) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000e00)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8890}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000840)={0x0, 0x80, 0x2, 0x1, 0x9, 0x0, 0x0, 0x7, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x3ff, 0x0, @perf_config_ext={0x67}, 0x200, 0x612, 0x0, 0x0, 0xa0, 0x0, 0xd171, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x3, r4, 0x1) ioctl$SIOCSIFHWADDR(r9, 0x8914, &(0x7f0000000040)={'sit0\x00', @random="4f33e363a4b1"}) 14:38:12 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90424fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:12 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00eac0122003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) [ 1250.165436][T32031] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 1250.179785][T32031] platform regulatory.0: Falling back to sysfs fallback for: regulatory.db [ 1250.249237][T32043] device sit0 left promiscuous mode 14:38:12 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90624fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:12 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00eae0122003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:12 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00eb00122003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:12 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00eb20122003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:12 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00eb40122003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) [ 1250.425157][T32048] device sit0 entered promiscuous mode 14:38:12 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00eb60122003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:12 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00eb80122003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:12 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00eba0122003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:12 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00ebc0122003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:12 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f91824fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:12 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f96424fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:12 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r5 = openat$cgroup_ro(r1, &(0x7f00000000c0)='blkio.bfq.sectors\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={r3, 0xe0, &(0x7f0000000940)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000200)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x1, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000640)=[0x0], 0x0, 0x6a, &(0x7f0000000680)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x6e, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r7 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000a40)={0x1b, 0x0, 0x0, 0x7, 0x0, r0, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x5, 0x3}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x1c, 0x21, &(0x7f0000000440)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x905, 0x0, 0x0, 0x0, 0x1}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@generic={0x80, 0x6, 0x8, 0x3f, 0xda}, @map_val={0x18, 0x1, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x401}, @initr0={0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x2}, @ldst={0x2, 0x3, 0x2, 0x9, 0x3, 0x1, 0x4}, @tail_call={{0x18, 0x2, 0x1, 0x0, r2}}, @jmp={0x5, 0x1, 0xa, 0x9, 0x3, 0xffffffffffffffe0}, @generic={0x9, 0x1, 0x5, 0x4, 0x8001}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @ldst={0x2, 0x1, 0x1, 0xb, 0xb, 0x20, 0x8}, @map_idx={0x18, 0x6, 0x5, 0x0, 0x10}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000080)='GPL\x00', 0x800, 0xd4, &(0x7f00000002c0)=""/212, 0x41100, 0x6, '\x00', 0x0, 0x8, r5, 0x8, &(0x7f0000000100)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x2, 0x475f, 0x401}, 0x10, r6, 0xffffffffffffffff, 0x4, &(0x7f0000000800)=[0xffffffffffffffff, r7], &(0x7f0000000ac0)=[{0x3, 0x2, 0xc, 0x6}, {0x3, 0x4, 0xb, 0xa}, {0x2, 0x2, 0xe, 0x2}, {0x3, 0x1, 0x5, 0x8}], 0x10, 0x20}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) getpid() perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f00000005c0)={0x1, 0x80, 0x0, 0x0, 0xbe, 0x0, 0x0, 0x0, 0x28000, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x400, 0xd7, 0x5, 0x0, 0x965, 0x0, 0xfffffffffffffffb}, 0x0, 0xd, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f00000006c0)) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0xe5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) ioctl$SIOCSIFHWADDR(r8, 0x8914, &(0x7f0000000040)={'sit0\x00', @local}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f00000008c0)='\x00'}, 0x30) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000e00)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8890}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000840)={0x0, 0x80, 0x2, 0x1, 0x9, 0x0, 0x0, 0x7, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x3ff, 0x0, @perf_config_ext={0x67}, 0x200, 0x612, 0x0, 0x0, 0xa0, 0x0, 0xd171, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x3, r4, 0x1) ioctl$SIOCSIFHWADDR(r9, 0x8914, &(0x7f0000000040)={'sit0\x00', @random="4f33e363a4b1"}) 14:38:12 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00ebe0122003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:12 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90502fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:12 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00ec00122003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) [ 1250.734770][T32072] device sit0 left promiscuous mode 14:38:12 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00ec20122003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:12 executing program 2: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x10) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x1a, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f97e24fc6004030e624d740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x3, 0x5, 0x5, 0x0, 0x0, 0x8, 0x4000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x101, 0x1, @perf_config_ext={0x7fff, 0x8}, 0x4000, 0x3, 0x0, 0x3, 0x80000001, 0x80, 0x40, 0x0, 0x0, 0x0, 0x81}, 0xffffffffffffffff, 0x8, r0, 0x0) 14:38:12 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00ec40122003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:12 executing program 2: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x10) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x1a, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f97e24fc6004030e5c63740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x3, 0x5, 0x5, 0x0, 0x0, 0x8, 0x4000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x101, 0x1, @perf_config_ext={0x7fff, 0x8}, 0x4000, 0x3, 0x0, 0x3, 0x80000001, 0x80, 0x40, 0x0, 0x0, 0x0, 0x81}, 0xffffffffffffffff, 0x8, r0, 0x0) 14:38:12 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524026004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:12 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00ec60122003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) [ 1250.982269][T32078] device sit0 entered promiscuous mode 14:38:12 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00ec80122003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:13 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00eca0122003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:13 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00ecc0122003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:13 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc0204030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:13 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00ece0122003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:13 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r5 = openat$cgroup_ro(r1, &(0x7f00000000c0)='blkio.bfq.sectors\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={r3, 0xe0, &(0x7f0000000940)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000200)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x1, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000640)=[0x0], 0x0, 0x6a, &(0x7f0000000680)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x6e, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r7 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000a40)={0x1b, 0x0, 0x0, 0x7, 0x0, r0, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x5, 0x3}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x1c, 0x21, &(0x7f0000000440)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x905, 0x0, 0x0, 0x0, 0x1}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@generic={0x80, 0x6, 0x8, 0x3f, 0xda}, @map_val={0x18, 0x1, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x401}, @initr0={0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x2}, @ldst={0x2, 0x3, 0x2, 0x9, 0x3, 0x1, 0x4}, @tail_call={{0x18, 0x2, 0x1, 0x0, r2}}, @jmp={0x5, 0x1, 0xa, 0x9, 0x3, 0xffffffffffffffe0}, @generic={0x9, 0x1, 0x5, 0x4, 0x8001}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @ldst={0x2, 0x1, 0x1, 0xb, 0xb, 0x20, 0x8}, @map_idx={0x18, 0x6, 0x5, 0x0, 0x10}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000080)='GPL\x00', 0x800, 0xd4, &(0x7f00000002c0)=""/212, 0x41100, 0x6, '\x00', 0x0, 0x8, r5, 0x8, &(0x7f0000000100)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x2, 0x475f, 0x401}, 0x10, r6, 0xffffffffffffffff, 0x4, &(0x7f0000000800)=[0xffffffffffffffff, r7], &(0x7f0000000ac0)=[{0x3, 0x2, 0xc, 0x6}, {0x3, 0x4, 0xb, 0xa}, {0x2, 0x2, 0xe, 0x2}, {0x3, 0x1, 0x5, 0x8}], 0x10, 0x20}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) getpid() perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f00000005c0)={0x1, 0x80, 0x0, 0x0, 0xbe, 0x0, 0x0, 0x0, 0x28000, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x400, 0xd7, 0x5, 0x0, 0x965, 0x0, 0xfffffffffffffffb}, 0x0, 0xd, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f00000006c0)) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0xe5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) ioctl$SIOCSIFHWADDR(r8, 0x8914, &(0x7f0000000040)={'sit0\x00', @local}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f00000008c0)='\x00'}, 0x30) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000e00)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8890}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000840)={0x0, 0x80, 0x2, 0x1, 0x9, 0x0, 0x0, 0x7, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x3ff, 0x0, @perf_config_ext={0x67}, 0x200, 0x612, 0x0, 0x0, 0xa0, 0x0, 0xd171, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x3, r4, 0x1) ioctl$SIOCSIFHWADDR(r9, 0x8914, &(0x7f0000000040)={'sit0\x00', @random="4f33e363a4b1"}) [ 1251.202893][T32089] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 1251.238505][T32089] platform regulatory.0: Falling back to sysfs fallback for: regulatory.db 14:38:13 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc0804030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) [ 1251.288837][T32103] device sit0 left promiscuous mode 14:38:13 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00ed00122003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:13 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00ed20122003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:13 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00ed40122003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:13 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc0a04030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:13 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00ed60122003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) [ 1251.453299][T32108] device sit0 entered promiscuous mode 14:38:13 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00ed80122003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:13 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00eda0122003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:13 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc2504030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:13 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00edc0122003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:13 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r5 = openat$cgroup_ro(r1, &(0x7f00000000c0)='blkio.bfq.sectors\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={r3, 0xe0, &(0x7f0000000940)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000200)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x1, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000640)=[0x0], 0x0, 0x6a, &(0x7f0000000680)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x6e, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r7 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000a40)={0x1b, 0x0, 0x0, 0x7, 0x0, r0, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x5, 0x3}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x1c, 0x21, &(0x7f0000000440)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x905, 0x0, 0x0, 0x0, 0x1}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@generic={0x80, 0x6, 0x8, 0x3f, 0xda}, @map_val={0x18, 0x1, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x401}, @initr0={0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x2}, @ldst={0x2, 0x3, 0x2, 0x9, 0x3, 0x1, 0x4}, @tail_call={{0x18, 0x2, 0x1, 0x0, r2}}, @jmp={0x5, 0x1, 0xa, 0x9, 0x3, 0xffffffffffffffe0}, @generic={0x9, 0x1, 0x5, 0x4, 0x8001}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @ldst={0x2, 0x1, 0x1, 0xb, 0xb, 0x20, 0x8}, @map_idx={0x18, 0x6, 0x5, 0x0, 0x10}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000080)='GPL\x00', 0x800, 0xd4, &(0x7f00000002c0)=""/212, 0x41100, 0x6, '\x00', 0x0, 0x8, r5, 0x8, &(0x7f0000000100)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x2, 0x475f, 0x401}, 0x10, r6, 0xffffffffffffffff, 0x4, &(0x7f0000000800)=[0xffffffffffffffff, r7], &(0x7f0000000ac0)=[{0x3, 0x2, 0xc, 0x6}, {0x3, 0x4, 0xb, 0xa}, {0x2, 0x2, 0xe, 0x2}, {0x3, 0x1, 0x5, 0x8}], 0x10, 0x20}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) getpid() perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f00000005c0)={0x1, 0x80, 0x0, 0x0, 0xbe, 0x0, 0x0, 0x0, 0x28000, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x400, 0xd7, 0x5, 0x0, 0x965, 0x0, 0xfffffffffffffffb}, 0x0, 0xd, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f00000006c0)) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0xe5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) ioctl$SIOCSIFHWADDR(r8, 0x8914, &(0x7f0000000040)={'sit0\x00', @local}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f00000008c0)='\x00'}, 0x30) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000e00)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8890}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000840)={0x0, 0x80, 0x2, 0x1, 0x9, 0x0, 0x0, 0x7, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x3ff, 0x0, @perf_config_ext={0x67}, 0x200, 0x612, 0x0, 0x0, 0xa0, 0x0, 0xd171, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x3, r4, 0x1) ioctl$SIOCSIFHWADDR(r9, 0x8914, &(0x7f0000000040)={'sit0\x00', @random="4f33e363a4b1"}) 14:38:13 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004000e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:13 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00ede0122003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) [ 1251.707193][T32127] device sit0 left promiscuous mode 14:38:13 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00ee00122003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:13 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6002030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:13 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00ee20122003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:13 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00ee40122003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:13 executing program 2: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x10) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x1a, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f97e24fc6004030e0064740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x3, 0x5, 0x5, 0x0, 0x0, 0x8, 0x4000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x101, 0x1, @perf_config_ext={0x7fff, 0x8}, 0x4000, 0x3, 0x0, 0x3, 0x80000001, 0x80, 0x40, 0x0, 0x0, 0x0, 0x81}, 0xffffffffffffffff, 0x8, r0, 0x0) 14:38:13 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00ee60122003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:13 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00ee80122003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:13 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00eea0122003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) [ 1251.981359][T14372] Bluetooth: hci6: command 0x0419 tx timeout [ 1251.998939][T32133] device sit0 entered promiscuous mode 14:38:13 executing program 2: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x10) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x1a, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f97e24fc6004030e007e740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x3, 0x5, 0x5, 0x0, 0x0, 0x8, 0x4000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x101, 0x1, @perf_config_ext={0x7fff, 0x8}, 0x4000, 0x3, 0x0, 0x3, 0x80000001, 0x80, 0x40, 0x0, 0x0, 0x0, 0x81}, 0xffffffffffffffff, 0x8, r0, 0x0) 14:38:13 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00eec0122003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:14 executing program 2: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x10) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x1a, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f97e24fc6004030e078d740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x3, 0x5, 0x5, 0x0, 0x0, 0x8, 0x4000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x101, 0x1, @perf_config_ext={0x7fff, 0x8}, 0x4000, 0x3, 0x0, 0x3, 0x80000001, 0x80, 0x40, 0x0, 0x0, 0x0, 0x81}, 0xffffffffffffffff, 0x8, r0, 0x0) 14:38:14 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00eee0122003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:14 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6003030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:14 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r5 = openat$cgroup_ro(r1, &(0x7f00000000c0)='blkio.bfq.sectors\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={r3, 0xe0, &(0x7f0000000940)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000200)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x1, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000640)=[0x0], 0x0, 0x6a, &(0x7f0000000680)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x6e, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r7 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000a40)={0x1b, 0x0, 0x0, 0x7, 0x0, r0, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x5, 0x3}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x1c, 0x21, &(0x7f0000000440)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x905, 0x0, 0x0, 0x0, 0x1}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@generic={0x80, 0x6, 0x8, 0x3f, 0xda}, @map_val={0x18, 0x1, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x401}, @initr0={0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x2}, @ldst={0x2, 0x3, 0x2, 0x9, 0x3, 0x1, 0x4}, @tail_call={{0x18, 0x2, 0x1, 0x0, r2}}, @jmp={0x5, 0x1, 0xa, 0x9, 0x3, 0xffffffffffffffe0}, @generic={0x9, 0x1, 0x5, 0x4, 0x8001}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @ldst={0x2, 0x1, 0x1, 0xb, 0xb, 0x20, 0x8}, @map_idx={0x18, 0x6, 0x5, 0x0, 0x10}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000080)='GPL\x00', 0x800, 0xd4, &(0x7f00000002c0)=""/212, 0x41100, 0x6, '\x00', 0x0, 0x8, r5, 0x8, &(0x7f0000000100)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x2, 0x475f, 0x401}, 0x10, r6, 0xffffffffffffffff, 0x4, &(0x7f0000000800)=[0xffffffffffffffff, r7], &(0x7f0000000ac0)=[{0x3, 0x2, 0xc, 0x6}, {0x3, 0x4, 0xb, 0xa}, {0x2, 0x2, 0xe, 0x2}, {0x3, 0x1, 0x5, 0x8}], 0x10, 0x20}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) getpid() perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f00000005c0)={0x1, 0x80, 0x0, 0x0, 0xbe, 0x0, 0x0, 0x0, 0x28000, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x400, 0xd7, 0x5, 0x0, 0x965, 0x0, 0xfffffffffffffffb}, 0x0, 0xd, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f00000006c0)) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0xe5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) ioctl$SIOCSIFHWADDR(r8, 0x8914, &(0x7f0000000040)={'sit0\x00', @local}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f00000008c0)='\x00'}, 0x30) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000e00)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8890}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000840)={0x0, 0x80, 0x2, 0x1, 0x9, 0x0, 0x0, 0x7, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x3ff, 0x0, @perf_config_ext={0x67}, 0x200, 0x612, 0x0, 0x0, 0xa0, 0x0, 0xd171, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x3, r4, 0x1) ioctl$SIOCSIFHWADDR(r9, 0x8914, &(0x7f0000000040)={'sit0\x00', @random="4f33e363a4b1"}) 14:38:14 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6005030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) [ 1252.251157][T32160] device sit0 left promiscuous mode 14:38:14 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00ef00122003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:14 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6006030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:14 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00ef20122003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) [ 1252.365572][T32157] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 1252.376207][T32166] device sit0 entered promiscuous mode [ 1252.400168][T32157] platform regulatory.0: Falling back to sysfs fallback for: regulatory.db 14:38:14 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00ef40122003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:14 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00ef60122003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:14 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00ef80122003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:14 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6007030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:14 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r5 = openat$cgroup_ro(r1, &(0x7f00000000c0)='blkio.bfq.sectors\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={r3, 0xe0, &(0x7f0000000940)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000200)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x1, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000640)=[0x0], 0x0, 0x6a, &(0x7f0000000680)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x6e, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r7 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000a40)={0x1b, 0x0, 0x0, 0x7, 0x0, r0, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x5, 0x3}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x1c, 0x21, &(0x7f0000000440)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x905, 0x0, 0x0, 0x0, 0x1}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@generic={0x80, 0x6, 0x8, 0x3f, 0xda}, @map_val={0x18, 0x1, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x401}, @initr0={0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x2}, @ldst={0x2, 0x3, 0x2, 0x9, 0x3, 0x1, 0x4}, @tail_call={{0x18, 0x2, 0x1, 0x0, r2}}, @jmp={0x5, 0x1, 0xa, 0x9, 0x3, 0xffffffffffffffe0}, @generic={0x9, 0x1, 0x5, 0x4, 0x8001}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @ldst={0x2, 0x1, 0x1, 0xb, 0xb, 0x20, 0x8}, @map_idx={0x18, 0x6, 0x5, 0x0, 0x10}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000080)='GPL\x00', 0x800, 0xd4, &(0x7f00000002c0)=""/212, 0x41100, 0x6, '\x00', 0x0, 0x8, r5, 0x8, &(0x7f0000000100)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x2, 0x475f, 0x401}, 0x10, r6, 0xffffffffffffffff, 0x4, &(0x7f0000000800)=[0xffffffffffffffff, r7], &(0x7f0000000ac0)=[{0x3, 0x2, 0xc, 0x6}, {0x3, 0x4, 0xb, 0xa}, {0x2, 0x2, 0xe, 0x2}, {0x3, 0x1, 0x5, 0x8}], 0x10, 0x20}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) getpid() perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f00000005c0)={0x1, 0x80, 0x0, 0x0, 0xbe, 0x0, 0x0, 0x0, 0x28000, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x400, 0xd7, 0x5, 0x0, 0x965, 0x0, 0xfffffffffffffffb}, 0x0, 0xd, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f00000006c0)) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0xe5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) ioctl$SIOCSIFHWADDR(r8, 0x8914, &(0x7f0000000040)={'sit0\x00', @local}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f00000008c0)='\x00'}, 0x30) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000e00)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8890}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000840)={0x0, 0x80, 0x2, 0x1, 0x9, 0x0, 0x0, 0x7, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x3ff, 0x0, @perf_config_ext={0x67}, 0x200, 0x612, 0x0, 0x0, 0xa0, 0x0, 0xd171, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x3, r4, 0x1) ioctl$SIOCSIFHWADDR(r9, 0x8914, &(0x7f0000000040)={'sit0\x00', @random="4f33e363a4b1"}) 14:38:14 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6008030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:14 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00efa0122003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:14 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6009030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:14 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00efc0122003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) [ 1252.711847][T32186] device sit0 left promiscuous mode 14:38:14 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc600a030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:14 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00efe0122003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:14 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020222003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:14 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e040222003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:14 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e060222003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) [ 1252.917960][T32190] device sit0 entered promiscuous mode 14:38:14 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e080222003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:14 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e0a0222003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:14 executing program 2: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x10) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x1a, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f97e24fc6004030e07b7740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x3, 0x5, 0x5, 0x0, 0x0, 0x8, 0x4000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x101, 0x1, @perf_config_ext={0x7fff, 0x8}, 0x4000, 0x3, 0x0, 0x3, 0x80000001, 0x80, 0x40, 0x0, 0x0, 0x0, 0x81}, 0xffffffffffffffff, 0x8, r0, 0x0) 14:38:14 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e0c0222003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:15 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc600b030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:15 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e0e0222003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:15 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r5 = openat$cgroup_ro(r1, &(0x7f00000000c0)='blkio.bfq.sectors\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={r3, 0xe0, &(0x7f0000000940)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000200)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x1, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000640)=[0x0], 0x0, 0x6a, &(0x7f0000000680)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x6e, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r7 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000a40)={0x1b, 0x0, 0x0, 0x7, 0x0, r0, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x5, 0x3}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x1c, 0x21, &(0x7f0000000440)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x905, 0x0, 0x0, 0x0, 0x1}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@generic={0x80, 0x6, 0x8, 0x3f, 0xda}, @map_val={0x18, 0x1, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x401}, @initr0={0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x2}, @ldst={0x2, 0x3, 0x2, 0x9, 0x3, 0x1, 0x4}, @tail_call={{0x18, 0x2, 0x1, 0x0, r2}}, @jmp={0x5, 0x1, 0xa, 0x9, 0x3, 0xffffffffffffffe0}, @generic={0x9, 0x1, 0x5, 0x4, 0x8001}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @ldst={0x2, 0x1, 0x1, 0xb, 0xb, 0x20, 0x8}, @map_idx={0x18, 0x6, 0x5, 0x0, 0x10}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000080)='GPL\x00', 0x800, 0xd4, &(0x7f00000002c0)=""/212, 0x41100, 0x6, '\x00', 0x0, 0x8, r5, 0x8, &(0x7f0000000100)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x2, 0x475f, 0x401}, 0x10, r6, 0xffffffffffffffff, 0x4, &(0x7f0000000800)=[0xffffffffffffffff, r7], &(0x7f0000000ac0)=[{0x3, 0x2, 0xc, 0x6}, {0x3, 0x4, 0xb, 0xa}, {0x2, 0x2, 0xe, 0x2}, {0x3, 0x1, 0x5, 0x8}], 0x10, 0x20}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) getpid() perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f00000005c0)={0x1, 0x80, 0x0, 0x0, 0xbe, 0x0, 0x0, 0x0, 0x28000, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x400, 0xd7, 0x5, 0x0, 0x965, 0x0, 0xfffffffffffffffb}, 0x0, 0xd, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f00000006c0)) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0xe5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) ioctl$SIOCSIFHWADDR(r8, 0x8914, &(0x7f0000000040)={'sit0\x00', @local}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f00000008c0)='\x00'}, 0x30) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000e00)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8890}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000840)={0x0, 0x80, 0x2, 0x1, 0x9, 0x0, 0x0, 0x7, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x3ff, 0x0, @perf_config_ext={0x67}, 0x200, 0x612, 0x0, 0x0, 0xa0, 0x0, 0xd171, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x3, r4, 0x1) ioctl$SIOCSIFHWADDR(r9, 0x8914, &(0x7f0000000040)={'sit0\x00', @random="4f33e363a4b1"}) [ 1253.114332][T32207] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 1253.135321][T32207] platform regulatory.0: Falling back to sysfs fallback for: regulatory.db 14:38:15 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e100222003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:15 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc600c030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:15 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e120222003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) [ 1253.238773][T32217] device sit0 left promiscuous mode 14:38:15 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e140222003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:15 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e160222003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:15 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc600d030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:15 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e180222003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) [ 1253.408157][T32221] device sit0 entered promiscuous mode 14:38:15 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc600e030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:15 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e1a0222003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:15 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e1c0222003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) [ 1253.531865][T32233] __nla_validate_parse: 18 callbacks suppressed [ 1253.531883][T32233] netlink: 134044 bytes leftover after parsing attributes in process `syz-executor.4'. 14:38:15 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e1e0222003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:15 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r5 = openat$cgroup_ro(r1, &(0x7f00000000c0)='blkio.bfq.sectors\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={r3, 0xe0, &(0x7f0000000940)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000200)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x1, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000640)=[0x0], 0x0, 0x6a, &(0x7f0000000680)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x6e, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r7 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000a40)={0x1b, 0x0, 0x0, 0x7, 0x0, r0, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x5, 0x3}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x1c, 0x21, &(0x7f0000000440)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x905, 0x0, 0x0, 0x0, 0x1}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@generic={0x80, 0x6, 0x8, 0x3f, 0xda}, @map_val={0x18, 0x1, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x401}, @initr0={0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x2}, @ldst={0x2, 0x3, 0x2, 0x9, 0x3, 0x1, 0x4}, @tail_call={{0x18, 0x2, 0x1, 0x0, r2}}, @jmp={0x5, 0x1, 0xa, 0x9, 0x3, 0xffffffffffffffe0}, @generic={0x9, 0x1, 0x5, 0x4, 0x8001}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @ldst={0x2, 0x1, 0x1, 0xb, 0xb, 0x20, 0x8}, @map_idx={0x18, 0x6, 0x5, 0x0, 0x10}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000080)='GPL\x00', 0x800, 0xd4, &(0x7f00000002c0)=""/212, 0x41100, 0x6, '\x00', 0x0, 0x8, r5, 0x8, &(0x7f0000000100)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x2, 0x475f, 0x401}, 0x10, r6, 0xffffffffffffffff, 0x4, &(0x7f0000000800)=[0xffffffffffffffff, r7], &(0x7f0000000ac0)=[{0x3, 0x2, 0xc, 0x6}, {0x3, 0x4, 0xb, 0xa}, {0x2, 0x2, 0xe, 0x2}, {0x3, 0x1, 0x5, 0x8}], 0x10, 0x20}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) getpid() perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f00000005c0)={0x1, 0x80, 0x0, 0x0, 0xbe, 0x0, 0x0, 0x0, 0x28000, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x400, 0xd7, 0x5, 0x0, 0x965, 0x0, 0xfffffffffffffffb}, 0x0, 0xd, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f00000006c0)) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0xe5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) ioctl$SIOCSIFHWADDR(r8, 0x8914, &(0x7f0000000040)={'sit0\x00', @local}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f00000008c0)='\x00'}, 0x30) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000e00)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8890}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000840)={0x0, 0x80, 0x2, 0x1, 0x9, 0x0, 0x0, 0x7, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x3ff, 0x0, @perf_config_ext={0x67}, 0x200, 0x612, 0x0, 0x0, 0xa0, 0x0, 0xd171, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x3, r4, 0x1) ioctl$SIOCSIFHWADDR(r9, 0x8914, &(0x7f0000000040)={'sit0\x00', @random="4f33e363a4b1"}) 14:38:15 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6010030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:15 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e200222003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:15 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e220222003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) [ 1253.686300][T32241] device sit0 left promiscuous mode [ 1253.693183][T32243] netlink: 134044 bytes leftover after parsing attributes in process `syz-executor.4'. 14:38:15 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e240222003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:15 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6011030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) [ 1253.799195][T32246] device sit0 entered promiscuous mode 14:38:15 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e260222003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:15 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6012030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:15 executing program 2: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x10) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x1a, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f97e24fc6004030e0002740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x3, 0x5, 0x5, 0x0, 0x0, 0x8, 0x4000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x101, 0x1, @perf_config_ext={0x7fff, 0x8}, 0x4000, 0x3, 0x0, 0x3, 0x80000001, 0x80, 0x40, 0x0, 0x0, 0x0, 0x81}, 0xffffffffffffffff, 0x8, r0, 0x0) 14:38:15 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e280222003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) [ 1253.938622][T32255] netlink: 134040 bytes leftover after parsing attributes in process `syz-executor.4'. 14:38:15 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e2a0222003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) [ 1253.999406][T32258] netlink: 134056 bytes leftover after parsing attributes in process `syz-executor.2'. 14:38:15 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r5 = openat$cgroup_ro(r1, &(0x7f00000000c0)='blkio.bfq.sectors\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={r3, 0xe0, &(0x7f0000000940)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000200)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x1, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000640)=[0x0], 0x0, 0x6a, &(0x7f0000000680)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x6e, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r7 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000a40)={0x1b, 0x0, 0x0, 0x7, 0x0, r0, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x5, 0x3}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x1c, 0x21, &(0x7f0000000440)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x905, 0x0, 0x0, 0x0, 0x1}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@generic={0x80, 0x6, 0x8, 0x3f, 0xda}, @map_val={0x18, 0x1, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x401}, @initr0={0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x2}, @ldst={0x2, 0x3, 0x2, 0x9, 0x3, 0x1, 0x4}, @tail_call={{0x18, 0x2, 0x1, 0x0, r2}}, @jmp={0x5, 0x1, 0xa, 0x9, 0x3, 0xffffffffffffffe0}, @generic={0x9, 0x1, 0x5, 0x4, 0x8001}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @ldst={0x2, 0x1, 0x1, 0xb, 0xb, 0x20, 0x8}, @map_idx={0x18, 0x6, 0x5, 0x0, 0x10}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000080)='GPL\x00', 0x800, 0xd4, &(0x7f00000002c0)=""/212, 0x41100, 0x6, '\x00', 0x0, 0x8, r5, 0x8, &(0x7f0000000100)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x2, 0x475f, 0x401}, 0x10, r6, 0xffffffffffffffff, 0x4, &(0x7f0000000800)=[0xffffffffffffffff, r7], &(0x7f0000000ac0)=[{0x3, 0x2, 0xc, 0x6}, {0x3, 0x4, 0xb, 0xa}, {0x2, 0x2, 0xe, 0x2}, {0x3, 0x1, 0x5, 0x8}], 0x10, 0x20}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) getpid() perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f00000005c0)={0x1, 0x80, 0x0, 0x0, 0xbe, 0x0, 0x0, 0x0, 0x28000, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x400, 0xd7, 0x5, 0x0, 0x965, 0x0, 0xfffffffffffffffb}, 0x0, 0xd, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f00000006c0)) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0xe5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) ioctl$SIOCSIFHWADDR(r8, 0x8914, &(0x7f0000000040)={'sit0\x00', @local}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f00000008c0)='\x00'}, 0x30) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000e00)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8890}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000840)={0x0, 0x80, 0x2, 0x1, 0x9, 0x0, 0x0, 0x7, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x3ff, 0x0, @perf_config_ext={0x67}, 0x200, 0x612, 0x0, 0x0, 0xa0, 0x0, 0xd171, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x3, r4, 0x1) ioctl$SIOCSIFHWADDR(r9, 0x8914, &(0x7f0000000040)={'sit0\x00', @random="4f33e363a4b1"}) 14:38:15 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6018030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:16 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e2c0222003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) [ 1254.066556][T32258] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 1254.081448][T32258] platform regulatory.0: Falling back to sysfs fallback for: regulatory.db 14:38:16 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e2e0222003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:16 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004020e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) [ 1254.165945][T32266] netlink: 134036 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1254.186719][T32267] device sit0 left promiscuous mode 14:38:16 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e300222003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:16 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e320222003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) [ 1254.253693][T32274] netlink: 134312 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1254.274397][T32272] device sit0 entered promiscuous mode 14:38:16 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e340222003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:16 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e360222003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:16 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004040e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:16 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e380222003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:16 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r5 = openat$cgroup_ro(r1, &(0x7f00000000c0)='blkio.bfq.sectors\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={r3, 0xe0, &(0x7f0000000940)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000200)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x1, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000640)=[0x0], 0x0, 0x6a, &(0x7f0000000680)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x6e, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r7 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000a40)={0x1b, 0x0, 0x0, 0x7, 0x0, r0, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x5, 0x3}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x1c, 0x21, &(0x7f0000000440)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x905, 0x0, 0x0, 0x0, 0x1}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@generic={0x80, 0x6, 0x8, 0x3f, 0xda}, @map_val={0x18, 0x1, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x401}, @initr0={0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x2}, @ldst={0x2, 0x3, 0x2, 0x9, 0x3, 0x1, 0x4}, @tail_call={{0x18, 0x2, 0x1, 0x0, r2}}, @jmp={0x5, 0x1, 0xa, 0x9, 0x3, 0xffffffffffffffe0}, @generic={0x9, 0x1, 0x5, 0x4, 0x8001}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @ldst={0x2, 0x1, 0x1, 0xb, 0xb, 0x20, 0x8}, @map_idx={0x18, 0x6, 0x5, 0x0, 0x10}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000080)='GPL\x00', 0x800, 0xd4, &(0x7f00000002c0)=""/212, 0x41100, 0x6, '\x00', 0x0, 0x8, r5, 0x8, &(0x7f0000000100)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x2, 0x475f, 0x401}, 0x10, r6, 0xffffffffffffffff, 0x4, &(0x7f0000000800)=[0xffffffffffffffff, r7], &(0x7f0000000ac0)=[{0x3, 0x2, 0xc, 0x6}, {0x3, 0x4, 0xb, 0xa}, {0x2, 0x2, 0xe, 0x2}, {0x3, 0x1, 0x5, 0x8}], 0x10, 0x20}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) getpid() perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f00000005c0)={0x1, 0x80, 0x0, 0x0, 0xbe, 0x0, 0x0, 0x0, 0x28000, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x400, 0xd7, 0x5, 0x0, 0x965, 0x0, 0xfffffffffffffffb}, 0x0, 0xd, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f00000006c0)) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0xe5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) ioctl$SIOCSIFHWADDR(r8, 0x8914, &(0x7f0000000040)={'sit0\x00', @local}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f00000008c0)='\x00'}, 0x30) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000e00)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8890}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000840)={0x0, 0x80, 0x2, 0x1, 0x9, 0x0, 0x0, 0x7, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x3ff, 0x0, @perf_config_ext={0x67}, 0x200, 0x612, 0x0, 0x0, 0xa0, 0x0, 0xd171, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x3, r4, 0x1) ioctl$SIOCSIFHWADDR(r9, 0x8914, &(0x7f0000000040)={'sit0\x00', @random="4f33e363a4b1"}) 14:38:16 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e3a0222003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) [ 1254.538941][T32284] netlink: 133800 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1254.558567][T32288] device sit0 left promiscuous mode 14:38:16 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e3c0222003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:16 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e3e0222003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:16 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004050e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) [ 1254.650148][T32291] device sit0 entered promiscuous mode 14:38:16 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e400222003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:16 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e420222003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) [ 1254.758328][T32297] netlink: 133544 bytes leftover after parsing attributes in process `syz-executor.4'. 14:38:16 executing program 2: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x10) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x1a, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f97e24fc6004030e0008740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x3, 0x5, 0x5, 0x0, 0x0, 0x8, 0x4000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x101, 0x1, @perf_config_ext={0x7fff, 0x8}, 0x4000, 0x3, 0x0, 0x3, 0x80000001, 0x80, 0x40, 0x0, 0x0, 0x0, 0x81}, 0xffffffffffffffff, 0x8, r0, 0x0) 14:38:16 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004060e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:16 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e440222003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:16 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r5 = openat$cgroup_ro(r1, &(0x7f00000000c0)='blkio.bfq.sectors\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={r3, 0xe0, &(0x7f0000000940)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000200)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x1, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000640)=[0x0], 0x0, 0x6a, &(0x7f0000000680)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x6e, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r7 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000a40)={0x1b, 0x0, 0x0, 0x7, 0x0, r0, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x5, 0x3}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x1c, 0x21, &(0x7f0000000440)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x905, 0x0, 0x0, 0x0, 0x1}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@generic={0x80, 0x6, 0x8, 0x3f, 0xda}, @map_val={0x18, 0x1, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x401}, @initr0={0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x2}, @ldst={0x2, 0x3, 0x2, 0x9, 0x3, 0x1, 0x4}, @tail_call={{0x18, 0x2, 0x1, 0x0, r2}}, @jmp={0x5, 0x1, 0xa, 0x9, 0x3, 0xffffffffffffffe0}, @generic={0x9, 0x1, 0x5, 0x4, 0x8001}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @ldst={0x2, 0x1, 0x1, 0xb, 0xb, 0x20, 0x8}, @map_idx={0x18, 0x6, 0x5, 0x0, 0x10}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000080)='GPL\x00', 0x800, 0xd4, &(0x7f00000002c0)=""/212, 0x41100, 0x6, '\x00', 0x0, 0x8, r5, 0x8, &(0x7f0000000100)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x2, 0x475f, 0x401}, 0x10, r6, 0xffffffffffffffff, 0x4, &(0x7f0000000800)=[0xffffffffffffffff, r7], &(0x7f0000000ac0)=[{0x3, 0x2, 0xc, 0x6}, {0x3, 0x4, 0xb, 0xa}, {0x2, 0x2, 0xe, 0x2}, {0x3, 0x1, 0x5, 0x8}], 0x10, 0x20}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) getpid() perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f00000005c0)={0x1, 0x80, 0x0, 0x0, 0xbe, 0x0, 0x0, 0x0, 0x28000, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x400, 0xd7, 0x5, 0x0, 0x965, 0x0, 0xfffffffffffffffb}, 0x0, 0xd, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f00000006c0)) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0xe5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) ioctl$SIOCSIFHWADDR(r8, 0x8914, &(0x7f0000000040)={'sit0\x00', @local}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f00000008c0)='\x00'}, 0x30) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000e00)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8890}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000840)={0x0, 0x80, 0x2, 0x1, 0x9, 0x0, 0x0, 0x7, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x3ff, 0x0, @perf_config_ext={0x67}, 0x200, 0x612, 0x0, 0x0, 0xa0, 0x0, 0xd171, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x3, r4, 0x1) ioctl$SIOCSIFHWADDR(r9, 0x8914, &(0x7f0000000040)={'sit0\x00', @random="4f33e363a4b1"}) [ 1254.910429][T32305] netlink: 133288 bytes leftover after parsing attributes in process `syz-executor.4'. 14:38:16 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004070e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) [ 1254.955819][T32303] netlink: 134056 bytes leftover after parsing attributes in process `syz-executor.2'. 14:38:16 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e460222003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) [ 1255.003559][T32310] device sit0 left promiscuous mode [ 1255.034416][T32303] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 1255.049897][T32303] platform regulatory.0: Falling back to sysfs fallback for: regulatory.db 14:38:16 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e480222003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:17 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004080e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) [ 1255.114247][T32315] device sit0 entered promiscuous mode 14:38:17 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e4a0222003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:17 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e4c0222003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:17 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e4e0222003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:17 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004090e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:17 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e500222003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:17 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r5 = openat$cgroup_ro(r1, &(0x7f00000000c0)='blkio.bfq.sectors\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={r3, 0xe0, &(0x7f0000000940)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000200)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x1, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000640)=[0x0], 0x0, 0x6a, &(0x7f0000000680)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x6e, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r7 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000a40)={0x1b, 0x0, 0x0, 0x7, 0x0, r0, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x5, 0x3}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x1c, 0x21, &(0x7f0000000440)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x905, 0x0, 0x0, 0x0, 0x1}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@generic={0x80, 0x6, 0x8, 0x3f, 0xda}, @map_val={0x18, 0x1, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x401}, @initr0={0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x2}, @ldst={0x2, 0x3, 0x2, 0x9, 0x3, 0x1, 0x4}, @tail_call={{0x18, 0x2, 0x1, 0x0, r2}}, @jmp={0x5, 0x1, 0xa, 0x9, 0x3, 0xffffffffffffffe0}, @generic={0x9, 0x1, 0x5, 0x4, 0x8001}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @ldst={0x2, 0x1, 0x1, 0xb, 0xb, 0x20, 0x8}, @map_idx={0x18, 0x6, 0x5, 0x0, 0x10}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000080)='GPL\x00', 0x800, 0xd4, &(0x7f00000002c0)=""/212, 0x41100, 0x6, '\x00', 0x0, 0x8, r5, 0x8, &(0x7f0000000100)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x2, 0x475f, 0x401}, 0x10, r6, 0xffffffffffffffff, 0x4, &(0x7f0000000800)=[0xffffffffffffffff, r7], &(0x7f0000000ac0)=[{0x3, 0x2, 0xc, 0x6}, {0x3, 0x4, 0xb, 0xa}, {0x2, 0x2, 0xe, 0x2}, {0x3, 0x1, 0x5, 0x8}], 0x10, 0x20}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) getpid() perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f00000005c0)={0x1, 0x80, 0x0, 0x0, 0xbe, 0x0, 0x0, 0x0, 0x28000, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x400, 0xd7, 0x5, 0x0, 0x965, 0x0, 0xfffffffffffffffb}, 0x0, 0xd, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f00000006c0)) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0xe5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) ioctl$SIOCSIFHWADDR(r8, 0x8914, &(0x7f0000000040)={'sit0\x00', @local}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f00000008c0)='\x00'}, 0x30) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000e00)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8890}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000840)={0x0, 0x80, 0x2, 0x1, 0x9, 0x0, 0x0, 0x7, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x3ff, 0x0, @perf_config_ext={0x67}, 0x200, 0x612, 0x0, 0x0, 0xa0, 0x0, 0xd171, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x3, r4, 0x1) ioctl$SIOCSIFHWADDR(r9, 0x8914, &(0x7f0000000040)={'sit0\x00', @random="4f33e363a4b1"}) 14:38:17 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc60040a0e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:17 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e520222003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:17 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc60040b0e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) [ 1255.423617][T32331] device sit0 left promiscuous mode 14:38:17 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e540222003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:17 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e560222003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:17 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc60040c0e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:17 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc60040d0e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:17 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e580222003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:17 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc60040e0e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:17 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e5a0222003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) [ 1255.635535][T32336] device sit0 entered promiscuous mode 14:38:17 executing program 2: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x10) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x1a, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f97e24fc6004030e0025740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x3, 0x5, 0x5, 0x0, 0x0, 0x8, 0x4000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x101, 0x1, @perf_config_ext={0x7fff, 0x8}, 0x4000, 0x3, 0x0, 0x3, 0x80000001, 0x80, 0x40, 0x0, 0x0, 0x0, 0x81}, 0xffffffffffffffff, 0x8, r0, 0x0) 14:38:17 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e5c0222003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:17 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004100e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:17 executing program 2: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x10) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x1a, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f97e24fc6004030e003c740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x3, 0x5, 0x5, 0x0, 0x0, 0x8, 0x4000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x101, 0x1, @perf_config_ext={0x7fff, 0x8}, 0x4000, 0x3, 0x0, 0x3, 0x80000001, 0x80, 0x40, 0x0, 0x0, 0x0, 0x81}, 0xffffffffffffffff, 0x8, r0, 0x0) 14:38:17 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e5e0222003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:17 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004110e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:17 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e600222003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:17 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004120e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:17 executing program 2: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x10) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x1a, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f97e24fc6004030e0064740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x3, 0x5, 0x5, 0x0, 0x0, 0x8, 0x4000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x101, 0x1, @perf_config_ext={0x7fff, 0x8}, 0x4000, 0x3, 0x0, 0x3, 0x80000001, 0x80, 0x40, 0x0, 0x0, 0x0, 0x81}, 0xffffffffffffffff, 0x8, r0, 0x0) 14:38:17 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r5 = openat$cgroup_ro(r1, &(0x7f00000000c0)='blkio.bfq.sectors\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={r3, 0xe0, &(0x7f0000000940)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000200)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x1, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000640)=[0x0], 0x0, 0x6a, &(0x7f0000000680)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x6e, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r7 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000a40)={0x1b, 0x0, 0x0, 0x7, 0x0, r0, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x5, 0x3}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x1c, 0x21, &(0x7f0000000440)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x905, 0x0, 0x0, 0x0, 0x1}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@generic={0x80, 0x6, 0x8, 0x3f, 0xda}, @map_val={0x18, 0x1, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x401}, @initr0={0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x2}, @ldst={0x2, 0x3, 0x2, 0x9, 0x3, 0x1, 0x4}, @tail_call={{0x18, 0x2, 0x1, 0x0, r2}}, @jmp={0x5, 0x1, 0xa, 0x9, 0x3, 0xffffffffffffffe0}, @generic={0x9, 0x1, 0x5, 0x4, 0x8001}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @ldst={0x2, 0x1, 0x1, 0xb, 0xb, 0x20, 0x8}, @map_idx={0x18, 0x6, 0x5, 0x0, 0x10}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000080)='GPL\x00', 0x800, 0xd4, &(0x7f00000002c0)=""/212, 0x41100, 0x6, '\x00', 0x0, 0x8, r5, 0x8, &(0x7f0000000100)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x2, 0x475f, 0x401}, 0x10, r6, 0xffffffffffffffff, 0x4, &(0x7f0000000800)=[0xffffffffffffffff, r7], &(0x7f0000000ac0)=[{0x3, 0x2, 0xc, 0x6}, {0x3, 0x4, 0xb, 0xa}, {0x2, 0x2, 0xe, 0x2}, {0x3, 0x1, 0x5, 0x8}], 0x10, 0x20}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) getpid() perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f00000005c0)={0x1, 0x80, 0x0, 0x0, 0xbe, 0x0, 0x0, 0x0, 0x28000, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x400, 0xd7, 0x5, 0x0, 0x965, 0x0, 0xfffffffffffffffb}, 0x0, 0xd, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f00000006c0)) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0xe5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) ioctl$SIOCSIFHWADDR(r8, 0x8914, &(0x7f0000000040)={'sit0\x00', @local}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f00000008c0)='\x00'}, 0x30) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000e00)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8890}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000840)={0x0, 0x80, 0x2, 0x1, 0x9, 0x0, 0x0, 0x7, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x3ff, 0x0, @perf_config_ext={0x67}, 0x200, 0x612, 0x0, 0x0, 0xa0, 0x0, 0xd171, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x3, r4, 0x1) ioctl$SIOCSIFHWADDR(r9, 0x8914, &(0x7f0000000040)={'sit0\x00', @random="4f33e363a4b1"}) 14:38:17 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e620222003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:18 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004180e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) [ 1256.115625][T32375] device sit0 left promiscuous mode 14:38:18 executing program 2: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x10) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x1a, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f97e24fc6004030e007e740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x3, 0x5, 0x5, 0x0, 0x0, 0x8, 0x4000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x101, 0x1, @perf_config_ext={0x7fff, 0x8}, 0x4000, 0x3, 0x0, 0x3, 0x80000001, 0x80, 0x40, 0x0, 0x0, 0x0, 0x81}, 0xffffffffffffffff, 0x8, r0, 0x0) 14:38:18 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e640222003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:18 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004640e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:18 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e660222003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:18 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc60040302000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:18 executing program 2: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x10) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x1a, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f97e24fc6004030e000a020000053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x3, 0x5, 0x5, 0x0, 0x0, 0x8, 0x4000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x101, 0x1, @perf_config_ext={0x7fff, 0x8}, 0x4000, 0x3, 0x0, 0x3, 0x80000001, 0x80, 0x40, 0x0, 0x0, 0x0, 0x81}, 0xffffffffffffffff, 0x8, r0, 0x0) 14:38:18 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e680222003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:18 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc60040317010a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:18 executing program 2: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x10) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x1a, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f97e24fc6004030e000a020100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x3, 0x5, 0x5, 0x0, 0x0, 0x8, 0x4000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x101, 0x1, @perf_config_ext={0x7fff, 0x8}, 0x4000, 0x3, 0x0, 0x3, 0x80000001, 0x80, 0x40, 0x0, 0x0, 0x0, 0x81}, 0xffffffffffffffff, 0x8, r0, 0x0) 14:38:18 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc60040331010a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:18 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e6a0222003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:18 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e6c0222003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) [ 1256.571091][T32378] device sit0 entered promiscuous mode 14:38:18 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e020a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:18 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e6e0222003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:18 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e700222003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:18 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e720222003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:18 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r5 = openat$cgroup_ro(r1, &(0x7f00000000c0)='blkio.bfq.sectors\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={r3, 0xe0, &(0x7f0000000940)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000200)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x1, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000640)=[0x0], 0x0, 0x6a, &(0x7f0000000680)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x6e, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r7 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000a40)={0x1b, 0x0, 0x0, 0x7, 0x0, r0, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x5, 0x3}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x1c, 0x21, &(0x7f0000000440)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x905, 0x0, 0x0, 0x0, 0x1}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@generic={0x80, 0x6, 0x8, 0x3f, 0xda}, @map_val={0x18, 0x1, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x401}, @initr0={0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x2}, @ldst={0x2, 0x3, 0x2, 0x9, 0x3, 0x1, 0x4}, @tail_call={{0x18, 0x2, 0x1, 0x0, r2}}, @jmp={0x5, 0x1, 0xa, 0x9, 0x3, 0xffffffffffffffe0}, @generic={0x9, 0x1, 0x5, 0x4, 0x8001}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @ldst={0x2, 0x1, 0x1, 0xb, 0xb, 0x20, 0x8}, @map_idx={0x18, 0x6, 0x5, 0x0, 0x10}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000080)='GPL\x00', 0x800, 0xd4, &(0x7f00000002c0)=""/212, 0x41100, 0x6, '\x00', 0x0, 0x8, r5, 0x8, &(0x7f0000000100)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x2, 0x475f, 0x401}, 0x10, r6, 0xffffffffffffffff, 0x4, &(0x7f0000000800)=[0xffffffffffffffff, r7], &(0x7f0000000ac0)=[{0x3, 0x2, 0xc, 0x6}, {0x3, 0x4, 0xb, 0xa}, {0x2, 0x2, 0xe, 0x2}, {0x3, 0x1, 0x5, 0x8}], 0x10, 0x20}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) getpid() perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f00000005c0)={0x1, 0x80, 0x0, 0x0, 0xbe, 0x0, 0x0, 0x0, 0x28000, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x400, 0xd7, 0x5, 0x0, 0x965, 0x0, 0xfffffffffffffffb}, 0x0, 0xd, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f00000006c0)) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0xe5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) ioctl$SIOCSIFHWADDR(r8, 0x8914, &(0x7f0000000040)={'sit0\x00', @local}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f00000008c0)='\x00'}, 0x30) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000e00)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8890}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000840)={0x0, 0x80, 0x2, 0x1, 0x9, 0x0, 0x0, 0x7, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x3ff, 0x0, @perf_config_ext={0x67}, 0x200, 0x612, 0x0, 0x0, 0xa0, 0x0, 0xd171, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x3, r4, 0x1) ioctl$SIOCSIFHWADDR(r9, 0x8914, &(0x7f0000000040)={'sit0\x00', @random="4f33e363a4b1"}) 14:38:18 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e740222003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:18 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e030a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) [ 1256.780256][T32402] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 1256.819964][T32402] platform regulatory.0: Falling back to sysfs fallback for: regulatory.db [ 1256.859071][T32418] device sit0 left promiscuous mode 14:38:18 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e040a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:18 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e760222003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) [ 1256.928067][T32422] device sit0 entered promiscuous mode 14:38:18 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e780222003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:19 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e050a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:19 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e7a0222003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:19 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r5 = openat$cgroup_ro(r1, &(0x7f00000000c0)='blkio.bfq.sectors\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={r3, 0xe0, &(0x7f0000000940)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000200)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x1, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000640)=[0x0], 0x0, 0x6a, &(0x7f0000000680)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x6e, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r7 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000a40)={0x1b, 0x0, 0x0, 0x7, 0x0, r0, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x5, 0x3}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x1c, 0x21, &(0x7f0000000440)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x905, 0x0, 0x0, 0x0, 0x1}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@generic={0x80, 0x6, 0x8, 0x3f, 0xda}, @map_val={0x18, 0x1, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x401}, @initr0={0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x2}, @ldst={0x2, 0x3, 0x2, 0x9, 0x3, 0x1, 0x4}, @tail_call={{0x18, 0x2, 0x1, 0x0, r2}}, @jmp={0x5, 0x1, 0xa, 0x9, 0x3, 0xffffffffffffffe0}, @generic={0x9, 0x1, 0x5, 0x4, 0x8001}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @ldst={0x2, 0x1, 0x1, 0xb, 0xb, 0x20, 0x8}, @map_idx={0x18, 0x6, 0x5, 0x0, 0x10}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000080)='GPL\x00', 0x800, 0xd4, &(0x7f00000002c0)=""/212, 0x41100, 0x6, '\x00', 0x0, 0x8, r5, 0x8, &(0x7f0000000100)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x2, 0x475f, 0x401}, 0x10, r6, 0xffffffffffffffff, 0x4, &(0x7f0000000800)=[0xffffffffffffffff, r7], &(0x7f0000000ac0)=[{0x3, 0x2, 0xc, 0x6}, {0x3, 0x4, 0xb, 0xa}, {0x2, 0x2, 0xe, 0x2}, {0x3, 0x1, 0x5, 0x8}], 0x10, 0x20}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) getpid() perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f00000005c0)={0x1, 0x80, 0x0, 0x0, 0xbe, 0x0, 0x0, 0x0, 0x28000, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x400, 0xd7, 0x5, 0x0, 0x965, 0x0, 0xfffffffffffffffb}, 0x0, 0xd, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f00000006c0)) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0xe5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) ioctl$SIOCSIFHWADDR(r8, 0x8914, &(0x7f0000000040)={'sit0\x00', @local}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f00000008c0)='\x00'}, 0x30) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000e00)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8890}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000840)={0x0, 0x80, 0x2, 0x1, 0x9, 0x0, 0x0, 0x7, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x3ff, 0x0, @perf_config_ext={0x67}, 0x200, 0x612, 0x0, 0x0, 0xa0, 0x0, 0xd171, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x3, r4, 0x1) ioctl$SIOCSIFHWADDR(r9, 0x8914, &(0x7f0000000040)={'sit0\x00', @random="4f33e363a4b1"}) 14:38:19 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e060a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:19 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e7c0222003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) [ 1257.194602][T32433] device sit0 left promiscuous mode 14:38:19 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e7e0222003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) [ 1257.273580][T32435] device sit0 entered promiscuous mode 14:38:19 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e800222003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:19 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e820222003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:19 executing program 2: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x10) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x1a, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f97e24fc6004030e000a0a0100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x3, 0x5, 0x5, 0x0, 0x0, 0x8, 0x4000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x101, 0x1, @perf_config_ext={0x7fff, 0x8}, 0x4000, 0x3, 0x0, 0x3, 0x80000001, 0x80, 0x40, 0x0, 0x0, 0x0, 0x81}, 0xffffffffffffffff, 0x8, r0, 0x0) 14:38:19 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e840222003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:19 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e860222003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:19 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e070a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:19 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r5 = openat$cgroup_ro(r1, &(0x7f00000000c0)='blkio.bfq.sectors\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={r3, 0xe0, &(0x7f0000000940)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000200)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x1, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000640)=[0x0], 0x0, 0x6a, &(0x7f0000000680)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x6e, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r7 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000a40)={0x1b, 0x0, 0x0, 0x7, 0x0, r0, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x5, 0x3}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x1c, 0x21, &(0x7f0000000440)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x905, 0x0, 0x0, 0x0, 0x1}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@generic={0x80, 0x6, 0x8, 0x3f, 0xda}, @map_val={0x18, 0x1, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x401}, @initr0={0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x2}, @ldst={0x2, 0x3, 0x2, 0x9, 0x3, 0x1, 0x4}, @tail_call={{0x18, 0x2, 0x1, 0x0, r2}}, @jmp={0x5, 0x1, 0xa, 0x9, 0x3, 0xffffffffffffffe0}, @generic={0x9, 0x1, 0x5, 0x4, 0x8001}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @ldst={0x2, 0x1, 0x1, 0xb, 0xb, 0x20, 0x8}, @map_idx={0x18, 0x6, 0x5, 0x0, 0x10}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000080)='GPL\x00', 0x800, 0xd4, &(0x7f00000002c0)=""/212, 0x41100, 0x6, '\x00', 0x0, 0x8, r5, 0x8, &(0x7f0000000100)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x2, 0x475f, 0x401}, 0x10, r6, 0xffffffffffffffff, 0x4, &(0x7f0000000800)=[0xffffffffffffffff, r7], &(0x7f0000000ac0)=[{0x3, 0x2, 0xc, 0x6}, {0x3, 0x4, 0xb, 0xa}, {0x2, 0x2, 0xe, 0x2}, {0x3, 0x1, 0x5, 0x8}], 0x10, 0x20}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) getpid() perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f00000005c0)={0x1, 0x80, 0x0, 0x0, 0xbe, 0x0, 0x0, 0x0, 0x28000, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x400, 0xd7, 0x5, 0x0, 0x965, 0x0, 0xfffffffffffffffb}, 0x0, 0xd, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f00000006c0)) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0xe5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) ioctl$SIOCSIFHWADDR(r8, 0x8914, &(0x7f0000000040)={'sit0\x00', @local}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f00000008c0)='\x00'}, 0x30) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000e00)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8890}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000840)={0x0, 0x80, 0x2, 0x1, 0x9, 0x0, 0x0, 0x7, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x3ff, 0x0, @perf_config_ext={0x67}, 0x200, 0x612, 0x0, 0x0, 0xa0, 0x0, 0xd171, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x3, r4, 0x1) ioctl$SIOCSIFHWADDR(r9, 0x8914, &(0x7f0000000040)={'sit0\x00', @random="4f33e363a4b1"}) [ 1257.544264][T32447] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 1257.559779][T32447] platform regulatory.0: Falling back to sysfs fallback for: regulatory.db 14:38:19 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e080a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:19 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e880222003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:19 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e090a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) [ 1257.661174][T32456] device sit0 left promiscuous mode 14:38:19 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e8a0222003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:19 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e8c0222003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:19 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e8e0222003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:19 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e900222003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:19 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e0a0a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:19 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e920222003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) [ 1257.847912][T32463] device sit0 entered promiscuous mode 14:38:19 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e940222003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:19 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e960222003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:19 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e980222003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:19 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e0b0a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:19 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e9a0222003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:19 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r5 = openat$cgroup_ro(r1, &(0x7f00000000c0)='blkio.bfq.sectors\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={r3, 0xe0, &(0x7f0000000940)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000200)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x1, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000640)=[0x0], 0x0, 0x6a, &(0x7f0000000680)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x6e, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r7 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000a40)={0x1b, 0x0, 0x0, 0x7, 0x0, r0, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x5, 0x3}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x1c, 0x21, &(0x7f0000000440)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x905, 0x0, 0x0, 0x0, 0x1}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@generic={0x80, 0x6, 0x8, 0x3f, 0xda}, @map_val={0x18, 0x1, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x401}, @initr0={0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x2}, @ldst={0x2, 0x3, 0x2, 0x9, 0x3, 0x1, 0x4}, @tail_call={{0x18, 0x2, 0x1, 0x0, r2}}, @jmp={0x5, 0x1, 0xa, 0x9, 0x3, 0xffffffffffffffe0}, @generic={0x9, 0x1, 0x5, 0x4, 0x8001}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @ldst={0x2, 0x1, 0x1, 0xb, 0xb, 0x20, 0x8}, @map_idx={0x18, 0x6, 0x5, 0x0, 0x10}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000080)='GPL\x00', 0x800, 0xd4, &(0x7f00000002c0)=""/212, 0x41100, 0x6, '\x00', 0x0, 0x8, r5, 0x8, &(0x7f0000000100)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x2, 0x475f, 0x401}, 0x10, r6, 0xffffffffffffffff, 0x4, &(0x7f0000000800)=[0xffffffffffffffff, r7], &(0x7f0000000ac0)=[{0x3, 0x2, 0xc, 0x6}, {0x3, 0x4, 0xb, 0xa}, {0x2, 0x2, 0xe, 0x2}, {0x3, 0x1, 0x5, 0x8}], 0x10, 0x20}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) getpid() perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f00000005c0)={0x1, 0x80, 0x0, 0x0, 0xbe, 0x0, 0x0, 0x0, 0x28000, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x400, 0xd7, 0x5, 0x0, 0x965, 0x0, 0xfffffffffffffffb}, 0x0, 0xd, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f00000006c0)) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0xe5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) ioctl$SIOCSIFHWADDR(r8, 0x8914, &(0x7f0000000040)={'sit0\x00', @local}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f00000008c0)='\x00'}, 0x30) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000e00)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8890}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000840)={0x0, 0x80, 0x2, 0x1, 0x9, 0x0, 0x0, 0x7, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x3ff, 0x0, @perf_config_ext={0x67}, 0x200, 0x612, 0x0, 0x0, 0xa0, 0x0, 0xd171, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x3, r4, 0x1) ioctl$SIOCSIFHWADDR(r9, 0x8914, &(0x7f0000000040)={'sit0\x00', @random="4f33e363a4b1"}) 14:38:19 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e9c0222003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:20 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e9e0222003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) [ 1258.124432][T32486] device sit0 left promiscuous mode 14:38:20 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00ea00222003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:20 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00ea20222003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:20 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e0c0a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) [ 1258.262236][T32492] device sit0 entered promiscuous mode 14:38:20 executing program 2: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x10) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x1a, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f97e24fc6004030e000a250100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x3, 0x5, 0x5, 0x0, 0x0, 0x8, 0x4000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x101, 0x1, @perf_config_ext={0x7fff, 0x8}, 0x4000, 0x3, 0x0, 0x3, 0x80000001, 0x80, 0x40, 0x0, 0x0, 0x0, 0x81}, 0xffffffffffffffff, 0x8, r0, 0x0) 14:38:20 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00ea40222003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:20 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00ea60222003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:20 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00ea80222003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:20 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00eaa0222003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:20 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r5 = openat$cgroup_ro(r1, &(0x7f00000000c0)='blkio.bfq.sectors\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={r3, 0xe0, &(0x7f0000000940)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000200)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x1, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000640)=[0x0], 0x0, 0x6a, &(0x7f0000000680)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x6e, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r7 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000a40)={0x1b, 0x0, 0x0, 0x7, 0x0, r0, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x5, 0x3}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x1c, 0x21, &(0x7f0000000440)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x905, 0x0, 0x0, 0x0, 0x1}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@generic={0x80, 0x6, 0x8, 0x3f, 0xda}, @map_val={0x18, 0x1, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x401}, @initr0={0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x2}, @ldst={0x2, 0x3, 0x2, 0x9, 0x3, 0x1, 0x4}, @tail_call={{0x18, 0x2, 0x1, 0x0, r2}}, @jmp={0x5, 0x1, 0xa, 0x9, 0x3, 0xffffffffffffffe0}, @generic={0x9, 0x1, 0x5, 0x4, 0x8001}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @ldst={0x2, 0x1, 0x1, 0xb, 0xb, 0x20, 0x8}, @map_idx={0x18, 0x6, 0x5, 0x0, 0x10}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000080)='GPL\x00', 0x800, 0xd4, &(0x7f00000002c0)=""/212, 0x41100, 0x6, '\x00', 0x0, 0x8, r5, 0x8, &(0x7f0000000100)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x2, 0x475f, 0x401}, 0x10, r6, 0xffffffffffffffff, 0x4, &(0x7f0000000800)=[0xffffffffffffffff, r7], &(0x7f0000000ac0)=[{0x3, 0x2, 0xc, 0x6}, {0x3, 0x4, 0xb, 0xa}, {0x2, 0x2, 0xe, 0x2}, {0x3, 0x1, 0x5, 0x8}], 0x10, 0x20}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) getpid() perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f00000005c0)={0x1, 0x80, 0x0, 0x0, 0xbe, 0x0, 0x0, 0x0, 0x28000, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x400, 0xd7, 0x5, 0x0, 0x965, 0x0, 0xfffffffffffffffb}, 0x0, 0xd, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f00000006c0)) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0xe5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) ioctl$SIOCSIFHWADDR(r8, 0x8914, &(0x7f0000000040)={'sit0\x00', @local}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f00000008c0)='\x00'}, 0x30) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000e00)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8890}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000840)={0x0, 0x80, 0x2, 0x1, 0x9, 0x0, 0x0, 0x7, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x3ff, 0x0, @perf_config_ext={0x67}, 0x200, 0x612, 0x0, 0x0, 0xa0, 0x0, 0xd171, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x3, r4, 0x1) ioctl$SIOCSIFHWADDR(r9, 0x8914, &(0x7f0000000040)={'sit0\x00', @random="4f33e363a4b1"}) 14:38:20 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e0d0a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) [ 1258.547714][T32502] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 1258.572423][T32502] platform regulatory.0: Falling back to sysfs fallback for: regulatory.db 14:38:20 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00eac0222003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) [ 1258.593438][T32513] __nla_validate_parse: 17 callbacks suppressed [ 1258.593458][T32513] netlink: 134056 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1258.619576][T32512] device sit0 left promiscuous mode 14:38:20 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00eae0222003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:20 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00eb00222003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:20 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00eb20222003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:20 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00eb40222003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:20 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e0e0a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) [ 1258.784320][T32516] device sit0 entered promiscuous mode 14:38:20 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00ed80222003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) [ 1258.862061][T32525] netlink: 134056 bytes leftover after parsing attributes in process `syz-executor.4'. 14:38:20 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00eda0222003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:20 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00edc0222003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:20 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e0f0a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:20 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020222003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:20 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r5 = openat$cgroup_ro(r1, &(0x7f00000000c0)='blkio.bfq.sectors\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={r3, 0xe0, &(0x7f0000000940)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000200)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x1, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000640)=[0x0], 0x0, 0x6a, &(0x7f0000000680)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x6e, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r7 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000a40)={0x1b, 0x0, 0x0, 0x7, 0x0, r0, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x5, 0x3}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x1c, 0x21, &(0x7f0000000440)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x905, 0x0, 0x0, 0x0, 0x1}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@generic={0x80, 0x6, 0x8, 0x3f, 0xda}, @map_val={0x18, 0x1, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x401}, @initr0={0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x2}, @ldst={0x2, 0x3, 0x2, 0x9, 0x3, 0x1, 0x4}, @tail_call={{0x18, 0x2, 0x1, 0x0, r2}}, @jmp={0x5, 0x1, 0xa, 0x9, 0x3, 0xffffffffffffffe0}, @generic={0x9, 0x1, 0x5, 0x4, 0x8001}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @ldst={0x2, 0x1, 0x1, 0xb, 0xb, 0x20, 0x8}, @map_idx={0x18, 0x6, 0x5, 0x0, 0x10}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000080)='GPL\x00', 0x800, 0xd4, &(0x7f00000002c0)=""/212, 0x41100, 0x6, '\x00', 0x0, 0x8, r5, 0x8, &(0x7f0000000100)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x2, 0x475f, 0x401}, 0x10, r6, 0xffffffffffffffff, 0x4, &(0x7f0000000800)=[0xffffffffffffffff, r7], &(0x7f0000000ac0)=[{0x3, 0x2, 0xc, 0x6}, {0x3, 0x4, 0xb, 0xa}, {0x2, 0x2, 0xe, 0x2}, {0x3, 0x1, 0x5, 0x8}], 0x10, 0x20}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) getpid() perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f00000005c0)={0x1, 0x80, 0x0, 0x0, 0xbe, 0x0, 0x0, 0x0, 0x28000, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x400, 0xd7, 0x5, 0x0, 0x965, 0x0, 0xfffffffffffffffb}, 0x0, 0xd, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f00000006c0)) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0xe5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) ioctl$SIOCSIFHWADDR(r8, 0x8914, &(0x7f0000000040)={'sit0\x00', @local}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f00000008c0)='\x00'}, 0x30) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000e00)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8890}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000840)={0x0, 0x80, 0x2, 0x1, 0x9, 0x0, 0x0, 0x7, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x3ff, 0x0, @perf_config_ext={0x67}, 0x200, 0x612, 0x0, 0x0, 0xa0, 0x0, 0xd171, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x3, r4, 0x1) ioctl$SIOCSIFHWADDR(r9, 0x8914, &(0x7f0000000040)={'sit0\x00', @random="4f33e363a4b1"}) 14:38:20 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020322003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) [ 1259.070220][T32536] device sit0 left promiscuous mode [ 1259.077789][T32538] netlink: 134056 bytes leftover after parsing attributes in process `syz-executor.4'. 14:38:21 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020422003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:21 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e100a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) [ 1259.142593][T32541] device sit0 entered promiscuous mode 14:38:21 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020522003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:21 executing program 2: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x10) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x1a, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f97e24fc6004030e000a740200053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x3, 0x5, 0x5, 0x0, 0x0, 0x8, 0x4000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x101, 0x1, @perf_config_ext={0x7fff, 0x8}, 0x4000, 0x3, 0x0, 0x3, 0x80000001, 0x80, 0x40, 0x0, 0x0, 0x0, 0x81}, 0xffffffffffffffff, 0x8, r0, 0x0) 14:38:21 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020622003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) [ 1259.217385][T32546] netlink: 134056 bytes leftover after parsing attributes in process `syz-executor.4'. 14:38:21 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020722003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) [ 1259.295272][T32550] netlink: 134056 bytes leftover after parsing attributes in process `syz-executor.2'. 14:38:21 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r5 = openat$cgroup_ro(r1, &(0x7f00000000c0)='blkio.bfq.sectors\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={r3, 0xe0, &(0x7f0000000940)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000200)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x1, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000640)=[0x0], 0x0, 0x6a, &(0x7f0000000680)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x6e, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r7 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000a40)={0x1b, 0x0, 0x0, 0x7, 0x0, r0, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x5, 0x3}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x1c, 0x21, &(0x7f0000000440)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x905, 0x0, 0x0, 0x0, 0x1}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@generic={0x80, 0x6, 0x8, 0x3f, 0xda}, @map_val={0x18, 0x1, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x401}, @initr0={0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x2}, @ldst={0x2, 0x3, 0x2, 0x9, 0x3, 0x1, 0x4}, @tail_call={{0x18, 0x2, 0x1, 0x0, r2}}, @jmp={0x5, 0x1, 0xa, 0x9, 0x3, 0xffffffffffffffe0}, @generic={0x9, 0x1, 0x5, 0x4, 0x8001}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @ldst={0x2, 0x1, 0x1, 0xb, 0xb, 0x20, 0x8}, @map_idx={0x18, 0x6, 0x5, 0x0, 0x10}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000080)='GPL\x00', 0x800, 0xd4, &(0x7f00000002c0)=""/212, 0x41100, 0x6, '\x00', 0x0, 0x8, r5, 0x8, &(0x7f0000000100)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x2, 0x475f, 0x401}, 0x10, r6, 0xffffffffffffffff, 0x4, &(0x7f0000000800)=[0xffffffffffffffff, r7], &(0x7f0000000ac0)=[{0x3, 0x2, 0xc, 0x6}, {0x3, 0x4, 0xb, 0xa}, {0x2, 0x2, 0xe, 0x2}, {0x3, 0x1, 0x5, 0x8}], 0x10, 0x20}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) getpid() perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f00000005c0)={0x1, 0x80, 0x0, 0x0, 0xbe, 0x0, 0x0, 0x0, 0x28000, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x400, 0xd7, 0x5, 0x0, 0x965, 0x0, 0xfffffffffffffffb}, 0x0, 0xd, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f00000006c0)) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0xe5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) ioctl$SIOCSIFHWADDR(r8, 0x8914, &(0x7f0000000040)={'sit0\x00', @local}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f00000008c0)='\x00'}, 0x30) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000e00)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8890}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000840)={0x0, 0x80, 0x2, 0x1, 0x9, 0x0, 0x0, 0x7, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x3ff, 0x0, @perf_config_ext={0x67}, 0x200, 0x612, 0x0, 0x0, 0xa0, 0x0, 0xd171, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x3, r4, 0x1) ioctl$SIOCSIFHWADDR(r9, 0x8914, &(0x7f0000000040)={'sit0\x00', @random="4f33e363a4b1"}) 14:38:21 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e110a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:21 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020822003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) [ 1259.406560][T32550] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 1259.422905][T32550] platform regulatory.0: Falling back to sysfs fallback for: regulatory.db 14:38:21 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020922003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) [ 1259.489447][T32558] device sit0 left promiscuous mode [ 1259.496922][T32560] netlink: 134056 bytes leftover after parsing attributes in process `syz-executor.4'. 14:38:21 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e120a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:21 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020a22003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) [ 1259.619974][T32558] device sit0 entered promiscuous mode 14:38:21 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020b22003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:21 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e180a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) [ 1259.661946][T32565] netlink: 134056 bytes leftover after parsing attributes in process `syz-executor.4'. 14:38:21 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r5 = openat$cgroup_ro(r1, &(0x7f00000000c0)='blkio.bfq.sectors\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={r3, 0xe0, &(0x7f0000000940)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000200)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x1, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000640)=[0x0], 0x0, 0x6a, &(0x7f0000000680)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x6e, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r7 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000a40)={0x1b, 0x0, 0x0, 0x7, 0x0, r0, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x5, 0x3}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x1c, 0x21, &(0x7f0000000440)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x905, 0x0, 0x0, 0x0, 0x1}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@generic={0x80, 0x6, 0x8, 0x3f, 0xda}, @map_val={0x18, 0x1, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x401}, @initr0={0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x2}, @ldst={0x2, 0x3, 0x2, 0x9, 0x3, 0x1, 0x4}, @tail_call={{0x18, 0x2, 0x1, 0x0, r2}}, @jmp={0x5, 0x1, 0xa, 0x9, 0x3, 0xffffffffffffffe0}, @generic={0x9, 0x1, 0x5, 0x4, 0x8001}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @ldst={0x2, 0x1, 0x1, 0xb, 0xb, 0x20, 0x8}, @map_idx={0x18, 0x6, 0x5, 0x0, 0x10}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000080)='GPL\x00', 0x800, 0xd4, &(0x7f00000002c0)=""/212, 0x41100, 0x6, '\x00', 0x0, 0x8, r5, 0x8, &(0x7f0000000100)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x2, 0x475f, 0x401}, 0x10, r6, 0xffffffffffffffff, 0x4, &(0x7f0000000800)=[0xffffffffffffffff, r7], &(0x7f0000000ac0)=[{0x3, 0x2, 0xc, 0x6}, {0x3, 0x4, 0xb, 0xa}, {0x2, 0x2, 0xe, 0x2}, {0x3, 0x1, 0x5, 0x8}], 0x10, 0x20}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) getpid() perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f00000005c0)={0x1, 0x80, 0x0, 0x0, 0xbe, 0x0, 0x0, 0x0, 0x28000, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x400, 0xd7, 0x5, 0x0, 0x965, 0x0, 0xfffffffffffffffb}, 0x0, 0xd, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f00000006c0)) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0xe5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) ioctl$SIOCSIFHWADDR(r8, 0x8914, &(0x7f0000000040)={'sit0\x00', @local}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f00000008c0)='\x00'}, 0x30) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000e00)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8890}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000840)={0x0, 0x80, 0x2, 0x1, 0x9, 0x0, 0x0, 0x7, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x3ff, 0x0, @perf_config_ext={0x67}, 0x200, 0x612, 0x0, 0x0, 0xa0, 0x0, 0xd171, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x3, r4, 0x1) ioctl$SIOCSIFHWADDR(r9, 0x8914, &(0x7f0000000040)={'sit0\x00', @random="4f33e363a4b1"}) 14:38:21 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020c22003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:21 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020d22003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:21 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e210a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) [ 1259.755245][T32571] netlink: 134056 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1259.782186][T32575] device sit0 left promiscuous mode 14:38:21 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020e22003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) [ 1259.846942][T32580] netlink: 134056 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1259.873370][T32579] device sit0 entered promiscuous mode 14:38:21 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020f22003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:21 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e021022003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:21 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e021122003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:21 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e250a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:21 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e021222003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:22 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r5 = openat$cgroup_ro(r1, &(0x7f00000000c0)='blkio.bfq.sectors\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={r3, 0xe0, &(0x7f0000000940)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000200)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x1, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000640)=[0x0], 0x0, 0x6a, &(0x7f0000000680)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x6e, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r7 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000a40)={0x1b, 0x0, 0x0, 0x7, 0x0, r0, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x5, 0x3}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x1c, 0x21, &(0x7f0000000440)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x905, 0x0, 0x0, 0x0, 0x1}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@generic={0x80, 0x6, 0x8, 0x3f, 0xda}, @map_val={0x18, 0x1, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x401}, @initr0={0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x2}, @ldst={0x2, 0x3, 0x2, 0x9, 0x3, 0x1, 0x4}, @tail_call={{0x18, 0x2, 0x1, 0x0, r2}}, @jmp={0x5, 0x1, 0xa, 0x9, 0x3, 0xffffffffffffffe0}, @generic={0x9, 0x1, 0x5, 0x4, 0x8001}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @ldst={0x2, 0x1, 0x1, 0xb, 0xb, 0x20, 0x8}, @map_idx={0x18, 0x6, 0x5, 0x0, 0x10}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000080)='GPL\x00', 0x800, 0xd4, &(0x7f00000002c0)=""/212, 0x41100, 0x6, '\x00', 0x0, 0x8, r5, 0x8, &(0x7f0000000100)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x2, 0x475f, 0x401}, 0x10, r6, 0xffffffffffffffff, 0x4, &(0x7f0000000800)=[0xffffffffffffffff, r7], &(0x7f0000000ac0)=[{0x3, 0x2, 0xc, 0x6}, {0x3, 0x4, 0xb, 0xa}, {0x2, 0x2, 0xe, 0x2}, {0x3, 0x1, 0x5, 0x8}], 0x10, 0x20}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) getpid() perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f00000005c0)={0x1, 0x80, 0x0, 0x0, 0xbe, 0x0, 0x0, 0x0, 0x28000, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x400, 0xd7, 0x5, 0x0, 0x965, 0x0, 0xfffffffffffffffb}, 0x0, 0xd, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f00000006c0)) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0xe5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) ioctl$SIOCSIFHWADDR(r8, 0x8914, &(0x7f0000000040)={'sit0\x00', @local}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f00000008c0)='\x00'}, 0x30) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000e00)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8890}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000840)={0x0, 0x80, 0x2, 0x1, 0x9, 0x0, 0x0, 0x7, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3ff, 0x0, @perf_config_ext={0x67}, 0x200, 0x612, 0x0, 0x0, 0xa0, 0x0, 0xd171, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x3, r4, 0x1) ioctl$SIOCSIFHWADDR(r9, 0x8914, &(0x7f0000000040)={'sit0\x00', @random="4f33e363a4b1"}) 14:38:22 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e021822003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:22 executing program 2: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x10) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x1a, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f97e24fc6004030e000a740300053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x3, 0x5, 0x5, 0x0, 0x0, 0x8, 0x4000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x101, 0x1, @perf_config_ext={0x7fff, 0x8}, 0x4000, 0x3, 0x0, 0x3, 0x80000001, 0x80, 0x40, 0x0, 0x0, 0x0, 0x81}, 0xffffffffffffffff, 0x8, r0, 0x0) 14:38:22 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e350a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:22 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e022122003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) [ 1260.143094][T32592] netlink: 134056 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1260.200794][T32596] device sit0 left promiscuous mode 14:38:22 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e022522003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:22 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e410a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) [ 1260.297475][T32602] device sit0 entered promiscuous mode 14:38:22 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e023522003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:22 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e024122003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:22 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e024822003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:22 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e024c22003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:22 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e026022003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:22 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e480a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) [ 1260.567384][T32598] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 1260.582691][T32598] platform regulatory.0: Falling back to sysfs fallback for: regulatory.db 14:38:22 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r5 = openat$cgroup_ro(r1, &(0x7f00000000c0)='blkio.bfq.sectors\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={r3, 0xe0, &(0x7f0000000940)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000200)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x1, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000640)=[0x0], 0x0, 0x6a, &(0x7f0000000680)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x6e, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r7 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000a40)={0x1b, 0x0, 0x0, 0x7, 0x0, r0, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x5, 0x3}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x1c, 0x21, &(0x7f0000000440)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x905, 0x0, 0x0, 0x0, 0x1}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@generic={0x80, 0x6, 0x8, 0x3f, 0xda}, @map_val={0x18, 0x1, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x401}, @initr0={0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x2}, @ldst={0x2, 0x3, 0x2, 0x9, 0x3, 0x1, 0x4}, @tail_call={{0x18, 0x2, 0x1, 0x0, r2}}, @jmp={0x5, 0x1, 0xa, 0x9, 0x3, 0xffffffffffffffe0}, @generic={0x9, 0x1, 0x5, 0x4, 0x8001}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @ldst={0x2, 0x1, 0x1, 0xb, 0xb, 0x20, 0x8}, @map_idx={0x18, 0x6, 0x5, 0x0, 0x10}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000080)='GPL\x00', 0x800, 0xd4, &(0x7f00000002c0)=""/212, 0x41100, 0x6, '\x00', 0x0, 0x8, r5, 0x8, &(0x7f0000000100)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x2, 0x475f, 0x401}, 0x10, r6, 0xffffffffffffffff, 0x4, &(0x7f0000000800)=[0xffffffffffffffff, r7], &(0x7f0000000ac0)=[{0x3, 0x2, 0xc, 0x6}, {0x3, 0x4, 0xb, 0xa}, {0x2, 0x2, 0xe, 0x2}, {0x3, 0x1, 0x5, 0x8}], 0x10, 0x20}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) getpid() perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f00000005c0)={0x1, 0x80, 0x0, 0x0, 0xbe, 0x0, 0x0, 0x0, 0x28000, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x400, 0xd7, 0x5, 0x0, 0x965, 0x0, 0xfffffffffffffffb}, 0x0, 0xd, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f00000006c0)) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0xe5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) ioctl$SIOCSIFHWADDR(r8, 0x8914, &(0x7f0000000040)={'sit0\x00', @local}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f00000008c0)='\x00'}, 0x30) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000e00)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8890}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000840)={0x0, 0x80, 0x2, 0x1, 0x9, 0x0, 0x0, 0x7, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3ff, 0x0, @perf_config_ext={0x67}, 0x200, 0x612, 0x0, 0x0, 0xa0, 0x0, 0xd171, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x3, r4, 0x1) ioctl$SIOCSIFHWADDR(r9, 0x8914, &(0x7f0000000040)={'sit0\x00', @random="4f33e363a4b1"}) 14:38:22 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e026822003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:22 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e4c0a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:22 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e026c22003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) [ 1260.720443][T32622] device sit0 left promiscuous mode 14:38:22 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e027422003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:22 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e027a22003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:22 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020040003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:22 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e600a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) [ 1260.874546][T32627] device sit0 entered promiscuous mode 14:38:22 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e0202d6003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:22 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020fff003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:22 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020002003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:22 executing program 2: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x10) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x1a, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f97e24fc6004030e000a740400053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x3, 0x5, 0x5, 0x0, 0x0, 0x8, 0x4000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x101, 0x1, @perf_config_ext={0x7fff, 0x8}, 0x4000, 0x3, 0x0, 0x3, 0x80000001, 0x80, 0x40, 0x0, 0x0, 0x0, 0x81}, 0xffffffffffffffff, 0x8, r0, 0x0) 14:38:22 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020010003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:23 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e640a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:23 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r5 = openat$cgroup_ro(r1, &(0x7f00000000c0)='blkio.bfq.sectors\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={r3, 0xe0, &(0x7f0000000940)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000200)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x1, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000640)=[0x0], 0x0, 0x6a, &(0x7f0000000680)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x6e, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r7 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000a40)={0x1b, 0x0, 0x0, 0x7, 0x0, r0, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x5, 0x3}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x1c, 0x21, &(0x7f0000000440)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x905, 0x0, 0x0, 0x0, 0x1}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@generic={0x80, 0x6, 0x8, 0x3f, 0xda}, @map_val={0x18, 0x1, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x401}, @initr0={0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x2}, @ldst={0x2, 0x3, 0x2, 0x9, 0x3, 0x1, 0x4}, @tail_call={{0x18, 0x2, 0x1, 0x0, r2}}, @jmp={0x5, 0x1, 0xa, 0x9, 0x3, 0xffffffffffffffe0}, @generic={0x9, 0x1, 0x5, 0x4, 0x8001}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @ldst={0x2, 0x1, 0x1, 0xb, 0xb, 0x20, 0x8}, @map_idx={0x18, 0x6, 0x5, 0x0, 0x10}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000080)='GPL\x00', 0x800, 0xd4, &(0x7f00000002c0)=""/212, 0x41100, 0x6, '\x00', 0x0, 0x8, r5, 0x8, &(0x7f0000000100)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x2, 0x475f, 0x401}, 0x10, r6, 0xffffffffffffffff, 0x4, &(0x7f0000000800)=[0xffffffffffffffff, r7], &(0x7f0000000ac0)=[{0x3, 0x2, 0xc, 0x6}, {0x3, 0x4, 0xb, 0xa}, {0x2, 0x2, 0xe, 0x2}, {0x3, 0x1, 0x5, 0x8}], 0x10, 0x20}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) getpid() perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f00000005c0)={0x1, 0x80, 0x0, 0x0, 0xbe, 0x0, 0x0, 0x0, 0x28000, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x400, 0xd7, 0x5, 0x0, 0x965, 0x0, 0xfffffffffffffffb}, 0x0, 0xd, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f00000006c0)) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0xe5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) ioctl$SIOCSIFHWADDR(r8, 0x8914, &(0x7f0000000040)={'sit0\x00', @local}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f00000008c0)='\x00'}, 0x30) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000e00)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8890}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000840)={0x0, 0x80, 0x2, 0x1, 0x9, 0x0, 0x0, 0x7, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3ff, 0x0, @perf_config_ext={0x67}, 0x200, 0x612, 0x0, 0x0, 0xa0, 0x0, 0xd171, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x3, r4, 0x1) ioctl$SIOCSIFHWADDR(r9, 0x8914, &(0x7f0000000040)={'sit0\x00', @random="4f33e363a4b1"}) 14:38:23 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e0200d6023505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:23 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e680a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:23 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022020005d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) [ 1261.229117][T32645] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 1261.253189][T32654] device sit0 left promiscuous mode 14:38:23 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022000a05d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) [ 1261.277325][T32645] platform regulatory.0: Falling back to sysfs fallback for: regulatory.db 14:38:23 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022002005d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:23 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022002305d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:23 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e6c0a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) [ 1261.415953][T32658] device sit0 entered promiscuous mode 14:38:23 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e740a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:23 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022002b05d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:23 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r5 = openat$cgroup_ro(r1, &(0x7f00000000c0)='blkio.bfq.sectors\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={r3, 0xe0, &(0x7f0000000940)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000200)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x1, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000640)=[0x0], 0x0, 0x6a, &(0x7f0000000680)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x6e, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r7 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000a40)={0x1b, 0x0, 0x0, 0x7, 0x0, r0, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x5, 0x3}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x1c, 0x21, &(0x7f0000000440)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x905, 0x0, 0x0, 0x0, 0x1}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@generic={0x80, 0x6, 0x8, 0x3f, 0xda}, @map_val={0x18, 0x1, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x401}, @initr0={0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x2}, @ldst={0x2, 0x3, 0x2, 0x9, 0x3, 0x1, 0x4}, @tail_call={{0x18, 0x2, 0x1, 0x0, r2}}, @jmp={0x5, 0x1, 0xa, 0x9, 0x3, 0xffffffffffffffe0}, @generic={0x9, 0x1, 0x5, 0x4, 0x8001}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @ldst={0x2, 0x1, 0x1, 0xb, 0xb, 0x20, 0x8}, @map_idx={0x18, 0x6, 0x5, 0x0, 0x10}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000080)='GPL\x00', 0x800, 0xd4, &(0x7f00000002c0)=""/212, 0x41100, 0x6, '\x00', 0x0, 0x8, r5, 0x8, &(0x7f0000000100)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x2, 0x475f, 0x401}, 0x10, r6, 0xffffffffffffffff, 0x4, &(0x7f0000000800)=[0xffffffffffffffff, r7], &(0x7f0000000ac0)=[{0x3, 0x2, 0xc, 0x6}, {0x3, 0x4, 0xb, 0xa}, {0x2, 0x2, 0xe, 0x2}, {0x3, 0x1, 0x5, 0x8}], 0x10, 0x20}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) getpid() perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f00000005c0)={0x1, 0x80, 0x0, 0x0, 0xbe, 0x0, 0x0, 0x0, 0x28000, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x400, 0xd7, 0x5, 0x0, 0x965, 0x0, 0xfffffffffffffffb}, 0x0, 0xd, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f00000006c0)) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0xe5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) ioctl$SIOCSIFHWADDR(r8, 0x8914, &(0x7f0000000040)={'sit0\x00', @local}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f00000008c0)='\x00'}, 0x30) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000e00)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8890}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000840)={0x0, 0x80, 0x2, 0x1, 0x9, 0x0, 0x0, 0x7, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_config_ext={0x67}, 0x200, 0x612, 0x0, 0x0, 0xa0, 0x0, 0xd171, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x3, r4, 0x1) ioctl$SIOCSIFHWADDR(r9, 0x8914, &(0x7f0000000040)={'sit0\x00', @random="4f33e363a4b1"}) 14:38:23 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022002d05d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:23 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e7a0a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) [ 1261.681262][T32673] device sit0 left promiscuous mode 14:38:23 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003005d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:23 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022023505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:23 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022033505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:23 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e0025740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:23 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022043505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) [ 1261.841342][T32678] device sit0 entered promiscuous mode 14:38:23 executing program 2: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x10) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x1a, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f97e24fc6004030e000a740500053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x3, 0x5, 0x5, 0x0, 0x0, 0x8, 0x4000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x101, 0x1, @perf_config_ext={0x7fff, 0x8}, 0x4000, 0x3, 0x0, 0x3, 0x80000001, 0x80, 0x40, 0x0, 0x0, 0x0, 0x81}, 0xffffffffffffffff, 0x8, r0, 0x0) 14:38:23 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e7535740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:23 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022053505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:23 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022063505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:23 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022073505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:23 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e0040740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:24 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r5 = openat$cgroup_ro(r1, &(0x7f00000000c0)='blkio.bfq.sectors\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={r3, 0xe0, &(0x7f0000000940)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000200)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x1, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000640)=[0x0], 0x0, 0x6a, &(0x7f0000000680)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x6e, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r7 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000a40)={0x1b, 0x0, 0x0, 0x7, 0x0, r0, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x5, 0x3}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x1c, 0x21, &(0x7f0000000440)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x905, 0x0, 0x0, 0x0, 0x1}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@generic={0x80, 0x6, 0x8, 0x3f, 0xda}, @map_val={0x18, 0x1, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x401}, @initr0={0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x2}, @ldst={0x2, 0x3, 0x2, 0x9, 0x3, 0x1, 0x4}, @tail_call={{0x18, 0x2, 0x1, 0x0, r2}}, @jmp={0x5, 0x1, 0xa, 0x9, 0x3, 0xffffffffffffffe0}, @generic={0x9, 0x1, 0x5, 0x4, 0x8001}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @ldst={0x2, 0x1, 0x1, 0xb, 0xb, 0x20, 0x8}, @map_idx={0x18, 0x6, 0x5, 0x0, 0x10}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000080)='GPL\x00', 0x800, 0xd4, &(0x7f00000002c0)=""/212, 0x41100, 0x6, '\x00', 0x0, 0x8, r5, 0x8, &(0x7f0000000100)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x2, 0x475f, 0x401}, 0x10, r6, 0xffffffffffffffff, 0x4, &(0x7f0000000800)=[0xffffffffffffffff, r7], &(0x7f0000000ac0)=[{0x3, 0x2, 0xc, 0x6}, {0x3, 0x4, 0xb, 0xa}, {0x2, 0x2, 0xe, 0x2}, {0x3, 0x1, 0x5, 0x8}], 0x10, 0x20}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) getpid() perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f00000005c0)={0x1, 0x80, 0x0, 0x0, 0xbe, 0x0, 0x0, 0x0, 0x28000, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x400, 0xd7, 0x5, 0x0, 0x965, 0x0, 0xfffffffffffffffb}, 0x0, 0xd, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f00000006c0)) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0xe5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) ioctl$SIOCSIFHWADDR(r8, 0x8914, &(0x7f0000000040)={'sit0\x00', @local}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f00000008c0)='\x00'}, 0x30) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000e00)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8890}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000840)={0x0, 0x80, 0x2, 0x1, 0x9, 0x0, 0x0, 0x7, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_config_ext={0x67}, 0x200, 0x612, 0x0, 0x0, 0xa0, 0x0, 0xd171, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x3, r4, 0x1) ioctl$SIOCSIFHWADDR(r9, 0x8914, &(0x7f0000000040)={'sit0\x00', @random="4f33e363a4b1"}) [ 1262.071909][T32690] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 1262.093434][T32690] platform regulatory.0: Falling back to sysfs fallback for: regulatory.db 14:38:24 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e04ae740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:24 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022083505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) [ 1262.186462][T32703] device sit0 left promiscuous mode 14:38:24 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022093505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:24 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e0002740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) [ 1262.270802][T32708] device sit0 entered promiscuous mode 14:38:24 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e0200220a3505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:24 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e0200220b3505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:24 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e0200220c3505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:24 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e0200220d3505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:24 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e0025740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:24 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r5 = openat$cgroup_ro(r1, &(0x7f00000000c0)='blkio.bfq.sectors\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={r3, 0xe0, &(0x7f0000000940)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000200)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x1, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000640)=[0x0], 0x0, 0x6a, &(0x7f0000000680)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x6e, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r7 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000a40)={0x1b, 0x0, 0x0, 0x7, 0x0, r0, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x5, 0x3}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x1c, 0x21, &(0x7f0000000440)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x905, 0x0, 0x0, 0x0, 0x1}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@generic={0x80, 0x6, 0x8, 0x3f, 0xda}, @map_val={0x18, 0x1, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x401}, @initr0={0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x2}, @ldst={0x2, 0x3, 0x2, 0x9, 0x3, 0x1, 0x4}, @tail_call={{0x18, 0x2, 0x1, 0x0, r2}}, @jmp={0x5, 0x1, 0xa, 0x9, 0x3, 0xffffffffffffffe0}, @generic={0x9, 0x1, 0x5, 0x4, 0x8001}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @ldst={0x2, 0x1, 0x1, 0xb, 0xb, 0x20, 0x8}, @map_idx={0x18, 0x6, 0x5, 0x0, 0x10}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000080)='GPL\x00', 0x800, 0xd4, &(0x7f00000002c0)=""/212, 0x41100, 0x6, '\x00', 0x0, 0x8, r5, 0x8, &(0x7f0000000100)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x2, 0x475f, 0x401}, 0x10, r6, 0xffffffffffffffff, 0x4, &(0x7f0000000800)=[0xffffffffffffffff, r7], &(0x7f0000000ac0)=[{0x3, 0x2, 0xc, 0x6}, {0x3, 0x4, 0xb, 0xa}, {0x2, 0x2, 0xe, 0x2}, {0x3, 0x1, 0x5, 0x8}], 0x10, 0x20}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) getpid() perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f00000005c0)={0x1, 0x80, 0x0, 0x0, 0xbe, 0x0, 0x0, 0x0, 0x28000, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x400, 0xd7, 0x5, 0x0, 0x965, 0x0, 0xfffffffffffffffb}, 0x0, 0xd, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f00000006c0)) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0xe5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) ioctl$SIOCSIFHWADDR(r8, 0x8914, &(0x7f0000000040)={'sit0\x00', @local}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f00000008c0)='\x00'}, 0x30) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000e00)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8890}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000840)={0x0, 0x80, 0x2, 0x1, 0x9, 0x0, 0x0, 0x7, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_config_ext={0x67}, 0x200, 0x612, 0x0, 0x0, 0xa0, 0x0, 0xd171, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x3, r4, 0x1) ioctl$SIOCSIFHWADDR(r9, 0x8914, &(0x7f0000000040)={'sit0\x00', @random="4f33e363a4b1"}) 14:38:24 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e0200220e3505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:24 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a020000053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) [ 1262.550930][T32723] device sit0 left promiscuous mode 14:38:24 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e0200220f3505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:24 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022103505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:24 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022113505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:24 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022123505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:24 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022183505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) [ 1262.718121][T32727] device sit0 entered promiscuous mode 14:38:24 executing program 2: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x10) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x1a, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f97e24fc6004030e000a740700053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x3, 0x5, 0x5, 0x0, 0x0, 0x8, 0x4000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x101, 0x1, @perf_config_ext={0x7fff, 0x8}, 0x4000, 0x3, 0x0, 0x3, 0x80000001, 0x80, 0x40, 0x0, 0x0, 0x0, 0x81}, 0xffffffffffffffff, 0x8, r0, 0x0) 14:38:24 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022213505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:24 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a020100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:24 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r5 = openat$cgroup_ro(r1, &(0x7f00000000c0)='blkio.bfq.sectors\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={r3, 0xe0, &(0x7f0000000940)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000200)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x1, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000640)=[0x0], 0x0, 0x6a, &(0x7f0000000680)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x6e, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r7 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000a40)={0x1b, 0x0, 0x0, 0x7, 0x0, r0, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x5, 0x3}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x1c, 0x21, &(0x7f0000000440)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x905, 0x0, 0x0, 0x0, 0x1}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@generic={0x80, 0x6, 0x8, 0x3f, 0xda}, @map_val={0x18, 0x1, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x401}, @initr0={0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x2}, @ldst={0x2, 0x3, 0x2, 0x9, 0x3, 0x1, 0x4}, @tail_call={{0x18, 0x2, 0x1, 0x0, r2}}, @jmp={0x5, 0x1, 0xa, 0x9, 0x3, 0xffffffffffffffe0}, @generic={0x9, 0x1, 0x5, 0x4, 0x8001}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @ldst={0x2, 0x1, 0x1, 0xb, 0xb, 0x20, 0x8}, @map_idx={0x18, 0x6, 0x5, 0x0, 0x10}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000080)='GPL\x00', 0x800, 0xd4, &(0x7f00000002c0)=""/212, 0x41100, 0x6, '\x00', 0x0, 0x8, r5, 0x8, &(0x7f0000000100)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x2, 0x475f, 0x401}, 0x10, r6, 0xffffffffffffffff, 0x4, &(0x7f0000000800)=[0xffffffffffffffff, r7], &(0x7f0000000ac0)=[{0x3, 0x2, 0xc, 0x6}, {0x3, 0x4, 0xb, 0xa}, {0x2, 0x2, 0xe, 0x2}, {0x3, 0x1, 0x5, 0x8}], 0x10, 0x20}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) getpid() perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f00000005c0)={0x1, 0x80, 0x0, 0x0, 0xbe, 0x0, 0x0, 0x0, 0x28000, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x400, 0xd7, 0x5, 0x0, 0x965, 0x0, 0xfffffffffffffffb}, 0x0, 0xd, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f00000006c0)) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0xe5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) ioctl$SIOCSIFHWADDR(r8, 0x8914, &(0x7f0000000040)={'sit0\x00', @local}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f00000008c0)='\x00'}, 0x30) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000e00)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8890}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000840)={0x0, 0x80, 0x2, 0x1, 0x9, 0x0, 0x0, 0x7, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x3ff, 0x0, @perf_config_ext, 0x200, 0x612, 0x0, 0x0, 0xa0, 0x0, 0xd171, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x3, r4, 0x1) ioctl$SIOCSIFHWADDR(r9, 0x8914, &(0x7f0000000040)={'sit0\x00', @random="4f33e363a4b1"}) 14:38:24 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022253505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:24 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a0a0100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) [ 1262.920700][T32741] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 1262.942085][T32741] platform regulatory.0: Falling back to sysfs fallback for: regulatory.db 14:38:24 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a250100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) [ 1263.043429][T32748] device sit0 left promiscuous mode 14:38:24 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022353505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:25 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022413505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:25 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022483505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:25 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740200053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:25 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e0200224c3505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) [ 1263.220423][T32755] device sit0 entered promiscuous mode 14:38:25 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022603505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:25 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022683505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:25 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r5 = openat$cgroup_ro(r1, &(0x7f00000000c0)='blkio.bfq.sectors\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={r3, 0xe0, &(0x7f0000000940)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000200)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x1, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000640)=[0x0], 0x0, 0x6a, &(0x7f0000000680)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x6e, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r7 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000a40)={0x1b, 0x0, 0x0, 0x7, 0x0, r0, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x5, 0x3}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x1c, 0x21, &(0x7f0000000440)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x905, 0x0, 0x0, 0x0, 0x1}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@generic={0x80, 0x6, 0x8, 0x3f, 0xda}, @map_val={0x18, 0x1, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x401}, @initr0={0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x2}, @ldst={0x2, 0x3, 0x2, 0x9, 0x3, 0x1, 0x4}, @tail_call={{0x18, 0x2, 0x1, 0x0, r2}}, @jmp={0x5, 0x1, 0xa, 0x9, 0x3, 0xffffffffffffffe0}, @generic={0x9, 0x1, 0x5, 0x4, 0x8001}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @ldst={0x2, 0x1, 0x1, 0xb, 0xb, 0x20, 0x8}, @map_idx={0x18, 0x6, 0x5, 0x0, 0x10}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000080)='GPL\x00', 0x800, 0xd4, &(0x7f00000002c0)=""/212, 0x41100, 0x6, '\x00', 0x0, 0x8, r5, 0x8, &(0x7f0000000100)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x2, 0x475f, 0x401}, 0x10, r6, 0xffffffffffffffff, 0x4, &(0x7f0000000800)=[0xffffffffffffffff, r7], &(0x7f0000000ac0)=[{0x3, 0x2, 0xc, 0x6}, {0x3, 0x4, 0xb, 0xa}, {0x2, 0x2, 0xe, 0x2}, {0x3, 0x1, 0x5, 0x8}], 0x10, 0x20}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) getpid() perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f00000005c0)={0x1, 0x80, 0x0, 0x0, 0xbe, 0x0, 0x0, 0x0, 0x28000, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x400, 0xd7, 0x5, 0x0, 0x965, 0x0, 0xfffffffffffffffb}, 0x0, 0xd, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f00000006c0)) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0xe5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) ioctl$SIOCSIFHWADDR(r8, 0x8914, &(0x7f0000000040)={'sit0\x00', @local}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f00000008c0)='\x00'}, 0x30) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000e00)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8890}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000840)={0x0, 0x80, 0x2, 0x1, 0x9, 0x0, 0x0, 0x7, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x3ff, 0x0, @perf_config_ext, 0x200, 0x612, 0x0, 0x0, 0xa0, 0x0, 0xd171, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x3, r4, 0x1) ioctl$SIOCSIFHWADDR(r9, 0x8914, &(0x7f0000000040)={'sit0\x00', @random="4f33e363a4b1"}) 14:38:25 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740300053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:25 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e0200226c3505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) [ 1263.447278][ T303] device sit0 left promiscuous mode 14:38:25 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022743505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:25 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740400053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) [ 1263.524819][ T303] device sit0 entered promiscuous mode 14:38:25 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e0200227a3505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) [ 1263.630156][ T312] __nla_validate_parse: 28 callbacks suppressed [ 1263.630175][ T312] netlink: 134056 bytes leftover after parsing attributes in process `syz-executor.4'. 14:38:25 executing program 2: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x10) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x1a, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f97e24fc6004030e000a740800053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x3, 0x5, 0x5, 0x0, 0x0, 0x8, 0x4000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x101, 0x1, @perf_config_ext={0x7fff, 0x8}, 0x4000, 0x3, 0x0, 0x3, 0x80000001, 0x80, 0x40, 0x0, 0x0, 0x0, 0x81}, 0xffffffffffffffff, 0x8, r0, 0x0) 14:38:25 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022004705d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:25 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740500053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:25 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r5 = openat$cgroup_ro(r1, &(0x7f00000000c0)='blkio.bfq.sectors\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={r3, 0xe0, &(0x7f0000000940)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000200)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x1, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000640)=[0x0], 0x0, 0x6a, &(0x7f0000000680)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x6e, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r7 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000a40)={0x1b, 0x0, 0x0, 0x7, 0x0, r0, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x5, 0x3}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x1c, 0x21, &(0x7f0000000440)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x905, 0x0, 0x0, 0x0, 0x1}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@generic={0x80, 0x6, 0x8, 0x3f, 0xda}, @map_val={0x18, 0x1, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x401}, @initr0={0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x2}, @ldst={0x2, 0x3, 0x2, 0x9, 0x3, 0x1, 0x4}, @tail_call={{0x18, 0x2, 0x1, 0x0, r2}}, @jmp={0x5, 0x1, 0xa, 0x9, 0x3, 0xffffffffffffffe0}, @generic={0x9, 0x1, 0x5, 0x4, 0x8001}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @ldst={0x2, 0x1, 0x1, 0xb, 0xb, 0x20, 0x8}, @map_idx={0x18, 0x6, 0x5, 0x0, 0x10}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000080)='GPL\x00', 0x800, 0xd4, &(0x7f00000002c0)=""/212, 0x41100, 0x6, '\x00', 0x0, 0x8, r5, 0x8, &(0x7f0000000100)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x2, 0x475f, 0x401}, 0x10, r6, 0xffffffffffffffff, 0x4, &(0x7f0000000800)=[0xffffffffffffffff, r7], &(0x7f0000000ac0)=[{0x3, 0x2, 0xc, 0x6}, {0x3, 0x4, 0xb, 0xa}, {0x2, 0x2, 0xe, 0x2}, {0x3, 0x1, 0x5, 0x8}], 0x10, 0x20}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) getpid() perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f00000005c0)={0x1, 0x80, 0x0, 0x0, 0xbe, 0x0, 0x0, 0x0, 0x28000, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x400, 0xd7, 0x5, 0x0, 0x965, 0x0, 0xfffffffffffffffb}, 0x0, 0xd, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f00000006c0)) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0xe5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) ioctl$SIOCSIFHWADDR(r8, 0x8914, &(0x7f0000000040)={'sit0\x00', @local}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f00000008c0)='\x00'}, 0x30) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000e00)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8890}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000840)={0x0, 0x80, 0x2, 0x1, 0x9, 0x0, 0x0, 0x7, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x3ff, 0x0, @perf_config_ext, 0x200, 0x612, 0x0, 0x0, 0xa0, 0x0, 0xd171, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x3, r4, 0x1) ioctl$SIOCSIFHWADDR(r9, 0x8914, &(0x7f0000000040)={'sit0\x00', @random="4f33e363a4b1"}) [ 1263.786819][ T319] netlink: 134056 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1263.792120][ T318] netlink: 134056 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1263.808851][ T321] netlink: 134056 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1263.818586][ T322] device sit0 left promiscuous mode 14:38:25 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740700053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:25 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022000a05d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) [ 1263.871151][ T319] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 1263.890222][ T325] device sit0 entered promiscuous mode [ 1263.917019][ T319] platform regulatory.0: Falling back to sysfs fallback for: regulatory.db 14:38:25 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022002305d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) [ 1263.992023][ T329] netlink: 134056 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1264.028670][ T332] netlink: 134056 bytes leftover after parsing attributes in process `syz-executor.0'. 14:38:26 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740800053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:26 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022002b05d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:26 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r5 = openat$cgroup_ro(r1, &(0x7f00000000c0)='blkio.bfq.sectors\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={r3, 0xe0, &(0x7f0000000940)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000200)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x1, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000640)=[0x0], 0x0, 0x6a, &(0x7f0000000680)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x6e, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r7 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000a40)={0x1b, 0x0, 0x0, 0x7, 0x0, r0, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x5, 0x3}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x1c, 0x21, &(0x7f0000000440)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x905, 0x0, 0x0, 0x0, 0x1}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@generic={0x80, 0x6, 0x8, 0x3f, 0xda}, @map_val={0x18, 0x1, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x401}, @initr0={0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x2}, @ldst={0x2, 0x3, 0x2, 0x9, 0x3, 0x1, 0x4}, @tail_call={{0x18, 0x2, 0x1, 0x0, r2}}, @jmp={0x5, 0x1, 0xa, 0x9, 0x3, 0xffffffffffffffe0}, @generic={0x9, 0x1, 0x5, 0x4, 0x8001}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @ldst={0x2, 0x1, 0x1, 0xb, 0xb, 0x20, 0x8}, @map_idx={0x18, 0x6, 0x5, 0x0, 0x10}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000080)='GPL\x00', 0x800, 0xd4, &(0x7f00000002c0)=""/212, 0x41100, 0x6, '\x00', 0x0, 0x8, r5, 0x8, &(0x7f0000000100)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x2, 0x475f, 0x401}, 0x10, r6, 0xffffffffffffffff, 0x4, &(0x7f0000000800)=[0xffffffffffffffff, r7], &(0x7f0000000ac0)=[{0x3, 0x2, 0xc, 0x6}, {0x3, 0x4, 0xb, 0xa}, {0x2, 0x2, 0xe, 0x2}, {0x3, 0x1, 0x5, 0x8}], 0x10, 0x20}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) getpid() perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f00000005c0)={0x1, 0x80, 0x0, 0x0, 0xbe, 0x0, 0x0, 0x0, 0x28000, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x400, 0xd7, 0x5, 0x0, 0x965, 0x0, 0xfffffffffffffffb}, 0x0, 0xd, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f00000006c0)) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0xe5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) ioctl$SIOCSIFHWADDR(r8, 0x8914, &(0x7f0000000040)={'sit0\x00', @local}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f00000008c0)='\x00'}, 0x30) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000e00)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8890}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000840)={0x0, 0x80, 0x2, 0x1, 0x9, 0x0, 0x0, 0x7, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x3ff, 0x0, @perf_config_ext={0x67}, 0x0, 0x612, 0x0, 0x0, 0xa0, 0x0, 0xd171, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x3, r4, 0x1) ioctl$SIOCSIFHWADDR(r9, 0x8914, &(0x7f0000000040)={'sit0\x00', @random="4f33e363a4b1"}) 14:38:26 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022002d05d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) [ 1264.158980][ T334] netlink: 134056 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1264.178561][ T336] netlink: 134056 bytes leftover after parsing attributes in process `syz-executor.4'. 14:38:26 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a741800053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) [ 1264.208684][ T340] netlink: 134056 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1264.209016][ T338] device sit0 left promiscuous mode [ 1264.263379][ T342] netlink: 134056 bytes leftover after parsing attributes in process `syz-executor.4'. 14:38:26 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003005d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) [ 1264.359860][ T343] device sit0 entered promiscuous mode 14:38:26 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022004705d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:26 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003504d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:26 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a742500053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:26 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r5 = openat$cgroup_ro(r1, &(0x7f00000000c0)='blkio.bfq.sectors\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={r3, 0xe0, &(0x7f0000000940)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000200)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x1, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000640)=[0x0], 0x0, 0x6a, &(0x7f0000000680)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x6e, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r7 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000a40)={0x1b, 0x0, 0x0, 0x7, 0x0, r0, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x5, 0x3}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x1c, 0x21, &(0x7f0000000440)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x905, 0x0, 0x0, 0x0, 0x1}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@generic={0x80, 0x6, 0x8, 0x3f, 0xda}, @map_val={0x18, 0x1, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x401}, @initr0={0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x2}, @ldst={0x2, 0x3, 0x2, 0x9, 0x3, 0x1, 0x4}, @tail_call={{0x18, 0x2, 0x1, 0x0, r2}}, @jmp={0x5, 0x1, 0xa, 0x9, 0x3, 0xffffffffffffffe0}, @generic={0x9, 0x1, 0x5, 0x4, 0x8001}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @ldst={0x2, 0x1, 0x1, 0xb, 0xb, 0x20, 0x8}, @map_idx={0x18, 0x6, 0x5, 0x0, 0x10}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000080)='GPL\x00', 0x800, 0xd4, &(0x7f00000002c0)=""/212, 0x41100, 0x6, '\x00', 0x0, 0x8, r5, 0x8, &(0x7f0000000100)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x2, 0x475f, 0x401}, 0x10, r6, 0xffffffffffffffff, 0x4, &(0x7f0000000800)=[0xffffffffffffffff, r7], &(0x7f0000000ac0)=[{0x3, 0x2, 0xc, 0x6}, {0x3, 0x4, 0xb, 0xa}, {0x2, 0x2, 0xe, 0x2}, {0x3, 0x1, 0x5, 0x8}], 0x10, 0x20}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) getpid() perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f00000005c0)={0x1, 0x80, 0x0, 0x0, 0xbe, 0x0, 0x0, 0x0, 0x28000, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x400, 0xd7, 0x5, 0x0, 0x965, 0x0, 0xfffffffffffffffb}, 0x0, 0xd, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f00000006c0)) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0xe5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) ioctl$SIOCSIFHWADDR(r8, 0x8914, &(0x7f0000000040)={'sit0\x00', @local}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f00000008c0)='\x00'}, 0x30) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000e00)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8890}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000840)={0x0, 0x80, 0x2, 0x1, 0x9, 0x0, 0x0, 0x7, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x3ff, 0x0, @perf_config_ext={0x67}, 0x0, 0x612, 0x0, 0x0, 0xa0, 0x0, 0xd171, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x3, r4, 0x1) ioctl$SIOCSIFHWADDR(r9, 0x8914, &(0x7f0000000040)={'sit0\x00', @random="4f33e363a4b1"}) 14:38:26 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740003053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:26 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003506d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:26 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740102053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:26 executing program 2: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x10) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x1a, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f97e24fc6004030e000a741000053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x3, 0x5, 0x5, 0x0, 0x0, 0x8, 0x4000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x101, 0x1, @perf_config_ext={0x7fff, 0x8}, 0x4000, 0x3, 0x0, 0x3, 0x80000001, 0x80, 0x40, 0x0, 0x0, 0x0, 0x81}, 0xffffffffffffffff, 0x8, r0, 0x0) [ 1264.611240][ T355] device sit0 left promiscuous mode 14:38:26 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e02002200350ed25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) [ 1264.730416][ T359] device sit0 entered promiscuous mode 14:38:26 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740103053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:26 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r5 = openat$cgroup_ro(r1, &(0x7f00000000c0)='blkio.bfq.sectors\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={r3, 0xe0, &(0x7f0000000940)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000200)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x1, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000640)=[0x0], 0x0, 0x6a, &(0x7f0000000680)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x6e, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r7 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000a40)={0x1b, 0x0, 0x0, 0x7, 0x0, r0, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x5, 0x3}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x1c, 0x21, &(0x7f0000000440)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x905, 0x0, 0x0, 0x0, 0x1}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@generic={0x80, 0x6, 0x8, 0x3f, 0xda}, @map_val={0x18, 0x1, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x401}, @initr0={0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x2}, @ldst={0x2, 0x3, 0x2, 0x9, 0x3, 0x1, 0x4}, @tail_call={{0x18, 0x2, 0x1, 0x0, r2}}, @jmp={0x5, 0x1, 0xa, 0x9, 0x3, 0xffffffffffffffe0}, @generic={0x9, 0x1, 0x5, 0x4, 0x8001}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @ldst={0x2, 0x1, 0x1, 0xb, 0xb, 0x20, 0x8}, @map_idx={0x18, 0x6, 0x5, 0x0, 0x10}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000080)='GPL\x00', 0x800, 0xd4, &(0x7f00000002c0)=""/212, 0x41100, 0x6, '\x00', 0x0, 0x8, r5, 0x8, &(0x7f0000000100)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x2, 0x475f, 0x401}, 0x10, r6, 0xffffffffffffffff, 0x4, &(0x7f0000000800)=[0xffffffffffffffff, r7], &(0x7f0000000ac0)=[{0x3, 0x2, 0xc, 0x6}, {0x3, 0x4, 0xb, 0xa}, {0x2, 0x2, 0xe, 0x2}, {0x3, 0x1, 0x5, 0x8}], 0x10, 0x20}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) getpid() perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f00000005c0)={0x1, 0x80, 0x0, 0x0, 0xbe, 0x0, 0x0, 0x0, 0x28000, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x400, 0xd7, 0x5, 0x0, 0x965, 0x0, 0xfffffffffffffffb}, 0x0, 0xd, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f00000006c0)) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0xe5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) ioctl$SIOCSIFHWADDR(r8, 0x8914, &(0x7f0000000040)={'sit0\x00', @local}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f00000008c0)='\x00'}, 0x30) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000e00)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8890}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000840)={0x0, 0x80, 0x2, 0x1, 0x9, 0x0, 0x0, 0x7, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x3ff, 0x0, @perf_config_ext={0x67}, 0x0, 0x612, 0x0, 0x0, 0xa0, 0x0, 0xd171, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x3, r4, 0x1) ioctl$SIOCSIFHWADDR(r9, 0x8914, &(0x7f0000000040)={'sit0\x00', @random="4f33e363a4b1"}) 14:38:26 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003518d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:26 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740104053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) [ 1264.899871][ T362] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 1264.909397][ T362] platform regulatory.0: Falling back to sysfs fallback for: regulatory.db 14:38:26 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505025a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) [ 1264.985460][ T371] device sit0 left promiscuous mode 14:38:26 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d202806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:26 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740105053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) [ 1265.064918][ T376] device sit0 entered promiscuous mode 14:38:27 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740106053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:27 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a026f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:27 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r5 = openat$cgroup_ro(r1, &(0x7f00000000c0)='blkio.bfq.sectors\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={r3, 0xe0, &(0x7f0000000940)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000200)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x1, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000640)=[0x0], 0x0, 0x6a, &(0x7f0000000680)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x6e, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r7 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000a40)={0x1b, 0x0, 0x0, 0x7, 0x0, r0, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x5, 0x3}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x1c, 0x21, &(0x7f0000000440)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x905, 0x0, 0x0, 0x0, 0x1}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@generic={0x80, 0x6, 0x8, 0x3f, 0xda}, @map_val={0x18, 0x1, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x401}, @initr0={0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x2}, @ldst={0x2, 0x3, 0x2, 0x9, 0x3, 0x1, 0x4}, @tail_call={{0x18, 0x2, 0x1, 0x0, r2}}, @jmp={0x5, 0x1, 0xa, 0x9, 0x3, 0xffffffffffffffe0}, @generic={0x9, 0x1, 0x5, 0x4, 0x8001}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @ldst={0x2, 0x1, 0x1, 0xb, 0xb, 0x20, 0x8}, @map_idx={0x18, 0x6, 0x5, 0x0, 0x10}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000080)='GPL\x00', 0x800, 0xd4, &(0x7f00000002c0)=""/212, 0x41100, 0x6, '\x00', 0x0, 0x8, r5, 0x8, &(0x7f0000000100)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x2, 0x475f, 0x401}, 0x10, r6, 0xffffffffffffffff, 0x4, &(0x7f0000000800)=[0xffffffffffffffff, r7], &(0x7f0000000ac0)=[{0x3, 0x2, 0xc, 0x6}, {0x3, 0x4, 0xb, 0xa}, {0x2, 0x2, 0xe, 0x2}, {0x3, 0x1, 0x5, 0x8}], 0x10, 0x20}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) getpid() perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f00000005c0)={0x1, 0x80, 0x0, 0x0, 0xbe, 0x0, 0x0, 0x0, 0x28000, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x400, 0xd7, 0x5, 0x0, 0x965, 0x0, 0xfffffffffffffffb}, 0x0, 0xd, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f00000006c0)) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0xe5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) ioctl$SIOCSIFHWADDR(r8, 0x8914, &(0x7f0000000040)={'sit0\x00', @local}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f00000008c0)='\x00'}, 0x30) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000e00)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8890}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000840)={0x0, 0x80, 0x2, 0x1, 0x9, 0x0, 0x0, 0x7, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x3ff, 0x0, @perf_config_ext={0x67}, 0x200, 0x0, 0x0, 0x0, 0xa0, 0x0, 0xd171, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x3, r4, 0x1) ioctl$SIOCSIFHWADDR(r9, 0x8914, &(0x7f0000000040)={'sit0\x00', @random="4f33e363a4b1"}) 14:38:27 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740107053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) [ 1265.371511][ T385] device sit0 left promiscuous mode 14:38:27 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a800a8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:27 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740108053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:27 executing program 2: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x10) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x1a, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f97e24fc6004030e000a741100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x3, 0x5, 0x5, 0x0, 0x0, 0x8, 0x4000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x101, 0x1, @perf_config_ext={0x7fff, 0x8}, 0x4000, 0x3, 0x0, 0x3, 0x80000001, 0x80, 0x40, 0x0, 0x0, 0x0, 0x81}, 0xffffffffffffffff, 0x8, r0, 0x0) [ 1265.494912][ T389] device sit0 entered promiscuous mode 14:38:27 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r5 = openat$cgroup_ro(r1, &(0x7f00000000c0)='blkio.bfq.sectors\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={r3, 0xe0, &(0x7f0000000940)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000200)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x1, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000640)=[0x0], 0x0, 0x6a, &(0x7f0000000680)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x6e, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r7 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000a40)={0x1b, 0x0, 0x0, 0x7, 0x0, r0, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x5, 0x3}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x1c, 0x21, &(0x7f0000000440)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x905, 0x0, 0x0, 0x0, 0x1}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@generic={0x80, 0x6, 0x8, 0x3f, 0xda}, @map_val={0x18, 0x1, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x401}, @initr0={0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x2}, @ldst={0x2, 0x3, 0x2, 0x9, 0x3, 0x1, 0x4}, @tail_call={{0x18, 0x2, 0x1, 0x0, r2}}, @jmp={0x5, 0x1, 0xa, 0x9, 0x3, 0xffffffffffffffe0}, @generic={0x9, 0x1, 0x5, 0x4, 0x8001}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @ldst={0x2, 0x1, 0x1, 0xb, 0xb, 0x20, 0x8}, @map_idx={0x18, 0x6, 0x5, 0x0, 0x10}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000080)='GPL\x00', 0x800, 0xd4, &(0x7f00000002c0)=""/212, 0x41100, 0x6, '\x00', 0x0, 0x8, r5, 0x8, &(0x7f0000000100)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x2, 0x475f, 0x401}, 0x10, r6, 0xffffffffffffffff, 0x4, &(0x7f0000000800)=[0xffffffffffffffff, r7], &(0x7f0000000ac0)=[{0x3, 0x2, 0xc, 0x6}, {0x3, 0x4, 0xb, 0xa}, {0x2, 0x2, 0xe, 0x2}, {0x3, 0x1, 0x5, 0x8}], 0x10, 0x20}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) getpid() perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f00000005c0)={0x1, 0x80, 0x0, 0x0, 0xbe, 0x0, 0x0, 0x0, 0x28000, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x400, 0xd7, 0x5, 0x0, 0x965, 0x0, 0xfffffffffffffffb}, 0x0, 0xd, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f00000006c0)) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0xe5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) ioctl$SIOCSIFHWADDR(r8, 0x8914, &(0x7f0000000040)={'sit0\x00', @local}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f00000008c0)='\x00'}, 0x30) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000e00)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8890}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000840)={0x0, 0x80, 0x2, 0x1, 0x9, 0x0, 0x0, 0x7, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x3ff, 0x0, @perf_config_ext={0x67}, 0x200, 0x0, 0x0, 0x0, 0xa0, 0x0, 0xd171, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x3, r4, 0x1) ioctl$SIOCSIFHWADDR(r9, 0x8914, &(0x7f0000000040)={'sit0\x00', @random="4f33e363a4b1"}) 14:38:27 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a80258c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:27 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740109053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) [ 1265.693062][ T395] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 1265.715706][ T395] platform regulatory.0: Falling back to sysfs fallback for: regulatory.db 14:38:27 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f026394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) [ 1265.790887][ T400] device sit0 left promiscuous mode 14:38:27 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c0a94f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:27 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a74010a053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) [ 1265.873161][ T400] device sit0 entered promiscuous mode 14:38:27 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a74010b053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:27 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r5 = openat$cgroup_ro(r1, &(0x7f00000000c0)='blkio.bfq.sectors\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={r3, 0xe0, &(0x7f0000000940)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000200)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x1, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000640)=[0x0], 0x0, 0x6a, &(0x7f0000000680)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x6e, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r7 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000a40)={0x1b, 0x0, 0x0, 0x7, 0x0, r0, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x5, 0x3}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x1c, 0x21, &(0x7f0000000440)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x905, 0x0, 0x0, 0x0, 0x1}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@generic={0x80, 0x6, 0x8, 0x3f, 0xda}, @map_val={0x18, 0x1, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x401}, @initr0={0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x2}, @ldst={0x2, 0x3, 0x2, 0x9, 0x3, 0x1, 0x4}, @tail_call={{0x18, 0x2, 0x1, 0x0, r2}}, @jmp={0x5, 0x1, 0xa, 0x9, 0x3, 0xffffffffffffffe0}, @generic={0x9, 0x1, 0x5, 0x4, 0x8001}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @ldst={0x2, 0x1, 0x1, 0xb, 0xb, 0x20, 0x8}, @map_idx={0x18, 0x6, 0x5, 0x0, 0x10}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000080)='GPL\x00', 0x800, 0xd4, &(0x7f00000002c0)=""/212, 0x41100, 0x6, '\x00', 0x0, 0x8, r5, 0x8, &(0x7f0000000100)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x2, 0x475f, 0x401}, 0x10, r6, 0xffffffffffffffff, 0x4, &(0x7f0000000800)=[0xffffffffffffffff, r7], &(0x7f0000000ac0)=[{0x3, 0x2, 0xc, 0x6}, {0x3, 0x4, 0xb, 0xa}, {0x2, 0x2, 0xe, 0x2}, {0x3, 0x1, 0x5, 0x8}], 0x10, 0x20}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) getpid() perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f00000005c0)={0x1, 0x80, 0x0, 0x0, 0xbe, 0x0, 0x0, 0x0, 0x28000, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x400, 0xd7, 0x5, 0x0, 0x965, 0x0, 0xfffffffffffffffb}, 0x0, 0xd, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f00000006c0)) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0xe5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) ioctl$SIOCSIFHWADDR(r8, 0x8914, &(0x7f0000000040)={'sit0\x00', @local}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f00000008c0)='\x00'}, 0x30) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000e00)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8890}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000840)={0x0, 0x80, 0x2, 0x1, 0x9, 0x0, 0x0, 0x7, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x3ff, 0x0, @perf_config_ext={0x67}, 0x200, 0x0, 0x0, 0x0, 0xa0, 0x0, 0xd171, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x3, r4, 0x1) ioctl$SIOCSIFHWADDR(r9, 0x8914, &(0x7f0000000040)={'sit0\x00', @random="4f33e363a4b1"}) 14:38:27 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c2394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) [ 1266.104577][ T410] device sit0 left promiscuous mode 14:38:28 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c2594f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) [ 1266.241991][ T412] device sit0 entered promiscuous mode 14:38:28 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r5 = openat$cgroup_ro(r1, &(0x7f00000000c0)='blkio.bfq.sectors\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={r3, 0xe0, &(0x7f0000000940)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000200)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x1, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000640)=[0x0], 0x0, 0x6a, &(0x7f0000000680)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x6e, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r7 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000a40)={0x1b, 0x0, 0x0, 0x7, 0x0, r0, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x5, 0x3}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x1c, 0x21, &(0x7f0000000440)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x905, 0x0, 0x0, 0x0, 0x1}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@generic={0x80, 0x6, 0x8, 0x3f, 0xda}, @map_val={0x18, 0x1, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x401}, @initr0={0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x2}, @ldst={0x2, 0x3, 0x2, 0x9, 0x3, 0x1, 0x4}, @tail_call={{0x18, 0x2, 0x1, 0x0, r2}}, @jmp={0x5, 0x1, 0xa, 0x9, 0x3, 0xffffffffffffffe0}, @generic={0x9, 0x1, 0x5, 0x4, 0x8001}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @ldst={0x2, 0x1, 0x1, 0xb, 0xb, 0x20, 0x8}, @map_idx={0x18, 0x6, 0x5, 0x0, 0x10}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000080)='GPL\x00', 0x800, 0xd4, &(0x7f00000002c0)=""/212, 0x41100, 0x6, '\x00', 0x0, 0x8, r5, 0x8, &(0x7f0000000100)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x2, 0x475f, 0x401}, 0x10, r6, 0xffffffffffffffff, 0x4, &(0x7f0000000800)=[0xffffffffffffffff, r7], &(0x7f0000000ac0)=[{0x3, 0x2, 0xc, 0x6}, {0x3, 0x4, 0xb, 0xa}, {0x2, 0x2, 0xe, 0x2}, {0x3, 0x1, 0x5, 0x8}], 0x10, 0x20}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) getpid() perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f00000005c0)={0x1, 0x80, 0x0, 0x0, 0xbe, 0x0, 0x0, 0x0, 0x28000, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x400, 0xd7, 0x5, 0x0, 0x965, 0x0, 0xfffffffffffffffb}, 0x0, 0xd, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f00000006c0)) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0xe5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) ioctl$SIOCSIFHWADDR(r8, 0x8914, &(0x7f0000000040)={'sit0\x00', @local}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f00000008c0)='\x00'}, 0x30) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000e00)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8890}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000840)={0x0, 0x80, 0x2, 0x1, 0x9, 0x0, 0x0, 0x7, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x3ff, 0x0, @perf_config_ext={0x67}, 0x200, 0x612, 0x0, 0x0, 0x0, 0x0, 0xd171, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x3, r4, 0x1) ioctl$SIOCSIFHWADDR(r9, 0x8914, &(0x7f0000000040)={'sit0\x00', @random="4f33e363a4b1"}) 14:38:28 executing program 2: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x10) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x1a, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f97e24fc6004030e000a741800053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x3, 0x5, 0x5, 0x0, 0x0, 0x8, 0x4000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x101, 0x1, @perf_config_ext={0x7fff, 0x8}, 0x4000, 0x3, 0x0, 0x3, 0x80000001, 0x80, 0x40, 0x0, 0x0, 0x0, 0x81}, 0xffffffffffffffff, 0x8, r0, 0x0) 14:38:28 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a74010c053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:28 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c2a94f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) [ 1266.479878][ T421] device sit0 left promiscuous mode 14:38:28 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c2b94f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:28 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a74010d053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) [ 1266.546949][ T423] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 1266.565007][ T426] device sit0 entered promiscuous mode [ 1266.611825][ T423] platform regulatory.0: Falling back to sysfs fallback for: regulatory.db 14:38:28 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a74010e053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:28 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c2d94f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:28 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r5 = openat$cgroup_ro(r1, &(0x7f00000000c0)='blkio.bfq.sectors\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={r3, 0xe0, &(0x7f0000000940)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000200)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x1, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000640)=[0x0], 0x0, 0x6a, &(0x7f0000000680)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x6e, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r7 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000a40)={0x1b, 0x0, 0x0, 0x7, 0x0, r0, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x5, 0x3}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x1c, 0x21, &(0x7f0000000440)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x905, 0x0, 0x0, 0x0, 0x1}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@generic={0x80, 0x6, 0x8, 0x3f, 0xda}, @map_val={0x18, 0x1, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x401}, @initr0={0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x2}, @ldst={0x2, 0x3, 0x2, 0x9, 0x3, 0x1, 0x4}, @tail_call={{0x18, 0x2, 0x1, 0x0, r2}}, @jmp={0x5, 0x1, 0xa, 0x9, 0x3, 0xffffffffffffffe0}, @generic={0x9, 0x1, 0x5, 0x4, 0x8001}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @ldst={0x2, 0x1, 0x1, 0xb, 0xb, 0x20, 0x8}, @map_idx={0x18, 0x6, 0x5, 0x0, 0x10}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000080)='GPL\x00', 0x800, 0xd4, &(0x7f00000002c0)=""/212, 0x41100, 0x6, '\x00', 0x0, 0x8, r5, 0x8, &(0x7f0000000100)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x2, 0x475f, 0x401}, 0x10, r6, 0xffffffffffffffff, 0x4, &(0x7f0000000800)=[0xffffffffffffffff, r7], &(0x7f0000000ac0)=[{0x3, 0x2, 0xc, 0x6}, {0x3, 0x4, 0xb, 0xa}, {0x2, 0x2, 0xe, 0x2}, {0x3, 0x1, 0x5, 0x8}], 0x10, 0x20}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) getpid() perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f00000005c0)={0x1, 0x80, 0x0, 0x0, 0xbe, 0x0, 0x0, 0x0, 0x28000, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x400, 0xd7, 0x5, 0x0, 0x965, 0x0, 0xfffffffffffffffb}, 0x0, 0xd, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f00000006c0)) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0xe5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) ioctl$SIOCSIFHWADDR(r8, 0x8914, &(0x7f0000000040)={'sit0\x00', @local}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f00000008c0)='\x00'}, 0x30) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000e00)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8890}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000840)={0x0, 0x80, 0x2, 0x1, 0x9, 0x0, 0x0, 0x7, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x3ff, 0x0, @perf_config_ext={0x67}, 0x200, 0x612, 0x0, 0x0, 0x0, 0x0, 0xd171, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x3, r4, 0x1) ioctl$SIOCSIFHWADDR(r9, 0x8914, &(0x7f0000000040)={'sit0\x00', @random="4f33e363a4b1"}) 14:38:28 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c2e94f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:28 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a74010f053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) [ 1266.876673][ T437] device sit0 left promiscuous mode 14:38:28 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740110053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:28 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c3094f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) [ 1266.945672][ T437] device sit0 entered promiscuous mode 14:38:29 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740111053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:29 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c4c94f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:29 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r5 = openat$cgroup_ro(r1, &(0x7f00000000c0)='blkio.bfq.sectors\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={r3, 0xe0, &(0x7f0000000940)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000200)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x1, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000640)=[0x0], 0x0, 0x6a, &(0x7f0000000680)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x6e, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r7 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000a40)={0x1b, 0x0, 0x0, 0x7, 0x0, r0, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x5, 0x3}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x1c, 0x21, &(0x7f0000000440)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x905, 0x0, 0x0, 0x0, 0x1}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@generic={0x80, 0x6, 0x8, 0x3f, 0xda}, @map_val={0x18, 0x1, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x401}, @initr0={0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x2}, @ldst={0x2, 0x3, 0x2, 0x9, 0x3, 0x1, 0x4}, @tail_call={{0x18, 0x2, 0x1, 0x0, r2}}, @jmp={0x5, 0x1, 0xa, 0x9, 0x3, 0xffffffffffffffe0}, @generic={0x9, 0x1, 0x5, 0x4, 0x8001}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @ldst={0x2, 0x1, 0x1, 0xb, 0xb, 0x20, 0x8}, @map_idx={0x18, 0x6, 0x5, 0x0, 0x10}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000080)='GPL\x00', 0x800, 0xd4, &(0x7f00000002c0)=""/212, 0x41100, 0x6, '\x00', 0x0, 0x8, r5, 0x8, &(0x7f0000000100)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x2, 0x475f, 0x401}, 0x10, r6, 0xffffffffffffffff, 0x4, &(0x7f0000000800)=[0xffffffffffffffff, r7], &(0x7f0000000ac0)=[{0x3, 0x2, 0xc, 0x6}, {0x3, 0x4, 0xb, 0xa}, {0x2, 0x2, 0xe, 0x2}, {0x3, 0x1, 0x5, 0x8}], 0x10, 0x20}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) getpid() perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f00000005c0)={0x1, 0x80, 0x0, 0x0, 0xbe, 0x0, 0x0, 0x0, 0x28000, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x400, 0xd7, 0x5, 0x0, 0x965, 0x0, 0xfffffffffffffffb}, 0x0, 0xd, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f00000006c0)) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0xe5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) ioctl$SIOCSIFHWADDR(r8, 0x8914, &(0x7f0000000040)={'sit0\x00', @local}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f00000008c0)='\x00'}, 0x30) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000e00)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8890}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000840)={0x0, 0x80, 0x2, 0x1, 0x9, 0x0, 0x0, 0x7, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x3ff, 0x0, @perf_config_ext={0x67}, 0x200, 0x612, 0x0, 0x0, 0x0, 0x0, 0xd171, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x3, r4, 0x1) ioctl$SIOCSIFHWADDR(r9, 0x8914, &(0x7f0000000040)={'sit0\x00', @random="4f33e363a4b1"}) [ 1267.206234][ T452] device sit0 left promiscuous mode 14:38:29 executing program 2: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x10) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x1a, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f97e24fc6004030e000a742500053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x3, 0x5, 0x5, 0x0, 0x0, 0x8, 0x4000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x101, 0x1, @perf_config_ext={0x7fff, 0x8}, 0x4000, 0x3, 0x0, 0x3, 0x80000001, 0x80, 0x40, 0x0, 0x0, 0x0, 0x81}, 0xffffffffffffffff, 0x8, r0, 0x0) 14:38:29 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740112053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:29 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c5894f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) [ 1267.354675][ T454] device sit0 entered promiscuous mode 14:38:29 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740118053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) [ 1267.557094][ T456] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 14:38:29 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r5 = openat$cgroup_ro(r1, &(0x7f00000000c0)='blkio.bfq.sectors\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={r3, 0xe0, &(0x7f0000000940)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000200)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x1, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000640)=[0x0], 0x0, 0x6a, &(0x7f0000000680)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x6e, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r7 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000a40)={0x1b, 0x0, 0x0, 0x7, 0x0, r0, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x5, 0x3}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x1c, 0x21, &(0x7f0000000440)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x905, 0x0, 0x0, 0x0, 0x1}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@generic={0x80, 0x6, 0x8, 0x3f, 0xda}, @map_val={0x18, 0x1, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x401}, @initr0={0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x2}, @ldst={0x2, 0x3, 0x2, 0x9, 0x3, 0x1, 0x4}, @tail_call={{0x18, 0x2, 0x1, 0x0, r2}}, @jmp={0x5, 0x1, 0xa, 0x9, 0x3, 0xffffffffffffffe0}, @generic={0x9, 0x1, 0x5, 0x4, 0x8001}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @ldst={0x2, 0x1, 0x1, 0xb, 0xb, 0x20, 0x8}, @map_idx={0x18, 0x6, 0x5, 0x0, 0x10}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000080)='GPL\x00', 0x800, 0xd4, &(0x7f00000002c0)=""/212, 0x41100, 0x6, '\x00', 0x0, 0x8, r5, 0x8, &(0x7f0000000100)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x2, 0x475f, 0x401}, 0x10, r6, 0xffffffffffffffff, 0x4, &(0x7f0000000800)=[0xffffffffffffffff, r7], &(0x7f0000000ac0)=[{0x3, 0x2, 0xc, 0x6}, {0x3, 0x4, 0xb, 0xa}, {0x2, 0x2, 0xe, 0x2}, {0x3, 0x1, 0x5, 0x8}], 0x10, 0x20}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) getpid() perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f00000005c0)={0x1, 0x80, 0x0, 0x0, 0xbe, 0x0, 0x0, 0x0, 0x28000, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x400, 0xd7, 0x5, 0x0, 0x965, 0x0, 0xfffffffffffffffb}, 0x0, 0xd, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f00000006c0)) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0xe5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) ioctl$SIOCSIFHWADDR(r8, 0x8914, &(0x7f0000000040)={'sit0\x00', @local}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f00000008c0)='\x00'}, 0x30) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000e00)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8890}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000840)={0x0, 0x80, 0x2, 0x1, 0x9, 0x0, 0x0, 0x7, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x3ff, 0x0, @perf_config_ext={0x67}, 0x200, 0x612, 0x0, 0x0, 0xa0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x3, r4, 0x1) ioctl$SIOCSIFHWADDR(r9, 0x8914, &(0x7f0000000040)={'sit0\x00', @random="4f33e363a4b1"}) 14:38:29 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6494f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) [ 1267.602505][ T456] platform regulatory.0: Falling back to sysfs fallback for: regulatory.db 14:38:29 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740121053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) [ 1267.660785][ T465] device sit0 left promiscuous mode 14:38:29 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6894f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:29 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740125053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) [ 1267.808576][ T470] device sit0 entered promiscuous mode 14:38:29 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r5 = openat$cgroup_ro(r1, &(0x7f00000000c0)='blkio.bfq.sectors\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={r3, 0xe0, &(0x7f0000000940)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000200)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x1, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000640)=[0x0], 0x0, 0x6a, &(0x7f0000000680)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x6e, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r7 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000a40)={0x1b, 0x0, 0x0, 0x7, 0x0, r0, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x5, 0x3}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x1c, 0x21, &(0x7f0000000440)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x905, 0x0, 0x0, 0x0, 0x1}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@generic={0x80, 0x6, 0x8, 0x3f, 0xda}, @map_val={0x18, 0x1, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x401}, @initr0={0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x2}, @ldst={0x2, 0x3, 0x2, 0x9, 0x3, 0x1, 0x4}, @tail_call={{0x18, 0x2, 0x1, 0x0, r2}}, @jmp={0x5, 0x1, 0xa, 0x9, 0x3, 0xffffffffffffffe0}, @generic={0x9, 0x1, 0x5, 0x4, 0x8001}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @ldst={0x2, 0x1, 0x1, 0xb, 0xb, 0x20, 0x8}, @map_idx={0x18, 0x6, 0x5, 0x0, 0x10}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000080)='GPL\x00', 0x800, 0xd4, &(0x7f00000002c0)=""/212, 0x41100, 0x6, '\x00', 0x0, 0x8, r5, 0x8, &(0x7f0000000100)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x2, 0x475f, 0x401}, 0x10, r6, 0xffffffffffffffff, 0x4, &(0x7f0000000800)=[0xffffffffffffffff, r7], &(0x7f0000000ac0)=[{0x3, 0x2, 0xc, 0x6}, {0x3, 0x4, 0xb, 0xa}, {0x2, 0x2, 0xe, 0x2}, {0x3, 0x1, 0x5, 0x8}], 0x10, 0x20}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) getpid() perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f00000005c0)={0x1, 0x80, 0x0, 0x0, 0xbe, 0x0, 0x0, 0x0, 0x28000, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x400, 0xd7, 0x5, 0x0, 0x965, 0x0, 0xfffffffffffffffb}, 0x0, 0xd, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f00000006c0)) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0xe5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) ioctl$SIOCSIFHWADDR(r8, 0x8914, &(0x7f0000000040)={'sit0\x00', @local}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f00000008c0)='\x00'}, 0x30) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000e00)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8890}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000840)={0x0, 0x80, 0x2, 0x1, 0x9, 0x0, 0x0, 0x7, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x3ff, 0x0, @perf_config_ext={0x67}, 0x200, 0x612, 0x0, 0x0, 0xa0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x3, r4, 0x1) ioctl$SIOCSIFHWADDR(r9, 0x8914, &(0x7f0000000040)={'sit0\x00', @random="4f33e363a4b1"}) 14:38:29 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6994f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:29 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740135053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:29 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740141053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:29 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6c94f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) [ 1268.069378][ T480] device sit0 left promiscuous mode 14:38:30 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740148053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:30 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6f94f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:30 executing program 2: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x10) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x1a, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f97e24fc6004030e000a742700053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x3, 0x5, 0x5, 0x0, 0x0, 0x8, 0x4000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x101, 0x1, @perf_config_ext={0x7fff, 0x8}, 0x4000, 0x3, 0x0, 0x3, 0x80000001, 0x80, 0x40, 0x0, 0x0, 0x0, 0x81}, 0xffffffffffffffff, 0x8, r0, 0x0) 14:38:30 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a74014c053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) [ 1268.189567][ T480] device sit0 entered promiscuous mode 14:38:30 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740160053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:30 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c7094f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) [ 1268.400494][ T493] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 1268.410693][ T493] platform regulatory.0: Falling back to sysfs fallback for: regulatory.db 14:38:30 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r5 = openat$cgroup_ro(r1, &(0x7f00000000c0)='blkio.bfq.sectors\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={r3, 0xe0, &(0x7f0000000940)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000200)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x1, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000640)=[0x0], 0x0, 0x6a, &(0x7f0000000680)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x6e, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r7 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000a40)={0x1b, 0x0, 0x0, 0x7, 0x0, r0, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x5, 0x3}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x1c, 0x21, &(0x7f0000000440)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x905, 0x0, 0x0, 0x0, 0x1}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@generic={0x80, 0x6, 0x8, 0x3f, 0xda}, @map_val={0x18, 0x1, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x401}, @initr0={0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x2}, @ldst={0x2, 0x3, 0x2, 0x9, 0x3, 0x1, 0x4}, @tail_call={{0x18, 0x2, 0x1, 0x0, r2}}, @jmp={0x5, 0x1, 0xa, 0x9, 0x3, 0xffffffffffffffe0}, @generic={0x9, 0x1, 0x5, 0x4, 0x8001}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @ldst={0x2, 0x1, 0x1, 0xb, 0xb, 0x20, 0x8}, @map_idx={0x18, 0x6, 0x5, 0x0, 0x10}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000080)='GPL\x00', 0x800, 0xd4, &(0x7f00000002c0)=""/212, 0x41100, 0x6, '\x00', 0x0, 0x8, r5, 0x8, &(0x7f0000000100)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x2, 0x475f, 0x401}, 0x10, r6, 0xffffffffffffffff, 0x4, &(0x7f0000000800)=[0xffffffffffffffff, r7], &(0x7f0000000ac0)=[{0x3, 0x2, 0xc, 0x6}, {0x3, 0x4, 0xb, 0xa}, {0x2, 0x2, 0xe, 0x2}, {0x3, 0x1, 0x5, 0x8}], 0x10, 0x20}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) getpid() perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f00000005c0)={0x1, 0x80, 0x0, 0x0, 0xbe, 0x0, 0x0, 0x0, 0x28000, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x400, 0xd7, 0x5, 0x0, 0x965, 0x0, 0xfffffffffffffffb}, 0x0, 0xd, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f00000006c0)) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0xe5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) ioctl$SIOCSIFHWADDR(r8, 0x8914, &(0x7f0000000040)={'sit0\x00', @local}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f00000008c0)='\x00'}, 0x30) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000e00)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8890}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000840)={0x0, 0x80, 0x2, 0x1, 0x9, 0x0, 0x0, 0x7, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x3ff, 0x0, @perf_config_ext={0x67}, 0x200, 0x612, 0x0, 0x0, 0xa0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x3, r4, 0x1) ioctl$SIOCSIFHWADDR(r9, 0x8914, &(0x7f0000000040)={'sit0\x00', @random="4f33e363a4b1"}) 14:38:30 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c7394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:30 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740164053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) [ 1268.499979][ T500] device sit0 left promiscuous mode 14:38:30 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740168053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:30 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c7494f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) [ 1268.584810][ T505] device sit0 entered promiscuous mode [ 1268.663539][ T507] __nla_validate_parse: 61 callbacks suppressed [ 1268.663556][ T507] netlink: 134056 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1268.665788][ T509] netlink: 134056 bytes leftover after parsing attributes in process `syz-executor.4'. 14:38:30 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a74016c053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:30 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r5 = openat$cgroup_ro(r1, &(0x7f00000000c0)='blkio.bfq.sectors\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={r3, 0xe0, &(0x7f0000000940)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000200)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x1, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000640)=[0x0], 0x0, 0x6a, &(0x7f0000000680)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x6e, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r7 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000a40)={0x1b, 0x0, 0x0, 0x7, 0x0, r0, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x5, 0x3}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x1c, 0x21, &(0x7f0000000440)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x905, 0x0, 0x0, 0x0, 0x1}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@generic={0x80, 0x6, 0x8, 0x3f, 0xda}, @map_val={0x18, 0x1, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x401}, @initr0={0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x2}, @ldst={0x2, 0x3, 0x2, 0x9, 0x3, 0x1, 0x4}, @tail_call={{0x18, 0x2, 0x1, 0x0, r2}}, @jmp={0x5, 0x1, 0xa, 0x9, 0x3, 0xffffffffffffffe0}, @generic={0x9, 0x1, 0x5, 0x4, 0x8001}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @ldst={0x2, 0x1, 0x1, 0xb, 0xb, 0x20, 0x8}, @map_idx={0x18, 0x6, 0x5, 0x0, 0x10}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000080)='GPL\x00', 0x800, 0xd4, &(0x7f00000002c0)=""/212, 0x41100, 0x6, '\x00', 0x0, 0x8, r5, 0x8, &(0x7f0000000100)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x2, 0x475f, 0x401}, 0x10, r6, 0xffffffffffffffff, 0x4, &(0x7f0000000800)=[0xffffffffffffffff, r7], &(0x7f0000000ac0)=[{0x3, 0x2, 0xc, 0x6}, {0x3, 0x4, 0xb, 0xa}, {0x2, 0x2, 0xe, 0x2}, {0x3, 0x1, 0x5, 0x8}], 0x10, 0x20}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) getpid() perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f00000005c0)={0x1, 0x80, 0x0, 0x0, 0xbe, 0x0, 0x0, 0x0, 0x28000, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x400, 0xd7, 0x5, 0x0, 0x965, 0x0, 0xfffffffffffffffb}, 0x0, 0xd, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f00000006c0)) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0xe5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) ioctl$SIOCSIFHWADDR(r8, 0x8914, &(0x7f0000000040)={'sit0\x00', @local}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f00000008c0)='\x00'}, 0x30) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000e00)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8890}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000840)={0x0, 0x80, 0x2, 0x1, 0x9, 0x0, 0x0, 0x7, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x3ff, 0x0, @perf_config_ext={0x67}, 0x200, 0x612, 0x0, 0x0, 0xa0, 0x0, 0xd171}, 0x0, 0x3, r4, 0x1) ioctl$SIOCSIFHWADDR(r9, 0x8914, &(0x7f0000000040)={'sit0\x00', @random="4f33e363a4b1"}) 14:38:30 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c7594f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) [ 1268.867137][ T512] netlink: 134056 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1268.879309][ T515] netlink: 134056 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1268.885478][ T514] device sit0 left promiscuous mode 14:38:30 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740174053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:30 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c7894f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) [ 1268.990744][ T516] device sit0 entered promiscuous mode 14:38:30 executing program 2: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x10) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x1a, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f97e24fc6004030e000a743000053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x3, 0x5, 0x5, 0x0, 0x0, 0x8, 0x4000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x101, 0x1, @perf_config_ext={0x7fff, 0x8}, 0x4000, 0x3, 0x0, 0x3, 0x80000001, 0x80, 0x40, 0x0, 0x0, 0x0, 0x81}, 0xffffffffffffffff, 0x8, r0, 0x0) [ 1269.059193][ T518] netlink: 134056 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1269.078644][ T520] netlink: 134056 bytes leftover after parsing attributes in process `syz-executor.4'. 14:38:31 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a74017a053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:31 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c7a94f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:31 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r5 = openat$cgroup_ro(r1, &(0x7f00000000c0)='blkio.bfq.sectors\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={r3, 0xe0, &(0x7f0000000940)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000200)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x1, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000640)=[0x0], 0x0, 0x6a, &(0x7f0000000680)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x6e, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r7 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000a40)={0x1b, 0x0, 0x0, 0x7, 0x0, r0, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x5, 0x3}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x1c, 0x21, &(0x7f0000000440)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x905, 0x0, 0x0, 0x0, 0x1}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@generic={0x80, 0x6, 0x8, 0x3f, 0xda}, @map_val={0x18, 0x1, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x401}, @initr0={0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x2}, @ldst={0x2, 0x3, 0x2, 0x9, 0x3, 0x1, 0x4}, @tail_call={{0x18, 0x2, 0x1, 0x0, r2}}, @jmp={0x5, 0x1, 0xa, 0x9, 0x3, 0xffffffffffffffe0}, @generic={0x9, 0x1, 0x5, 0x4, 0x8001}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @ldst={0x2, 0x1, 0x1, 0xb, 0xb, 0x20, 0x8}, @map_idx={0x18, 0x6, 0x5, 0x0, 0x10}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000080)='GPL\x00', 0x800, 0xd4, &(0x7f00000002c0)=""/212, 0x41100, 0x6, '\x00', 0x0, 0x8, r5, 0x8, &(0x7f0000000100)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x2, 0x475f, 0x401}, 0x10, r6, 0xffffffffffffffff, 0x4, &(0x7f0000000800)=[0xffffffffffffffff, r7], &(0x7f0000000ac0)=[{0x3, 0x2, 0xc, 0x6}, {0x3, 0x4, 0xb, 0xa}, {0x2, 0x2, 0xe, 0x2}, {0x3, 0x1, 0x5, 0x8}], 0x10, 0x20}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) getpid() perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f00000005c0)={0x1, 0x80, 0x0, 0x0, 0xbe, 0x0, 0x0, 0x0, 0x28000, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x400, 0xd7, 0x5, 0x0, 0x965, 0x0, 0xfffffffffffffffb}, 0x0, 0xd, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f00000006c0)) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0xe5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) ioctl$SIOCSIFHWADDR(r8, 0x8914, &(0x7f0000000040)={'sit0\x00', @local}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f00000008c0)='\x00'}, 0x30) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000e00)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8890}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000840)={0x0, 0x80, 0x2, 0x1, 0x9, 0x0, 0x0, 0x7, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x3ff, 0x0, @perf_config_ext={0x67}, 0x200, 0x612, 0x0, 0x0, 0xa0, 0x0, 0xd171}, 0x0, 0x3, r4, 0x1) ioctl$SIOCSIFHWADDR(r9, 0x8914, &(0x7f0000000040)={'sit0\x00', @random="4f33e363a4b1"}) [ 1269.168925][ T522] netlink: 134056 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1269.184058][ T525] netlink: 134056 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1269.198018][ T526] netlink: 134056 bytes leftover after parsing attributes in process `syz-executor.4'. 14:38:31 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6302f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:31 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740100063582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) [ 1269.246762][ T522] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 1269.261752][ T522] platform regulatory.0: Falling back to sysfs fallback for: regulatory.db [ 1269.271189][ T529] device sit0 left promiscuous mode [ 1269.315270][ T532] netlink: 134056 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1269.378925][ T534] device sit0 entered promiscuous mode 14:38:31 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740100183582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:31 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740100403582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:31 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90224fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:31 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r5 = openat$cgroup_ro(r1, &(0x7f00000000c0)='blkio.bfq.sectors\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={r3, 0xe0, &(0x7f0000000940)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000200)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x1, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000640)=[0x0], 0x0, 0x6a, &(0x7f0000000680)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x6e, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r7 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000a40)={0x1b, 0x0, 0x0, 0x7, 0x0, r0, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x5, 0x3}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x1c, 0x21, &(0x7f0000000440)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x905, 0x0, 0x0, 0x0, 0x1}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@generic={0x80, 0x6, 0x8, 0x3f, 0xda}, @map_val={0x18, 0x1, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x401}, @initr0={0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x2}, @ldst={0x2, 0x3, 0x2, 0x9, 0x3, 0x1, 0x4}, @tail_call={{0x18, 0x2, 0x1, 0x0, r2}}, @jmp={0x5, 0x1, 0xa, 0x9, 0x3, 0xffffffffffffffe0}, @generic={0x9, 0x1, 0x5, 0x4, 0x8001}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @ldst={0x2, 0x1, 0x1, 0xb, 0xb, 0x20, 0x8}, @map_idx={0x18, 0x6, 0x5, 0x0, 0x10}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000080)='GPL\x00', 0x800, 0xd4, &(0x7f00000002c0)=""/212, 0x41100, 0x6, '\x00', 0x0, 0x8, r5, 0x8, &(0x7f0000000100)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x2, 0x475f, 0x401}, 0x10, r6, 0xffffffffffffffff, 0x4, &(0x7f0000000800)=[0xffffffffffffffff, r7], &(0x7f0000000ac0)=[{0x3, 0x2, 0xc, 0x6}, {0x3, 0x4, 0xb, 0xa}, {0x2, 0x2, 0xe, 0x2}, {0x3, 0x1, 0x5, 0x8}], 0x10, 0x20}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) getpid() perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f00000005c0)={0x1, 0x80, 0x0, 0x0, 0xbe, 0x0, 0x0, 0x0, 0x28000, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x400, 0xd7, 0x5, 0x0, 0x965, 0x0, 0xfffffffffffffffb}, 0x0, 0xd, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f00000006c0)) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0xe5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) ioctl$SIOCSIFHWADDR(r8, 0x8914, &(0x7f0000000040)={'sit0\x00', @local}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f00000008c0)='\x00'}, 0x30) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000e00)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8890}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000840)={0x0, 0x80, 0x2, 0x1, 0x9, 0x0, 0x0, 0x7, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x3ff, 0x0, @perf_config_ext={0x67}, 0x200, 0x612, 0x0, 0x0, 0xa0, 0x0, 0xd171}, 0x0, 0x3, r4, 0x1) ioctl$SIOCSIFHWADDR(r9, 0x8914, &(0x7f0000000040)={'sit0\x00', @random="4f33e363a4b1"}) 14:38:31 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740100643582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:31 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) [ 1269.643347][ T542] device sit0 left promiscuous mode 14:38:31 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740100023582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:31 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90624fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) [ 1269.765675][ T547] device sit0 entered promiscuous mode 14:38:31 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740100043582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:31 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r5 = openat$cgroup_ro(r1, &(0x7f00000000c0)='blkio.bfq.sectors\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={r3, 0xe0, &(0x7f0000000940)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000200)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x1, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000640)=[0x0], 0x0, 0x6a, &(0x7f0000000680)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x6e, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r7 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000a40)={0x1b, 0x0, 0x0, 0x7, 0x0, r0, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x5, 0x3}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x1c, 0x21, &(0x7f0000000440)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x905, 0x0, 0x0, 0x0, 0x1}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@generic={0x80, 0x6, 0x8, 0x3f, 0xda}, @map_val={0x18, 0x1, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x401}, @initr0={0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x2}, @ldst={0x2, 0x3, 0x2, 0x9, 0x3, 0x1, 0x4}, @tail_call={{0x18, 0x2, 0x1, 0x0, r2}}, @jmp={0x5, 0x1, 0xa, 0x9, 0x3, 0xffffffffffffffe0}, @generic={0x9, 0x1, 0x5, 0x4, 0x8001}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @ldst={0x2, 0x1, 0x1, 0xb, 0xb, 0x20, 0x8}, @map_idx={0x18, 0x6, 0x5, 0x0, 0x10}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000080)='GPL\x00', 0x800, 0xd4, &(0x7f00000002c0)=""/212, 0x41100, 0x6, '\x00', 0x0, 0x8, r5, 0x8, &(0x7f0000000100)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x2, 0x475f, 0x401}, 0x10, r6, 0xffffffffffffffff, 0x4, &(0x7f0000000800)=[0xffffffffffffffff, r7], &(0x7f0000000ac0)=[{0x3, 0x2, 0xc, 0x6}, {0x3, 0x4, 0xb, 0xa}, {0x2, 0x2, 0xe, 0x2}, {0x3, 0x1, 0x5, 0x8}], 0x10, 0x20}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) getpid() perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f00000005c0)={0x1, 0x80, 0x0, 0x0, 0xbe, 0x0, 0x0, 0x0, 0x28000, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x400, 0xd7, 0x5, 0x0, 0x965, 0x0, 0xfffffffffffffffb}, 0x0, 0xd, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f00000006c0)) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0xe5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) ioctl$SIOCSIFHWADDR(r8, 0x8914, &(0x7f0000000040)={'sit0\x00', @local}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f00000008c0)='\x00'}, 0x30) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000e00)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8890}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000840)={0x0, 0x80, 0x2, 0x1, 0x9, 0x0, 0x0, 0x7, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x3ff, 0x0, @perf_config_ext={0x67}, 0x200, 0x612, 0x0, 0x0, 0xa0, 0x0, 0xd171, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, r4, 0x1) ioctl$SIOCSIFHWADDR(r9, 0x8914, &(0x7f0000000040)={'sit0\x00', @random="4f33e363a4b1"}) 14:38:31 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90724fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:31 executing program 2: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x10) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x1a, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f97e24fc6004030e000a744200053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x3, 0x5, 0x5, 0x0, 0x0, 0x8, 0x4000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x101, 0x1, @perf_config_ext={0x7fff, 0x8}, 0x4000, 0x3, 0x0, 0x3, 0x80000001, 0x80, 0x40, 0x0, 0x0, 0x0, 0x81}, 0xffffffffffffffff, 0x8, r0, 0x0) 14:38:31 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90824fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:31 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740100063582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) [ 1270.070398][ T559] device sit0 left promiscuous mode 14:38:32 executing program 2: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x10) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x1a, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f97e24fc6004030e000a744c00053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x3, 0x5, 0x5, 0x0, 0x0, 0x8, 0x4000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x101, 0x1, @perf_config_ext={0x7fff, 0x8}, 0x4000, 0x3, 0x0, 0x3, 0x80000001, 0x80, 0x40, 0x0, 0x0, 0x0, 0x81}, 0xffffffffffffffff, 0x8, r0, 0x0) [ 1270.300596][ T563] device sit0 entered promiscuous mode 14:38:32 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90924fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:32 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r5 = openat$cgroup_ro(r1, &(0x7f00000000c0)='blkio.bfq.sectors\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={r3, 0xe0, &(0x7f0000000940)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000200)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x1, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000640)=[0x0], 0x0, 0x6a, &(0x7f0000000680)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x6e, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r7 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000a40)={0x1b, 0x0, 0x0, 0x7, 0x0, r0, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x5, 0x3}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x1c, 0x21, &(0x7f0000000440)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x905, 0x0, 0x0, 0x0, 0x1}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@generic={0x80, 0x6, 0x8, 0x3f, 0xda}, @map_val={0x18, 0x1, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x401}, @initr0={0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x2}, @ldst={0x2, 0x3, 0x2, 0x9, 0x3, 0x1, 0x4}, @tail_call={{0x18, 0x2, 0x1, 0x0, r2}}, @jmp={0x5, 0x1, 0xa, 0x9, 0x3, 0xffffffffffffffe0}, @generic={0x9, 0x1, 0x5, 0x4, 0x8001}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @ldst={0x2, 0x1, 0x1, 0xb, 0xb, 0x20, 0x8}, @map_idx={0x18, 0x6, 0x5, 0x0, 0x10}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000080)='GPL\x00', 0x800, 0xd4, &(0x7f00000002c0)=""/212, 0x41100, 0x6, '\x00', 0x0, 0x8, r5, 0x8, &(0x7f0000000100)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x2, 0x475f, 0x401}, 0x10, r6, 0xffffffffffffffff, 0x4, &(0x7f0000000800)=[0xffffffffffffffff, r7], &(0x7f0000000ac0)=[{0x3, 0x2, 0xc, 0x6}, {0x3, 0x4, 0xb, 0xa}, {0x2, 0x2, 0xe, 0x2}, {0x3, 0x1, 0x5, 0x8}], 0x10, 0x20}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) getpid() perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f00000005c0)={0x1, 0x80, 0x0, 0x0, 0xbe, 0x0, 0x0, 0x0, 0x28000, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x400, 0xd7, 0x5, 0x0, 0x965, 0x0, 0xfffffffffffffffb}, 0x0, 0xd, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f00000006c0)) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0xe5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) ioctl$SIOCSIFHWADDR(r8, 0x8914, &(0x7f0000000040)={'sit0\x00', @local}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f00000008c0)='\x00'}, 0x30) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000e00)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8890}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000840)={0x0, 0x80, 0x2, 0x1, 0x9, 0x0, 0x0, 0x7, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x3ff, 0x0, @perf_config_ext={0x67}, 0x200, 0x612, 0x0, 0x0, 0xa0, 0x0, 0xd171, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, r4, 0x1) ioctl$SIOCSIFHWADDR(r9, 0x8914, &(0x7f0000000040)={'sit0\x00', @random="4f33e363a4b1"}) 14:38:32 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740100183582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) [ 1270.468148][ T567] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 14:38:32 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90a24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) [ 1270.510587][ T567] platform regulatory.0: Falling back to sysfs fallback for: regulatory.db [ 1270.567951][ T574] device sit0 left promiscuous mode [ 1270.632815][ T577] device sit0 entered promiscuous mode 14:38:32 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740100643582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:32 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90b24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:32 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740100050a82c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:32 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90c24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:32 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r5 = openat$cgroup_ro(r1, &(0x7f00000000c0)='blkio.bfq.sectors\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={r3, 0xe0, &(0x7f0000000940)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000200)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x1, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000640)=[0x0], 0x0, 0x6a, &(0x7f0000000680)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x6e, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r7 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000a40)={0x1b, 0x0, 0x0, 0x7, 0x0, r0, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x5, 0x3}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x1c, 0x21, &(0x7f0000000440)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x905, 0x0, 0x0, 0x0, 0x1}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@generic={0x80, 0x6, 0x8, 0x3f, 0xda}, @map_val={0x18, 0x1, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x401}, @initr0={0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x2}, @ldst={0x2, 0x3, 0x2, 0x9, 0x3, 0x1, 0x4}, @tail_call={{0x18, 0x2, 0x1, 0x0, r2}}, @jmp={0x5, 0x1, 0xa, 0x9, 0x3, 0xffffffffffffffe0}, @generic={0x9, 0x1, 0x5, 0x4, 0x8001}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @ldst={0x2, 0x1, 0x1, 0xb, 0xb, 0x20, 0x8}, @map_idx={0x18, 0x6, 0x5, 0x0, 0x10}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000080)='GPL\x00', 0x800, 0xd4, &(0x7f00000002c0)=""/212, 0x41100, 0x6, '\x00', 0x0, 0x8, r5, 0x8, &(0x7f0000000100)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x2, 0x475f, 0x401}, 0x10, r6, 0xffffffffffffffff, 0x4, &(0x7f0000000800)=[0xffffffffffffffff, r7], &(0x7f0000000ac0)=[{0x3, 0x2, 0xc, 0x6}, {0x3, 0x4, 0xb, 0xa}, {0x2, 0x2, 0xe, 0x2}, {0x3, 0x1, 0x5, 0x8}], 0x10, 0x20}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) getpid() perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f00000005c0)={0x1, 0x80, 0x0, 0x0, 0xbe, 0x0, 0x0, 0x0, 0x28000, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x400, 0xd7, 0x5, 0x0, 0x965, 0x0, 0xfffffffffffffffb}, 0x0, 0xd, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f00000006c0)) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0xe5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) ioctl$SIOCSIFHWADDR(r8, 0x8914, &(0x7f0000000040)={'sit0\x00', @local}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f00000008c0)='\x00'}, 0x30) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000e00)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8890}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000840)={0x0, 0x80, 0x2, 0x1, 0x9, 0x0, 0x0, 0x7, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x3ff, 0x0, @perf_config_ext={0x67}, 0x200, 0x612, 0x0, 0x0, 0xa0, 0x0, 0xd171, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, r4, 0x1) ioctl$SIOCSIFHWADDR(r9, 0x8914, &(0x7f0000000040)={'sit0\x00', @random="4f33e363a4b1"}) 14:38:32 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740100052382c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) [ 1270.890149][ T587] device sit0 left promiscuous mode 14:38:32 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90e02fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:32 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740100052b82c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) [ 1270.957125][ T589] device sit0 entered promiscuous mode 14:38:32 executing program 2: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x10) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x1a, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f97e24fc6004030e000a747e00053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x3, 0x5, 0x5, 0x0, 0x0, 0x8, 0x4000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x101, 0x1, @perf_config_ext={0x7fff, 0x8}, 0x4000, 0x3, 0x0, 0x3, 0x80000001, 0x80, 0x40, 0x0, 0x0, 0x0, 0x81}, 0xffffffffffffffff, 0x8, r0, 0x0) 14:38:33 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90e24026004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:33 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740100052d82c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:33 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r4 = openat$cgroup_ro(r1, &(0x7f00000000c0)='blkio.bfq.sectors\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={r3, 0xe0, &(0x7f0000000940)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000200)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x1, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000640)=[0x0], 0x0, 0x6a, &(0x7f0000000680)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x6e, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r6 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000a40)={0x1b, 0x0, 0x0, 0x7, 0x0, r0, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x5, 0x3}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x1c, 0x21, &(0x7f0000000440)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x905, 0x0, 0x0, 0x0, 0x1}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@generic={0x80, 0x6, 0x8, 0x3f, 0xda}, @map_val={0x18, 0x1, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x401}, @initr0={0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x2}, @ldst={0x2, 0x3, 0x2, 0x9, 0x3, 0x1, 0x4}, @tail_call={{0x18, 0x2, 0x1, 0x0, r2}}, @jmp={0x5, 0x1, 0xa, 0x9, 0x3, 0xffffffffffffffe0}, @generic={0x9, 0x1, 0x5, 0x4, 0x8001}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @ldst={0x2, 0x1, 0x1, 0xb, 0xb, 0x20, 0x8}, @map_idx={0x18, 0x6, 0x5, 0x0, 0x10}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000080)='GPL\x00', 0x800, 0xd4, &(0x7f00000002c0)=""/212, 0x41100, 0x6, '\x00', 0x0, 0x8, r4, 0x8, &(0x7f0000000100)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x2, 0x475f, 0x401}, 0x10, r5, 0xffffffffffffffff, 0x4, &(0x7f0000000800)=[0xffffffffffffffff, r6], &(0x7f0000000ac0)=[{0x3, 0x2, 0xc, 0x6}, {0x3, 0x4, 0xb, 0xa}, {0x2, 0x2, 0xe, 0x2}, {0x3, 0x1, 0x5, 0x8}], 0x10, 0x20}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) getpid() perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f00000005c0)={0x1, 0x80, 0x0, 0x0, 0xbe, 0x0, 0x0, 0x0, 0x28000, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x400, 0xd7, 0x5, 0x0, 0x965, 0x0, 0xfffffffffffffffb}, 0x0, 0xd, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f00000006c0)) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0xe5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) ioctl$SIOCSIFHWADDR(r7, 0x8914, &(0x7f0000000040)={'sit0\x00', @local}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f00000008c0)='\x00'}, 0x30) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000e00)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8890}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000840)={0x0, 0x80, 0x2, 0x1, 0x9, 0x0, 0x0, 0x7, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x3ff, 0x0, @perf_config_ext={0x67}, 0x200, 0x612, 0x0, 0x0, 0xa0, 0x0, 0xd171, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x3, 0xffffffffffffffff, 0x1) ioctl$SIOCSIFHWADDR(r8, 0x8914, &(0x7f0000000040)={'sit0\x00', @random="4f33e363a4b1"}) [ 1271.191383][ T596] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 1271.229879][ T596] platform regulatory.0: Falling back to sysfs fallback for: regulatory.db 14:38:33 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90e24fc0204030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:33 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740100053082c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) [ 1271.311477][ T603] device sit0 left promiscuous mode 14:38:33 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90e24fc0804030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:33 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740100054782c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) [ 1271.458150][ T608] device sit0 entered promiscuous mode 14:38:33 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740100053502c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:33 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90e24fc0a04030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:33 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r4 = openat$cgroup_ro(r1, &(0x7f00000000c0)='blkio.bfq.sectors\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={r3, 0xe0, &(0x7f0000000940)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000200)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x1, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000640)=[0x0], 0x0, 0x6a, &(0x7f0000000680)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x6e, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r6 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000a40)={0x1b, 0x0, 0x0, 0x7, 0x0, r0, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x5, 0x3}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x1c, 0x21, &(0x7f0000000440)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x905, 0x0, 0x0, 0x0, 0x1}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@generic={0x80, 0x6, 0x8, 0x3f, 0xda}, @map_val={0x18, 0x1, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x401}, @initr0={0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x2}, @ldst={0x2, 0x3, 0x2, 0x9, 0x3, 0x1, 0x4}, @tail_call={{0x18, 0x2, 0x1, 0x0, r2}}, @jmp={0x5, 0x1, 0xa, 0x9, 0x3, 0xffffffffffffffe0}, @generic={0x9, 0x1, 0x5, 0x4, 0x8001}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @ldst={0x2, 0x1, 0x1, 0xb, 0xb, 0x20, 0x8}, @map_idx={0x18, 0x6, 0x5, 0x0, 0x10}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000080)='GPL\x00', 0x800, 0xd4, &(0x7f00000002c0)=""/212, 0x41100, 0x6, '\x00', 0x0, 0x8, r4, 0x8, &(0x7f0000000100)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x2, 0x475f, 0x401}, 0x10, r5, 0xffffffffffffffff, 0x4, &(0x7f0000000800)=[0xffffffffffffffff, r6], &(0x7f0000000ac0)=[{0x3, 0x2, 0xc, 0x6}, {0x3, 0x4, 0xb, 0xa}, {0x2, 0x2, 0xe, 0x2}, {0x3, 0x1, 0x5, 0x8}], 0x10, 0x20}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) getpid() perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f00000005c0)={0x1, 0x80, 0x0, 0x0, 0xbe, 0x0, 0x0, 0x0, 0x28000, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x400, 0xd7, 0x5, 0x0, 0x965, 0x0, 0xfffffffffffffffb}, 0x0, 0xd, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f00000006c0)) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0xe5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) ioctl$SIOCSIFHWADDR(r7, 0x8914, &(0x7f0000000040)={'sit0\x00', @local}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f00000008c0)='\x00'}, 0x30) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000e00)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8890}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000840)={0x0, 0x80, 0x2, 0x1, 0x9, 0x0, 0x0, 0x7, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x3ff, 0x0, @perf_config_ext={0x67}, 0x200, 0x612, 0x0, 0x0, 0xa0, 0x0, 0xd171, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x3, 0xffffffffffffffff, 0x1) ioctl$SIOCSIFHWADDR(r8, 0x8914, &(0x7f0000000040)={'sit0\x00', @random="4f33e363a4b1"}) 14:38:33 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740100053582c10a153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:33 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90e24fc2504030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) [ 1271.763537][ T618] device sit0 left promiscuous mode 14:38:33 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90e24fc6004000e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:33 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740100053582c1371502370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) [ 1271.842526][ T618] device sit0 entered promiscuous mode 14:38:33 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90e24fc6002030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:33 executing program 2: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x10) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x1a, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f97e24fc6004030e000a74d80f053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x3, 0x5, 0x5, 0x0, 0x0, 0x8, 0x4000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x101, 0x1, @perf_config_ext={0x7fff, 0x8}, 0x4000, 0x3, 0x0, 0x3, 0x80000001, 0x80, 0x40, 0x0, 0x0, 0x0, 0x81}, 0xffffffffffffffff, 0x8, r0, 0x0) 14:38:33 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90e24fc6003030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:33 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e0a0248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:34 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r4 = openat$cgroup_ro(r1, &(0x7f00000000c0)='blkio.bfq.sectors\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={r3, 0xe0, &(0x7f0000000940)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000200)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x1, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000640)=[0x0], 0x0, 0x6a, &(0x7f0000000680)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x6e, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r6 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000a40)={0x1b, 0x0, 0x0, 0x7, 0x0, r0, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x5, 0x3}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x1c, 0x21, &(0x7f0000000440)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x905, 0x0, 0x0, 0x0, 0x1}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@generic={0x80, 0x6, 0x8, 0x3f, 0xda}, @map_val={0x18, 0x1, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x401}, @initr0={0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x2}, @ldst={0x2, 0x3, 0x2, 0x9, 0x3, 0x1, 0x4}, @tail_call={{0x18, 0x2, 0x1, 0x0, r2}}, @jmp={0x5, 0x1, 0xa, 0x9, 0x3, 0xffffffffffffffe0}, @generic={0x9, 0x1, 0x5, 0x4, 0x8001}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @ldst={0x2, 0x1, 0x1, 0xb, 0xb, 0x20, 0x8}, @map_idx={0x18, 0x6, 0x5, 0x0, 0x10}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000080)='GPL\x00', 0x800, 0xd4, &(0x7f00000002c0)=""/212, 0x41100, 0x6, '\x00', 0x0, 0x8, r4, 0x8, &(0x7f0000000100)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x2, 0x475f, 0x401}, 0x10, r5, 0xffffffffffffffff, 0x4, &(0x7f0000000800)=[0xffffffffffffffff, r6], &(0x7f0000000ac0)=[{0x3, 0x2, 0xc, 0x6}, {0x3, 0x4, 0xb, 0xa}, {0x2, 0x2, 0xe, 0x2}, {0x3, 0x1, 0x5, 0x8}], 0x10, 0x20}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) getpid() perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f00000005c0)={0x1, 0x80, 0x0, 0x0, 0xbe, 0x0, 0x0, 0x0, 0x28000, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x400, 0xd7, 0x5, 0x0, 0x965, 0x0, 0xfffffffffffffffb}, 0x0, 0xd, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f00000006c0)) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0xe5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) ioctl$SIOCSIFHWADDR(r7, 0x8914, &(0x7f0000000040)={'sit0\x00', @local}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f00000008c0)='\x00'}, 0x30) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000e00)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8890}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000840)={0x0, 0x80, 0x2, 0x1, 0x9, 0x0, 0x0, 0x7, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x3ff, 0x0, @perf_config_ext={0x67}, 0x200, 0x612, 0x0, 0x0, 0xa0, 0x0, 0xd171, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x3, 0xffffffffffffffff, 0x1) ioctl$SIOCSIFHWADDR(r8, 0x8914, &(0x7f0000000040)={'sit0\x00', @random="4f33e363a4b1"}) [ 1272.067077][ T630] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 14:38:34 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90e24fc6005030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) [ 1272.115715][ T630] platform regulatory.0: Falling back to sysfs fallback for: regulatory.db [ 1272.136530][ T635] device sit0 left promiscuous mode 14:38:34 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90e24fc6006030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:34 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370348018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) [ 1272.291025][ T639] device sit0 entered promiscuous mode 14:38:34 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r5 = openat$cgroup_ro(r1, &(0x7f00000000c0)='blkio.bfq.sectors\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={r3, 0xe0, &(0x7f0000000940)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000200)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x1, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000640)=[0x0], 0x0, 0x6a, &(0x7f0000000680)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x6e, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r7 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000a40)={0x1b, 0x0, 0x0, 0x7, 0x0, r0, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x5, 0x3}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x1c, 0x21, &(0x7f0000000440)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x905, 0x0, 0x0, 0x0, 0x1}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@generic={0x80, 0x6, 0x8, 0x3f, 0xda}, @map_val={0x18, 0x1, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x401}, @initr0={0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x2}, @ldst={0x2, 0x3, 0x2, 0x9, 0x3, 0x1, 0x4}, @tail_call={{0x18, 0x2, 0x1, 0x0, r2}}, @jmp={0x5, 0x1, 0xa, 0x9, 0x3, 0xffffffffffffffe0}, @generic={0x9, 0x1, 0x5, 0x4, 0x8001}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @ldst={0x2, 0x1, 0x1, 0xb, 0xb, 0x20, 0x8}, @map_idx={0x18, 0x6, 0x5, 0x0, 0x10}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000080)='GPL\x00', 0x800, 0xd4, &(0x7f00000002c0)=""/212, 0x41100, 0x6, '\x00', 0x0, 0x8, r5, 0x8, &(0x7f0000000100)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x2, 0x475f, 0x401}, 0x10, r6, 0xffffffffffffffff, 0x4, &(0x7f0000000800)=[0xffffffffffffffff, r7], &(0x7f0000000ac0)=[{0x3, 0x2, 0xc, 0x6}, {0x3, 0x4, 0xb, 0xa}, {0x2, 0x2, 0xe, 0x2}, {0x3, 0x1, 0x5, 0x8}], 0x10, 0x20}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) getpid() perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f00000005c0)={0x1, 0x80, 0x0, 0x0, 0xbe, 0x0, 0x0, 0x0, 0x28000, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x400, 0xd7, 0x5, 0x0, 0x965, 0x0, 0xfffffffffffffffb}, 0x0, 0xd, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f00000006c0)) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0xe5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) ioctl$SIOCSIFHWADDR(r8, 0x8914, &(0x7f0000000040)={'sit0\x00', @local}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f00000008c0)='\x00'}, 0x30) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000e00)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8890}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000840)={0x0, 0x80, 0x2, 0x1, 0x9, 0x0, 0x0, 0x7, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x3ff, 0x0, @perf_config_ext={0x67}, 0x200, 0x612, 0x0, 0x0, 0xa0, 0x0, 0xd171, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x3, r4, 0x0) ioctl$SIOCSIFHWADDR(r9, 0x8914, &(0x7f0000000040)={'sit0\x00', @random="4f33e363a4b1"}) 14:38:34 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90e24fc6007030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:34 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370448018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:34 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90e24fc6008030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) [ 1272.507665][ T646] device sit0 left promiscuous mode 14:38:34 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90e24fc6009030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:34 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370548018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) [ 1272.648109][ T652] device sit0 entered promiscuous mode 14:38:34 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90e24fc600a030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:34 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90e24fc600b030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:34 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370648018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:34 executing program 2: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x10) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x1a, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f97e24fc6004030e000a74e00f053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x3, 0x5, 0x5, 0x0, 0x0, 0x8, 0x4000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x101, 0x1, @perf_config_ext={0x7fff, 0x8}, 0x4000, 0x3, 0x0, 0x3, 0x80000001, 0x80, 0x40, 0x0, 0x0, 0x0, 0x81}, 0xffffffffffffffff, 0x8, r0, 0x0) 14:38:34 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r5 = openat$cgroup_ro(r1, &(0x7f00000000c0)='blkio.bfq.sectors\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={r3, 0xe0, &(0x7f0000000940)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000200)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x1, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000640)=[0x0], 0x0, 0x6a, &(0x7f0000000680)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x6e, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r7 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000a40)={0x1b, 0x0, 0x0, 0x7, 0x0, r0, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x5, 0x3}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x1c, 0x21, &(0x7f0000000440)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x905, 0x0, 0x0, 0x0, 0x1}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@generic={0x80, 0x6, 0x8, 0x3f, 0xda}, @map_val={0x18, 0x1, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x401}, @initr0={0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x2}, @ldst={0x2, 0x3, 0x2, 0x9, 0x3, 0x1, 0x4}, @tail_call={{0x18, 0x2, 0x1, 0x0, r2}}, @jmp={0x5, 0x1, 0xa, 0x9, 0x3, 0xffffffffffffffe0}, @generic={0x9, 0x1, 0x5, 0x4, 0x8001}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @ldst={0x2, 0x1, 0x1, 0xb, 0xb, 0x20, 0x8}, @map_idx={0x18, 0x6, 0x5, 0x0, 0x10}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000080)='GPL\x00', 0x800, 0xd4, &(0x7f00000002c0)=""/212, 0x41100, 0x6, '\x00', 0x0, 0x8, r5, 0x8, &(0x7f0000000100)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x2, 0x475f, 0x401}, 0x10, r6, 0xffffffffffffffff, 0x4, &(0x7f0000000800)=[0xffffffffffffffff, r7], &(0x7f0000000ac0)=[{0x3, 0x2, 0xc, 0x6}, {0x3, 0x4, 0xb, 0xa}, {0x2, 0x2, 0xe, 0x2}, {0x3, 0x1, 0x5, 0x8}], 0x10, 0x20}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) getpid() perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f00000005c0)={0x1, 0x80, 0x0, 0x0, 0xbe, 0x0, 0x0, 0x0, 0x28000, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x400, 0xd7, 0x5, 0x0, 0x965, 0x0, 0xfffffffffffffffb}, 0x0, 0xd, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f00000006c0)) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0xe5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) ioctl$SIOCSIFHWADDR(r8, 0x8914, &(0x7f0000000040)={'sit0\x00', @local}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f00000008c0)='\x00'}, 0x30) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000e00)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8890}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000840)={0x0, 0x80, 0x2, 0x1, 0x9, 0x0, 0x0, 0x7, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x3ff, 0x0, @perf_config_ext={0x67}, 0x200, 0x612, 0x0, 0x0, 0xa0, 0x0, 0xd171, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x3, r4, 0x0) ioctl$SIOCSIFHWADDR(r9, 0x8914, &(0x7f0000000040)={'sit0\x00', @random="4f33e363a4b1"}) 14:38:34 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370848018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:34 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90e24fc600c030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) [ 1272.939729][ T667] device sit0 left promiscuous mode [ 1272.962712][ T665] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 1272.998260][ T665] platform regulatory.0: Falling back to sysfs fallback for: regulatory.db 14:38:34 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90e24fc600d030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:34 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370a48018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) [ 1273.084155][ T672] device sit0 entered promiscuous mode 14:38:35 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90e24fc600e030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:35 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370c48018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:35 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90e24fc6010030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:35 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r5 = openat$cgroup_ro(r1, &(0x7f00000000c0)='blkio.bfq.sectors\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={r3, 0xe0, &(0x7f0000000940)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000200)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x1, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000640)=[0x0], 0x0, 0x6a, &(0x7f0000000680)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x6e, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r7 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000a40)={0x1b, 0x0, 0x0, 0x7, 0x0, r0, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x5, 0x3}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x1c, 0x21, &(0x7f0000000440)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x905, 0x0, 0x0, 0x0, 0x1}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@generic={0x80, 0x6, 0x8, 0x3f, 0xda}, @map_val={0x18, 0x1, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x401}, @initr0={0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x2}, @ldst={0x2, 0x3, 0x2, 0x9, 0x3, 0x1, 0x4}, @tail_call={{0x18, 0x2, 0x1, 0x0, r2}}, @jmp={0x5, 0x1, 0xa, 0x9, 0x3, 0xffffffffffffffe0}, @generic={0x9, 0x1, 0x5, 0x4, 0x8001}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @ldst={0x2, 0x1, 0x1, 0xb, 0xb, 0x20, 0x8}, @map_idx={0x18, 0x6, 0x5, 0x0, 0x10}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000080)='GPL\x00', 0x800, 0xd4, &(0x7f00000002c0)=""/212, 0x41100, 0x6, '\x00', 0x0, 0x8, r5, 0x8, &(0x7f0000000100)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x2, 0x475f, 0x401}, 0x10, r6, 0xffffffffffffffff, 0x4, &(0x7f0000000800)=[0xffffffffffffffff, r7], &(0x7f0000000ac0)=[{0x3, 0x2, 0xc, 0x6}, {0x3, 0x4, 0xb, 0xa}, {0x2, 0x2, 0xe, 0x2}, {0x3, 0x1, 0x5, 0x8}], 0x10, 0x20}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) getpid() perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f00000005c0)={0x1, 0x80, 0x0, 0x0, 0xbe, 0x0, 0x0, 0x0, 0x28000, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x400, 0xd7, 0x5, 0x0, 0x965, 0x0, 0xfffffffffffffffb}, 0x0, 0xd, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f00000006c0)) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0xe5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) ioctl$SIOCSIFHWADDR(r8, 0x8914, &(0x7f0000000040)={'sit0\x00', @local}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f00000008c0)='\x00'}, 0x30) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000e00)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8890}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000840)={0x0, 0x80, 0x2, 0x1, 0x9, 0x0, 0x0, 0x7, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x3ff, 0x0, @perf_config_ext={0x67}, 0x200, 0x612, 0x0, 0x0, 0xa0, 0x0, 0xd171, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x3, r4, 0x0) ioctl$SIOCSIFHWADDR(r9, 0x8914, &(0x7f0000000040)={'sit0\x00', @random="4f33e363a4b1"}) 14:38:35 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370e48018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:35 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90e24fc6011030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:35 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e371048018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) [ 1273.370889][ T687] device sit0 left promiscuous mode 14:38:35 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90e24fc6012030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:35 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e371248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) [ 1273.519797][ T692] device sit0 entered promiscuous mode 14:38:35 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90e24fc6018030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:35 executing program 2: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x10) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x1a, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f97e24fc6004030e000a74eb0f053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x3, 0x5, 0x5, 0x0, 0x0, 0x8, 0x4000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x101, 0x1, @perf_config_ext={0x7fff, 0x8}, 0x4000, 0x3, 0x0, 0x3, 0x80000001, 0x80, 0x40, 0x0, 0x0, 0x0, 0x81}, 0xffffffffffffffff, 0x8, r0, 0x0) 14:38:35 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e371448018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:35 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r5 = openat$cgroup_ro(r1, &(0x7f00000000c0)='blkio.bfq.sectors\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={r3, 0xe0, &(0x7f0000000940)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000200)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x1, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000640)=[0x0], 0x0, 0x6a, &(0x7f0000000680)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x6e, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r7 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000a40)={0x1b, 0x0, 0x0, 0x7, 0x0, r0, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x5, 0x3}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x1c, 0x21, &(0x7f0000000440)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x905, 0x0, 0x0, 0x0, 0x1}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@generic={0x80, 0x6, 0x8, 0x3f, 0xda}, @map_val={0x18, 0x1, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x401}, @initr0={0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x2}, @ldst={0x2, 0x3, 0x2, 0x9, 0x3, 0x1, 0x4}, @tail_call={{0x18, 0x2, 0x1, 0x0, r2}}, @jmp={0x5, 0x1, 0xa, 0x9, 0x3, 0xffffffffffffffe0}, @generic={0x9, 0x1, 0x5, 0x4, 0x8001}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @ldst={0x2, 0x1, 0x1, 0xb, 0xb, 0x20, 0x8}, @map_idx={0x18, 0x6, 0x5, 0x0, 0x10}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000080)='GPL\x00', 0x800, 0xd4, &(0x7f00000002c0)=""/212, 0x41100, 0x6, '\x00', 0x0, 0x8, r5, 0x8, &(0x7f0000000100)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x2, 0x475f, 0x401}, 0x10, r6, 0xffffffffffffffff, 0x4, &(0x7f0000000800)=[0xffffffffffffffff, r7], &(0x7f0000000ac0)=[{0x3, 0x2, 0xc, 0x6}, {0x3, 0x4, 0xb, 0xa}, {0x2, 0x2, 0xe, 0x2}, {0x3, 0x1, 0x5, 0x8}], 0x10, 0x20}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) getpid() perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f00000005c0)={0x1, 0x80, 0x0, 0x0, 0xbe, 0x0, 0x0, 0x0, 0x28000, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x400, 0xd7, 0x5, 0x0, 0x965, 0x0, 0xfffffffffffffffb}, 0x0, 0xd, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f00000006c0)) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0xe5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) ioctl$SIOCSIFHWADDR(r8, 0x8914, &(0x7f0000000040)={'sit0\x00', @local}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f00000008c0)='\x00'}, 0x30) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000e00)) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8890}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000840)={0x0, 0x80, 0x2, 0x1, 0x9, 0x0, 0x0, 0x7, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x3ff, 0x0, @perf_config_ext={0x67}, 0x200, 0x612, 0x0, 0x0, 0xa0, 0x0, 0xd171, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x3, r4, 0x1) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, &(0x7f0000000040)={'sit0\x00', @random="4f33e363a4b1"}) [ 1273.815746][ T701] __nla_validate_parse: 56 callbacks suppressed [ 1273.815763][ T701] netlink: 134056 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1273.822444][ T700] netlink: 134036 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1273.855022][ T704] device sit0 left promiscuous mode [ 1273.908125][ T702] netlink: 134056 bytes leftover after parsing attributes in process `syz-executor.2'. 14:38:35 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e371648018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:35 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90e24fc6004020e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:35 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r5 = openat$cgroup_ro(r1, &(0x7f00000000c0)='blkio.bfq.sectors\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={r3, 0xe0, &(0x7f0000000940)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000200)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x1, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000640)=[0x0], 0x0, 0x6a, &(0x7f0000000680)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x6e, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r7 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000a40)={0x1b, 0x0, 0x0, 0x7, 0x0, r0, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x5, 0x3}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x1c, 0x21, &(0x7f0000000440)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x905, 0x0, 0x0, 0x0, 0x1}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@generic={0x80, 0x6, 0x8, 0x3f, 0xda}, @map_val={0x18, 0x1, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x401}, @initr0={0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x2}, @ldst={0x2, 0x3, 0x2, 0x9, 0x3, 0x1, 0x4}, @tail_call={{0x18, 0x2, 0x1, 0x0, r2}}, @jmp={0x5, 0x1, 0xa, 0x9, 0x3, 0xffffffffffffffe0}, @generic={0x9, 0x1, 0x5, 0x4, 0x8001}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @ldst={0x2, 0x1, 0x1, 0xb, 0xb, 0x20, 0x8}, @map_idx={0x18, 0x6, 0x5, 0x0, 0x10}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000080)='GPL\x00', 0x800, 0xd4, &(0x7f00000002c0)=""/212, 0x41100, 0x6, '\x00', 0x0, 0x8, r5, 0x8, &(0x7f0000000100)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x2, 0x475f, 0x401}, 0x10, r6, 0xffffffffffffffff, 0x4, &(0x7f0000000800)=[0xffffffffffffffff, r7], &(0x7f0000000ac0)=[{0x3, 0x2, 0xc, 0x6}, {0x3, 0x4, 0xb, 0xa}, {0x2, 0x2, 0xe, 0x2}, {0x3, 0x1, 0x5, 0x8}], 0x10, 0x20}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) getpid() perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f00000005c0)={0x1, 0x80, 0x0, 0x0, 0xbe, 0x0, 0x0, 0x0, 0x28000, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x400, 0xd7, 0x5, 0x0, 0x965, 0x0, 0xfffffffffffffffb}, 0x0, 0xd, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f00000006c0)) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0xe5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) ioctl$SIOCSIFHWADDR(r8, 0x8914, &(0x7f0000000040)={'sit0\x00', @local}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f00000008c0)='\x00'}, 0x30) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000e00)) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8890}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000840)={0x0, 0x80, 0x2, 0x1, 0x9, 0x0, 0x0, 0x7, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x3ff, 0x0, @perf_config_ext={0x67}, 0x200, 0x612, 0x0, 0x0, 0xa0, 0x0, 0xd171, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x3, r4, 0x1) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, &(0x7f0000000040)={'sit0\x00', @random="4f33e363a4b1"}) [ 1273.983308][ T702] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 1273.999851][ T702] platform regulatory.0: Falling back to sysfs fallback for: regulatory.db 14:38:35 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r5 = openat$cgroup_ro(r1, &(0x7f00000000c0)='blkio.bfq.sectors\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={r3, 0xe0, &(0x7f0000000940)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000200)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x1, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000640)=[0x0], 0x0, 0x6a, &(0x7f0000000680)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x6e, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r7 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000a40)={0x1b, 0x0, 0x0, 0x7, 0x0, r0, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x5, 0x3}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x1c, 0x21, &(0x7f0000000440)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x905, 0x0, 0x0, 0x0, 0x1}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@generic={0x80, 0x6, 0x8, 0x3f, 0xda}, @map_val={0x18, 0x1, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x401}, @initr0={0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x2}, @ldst={0x2, 0x3, 0x2, 0x9, 0x3, 0x1, 0x4}, @tail_call={{0x18, 0x2, 0x1, 0x0, r2}}, @jmp={0x5, 0x1, 0xa, 0x9, 0x3, 0xffffffffffffffe0}, @generic={0x9, 0x1, 0x5, 0x4, 0x8001}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @ldst={0x2, 0x1, 0x1, 0xb, 0xb, 0x20, 0x8}, @map_idx={0x18, 0x6, 0x5, 0x0, 0x10}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000080)='GPL\x00', 0x800, 0xd4, &(0x7f00000002c0)=""/212, 0x41100, 0x6, '\x00', 0x0, 0x8, r5, 0x8, &(0x7f0000000100)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x2, 0x475f, 0x401}, 0x10, r6, 0xffffffffffffffff, 0x4, &(0x7f0000000800)=[0xffffffffffffffff, r7], &(0x7f0000000ac0)=[{0x3, 0x2, 0xc, 0x6}, {0x3, 0x4, 0xb, 0xa}, {0x2, 0x2, 0xe, 0x2}, {0x3, 0x1, 0x5, 0x8}], 0x10, 0x20}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) getpid() perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f00000005c0)={0x1, 0x80, 0x0, 0x0, 0xbe, 0x0, 0x0, 0x0, 0x28000, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x400, 0xd7, 0x5, 0x0, 0x965, 0x0, 0xfffffffffffffffb}, 0x0, 0xd, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f00000006c0)) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0xe5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) ioctl$SIOCSIFHWADDR(r8, 0x8914, &(0x7f0000000040)={'sit0\x00', @local}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f00000008c0)='\x00'}, 0x30) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000e00)) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8890}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000840)={0x0, 0x80, 0x2, 0x1, 0x9, 0x0, 0x0, 0x7, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x3ff, 0x0, @perf_config_ext={0x67}, 0x200, 0x612, 0x0, 0x0, 0xa0, 0x0, 0xd171, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x3, r4, 0x1) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, &(0x7f0000000040)={'sit0\x00', @random="4f33e363a4b1"}) 14:38:35 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e371848018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) [ 1274.067275][ T710] netlink: 134312 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1274.080214][ T711] netlink: 134056 bytes leftover after parsing attributes in process `syz-executor.4'. 14:38:36 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e371a48018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:36 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r5 = openat$cgroup_ro(r1, &(0x7f00000000c0)='blkio.bfq.sectors\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={r3, 0xe0, &(0x7f0000000940)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000200)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x1, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000640)=[0x0], 0x0, 0x6a, &(0x7f0000000680)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x6e, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r7 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000a40)={0x1b, 0x0, 0x0, 0x7, 0x0, r0, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x5, 0x3}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x1c, 0x21, &(0x7f0000000440)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x905, 0x0, 0x0, 0x0, 0x1}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@generic={0x80, 0x6, 0x8, 0x3f, 0xda}, @map_val={0x18, 0x1, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x401}, @initr0={0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x2}, @ldst={0x2, 0x3, 0x2, 0x9, 0x3, 0x1, 0x4}, @tail_call={{0x18, 0x2, 0x1, 0x0, r2}}, @jmp={0x5, 0x1, 0xa, 0x9, 0x3, 0xffffffffffffffe0}, @generic={0x9, 0x1, 0x5, 0x4, 0x8001}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @ldst={0x2, 0x1, 0x1, 0xb, 0xb, 0x20, 0x8}, @map_idx={0x18, 0x6, 0x5, 0x0, 0x10}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000080)='GPL\x00', 0x800, 0xd4, &(0x7f00000002c0)=""/212, 0x41100, 0x6, '\x00', 0x0, 0x8, r5, 0x8, &(0x7f0000000100)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x2, 0x475f, 0x401}, 0x10, r6, 0xffffffffffffffff, 0x4, &(0x7f0000000800)=[0xffffffffffffffff, r7], &(0x7f0000000ac0)=[{0x3, 0x2, 0xc, 0x6}, {0x3, 0x4, 0xb, 0xa}, {0x2, 0x2, 0xe, 0x2}, {0x3, 0x1, 0x5, 0x8}], 0x10, 0x20}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) getpid() perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f00000005c0)={0x1, 0x80, 0x0, 0x0, 0xbe, 0x0, 0x0, 0x0, 0x28000, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x400, 0xd7, 0x5, 0x0, 0x965, 0x0, 0xfffffffffffffffb}, 0x0, 0xd, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f00000006c0)) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0xe5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) ioctl$SIOCSIFHWADDR(r8, 0x8914, &(0x7f0000000040)={'sit0\x00', @local}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f00000008c0)='\x00'}, 0x30) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000e00)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8890}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000840)={0x0, 0x80, 0x2, 0x1, 0x9, 0x0, 0x0, 0x7, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x3ff, 0x0, @perf_config_ext={0x67}, 0x200, 0x612, 0x0, 0x0, 0xa0, 0x0, 0xd171, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x3, r4, 0x1) ioctl$SIOCSIFHWADDR(r9, 0x8914, 0x0) [ 1274.115157][ T714] netlink: 134056 bytes leftover after parsing attributes in process `syz-executor.4'. 14:38:36 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90e24fc6004040e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:36 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e371c48018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) [ 1274.166546][ T718] netlink: 134056 bytes leftover after parsing attributes in process `syz-executor.4'. 14:38:36 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r5 = openat$cgroup_ro(r1, &(0x7f00000000c0)='blkio.bfq.sectors\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={r3, 0xe0, &(0x7f0000000940)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000200)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x1, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000640)=[0x0], 0x0, 0x6a, &(0x7f0000000680)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x6e, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r7 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000a40)={0x1b, 0x0, 0x0, 0x7, 0x0, r0, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x5, 0x3}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x1c, 0x21, &(0x7f0000000440)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x905, 0x0, 0x0, 0x0, 0x1}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@generic={0x80, 0x6, 0x8, 0x3f, 0xda}, @map_val={0x18, 0x1, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x401}, @initr0={0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x2}, @ldst={0x2, 0x3, 0x2, 0x9, 0x3, 0x1, 0x4}, @tail_call={{0x18, 0x2, 0x1, 0x0, r2}}, @jmp={0x5, 0x1, 0xa, 0x9, 0x3, 0xffffffffffffffe0}, @generic={0x9, 0x1, 0x5, 0x4, 0x8001}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @ldst={0x2, 0x1, 0x1, 0xb, 0xb, 0x20, 0x8}, @map_idx={0x18, 0x6, 0x5, 0x0, 0x10}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000080)='GPL\x00', 0x800, 0xd4, &(0x7f00000002c0)=""/212, 0x41100, 0x6, '\x00', 0x0, 0x8, r5, 0x8, &(0x7f0000000100)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x2, 0x475f, 0x401}, 0x10, r6, 0xffffffffffffffff, 0x4, &(0x7f0000000800)=[0xffffffffffffffff, r7], &(0x7f0000000ac0)=[{0x3, 0x2, 0xc, 0x6}, {0x3, 0x4, 0xb, 0xa}, {0x2, 0x2, 0xe, 0x2}, {0x3, 0x1, 0x5, 0x8}], 0x10, 0x20}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) getpid() perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f00000005c0)={0x1, 0x80, 0x0, 0x0, 0xbe, 0x0, 0x0, 0x0, 0x28000, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x400, 0xd7, 0x5, 0x0, 0x965, 0x0, 0xfffffffffffffffb}, 0x0, 0xd, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f00000006c0)) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0xe5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) ioctl$SIOCSIFHWADDR(r8, 0x8914, &(0x7f0000000040)={'sit0\x00', @local}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f00000008c0)='\x00'}, 0x30) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000e00)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8890}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000840)={0x0, 0x80, 0x2, 0x1, 0x9, 0x0, 0x0, 0x7, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x3ff, 0x0, @perf_config_ext={0x67}, 0x200, 0x612, 0x0, 0x0, 0xa0, 0x0, 0xd171, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x3, r4, 0x1) ioctl$SIOCSIFHWADDR(r9, 0x8914, 0x0) 14:38:36 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e371e48018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:36 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90e24fc6004050e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) [ 1274.215750][ T722] netlink: 133800 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1274.246981][ T724] netlink: 134056 bytes leftover after parsing attributes in process `syz-executor.4'. 14:38:36 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r5 = openat$cgroup_ro(r1, &(0x7f00000000c0)='blkio.bfq.sectors\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={r3, 0xe0, &(0x7f0000000940)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000200)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x1, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000640)=[0x0], 0x0, 0x6a, &(0x7f0000000680)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x6e, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r7 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000a40)={0x1b, 0x0, 0x0, 0x7, 0x0, r0, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x5, 0x3}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x1c, 0x21, &(0x7f0000000440)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x905, 0x0, 0x0, 0x0, 0x1}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@generic={0x80, 0x6, 0x8, 0x3f, 0xda}, @map_val={0x18, 0x1, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x401}, @initr0={0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x2}, @ldst={0x2, 0x3, 0x2, 0x9, 0x3, 0x1, 0x4}, @tail_call={{0x18, 0x2, 0x1, 0x0, r2}}, @jmp={0x5, 0x1, 0xa, 0x9, 0x3, 0xffffffffffffffe0}, @generic={0x9, 0x1, 0x5, 0x4, 0x8001}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @ldst={0x2, 0x1, 0x1, 0xb, 0xb, 0x20, 0x8}, @map_idx={0x18, 0x6, 0x5, 0x0, 0x10}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000080)='GPL\x00', 0x800, 0xd4, &(0x7f00000002c0)=""/212, 0x41100, 0x6, '\x00', 0x0, 0x8, r5, 0x8, &(0x7f0000000100)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x2, 0x475f, 0x401}, 0x10, r6, 0xffffffffffffffff, 0x4, &(0x7f0000000800)=[0xffffffffffffffff, r7], &(0x7f0000000ac0)=[{0x3, 0x2, 0xc, 0x6}, {0x3, 0x4, 0xb, 0xa}, {0x2, 0x2, 0xe, 0x2}, {0x3, 0x1, 0x5, 0x8}], 0x10, 0x20}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) getpid() perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f00000005c0)={0x1, 0x80, 0x0, 0x0, 0xbe, 0x0, 0x0, 0x0, 0x28000, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x400, 0xd7, 0x5, 0x0, 0x965, 0x0, 0xfffffffffffffffb}, 0x0, 0xd, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f00000006c0)) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0xe5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) ioctl$SIOCSIFHWADDR(r8, 0x8914, &(0x7f0000000040)={'sit0\x00', @local}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f00000008c0)='\x00'}, 0x30) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000e00)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8890}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000840)={0x0, 0x80, 0x2, 0x1, 0x9, 0x0, 0x0, 0x7, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x3ff, 0x0, @perf_config_ext={0x67}, 0x200, 0x612, 0x0, 0x0, 0xa0, 0x0, 0xd171, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x3, r4, 0x1) ioctl$SIOCSIFHWADDR(r9, 0x8914, 0x0) 14:38:36 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e372248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:36 executing program 1: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x10) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x1a, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f97e24fc6004030e000a742500053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x3, 0x5, 0x5, 0x0, 0x0, 0x8, 0x4000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x101, 0x1, @perf_config_ext={0x7fff, 0x8}, 0x4000, 0x3, 0x0, 0x3, 0x80000001, 0x80, 0x40, 0x0, 0x0, 0x0, 0x81}, 0xffffffffffffffff, 0x8, r0, 0x0) 14:38:36 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90e24fc6004060e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) [ 1274.309692][ T728] netlink: 134056 bytes leftover after parsing attributes in process `syz-executor.4'. 14:38:36 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e372448018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:36 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90e24fc6004070e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:36 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e372648018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:36 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90e24fc6004080e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:36 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e372848018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:36 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90e24fc6004090e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:36 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e372a48018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:36 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90e24fc60040a0e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:36 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r5 = openat$cgroup_ro(r1, &(0x7f00000000c0)='blkio.bfq.sectors\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={r3, 0xe0, &(0x7f0000000940)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000200)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x1, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000640)=[0x0], 0x0, 0x6a, &(0x7f0000000680)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x6e, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r7 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000a40)={0x1b, 0x0, 0x0, 0x7, 0x0, r0, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x5, 0x3}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x1c, 0x21, &(0x7f0000000440)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x905, 0x0, 0x0, 0x0, 0x1}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@generic={0x80, 0x6, 0x8, 0x3f, 0xda}, @map_val={0x18, 0x1, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x401}, @initr0={0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x2}, @ldst={0x2, 0x3, 0x2, 0x9, 0x3, 0x1, 0x4}, @tail_call={{0x18, 0x2, 0x1, 0x0, r2}}, @jmp={0x5, 0x1, 0xa, 0x9, 0x3, 0xffffffffffffffe0}, @generic={0x9, 0x1, 0x5, 0x4, 0x8001}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @ldst={0x2, 0x1, 0x1, 0xb, 0xb, 0x20, 0x8}, @map_idx={0x18, 0x6, 0x5, 0x0, 0x10}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000080)='GPL\x00', 0x800, 0xd4, &(0x7f00000002c0)=""/212, 0x41100, 0x6, '\x00', 0x0, 0x8, r5, 0x8, &(0x7f0000000100)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x2, 0x475f, 0x401}, 0x10, r6, 0xffffffffffffffff, 0x4, &(0x7f0000000800)=[0xffffffffffffffff, r7], &(0x7f0000000ac0)=[{0x3, 0x2, 0xc, 0x6}, {0x3, 0x4, 0xb, 0xa}, {0x2, 0x2, 0xe, 0x2}, {0x3, 0x1, 0x5, 0x8}], 0x10, 0x20}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) getpid() perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f00000005c0)={0x1, 0x80, 0x0, 0x0, 0xbe, 0x0, 0x0, 0x0, 0x28000, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x400, 0xd7, 0x5, 0x0, 0x965, 0x0, 0xfffffffffffffffb}, 0x0, 0xd, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f00000006c0)) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0xe5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) ioctl$SIOCSIFHWADDR(r8, 0x8914, &(0x7f0000000040)={'sit0\x00', @local}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f00000008c0)='\x00'}, 0x30) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000e00)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8890}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000840)={0x0, 0x80, 0x2, 0x1, 0x9, 0x0, 0x0, 0x7, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x3ff, 0x0, @perf_config_ext, 0x200, 0x612, 0x0, 0x0, 0xa0, 0x0, 0xd171, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x3, r4, 0x1) ioctl$SIOCSIFHWADDR(r9, 0x8914, &(0x7f0000000040)={'sit0\x00', @random="4f33e363a4b1"}) 14:38:36 executing program 2: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x10) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x1a, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f97e24fc6004030e000a74f30f053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x3, 0x5, 0x5, 0x0, 0x0, 0x8, 0x4000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x101, 0x1, @perf_config_ext={0x7fff, 0x8}, 0x4000, 0x3, 0x0, 0x3, 0x80000001, 0x80, 0x40, 0x0, 0x0, 0x0, 0x81}, 0xffffffffffffffff, 0x8, r0, 0x0) 14:38:36 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90e24fc60040b0e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:36 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e372c48018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:36 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90e24fc60040c0e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) [ 1274.721976][ T757] device sit0 entered promiscuous mode 14:38:36 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90e24fc60040d0e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:36 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90e24fc60040e0e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:36 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e372e48018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) [ 1274.880759][ T759] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 1274.900093][ T759] platform regulatory.0: Falling back to sysfs fallback for: regulatory.db 14:38:36 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90e24fc6004100e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:36 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e120a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:36 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e373048018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:36 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90e24fc6004110e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:36 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e373248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:36 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r5 = openat$cgroup_ro(r1, &(0x7f00000000c0)='blkio.bfq.sectors\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={r3, 0xe0, &(0x7f0000000940)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000200)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x1, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000640)=[0x0], 0x0, 0x6a, &(0x7f0000000680)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x6e, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r7 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000a40)={0x1b, 0x0, 0x0, 0x7, 0x0, r0, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x5, 0x3}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x1c, 0x21, &(0x7f0000000440)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x905, 0x0, 0x0, 0x0, 0x1}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@generic={0x80, 0x6, 0x8, 0x3f, 0xda}, @map_val={0x18, 0x1, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x401}, @initr0={0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x2}, @ldst={0x2, 0x3, 0x2, 0x9, 0x3, 0x1, 0x4}, @tail_call={{0x18, 0x2, 0x1, 0x0, r2}}, @jmp={0x5, 0x1, 0xa, 0x9, 0x3, 0xffffffffffffffe0}, @generic={0x9, 0x1, 0x5, 0x4, 0x8001}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @ldst={0x2, 0x1, 0x1, 0xb, 0xb, 0x20, 0x8}, @map_idx={0x18, 0x6, 0x5, 0x0, 0x10}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000080)='GPL\x00', 0x800, 0xd4, &(0x7f00000002c0)=""/212, 0x41100, 0x6, '\x00', 0x0, 0x8, r5, 0x8, &(0x7f0000000100)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x2, 0x475f, 0x401}, 0x10, r6, 0xffffffffffffffff, 0x4, &(0x7f0000000800)=[0xffffffffffffffff, r7], &(0x7f0000000ac0)=[{0x3, 0x2, 0xc, 0x6}, {0x3, 0x4, 0xb, 0xa}, {0x2, 0x2, 0xe, 0x2}, {0x3, 0x1, 0x5, 0x8}], 0x10, 0x20}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) getpid() perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f00000005c0)={0x1, 0x80, 0x0, 0x0, 0xbe, 0x0, 0x0, 0x0, 0x28000, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x400, 0xd7, 0x5, 0x0, 0x965, 0x0, 0xfffffffffffffffb}, 0x0, 0xd, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f00000006c0)) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0xe5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) ioctl$SIOCSIFHWADDR(r8, 0x8914, &(0x7f0000000040)={'sit0\x00', @local}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f00000008c0)='\x00'}, 0x30) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000e00)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8890}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000840)={0x0, 0x80, 0x2, 0x1, 0x9, 0x0, 0x0, 0x7, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x3ff, 0x0, @perf_config_ext={0x67}, 0x200, 0x612, 0x0, 0x0, 0xa0, 0x0, 0xd171, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x3, r4, 0x1) ioctl$SIOCSIFHWADDR(r9, 0x8914, &(0x7f0000000040)={'sit0\x00', @random="4f33e363a4b1"}) 14:38:37 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90e24fc6004120e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) [ 1275.092640][ T783] device sit0 left promiscuous mode 14:38:37 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90e24fc6004180e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:37 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90e24fc6004640e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:37 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90e24fc60040302000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:37 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e373448018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:37 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90e24fc60040305000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) [ 1275.248443][ T787] device sit0 entered promiscuous mode 14:38:37 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90e24fc60040306000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) [ 1275.312860][ T797] netlink: 'syz-executor.0': attribute type 5 has an invalid length. [ 1275.375119][ T799] netlink: 'syz-executor.0': attribute type 11 has an invalid length. 14:38:37 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90e24fc60040307000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:37 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e373648018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:37 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90e24fc60040308000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:37 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e373848018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:37 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r5 = openat$cgroup_ro(r1, &(0x7f00000000c0)='blkio.bfq.sectors\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={r3, 0xe0, &(0x7f0000000940)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000200)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x1, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000640)=[0x0], 0x0, 0x6a, &(0x7f0000000680)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x6e, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r7 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000a40)={0x1b, 0x0, 0x0, 0x7, 0x0, r0, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x5, 0x3}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x1c, 0x21, &(0x7f0000000440)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x905, 0x0, 0x0, 0x0, 0x1}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@generic={0x80, 0x6, 0x8, 0x3f, 0xda}, @map_val={0x18, 0x1, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x401}, @initr0={0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x2}, @ldst={0x2, 0x3, 0x2, 0x9, 0x3, 0x1, 0x4}, @tail_call={{0x18, 0x2, 0x1, 0x0, r2}}, @jmp={0x5, 0x1, 0xa, 0x9, 0x3, 0xffffffffffffffe0}, @generic={0x9, 0x1, 0x5, 0x4, 0x8001}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @ldst={0x2, 0x1, 0x1, 0xb, 0xb, 0x20, 0x8}, @map_idx={0x18, 0x6, 0x5, 0x0, 0x10}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000080)='GPL\x00', 0x800, 0xd4, &(0x7f00000002c0)=""/212, 0x41100, 0x6, '\x00', 0x0, 0x8, r5, 0x8, &(0x7f0000000100)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x2, 0x475f, 0x401}, 0x10, r6, 0xffffffffffffffff, 0x4, &(0x7f0000000800)=[0xffffffffffffffff, r7], &(0x7f0000000ac0)=[{0x3, 0x2, 0xc, 0x6}, {0x3, 0x4, 0xb, 0xa}, {0x2, 0x2, 0xe, 0x2}, {0x3, 0x1, 0x5, 0x8}], 0x10, 0x20}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) getpid() perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f00000005c0)={0x1, 0x80, 0x0, 0x0, 0xbe, 0x0, 0x0, 0x0, 0x28000, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x400, 0xd7, 0x5, 0x0, 0x965, 0x0, 0xfffffffffffffffb}, 0x0, 0xd, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f00000006c0)) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0xe5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) ioctl$SIOCSIFHWADDR(r8, 0x8914, &(0x7f0000000040)={'sit0\x00', @local}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f00000008c0)='\x00'}, 0x30) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000e00)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8890}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000840)={0x0, 0x80, 0x2, 0x1, 0x9, 0x0, 0x0, 0x7, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x3ff, 0x0, @perf_config_ext={0x67}, 0x200, 0x612, 0x0, 0x0, 0xa0, 0x0, 0xd171, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x3, r4, 0x1) ioctl$SIOCSIFHWADDR(r9, 0x8914, &(0x7f0000000040)={'sit0\x00', @random="4f33e363a4b1"}) 14:38:37 executing program 2: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x10) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x1a, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f97e24fc6004030e000a740100033582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x3, 0x5, 0x5, 0x0, 0x0, 0x8, 0x4000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x101, 0x1, @perf_config_ext={0x7fff, 0x8}, 0x4000, 0x3, 0x0, 0x3, 0x80000001, 0x80, 0x40, 0x0, 0x0, 0x0, 0x81}, 0xffffffffffffffff, 0x8, r0, 0x0) 14:38:37 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e373a48018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) [ 1275.554289][ T805] netlink: 'syz-executor.0': attribute type 8 has an invalid length. [ 1275.589054][ T807] device sit0 left promiscuous mode 14:38:37 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90e24fc60040309000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) [ 1275.673998][ T815] netlink: 'syz-executor.0': attribute type 9 has an invalid length. [ 1275.758566][ T811] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 1275.768901][ T812] device sit0 entered promiscuous mode [ 1275.790618][ T811] platform regulatory.0: Falling back to sysfs fallback for: regulatory.db 14:38:37 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e373c48018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:37 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90e24fc6004030a000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:37 executing program 1: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x10) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x1a, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f97e24fc6004030e680a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x3, 0x5, 0x5, 0x0, 0x0, 0x8, 0x4000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x101, 0x1, @perf_config_ext={0x7fff, 0x8}, 0x4000, 0x3, 0x0, 0x3, 0x80000001, 0x80, 0x40, 0x0, 0x0, 0x0, 0x81}, 0xffffffffffffffff, 0x8, r0, 0x0) 14:38:37 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90e24fc6004030b000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:37 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e373e48018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:38 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90e24fc6004030c000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:38 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e374248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:38 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90e24fc60040317010a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) [ 1276.130898][ T830] netlink: 'syz-executor.0': attribute type 12 has an invalid length. 14:38:38 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90e24fc60040331010a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:38 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e374448018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:38 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90e24fc6004030e0009740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:38 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e374648018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:38 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90e24fc6004030e020a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:38 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e374848018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:38 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e374a48018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:38 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90e24fc6004030e030a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:38 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e374c48018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:38 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90e24fc6004030e040a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:38 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e374e48018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:38 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90e24fc6004030e050a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:38 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e375048018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:38 executing program 2: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x10) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x1a, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f97e24fc6004030e000a7401e6033582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x3, 0x5, 0x5, 0x0, 0x0, 0x8, 0x4000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x101, 0x1, @perf_config_ext={0x7fff, 0x8}, 0x4000, 0x3, 0x0, 0x3, 0x80000001, 0x80, 0x40, 0x0, 0x0, 0x0, 0x81}, 0xffffffffffffffff, 0x8, r0, 0x0) 14:38:38 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r5 = openat$cgroup_ro(r1, &(0x7f00000000c0)='blkio.bfq.sectors\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={r3, 0xe0, &(0x7f0000000940)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000200)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x1, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000640)=[0x0], 0x0, 0x6a, &(0x7f0000000680)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x6e, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r7 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000a40)={0x1b, 0x0, 0x0, 0x7, 0x0, r0, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x5, 0x3}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x1c, 0x21, &(0x7f0000000440)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x905, 0x0, 0x0, 0x0, 0x1}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@generic={0x80, 0x6, 0x8, 0x3f, 0xda}, @map_val={0x18, 0x1, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x401}, @initr0={0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x2}, @ldst={0x2, 0x3, 0x2, 0x9, 0x3, 0x1, 0x4}, @tail_call={{0x18, 0x2, 0x1, 0x0, r2}}, @jmp={0x5, 0x1, 0xa, 0x9, 0x3, 0xffffffffffffffe0}, @generic={0x9, 0x1, 0x5, 0x4, 0x8001}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @ldst={0x2, 0x1, 0x1, 0xb, 0xb, 0x20, 0x8}, @map_idx={0x18, 0x6, 0x5, 0x0, 0x10}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000080)='GPL\x00', 0x800, 0xd4, &(0x7f00000002c0)=""/212, 0x41100, 0x6, '\x00', 0x0, 0x8, r5, 0x8, &(0x7f0000000100)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x2, 0x475f, 0x401}, 0x10, r6, 0xffffffffffffffff, 0x4, &(0x7f0000000800)=[0xffffffffffffffff, r7], &(0x7f0000000ac0)=[{0x3, 0x2, 0xc, 0x6}, {0x3, 0x4, 0xb, 0xa}, {0x2, 0x2, 0xe, 0x2}, {0x3, 0x1, 0x5, 0x8}], 0x10, 0x20}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) getpid() perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f00000005c0)={0x1, 0x80, 0x0, 0x0, 0xbe, 0x0, 0x0, 0x0, 0x28000, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x400, 0xd7, 0x5, 0x0, 0x965, 0x0, 0xfffffffffffffffb}, 0x0, 0xd, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f00000006c0)) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0xe5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) ioctl$SIOCSIFHWADDR(r8, 0x8914, &(0x7f0000000040)={'sit0\x00', @local}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f00000008c0)='\x00'}, 0x30) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000e00)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8890}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000840)={0x0, 0x80, 0x0, 0x1, 0x9, 0x0, 0x0, 0x7, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x3ff, 0x0, @perf_config_ext={0x67}, 0x200, 0x612, 0x0, 0x0, 0xa0, 0x0, 0xd171, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x3, r4, 0x1) ioctl$SIOCSIFHWADDR(r9, 0x8914, &(0x7f0000000040)={'sit0\x00', @random="4f33e363a4b1"}) 14:38:38 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90e24fc6004030e060a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) [ 1276.539900][ T864] device sit0 left promiscuous mode 14:38:38 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e375248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) [ 1276.593486][ T863] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 14:38:38 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e375448018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:38 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90e24fc6004030e070a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) [ 1276.665298][ T863] platform regulatory.0: Falling back to sysfs fallback for: regulatory.db [ 1276.708881][ T867] device sit0 entered promiscuous mode 14:38:38 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90e24fc6004030e080a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:38 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e375648018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:38 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e375848018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:38 executing program 1: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x10) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x1a, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f97e24fc6004030e0b0a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x3, 0x5, 0x5, 0x0, 0x0, 0x8, 0x4000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x101, 0x1, @perf_config_ext={0x7fff, 0x8}, 0x4000, 0x3, 0x0, 0x3, 0x80000001, 0x80, 0x40, 0x0, 0x0, 0x0, 0x81}, 0xffffffffffffffff, 0x8, r0, 0x0) 14:38:38 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90e24fc6004030e090a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:38 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e375a48018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:38 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90e24fc6004030e0a0a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:38 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90e24fc6004030e0b0a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:38 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e375c48018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:39 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e375e48018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:39 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90e24fc6004030e0c0a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:39 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90e24fc6004030e0d0a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:39 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e376048018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:39 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90e24fc6004030e0e0a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:39 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e376248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:39 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90e24fc6004030e0f0a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:39 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e376448018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:39 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90e24fc6004030e100a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:39 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e376648018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:39 executing program 2: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x10) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x1a, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f97e24fc6004030e000a740102053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x3, 0x5, 0x5, 0x0, 0x0, 0x8, 0x4000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x101, 0x1, @perf_config_ext={0x7fff, 0x8}, 0x4000, 0x3, 0x0, 0x3, 0x80000001, 0x80, 0x40, 0x0, 0x0, 0x0, 0x81}, 0xffffffffffffffff, 0x8, r0, 0x0) 14:38:39 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r5 = openat$cgroup_ro(r1, &(0x7f00000000c0)='blkio.bfq.sectors\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={r3, 0xe0, &(0x7f0000000940)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000200)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x1, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000640)=[0x0], 0x0, 0x6a, &(0x7f0000000680)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x6e, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) r7 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000a40)={0x1b, 0x0, 0x0, 0x7, 0x0, r0, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x5, 0x3}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x1c, 0x21, &(0x7f0000000440)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x905, 0x0, 0x0, 0x0, 0x1}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@generic={0x80, 0x6, 0x8, 0x3f, 0xda}, @map_val={0x18, 0x1, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x401}, @initr0={0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x2}, @ldst={0x2, 0x3, 0x2, 0x9, 0x3, 0x1, 0x4}, @tail_call={{0x18, 0x2, 0x1, 0x0, r2}}, @jmp={0x5, 0x1, 0xa, 0x9, 0x3, 0xffffffffffffffe0}, @generic={0x9, 0x1, 0x5, 0x4, 0x8001}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x4}, @ldst={0x2, 0x1, 0x1, 0xb, 0xb, 0x20, 0x8}, @map_idx={0x18, 0x6, 0x5, 0x0, 0x10}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000080)='GPL\x00', 0x800, 0xd4, &(0x7f00000002c0)=""/212, 0x41100, 0x6, '\x00', 0x0, 0x8, r5, 0x8, &(0x7f0000000100)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x2, 0x475f, 0x401}, 0x10, r6, 0xffffffffffffffff, 0x4, &(0x7f0000000800)=[0xffffffffffffffff, r7], &(0x7f0000000ac0)=[{0x3, 0x2, 0xc, 0x6}, {0x3, 0x4, 0xb, 0xa}, {0x2, 0x2, 0xe, 0x2}, {0x3, 0x1, 0x5, 0x8}], 0x10, 0x20}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) getpid() perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f00000005c0)={0x1, 0x80, 0x0, 0x0, 0xbe, 0x0, 0x0, 0x0, 0x28000, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x400, 0xd7, 0x5, 0x0, 0x965, 0x0, 0xfffffffffffffffb}, 0x0, 0xd, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f00000006c0)) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0xe5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) ioctl$SIOCSIFHWADDR(r8, 0x8914, &(0x7f0000000040)={'sit0\x00', @local}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f00000008c0)='\x00'}, 0x30) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000e00)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8890}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000840)={0x0, 0x80, 0x2, 0x1, 0x9, 0x0, 0x0, 0x7, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x3ff, 0x0, @perf_config_ext={0x67}, 0x200, 0x612, 0x0, 0x0, 0xa0, 0x0, 0xd171, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x3, r4, 0x1) ioctl$SIOCSIFHWADDR(r9, 0x8914, &(0x7f0000000040)={'sit0\x00', @random="4f33e363a4b1"}) 14:38:39 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90e24fc6004030e110a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:39 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e376848018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) [ 1277.403937][ T916] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 1277.450892][ T919] device sit0 left promiscuous mode [ 1277.462845][ T916] platform regulatory.0: Falling back to sysfs fallback for: regulatory.db 14:38:39 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e376a48018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:39 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90e24fc6004030e120a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) [ 1277.507622][ T925] device sit0 entered promiscuous mode 14:38:39 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90e24fc6004030e180a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:39 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e376c48018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:39 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90e24fc6004030e210a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:39 executing program 1: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x10) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x1a, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f97e24fc6004030e060a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x3, 0x5, 0x5, 0x0, 0x0, 0x8, 0x4000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x101, 0x1, @perf_config_ext={0x7fff, 0x8}, 0x4000, 0x3, 0x0, 0x3, 0x80000001, 0x80, 0x40, 0x0, 0x0, 0x0, 0x81}, 0xffffffffffffffff, 0x8, r0, 0x0) 14:38:39 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e376e48018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:39 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90e24fc6004030e250a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:39 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e377048018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:39 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90e24fc6004030e350a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:39 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e377248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:39 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e377448018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:39 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e377648018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:39 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90e24fc6004030e410a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:39 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90e24fc6004030e480a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:39 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90e24fc6004030e4c0a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:39 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e377848018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:39 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e377a48018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:39 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90e24fc6004030e600a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:39 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e377c48018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:40 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e377e48018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:40 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90e24fc6004030e680a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:40 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90e24fc6004030e6c0a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:40 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e378248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:40 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e378448018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:40 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90e24fc6004030e740a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:40 executing program 2: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x10) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x1a, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f97e24fc6004030e000a740103053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x3, 0x5, 0x5, 0x0, 0x0, 0x8, 0x4000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x101, 0x1, @perf_config_ext={0x7fff, 0x8}, 0x4000, 0x3, 0x0, 0x3, 0x80000001, 0x80, 0x40, 0x0, 0x0, 0x0, 0x81}, 0xffffffffffffffff, 0x8, r0, 0x0) 14:38:40 executing program 1: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x10) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x1a, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f97e24fc6004030e050a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x3, 0x5, 0x5, 0x0, 0x0, 0x8, 0x4000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x101, 0x1, @perf_config_ext={0x7fff, 0x8}, 0x4000, 0x3, 0x0, 0x3, 0x80000001, 0x80, 0x40, 0x0, 0x0, 0x0, 0x81}, 0xffffffffffffffff, 0x8, r0, 0x0) 14:38:40 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e378648018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:40 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90e24fc6004030e7a0a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) [ 1278.354578][ T982] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 14:38:40 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e378848018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:40 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90e24fc6004030e000e740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:40 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90e24fc6004030e0020740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) [ 1278.399869][ T982] platform regulatory.0: Falling back to sysfs fallback for: regulatory.db 14:38:40 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e378a48018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:40 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90e24fc6004030e0025740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:40 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90e24fc6004030e0040740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:40 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e378c48018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:40 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90e24fc6004030e0064740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:40 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e378e48018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:40 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e379048018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:40 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90e24fc6004030e797a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:40 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90e24fc6004030e04cf740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:40 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e379248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:40 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e379448018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:40 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90e24fc6004030e0002740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:40 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e379648018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:40 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90e24fc6004030e0009740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:40 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e379848018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:40 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90e24fc6004030e000e740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:40 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e379a48018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) [ 1278.829421][ T1038] __nla_validate_parse: 113 callbacks suppressed [ 1278.829438][ T1038] netlink: 134056 bytes leftover after parsing attributes in process `syz-executor.4'. 14:38:40 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90e24fc6004030e0025740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:40 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e379c48018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) [ 1278.893426][ T1044] netlink: 134056 bytes leftover after parsing attributes in process `syz-executor.4'. 14:38:40 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90e24fc6004030e0064740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:40 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e379e48018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) [ 1278.941322][ T1048] netlink: 134056 bytes leftover after parsing attributes in process `syz-executor.4'. 14:38:40 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e37a048018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:40 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90e24fc6004030e000a020000053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) [ 1278.995507][ T1051] netlink: 134056 bytes leftover after parsing attributes in process `syz-executor.4'. 14:38:40 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90e24fc6004030e000a020100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) [ 1279.037402][ T1054] netlink: 134056 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1279.071444][ T1056] netlink: 134056 bytes leftover after parsing attributes in process `syz-executor.4'. 14:38:40 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e37a248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:41 executing program 2: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x10) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x1a, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f97e24fc6004030e000a740104053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x3, 0x5, 0x5, 0x0, 0x0, 0x8, 0x4000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x101, 0x1, @perf_config_ext={0x7fff, 0x8}, 0x4000, 0x3, 0x0, 0x3, 0x80000001, 0x80, 0x40, 0x0, 0x0, 0x0, 0x81}, 0xffffffffffffffff, 0x8, r0, 0x0) [ 1279.091690][ T1058] netlink: 134056 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1279.130630][ T1060] netlink: 134056 bytes leftover after parsing attributes in process `syz-executor.4'. 14:38:41 executing program 1: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x10) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x1a, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f97e24fc6004030e000a740103053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x3, 0x5, 0x5, 0x0, 0x0, 0x8, 0x4000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x101, 0x1, @perf_config_ext={0x7fff, 0x8}, 0x4000, 0x3, 0x0, 0x3, 0x80000001, 0x80, 0x40, 0x0, 0x0, 0x0, 0x81}, 0xffffffffffffffff, 0x8, r0, 0x0) 14:38:41 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90e24fc6004030e000a0a0100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:41 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e37a448018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:41 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90e24fc6004030e000a250100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) [ 1279.214317][ T1063] netlink: 134056 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1279.247608][ T1068] netlink: 134056 bytes leftover after parsing attributes in process `syz-executor.4'. 14:38:41 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e37a648018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) [ 1279.288120][ T1070] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 14:38:41 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90e24fc6004030e000a740200053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:41 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e37a848018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:41 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e37aa48018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) [ 1279.330094][ T1070] platform regulatory.0: Falling back to sysfs fallback for: regulatory.db 14:38:41 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90e24fc6004030e000a740300053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:41 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e37ac48018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:41 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e37ae48018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:41 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90e24fc6004030e000a740400053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:41 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90e24fc6004030e000a740500053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:41 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e37b048018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:41 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e37b248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:41 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90e24fc6004030e000a740700053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:41 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90e24fc6004030e000a740800053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:41 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e37b448018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:41 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e37b648018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:41 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90e24fc6004030e000a740e00053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:41 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90e24fc6004030e000a741800053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:41 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e37b848018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:41 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90e24fc6004030e000a742500053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:41 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e37ba48018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:41 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90e24fc6004030e000a740003053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:41 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e37bc48018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:41 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e37be48018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:41 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90e24fc6004030e000a740102053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:41 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90e24fc6004030e000a740103053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:41 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e37c048018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:41 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e37c248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:41 executing program 2: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x10) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x1a, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f97e24fc6004030e000a740105053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x3, 0x5, 0x5, 0x0, 0x0, 0x8, 0x4000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x101, 0x1, @perf_config_ext={0x7fff, 0x8}, 0x4000, 0x3, 0x0, 0x3, 0x80000001, 0x80, 0x40, 0x0, 0x0, 0x0, 0x81}, 0xffffffffffffffff, 0x8, r0, 0x0) 14:38:41 executing program 1: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x10) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x1a, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f97e24fc6004120e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x3, 0x5, 0x5, 0x0, 0x0, 0x8, 0x4000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x101, 0x1, @perf_config_ext={0x7fff, 0x8}, 0x4000, 0x3, 0x0, 0x3, 0x80000001, 0x80, 0x40, 0x0, 0x0, 0x0, 0x81}, 0xffffffffffffffff, 0x8, r0, 0x0) 14:38:41 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90e24fc6004030e000a740104053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:41 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e37c448018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:42 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90e24fc6004030e000a740105053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:42 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e37c648018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:42 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90e24fc6004030e000a740106053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) [ 1280.114599][ T1151] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 1280.147168][ T1151] platform regulatory.0: Falling back to sysfs fallback for: regulatory.db 14:38:42 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e37c848018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:42 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90e24fc6004030e000a740107053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:42 executing program 1: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x10) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x1a, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f97e24fc6004120e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x3, 0x5, 0x5, 0x0, 0x0, 0x8, 0x4000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x101, 0x1, @perf_config_ext={0x7fff, 0x8}, 0x4000, 0x3, 0x0, 0x3, 0x80000001, 0x80, 0x40, 0x0, 0x0, 0x0, 0x81}, 0xffffffffffffffff, 0x8, r0, 0x0) 14:38:42 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e37ca48018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:42 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90e24fc6004030e000a740108053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:42 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e37cc48018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:42 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90e24fc6004030e000a740109053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:42 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e37ce48018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:42 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90e24fc6004030e000a74010a053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:42 executing program 1: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x10) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x1a, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f97e24fc6004120e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x3, 0x5, 0x5, 0x0, 0x0, 0x8, 0x4000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x101, 0x1, @perf_config_ext={0x7fff, 0x8}, 0x4000, 0x3, 0x0, 0x3, 0x80000001, 0x80, 0x40, 0x0, 0x0, 0x0, 0x81}, 0xffffffffffffffff, 0x8, r0, 0x0) 14:38:42 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90e24fc6004030e000a74010b053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:42 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90e24fc6004030e000a74010c053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:42 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e37d048018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:42 executing program 1: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x10) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x1a, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f97e24fc6004070e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x3, 0x5, 0x5, 0x0, 0x0, 0x8, 0x4000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x101, 0x1, @perf_config_ext={0x7fff, 0x8}, 0x4000, 0x3, 0x0, 0x3, 0x80000001, 0x80, 0x40, 0x0, 0x0, 0x0, 0x81}, 0xffffffffffffffff, 0x8, r0, 0x0) 14:38:42 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90e24fc6004030e000a74010d053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:42 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e37d248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:42 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90e24fc6004030e000a74010e053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:42 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e37d448018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:42 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90e24fc6004030e000a74010f053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:42 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e37d648018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:42 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90e24fc6004030e000a740110053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:42 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e37d848018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:42 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90e24fc6004030e000a740111053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:42 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e37da48018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:42 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90e24fc6004030e000a740112053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:42 executing program 2: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x10) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x1a, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f97e24fc6004030e000a740106053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x3, 0x5, 0x5, 0x0, 0x0, 0x8, 0x4000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x101, 0x1, @perf_config_ext={0x7fff, 0x8}, 0x4000, 0x3, 0x0, 0x3, 0x80000001, 0x80, 0x40, 0x0, 0x0, 0x0, 0x81}, 0xffffffffffffffff, 0x8, r0, 0x0) 14:38:42 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e37dc48018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:42 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90e24fc6004030e000a740118053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:42 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90e24fc6004030e000a740121053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:42 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e37de48018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:42 executing program 1: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x10) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x1a, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f97e24fc6004050e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x3, 0x5, 0x5, 0x0, 0x0, 0x8, 0x4000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x101, 0x1, @perf_config_ext={0x7fff, 0x8}, 0x4000, 0x3, 0x0, 0x3, 0x80000001, 0x80, 0x40, 0x0, 0x0, 0x0, 0x81}, 0xffffffffffffffff, 0x8, r0, 0x0) 14:38:43 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90e24fc6004030e000a740125053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:43 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e37e048018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) [ 1281.139349][ T1218] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 1281.152280][ T1218] platform regulatory.0: Falling back to sysfs fallback for: regulatory.db 14:38:43 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e37e248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:43 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90e24fc6004030e000a740135053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:43 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e37e448018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:43 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90e24fc6004030e000a740141053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:43 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e37e648018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:43 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90e24fc6004030e000a740148053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:43 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e37e848018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:43 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e37ea48018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:43 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90e24fc6004030e000a74014c053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:43 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e37ec48018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:43 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90e24fc6004030e000a740160053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:43 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90e24fc6004030e000a740168053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:43 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e37ee48018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:43 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90e24fc6004030e000a74016c053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:43 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e37f048018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:43 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90e24fc6004030e000a740174053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:43 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e37f248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:43 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e37f448018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:43 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90e24fc6004030e000a74017a053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:43 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e37f648018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:43 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90e24fc6004030e000a740100063582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:43 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e37f848018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:43 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90e24fc6004030e000a7401000e3582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:43 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90e24fc6004030e000a740100183582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:43 executing program 2: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x10) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x1a, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f97e24fc6004030e000a740107053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x3, 0x5, 0x5, 0x0, 0x0, 0x8, 0x4000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x101, 0x1, @perf_config_ext={0x7fff, 0x8}, 0x4000, 0x3, 0x0, 0x3, 0x80000001, 0x80, 0x40, 0x0, 0x0, 0x0, 0x81}, 0xffffffffffffffff, 0x8, r0, 0x0) 14:38:43 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e37fa48018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:43 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90e24fc6004030e000a740100403582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:43 executing program 1: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x10) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x1a, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f97e24fc6006030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x3, 0x5, 0x5, 0x0, 0x0, 0x8, 0x4000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x101, 0x1, @perf_config_ext={0x7fff, 0x8}, 0x4000, 0x3, 0x0, 0x3, 0x80000001, 0x80, 0x40, 0x0, 0x0, 0x0, 0x81}, 0xffffffffffffffff, 0x8, r0, 0x0) 14:38:43 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e37fc48018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:43 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90e24fc6004030e000a740100043582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:43 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e37fe48018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:43 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90e24fc6004030e000a740100063582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) [ 1281.924573][ T1289] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 1281.951768][ T1289] platform regulatory.0: Falling back to sysfs fallback for: regulatory.db 14:38:43 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370202008025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:43 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90e24fc6004030e000a7401000e3582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:43 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370202018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:43 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90e24fc6004030e000a740100183582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:44 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248028025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:44 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90e24fc6004030e000a740100050a82c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:44 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90e24fc6004030e000a740100052382c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:44 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248038025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:44 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90e24fc6004030e000a740100052b82c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:44 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248048025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:44 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90e24fc6004030e000a740100052d82c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:44 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248058025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:44 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90e24fc6004030e000a740100053082c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:44 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248078025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:44 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248088025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:44 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90e24fc6004030e000a740100054782c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:44 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248188025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:44 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248258025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:44 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90e24fc6004030e000a740100053502c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:44 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248010225f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:44 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90e24fc6004030e000a740100053582c1371502370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:44 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025021700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:44 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370348018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:44 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370448018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:44 executing program 2: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x10) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x1a, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f97e24fc6004030e000a740108053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x3, 0x5, 0x5, 0x0, 0x0, 0x8, 0x4000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x101, 0x1, @perf_config_ext={0x7fff, 0x8}, 0x4000, 0x3, 0x0, 0x3, 0x80000001, 0x80, 0x40, 0x0, 0x0, 0x0, 0x81}, 0xffffffffffffffff, 0x8, r0, 0x0) 14:38:44 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01702d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:44 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370648018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:44 executing program 1: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x10) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x1a, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f97e24fc6004030e000a740107053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x3, 0x5, 0x5, 0x0, 0x0, 0x8, 0x4000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x101, 0x1, @perf_config_ext={0x7fff, 0x8}, 0x4000, 0x3, 0x0, 0x3, 0x80000001, 0x80, 0x40, 0x0, 0x0, 0x0, 0x81}, 0xffffffffffffffff, 0x8, r0, 0x0) 14:38:44 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370848018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:44 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01703d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) [ 1282.793611][ T1355] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 1282.812962][ T1355] platform regulatory.0: Falling back to sysfs fallback for: regulatory.db 14:38:44 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370a48018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:44 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01704d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:44 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01705d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:44 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370c48018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:44 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01706d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:44 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01707d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:44 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370e48018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:44 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01708d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:45 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e371048018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:45 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01709d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:45 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e371248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:45 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f0170ad1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:45 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f0170bd1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:45 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e371448018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:45 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e371648018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:45 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f0170cd1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:45 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e371848018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:45 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f0170dd1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:45 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f0170ed1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:45 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e371a48018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:45 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e371c48018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:45 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f0170fd1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:45 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e371e48018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:45 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01710d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:45 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e372248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:45 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e372448018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:45 executing program 2: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x10) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x1a, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f97e24fc6004030e000a740109053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x3, 0x5, 0x5, 0x0, 0x0, 0x8, 0x4000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x101, 0x1, @perf_config_ext={0x7fff, 0x8}, 0x4000, 0x3, 0x0, 0x3, 0x80000001, 0x80, 0x40, 0x0, 0x0, 0x0, 0x81}, 0xffffffffffffffff, 0x8, r0, 0x0) 14:38:45 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01711d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:45 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e372648018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:45 executing program 1: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x10) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x1a, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f97e24fc6004030e000a740107053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x3, 0x5, 0x5, 0x0, 0x0, 0x8, 0x4000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x101, 0x1, @perf_config_ext={0x7fff, 0x8}, 0x4000, 0x3, 0x0, 0x3, 0x80000001, 0x80, 0x40, 0x0, 0x0, 0x0, 0x81}, 0xffffffffffffffff, 0x8, r0, 0x0) 14:38:45 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e372848018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:45 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01712d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:45 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e372a48018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) [ 1283.688761][ T1429] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 1283.709418][ T1429] platform regulatory.0: Falling back to sysfs fallback for: regulatory.db 14:38:45 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01718d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:45 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e372c48018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:45 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01721d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:45 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01725d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:45 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e372e48018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) [ 1283.851637][ T1441] __nla_validate_parse: 162 callbacks suppressed [ 1283.851655][ T1441] netlink: 134056 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1283.868657][ T1443] netlink: 134056 bytes leftover after parsing attributes in process `syz-executor.0'. 14:38:45 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e373048018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:45 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01735d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) [ 1283.912814][ T1445] netlink: 134056 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1283.922731][ T1447] netlink: 134056 bytes leftover after parsing attributes in process `syz-executor.0'. 14:38:45 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e373248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:45 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01741d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) [ 1283.961864][ T1449] netlink: 134056 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1283.978273][ T1451] netlink: 134056 bytes leftover after parsing attributes in process `syz-executor.4'. 14:38:45 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e373448018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) [ 1284.014501][ T1453] netlink: 134056 bytes leftover after parsing attributes in process `syz-executor.0'. 14:38:45 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01748d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) [ 1284.063502][ T1455] netlink: 134056 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1284.080535][ T1457] netlink: 134056 bytes leftover after parsing attributes in process `syz-executor.0'. 14:38:46 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e373648018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:46 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f0174cd1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:46 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e373848018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) [ 1284.117419][ T1459] netlink: 134056 bytes leftover after parsing attributes in process `syz-executor.4'. 14:38:46 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01760d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:46 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e373a48018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:46 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e373c48018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:46 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01764d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:46 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e373e48018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:46 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01768d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:46 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e374248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:46 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f0176cd1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:46 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e374448018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:46 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01774d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:46 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e374648018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) [ 1284.456501][T29270] unregister_netdevice: waiting for syzkaller1 to become free. Usage count = 2 14:38:46 executing program 2: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x10) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x1a, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f97e24fc6004030e000a74010a053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x3, 0x5, 0x5, 0x0, 0x0, 0x8, 0x4000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x101, 0x1, @perf_config_ext={0x7fff, 0x8}, 0x4000, 0x3, 0x0, 0x3, 0x80000001, 0x80, 0x40, 0x0, 0x0, 0x0, 0x81}, 0xffffffffffffffff, 0x8, r0, 0x0) 14:38:46 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f0177ad1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:46 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e374848018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:46 executing program 1: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x10) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x1a, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f97e24fc6004030e000a740107053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x3, 0x5, 0x5, 0x0, 0x0, 0x8, 0x4000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x101, 0x1, @perf_config_ext={0x7fff, 0x8}, 0x4000, 0x3, 0x0, 0x3, 0x80000001, 0x80, 0x40, 0x0, 0x0, 0x0, 0x81}, 0xffffffffffffffff, 0x8, r0, 0x0) 14:38:46 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e374a48018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:46 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x10}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:46 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0xec0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) [ 1284.555331][ T1494] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 1284.576163][ T1494] platform regulatory.0: Falling back to sysfs fallback for: regulatory.db 14:38:46 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e374c48018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:46 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x20ec0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:46 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e374e48018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:46 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e375048018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:46 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33f02}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:46 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e375248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:46 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x34000}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:46 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x3fec0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:46 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e375448018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:46 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e375648018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:46 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x20034020}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:46 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e375848018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:46 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x7ffff000}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:46 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0xfffffdef}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:46 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e375a48018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:46 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x2, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:46 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e375c48018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:46 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x3, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:47 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e375e48018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:47 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x4, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:47 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e376048018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:47 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x5, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:47 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e376248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:47 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x7, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:47 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e376448018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:47 executing program 2: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x10) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x1a, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f97e24fc6004030e000a74010b053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x3, 0x5, 0x5, 0x0, 0x0, 0x8, 0x4000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x101, 0x1, @perf_config_ext={0x7fff, 0x8}, 0x4000, 0x3, 0x0, 0x3, 0x80000001, 0x80, 0x40, 0x0, 0x0, 0x0, 0x81}, 0xffffffffffffffff, 0x8, r0, 0x0) 14:38:47 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x8, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:47 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e376648018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:47 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x1a, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f97e24fc6004030e000a740107053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:47 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x18, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:47 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e376848018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) [ 1285.451799][ T1562] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 1285.461536][ T1562] platform regulatory.0: Falling back to sysfs fallback for: regulatory.db 14:38:47 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e376a48018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:47 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x25, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:47 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x300, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:47 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e376c48018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:47 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x7ffffff2, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:47 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x7ffffff8, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:47 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e376e48018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:47 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x7ffffff9, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:47 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e377048018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:47 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0xffffff1f, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:47 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e377248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:47 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x2, 0x74000000}, 0x2000000) 14:38:47 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x3, 0x74000000}, 0x2000000) 14:38:47 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e377448018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:47 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x4, 0x74000000}, 0x2000000) 14:38:47 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e377648018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:47 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x5, 0x74000000}, 0x2000000) 14:38:47 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e377848018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:47 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e377a48018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:47 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x6, 0x74000000}, 0x2000000) 14:38:47 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e377c48018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:47 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x7, 0x74000000}, 0x2000000) 14:38:47 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x8, 0x74000000}, 0x2000000) 14:38:47 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x9, 0x74000000}, 0x2000000) 14:38:47 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e377e48018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:48 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0xa, 0x74000000}, 0x2000000) 14:38:48 executing program 2: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x10) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x1a, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f97e24fc6004030e000a74010c053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x3, 0x5, 0x5, 0x0, 0x0, 0x8, 0x4000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x101, 0x1, @perf_config_ext={0x7fff, 0x8}, 0x4000, 0x3, 0x0, 0x3, 0x80000001, 0x80, 0x40, 0x0, 0x0, 0x0, 0x81}, 0xffffffffffffffff, 0x8, r0, 0x0) 14:38:48 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e378248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:48 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0xb, 0x74000000}, 0x2000000) 14:38:48 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f97e24fc6004030e000a740107053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:48 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0xc, 0x74000000}, 0x2000000) 14:38:48 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e378448018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:48 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e378648018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) [ 1286.327914][ T1625] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 1286.356211][ T1625] platform regulatory.0: Falling back to sysfs fallback for: regulatory.db 14:38:48 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0xd, 0x74000000}, 0x2000000) 14:38:48 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e378848018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:48 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0xe, 0x74000000}, 0x2000000) 14:38:48 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0xf, 0x74000000}, 0x2000000) 14:38:48 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e378a48018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:48 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x10, 0x74000000}, 0x2000000) 14:38:48 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e378c48018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:48 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x11, 0x74000000}, 0x2000000) 14:38:48 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e378e48018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:48 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x12, 0x74000000}, 0x2000000) 14:38:48 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e379048018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:48 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x18, 0x74000000}, 0x2000000) 14:38:48 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e379248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:48 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x21, 0x74000000}, 0x2000000) 14:38:48 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e379448018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:48 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x25, 0x74000000}, 0x2000000) 14:38:48 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e379648018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:48 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x35, 0x74000000}, 0x2000000) 14:38:48 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e379848018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:48 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x41, 0x74000000}, 0x2000000) 14:38:48 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e379a48018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:48 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e379c48018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:48 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x48, 0x74000000}, 0x2000000) 14:38:48 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x4c, 0x74000000}, 0x2000000) 14:38:48 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e379e48018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:49 executing program 2: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x10) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x1a, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f97e24fc6004030e000a74010d053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x3, 0x5, 0x5, 0x0, 0x0, 0x8, 0x4000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x101, 0x1, @perf_config_ext={0x7fff, 0x8}, 0x4000, 0x3, 0x0, 0x3, 0x80000001, 0x80, 0x40, 0x0, 0x0, 0x0, 0x81}, 0xffffffffffffffff, 0x8, r0, 0x0) 14:38:49 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x60, 0x74000000}, 0x2000000) 14:38:49 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e37a048018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:49 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f97e24fc6004030e000a740107053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:49 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x64, 0x74000000}, 0x2000000) 14:38:49 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e37a248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:49 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x68, 0x74000000}, 0x2000000) 14:38:49 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e37a448018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) [ 1287.233323][ T1691] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 1287.258626][ T1691] platform regulatory.0: Falling back to sysfs fallback for: regulatory.db 14:38:49 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x6c, 0x74000000}, 0x2000000) 14:38:49 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e37a648018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:49 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e37a848018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:49 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x74, 0x74000000}, 0x2000000) 14:38:49 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e37aa48018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:49 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e37ac48018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:49 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x7a, 0x74000000}, 0x2000000) 14:38:49 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e37ae48018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:49 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x300, 0x74000000}, 0x2000000) 14:38:49 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e37b048018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:49 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x500, 0x74000000}, 0x2000000) 14:38:49 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e37b248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:49 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e37b448018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:49 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x600, 0x74000000}, 0x2000000) 14:38:49 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e37b648018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:49 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x700, 0x74000000}, 0x2000000) 14:38:49 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e37b848018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:49 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x900, 0x74000000}, 0x2000000) 14:38:49 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e37ba48018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:49 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x913, 0x74000000}, 0x2000000) 14:38:49 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e37bc48018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:49 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0xa00, 0x74000000}, 0x2000000) 14:38:49 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e37be48018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:49 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0xb00, 0x74000000}, 0x2000000) 14:38:49 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e37c048018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:49 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0xc00, 0x74000000}, 0x2000000) 14:38:49 executing program 2: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x10) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x1a, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f97e24fc6004030e000a74010e053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x3, 0x5, 0x5, 0x0, 0x0, 0x8, 0x4000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x101, 0x1, @perf_config_ext={0x7fff, 0x8}, 0x4000, 0x3, 0x0, 0x3, 0x80000001, 0x80, 0x40, 0x0, 0x0, 0x0, 0x81}, 0xffffffffffffffff, 0x8, r0, 0x0) 14:38:49 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f97e24fc6004030e000a740107053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:50 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0xd00, 0x74000000}, 0x2000000) 14:38:50 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e37c248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:50 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f97e24fc6004030e000a740107053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:50 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0xe00, 0x74000000}, 0x2000000) 14:38:50 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f97e24fc6004030e000a740107053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:50 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e37c448018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) [ 1288.163340][ T1759] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 1288.182875][ T1759] platform regulatory.0: Falling back to sysfs fallback for: regulatory.db 14:38:50 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0xf00, 0x74000000}, 0x2000000) 14:38:50 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f97e24fc6004030e000a740107053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:50 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e37c648018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:50 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x1100, 0x74000000}, 0x2000000) 14:38:50 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x1200, 0x74000000}, 0x2000000) 14:38:50 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e37c848018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:50 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x1309, 0x74000000}, 0x2000000) 14:38:50 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e37ca48018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:50 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x1800, 0x74000000}, 0x2000000) 14:38:50 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e37cc48018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:50 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x2000, 0x74000000}, 0x2000000) 14:38:50 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e37ce48018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:50 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x2100, 0x74000000}, 0x2000000) 14:38:50 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e37d048018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:50 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x2500, 0x74000000}, 0x2000000) 14:38:50 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e37d248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:50 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x3500, 0x74000000}, 0x2000000) 14:38:50 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e37d448018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:50 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x3f00, 0x74000000}, 0x2000000) 14:38:50 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e37d648018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:50 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x4000, 0x74000000}, 0x2000000) 14:38:50 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e37d848018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:50 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x4100, 0x74000000}, 0x2000000) 14:38:50 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e37da48018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:50 executing program 2: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x10) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x1a, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f97e24fc6004030e000a74010f053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x3, 0x5, 0x5, 0x0, 0x0, 0x8, 0x4000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x101, 0x1, @perf_config_ext={0x7fff, 0x8}, 0x4000, 0x3, 0x0, 0x3, 0x80000001, 0x80, 0x40, 0x0, 0x0, 0x0, 0x81}, 0xffffffffffffffff, 0x8, r0, 0x0) 14:38:50 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x4800, 0x74000000}, 0x2000000) 14:38:50 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e37dc48018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:50 executing program 1: r0 = socket$kcm(0x10, 0x0, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f97e24fc6004030e000a740107053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:50 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x4c00, 0x74000000}, 0x2000000) [ 1289.025000][ T1822] __nla_validate_parse: 109 callbacks suppressed [ 1289.025018][ T1822] netlink: 134056 bytes leftover after parsing attributes in process `syz-executor.0'. 14:38:51 executing program 1: r0 = socket$kcm(0x10, 0x0, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f97e24fc6004030e000a740107053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:51 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e37de48018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:51 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x6000, 0x74000000}, 0x2000000) [ 1289.105037][ T1826] netlink: 134056 bytes leftover after parsing attributes in process `syz-executor.2'. 14:38:51 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e37e048018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:51 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x6400, 0x74000000}, 0x2000000) 14:38:51 executing program 1: r0 = socket$kcm(0x10, 0x0, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f97e24fc6004030e000a740107053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) [ 1289.166052][ T1836] netlink: 134056 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1289.191037][ T1826] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 14:38:51 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x6800, 0x74000000}, 0x2000000) [ 1289.216875][ T1826] platform regulatory.0: Falling back to sysfs fallback for: regulatory.db 14:38:51 executing program 1: socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f97e24fc6004030e000a740107053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:51 executing program 1: socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f97e24fc6004030e000a740107053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:51 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e37e248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:51 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x6c00, 0x74000000}, 0x2000000) [ 1289.301178][ T1842] netlink: 134056 bytes leftover after parsing attributes in process `syz-executor.0'. 14:38:51 executing program 1: socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f97e24fc6004030e000a740107053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:51 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x7400, 0x74000000}, 0x2000000) 14:38:51 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e37e448018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:51 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, 0x0, 0x2000000) [ 1289.389165][ T1852] netlink: 134056 bytes leftover after parsing attributes in process `syz-executor.0'. 14:38:51 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x7a00, 0x74000000}, 0x2000000) 14:38:51 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e37e648018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) [ 1289.462083][ T1857] netlink: 134056 bytes leftover after parsing attributes in process `syz-executor.0'. 14:38:51 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, 0x0, 0x2000000) 14:38:51 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x13120, 0x74000000}, 0x2000000) [ 1289.508326][ T1862] netlink: 134056 bytes leftover after parsing attributes in process `syz-executor.0'. 14:38:51 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x20ba8, 0x74000000}, 0x2000000) 14:38:51 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, 0x0, 0x2000000) 14:38:51 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e37e848018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:51 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:51 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x20ed4, 0x74000000}, 0x2000000) 14:38:51 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e37ea48018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) [ 1289.609174][ T1871] netlink: 134056 bytes leftover after parsing attributes in process `syz-executor.0'. 14:38:51 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:51 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x74000000}, 0x2000000) [ 1289.673300][ T1878] netlink: 134056 bytes leftover after parsing attributes in process `syz-executor.0'. 14:38:51 executing program 2: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x10) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x1a, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f97e24fc6004030e000a740110053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x3, 0x5, 0x5, 0x0, 0x0, 0x8, 0x4000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x101, 0x1, @perf_config_ext={0x7fff, 0x8}, 0x4000, 0x3, 0x0, 0x3, 0x80000001, 0x80, 0x40, 0x0, 0x0, 0x0, 0x81}, 0xffffffffffffffff, 0x8, r0, 0x0) 14:38:51 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x30000, 0x74000000}, 0x2000000) 14:38:51 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e37ec48018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:51 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080), 0x0, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:51 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x33fe0, 0x74000000}, 0x2000000) 14:38:51 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080), 0x0, 0x0, 0x0, 0x74000000}, 0x2000000) [ 1289.881514][ T1888] netlink: 134056 bytes leftover after parsing attributes in process `syz-executor.0'. 14:38:51 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x34000, 0x74000000}, 0x2000000) 14:38:51 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e37ee48018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:51 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080), 0x0, 0x0, 0x0, 0x74000000}, 0x2000000) [ 1290.016715][ T1892] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 1290.041590][ T1892] platform regulatory.0: Falling back to sysfs fallback for: regulatory.db 14:38:51 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e37f048018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:51 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x36000, 0x74000000}, 0x2000000) 14:38:52 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{0x0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:52 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e37f248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:52 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x400300, 0x74000000}, 0x2000000) 14:38:52 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e37f448018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:52 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{0x0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:52 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e37f648018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:52 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{0x0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:52 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x600300, 0x74000000}, 0x2000000) 14:38:52 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e37f848018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:52 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x1000000, 0x74000000}, 0x2000000) 14:38:52 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:52 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x2000000, 0x74000000}, 0x2000000) 14:38:52 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:52 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e37fa48018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:52 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x3000000, 0x74000000}, 0x2000000) 14:38:52 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e37fc48018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:52 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x4000000, 0x74000000}, 0x2000000) 14:38:52 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:52 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e37fe48018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:52 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f97e24fc6004030e", 0x17}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:52 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x5000000, 0x74000000}, 0x2000000) 14:38:52 executing program 2: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x10) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x1a, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f97e24fc6004030e000a740111053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x3, 0x5, 0x5, 0x0, 0x0, 0x8, 0x4000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x101, 0x1, @perf_config_ext={0x7fff, 0x8}, 0x4000, 0x3, 0x0, 0x3, 0x80000001, 0x80, 0x40, 0x0, 0x0, 0x0, 0x81}, 0xffffffffffffffff, 0x8, r0, 0x0) 14:38:52 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370202008025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:52 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x6000000, 0x74000000}, 0x2000000) 14:38:52 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f97e24fc6004030e", 0x17}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:52 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370202018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:52 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f97e24fc6004030e", 0x17}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:52 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x7000000, 0x74000000}, 0x2000000) 14:38:52 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f97e24fc6004030e000a740107053582c137153e", 0x23}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:52 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f97e24fc6004030e000a740107053582c137153e", 0x23}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:52 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248028025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:52 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x8000000, 0x74000000}, 0x2000000) 14:38:52 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f97e24fc6004030e000a740107053582c137153e", 0x23}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:52 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248038025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) [ 1290.944115][ T1957] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 1290.966437][ T1957] platform regulatory.0: Falling back to sysfs fallback for: regulatory.db 14:38:52 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f97e24fc6004030e000a740107053582c137153e370248018025", 0x29}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:52 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x9000000, 0x74000000}, 0x2000000) 14:38:52 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248048025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:52 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x9130000, 0x74000000}, 0x2000000) 14:38:52 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f97e24fc6004030e000a740107053582c137153e370248018025", 0x29}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:53 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248058025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:53 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0xa000000, 0x74000000}, 0x2000000) 14:38:53 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248078025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:53 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f97e24fc6004030e000a740107053582c137153e370248018025", 0x29}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:53 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0xb000000, 0x74000000}, 0x2000000) 14:38:53 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f97e24fc6004030e000a740107053582c137153e370248018025f01700", 0x2c}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:53 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248088025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:53 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0xc000000, 0x74000000}, 0x2000000) 14:38:53 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0xd000000, 0x74000000}, 0x2000000) 14:38:53 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f97e24fc6004030e000a740107053582c137153e370248018025f01700", 0x2c}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:53 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e3702480e8025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:53 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f97e24fc6004030e000a740107053582c137153e370248018025f01700", 0x2c}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:53 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0xe000000, 0x74000000}, 0x2000000) 14:38:53 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0xf000000, 0x74000000}, 0x2000000) 14:38:53 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248188025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:53 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x10000000, 0x74000000}, 0x2000000) 14:38:53 executing program 2: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x10) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x1a, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f97e24fc6004030e000a740112053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x3, 0x5, 0x5, 0x0, 0x0, 0x8, 0x4000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x101, 0x1, @perf_config_ext={0x7fff, 0x8}, 0x4000, 0x3, 0x0, 0x3, 0x80000001, 0x80, 0x40, 0x0, 0x0, 0x0, 0x81}, 0xffffffffffffffff, 0x8, r0, 0x0) 14:38:53 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f97e24fc6004030e000a740107053582c137153e370248018025f01700d1", 0x2d}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:53 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f97e24fc6004030e000a740107053582c137153e370248018025f01700d1", 0x2d}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:53 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248258025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:53 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x11000000, 0x74000000}, 0x2000000) 14:38:53 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x12000000, 0x74000000}, 0x2000000) 14:38:53 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f97e24fc6004030e000a740107053582c137153e370248018025f01700d1", 0x2d}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:53 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248010225f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) [ 1291.702390][ T2023] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 1291.720690][ T2023] platform regulatory.0: Falling back to sysfs fallback for: regulatory.db 14:38:53 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x18000000, 0x74000000}, 0x2000000) 14:38:53 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f97e24fc6004030e000a740107053582c137153e370248018025f01700d1bd", 0x2e}], 0x1, 0x0, 0x0, 0x74000000}, 0x0) 14:38:53 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025021700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:53 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x20000000, 0x74000000}, 0x2000000) 14:38:53 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f97e24fc6004030e000a740107053582c137153e370248018025f01700d1bd", 0x2e}], 0x1, 0x0, 0x0, 0x74000000}, 0x0) 14:38:53 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01702d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:53 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x20310100, 0x74000000}, 0x2000000) 14:38:53 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f97e24fc6004030e000a740107053582c137153e370248018025f01700d1bd", 0x2e}], 0x1, 0x0, 0x0, 0x74000000}, 0x0) 14:38:53 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01703d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:53 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f97e24fc6004030e000a740107053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:53 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x21000000, 0x74000000}, 0x2000000) 14:38:53 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01704d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:53 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x25000000, 0x74000000}, 0x2000000) 14:38:54 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01705d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:54 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x35000000, 0x74000000}, 0x2000000) 14:38:54 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x3f000000, 0x74000000}, 0x2000000) 14:38:54 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01706d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:54 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x40000000, 0x74000000}, 0x2000000) 14:38:54 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x41000000, 0x74000000}, 0x2000000) 14:38:54 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01707d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:54 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x48000000, 0x74000000}, 0x2000000) 14:38:54 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01708d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:54 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01709d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:54 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x4c000000, 0x74000000}, 0x2000000) 14:38:54 executing program 2: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x10) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x1a, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f97e24fc6004030e000a740118053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x3, 0x5, 0x5, 0x0, 0x0, 0x8, 0x4000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x101, 0x1, @perf_config_ext={0x7fff, 0x8}, 0x4000, 0x3, 0x0, 0x3, 0x80000001, 0x80, 0x40, 0x0, 0x0, 0x0, 0x81}, 0xffffffffffffffff, 0x8, r0, 0x0) 14:38:54 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x60000000, 0x74000000}, 0x2000000) 14:38:54 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f0170ad1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:54 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f97e24fc6004030e000a740107053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:54 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x64000000, 0x74000000}, 0x2000000) 14:38:54 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f0170bd1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) [ 1292.593924][ T2091] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 1292.617695][ T2091] platform regulatory.0: Falling back to sysfs fallback for: regulatory.db 14:38:54 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x68000000, 0x74000000}, 0x2000000) 14:38:54 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f0170cd1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:54 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x6c000000, 0x74000000}, 0x2000000) 14:38:54 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f0170dd1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:54 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x74000000, 0x74000000}, 0x2000000) 14:38:54 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f0170ed1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:54 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x7a000000, 0x74000000}, 0x2000000) 14:38:54 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f0170fd1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:54 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0xa80b0200, 0x74000000}, 0x2000000) 14:38:54 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0xd40e0200, 0x74000000}, 0x2000000) 14:38:54 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01710d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:54 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0xe03f0300, 0x74000000}, 0x2000000) 14:38:54 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01711d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:54 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0xf0ffffff, 0x74000000}, 0x2000000) 14:38:54 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01712d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:54 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0xffffff7f, 0x74000000}, 0x2000000) 14:38:54 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01718d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:54 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0xfffffff0, 0x74000000}, 0x2000000) 14:38:55 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01721d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:55 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x7ff13fd56da9, 0x74000000}, 0x2000000) 14:38:55 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01725d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:55 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x3000000000000, 0x74000000}, 0x2000000) 14:38:55 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01735d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:55 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x40030000000000, 0x74000000}, 0x2000000) 14:38:55 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01741d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:55 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x60030000000000, 0x74000000}, 0x2000000) 14:38:55 executing program 2: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x10) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x1a, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f97e24fc6004030e000a740121053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x3, 0x5, 0x5, 0x0, 0x0, 0x8, 0x4000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x101, 0x1, @perf_config_ext={0x7fff, 0x8}, 0x4000, 0x3, 0x0, 0x3, 0x80000001, 0x80, 0x40, 0x0, 0x0, 0x0, 0x81}, 0xffffffffffffffff, 0x8, r0, 0x0) 14:38:55 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01748d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:55 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x100000000000000, 0x74000000}, 0x2000000) 14:38:55 executing program 1: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x10) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x1a, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f97e24fc6004030e000a740118053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x3, 0x5, 0x5, 0x0, 0x0, 0x8, 0x4000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x101, 0x1, @perf_config_ext={0x7fff, 0x8}, 0x4000, 0x3, 0x0, 0x3, 0x80000001, 0x80, 0x40, 0x0, 0x0, 0x0, 0x81}, 0xffffffffffffffff, 0x8, r0, 0x0) 14:38:55 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f0174cd1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:55 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x200000000000000, 0x74000000}, 0x2000000) 14:38:55 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x300000000000000, 0x74000000}, 0x2000000) [ 1293.461357][ T2162] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 1293.475730][ T2162] platform regulatory.0: Falling back to sysfs fallback for: regulatory.db 14:38:55 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01760d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:55 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x400000000000000, 0x74000000}, 0x2000000) 14:38:55 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01768d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:55 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f0176cd1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:55 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x500000000000000, 0x74000000}, 0x2000000) 14:38:55 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x600000000000000, 0x74000000}, 0x2000000) 14:38:55 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01774d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:55 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x700000000000000, 0x74000000}, 0x2000000) 14:38:55 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f0177ad1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:55 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x800000000000000, 0x74000000}, 0x2000000) 14:38:55 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x10}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:55 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x900000000000000, 0x74000000}, 0x2000000) 14:38:55 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0xec0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:55 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x20ec0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:55 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x913000000000000, 0x74000000}, 0x2000000) 14:38:55 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0xa00000000000000, 0x74000000}, 0x2000000) 14:38:55 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33f02}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:55 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0xb00000000000000, 0x74000000}, 0x2000000) 14:38:55 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0xc00000000000000, 0x74000000}, 0x2000000) 14:38:55 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0xd00000000000000, 0x74000000}, 0x2000000) 14:38:55 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x34000}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:55 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0xe00000000000000, 0x74000000}, 0x2000000) 14:38:55 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x3fec0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:55 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x20034020}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:56 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0xf00000000000000, 0x74000000}, 0x2000000) 14:38:56 executing program 2: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x10) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x1a, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f97e24fc6004030e000a740125053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x3, 0x5, 0x5, 0x0, 0x0, 0x8, 0x4000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x101, 0x1, @perf_config_ext={0x7fff, 0x8}, 0x4000, 0x3, 0x0, 0x3, 0x80000001, 0x80, 0x40, 0x0, 0x0, 0x0, 0x81}, 0xffffffffffffffff, 0x8, r0, 0x0) 14:38:56 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x1000000000000000, 0x74000000}, 0x2000000) 14:38:56 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x7ffff000}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:56 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f97e24fc6004030e000a740107053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:56 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0xfffffdef}], 0x1, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:56 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x1100000000000000, 0x74000000}, 0x2000000) [ 1294.354653][ T2242] __nla_validate_parse: 61 callbacks suppressed [ 1294.354670][ T2242] netlink: 134056 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1294.373136][ T2242] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 14:38:56 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x1200000000000000, 0x74000000}, 0x2000000) 14:38:56 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x2, 0x0, 0x0, 0x74000000}, 0x2000000) [ 1294.412531][ T2242] platform regulatory.0: Falling back to sysfs fallback for: regulatory.db 14:38:56 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90e24fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x3, 0x0, 0x0, 0x74000000}, 0x2000000) 14:38:56 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e020022003505d25a806f8c6394f90524fc6004030e000a740100053582c137153e370248018025f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x1800000000000000, 0x74000000}, 0x2000000)