x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 13:48:03 executing program 1: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00h\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 13:48:03 executing program 6: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000480)=':,^(\x00') openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x0) openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000040)='.\x00', 0x2000003) r2 = inotify_init1(0x0) r3 = inotify_add_watch(r2, &(0x7f0000000000)='./file0\x00', 0xa4000004) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r6 = dup3(r5, r4, 0x0) ioctl$TIOCPKT(r6, 0x5420, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) inotify_rm_watch(0xffffffffffffffff, r3) 13:48:03 executing program 5: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000480)=':,^(\x00') openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x0) openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000040)='.\x00', 0x2000003) r2 = inotify_init1(0x0) inotify_add_watch(r2, &(0x7f0000000000)='./file0\x00', 0xa4000004) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r5 = dup3(r4, r3, 0x0) ioctl$TIOCPKT(r5, 0x5420, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) 13:48:03 executing program 4: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00H\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 13:48:03 executing program 0: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x0f\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 13:48:03 executing program 2: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00h\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 13:48:03 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000480)=':,^(\x00') openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x0) r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) r2 = inotify_init1(0x0) inotify_add_watch(r2, &(0x7f0000000040)='.\x00', 0x2000003) r3 = inotify_init1(0x0) inotify_add_watch(r3, &(0x7f0000000000)='./file0\x00', 0xa4000004) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r6 = dup3(r5, r4, 0x0) ioctl$TIOCPKT(r6, 0x5420, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r7 = dup2(r1, r1) close_range(r7, 0xffffffffffffffff, 0x0) 13:48:03 executing program 5: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000480)=':,^(\x00') openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x0) openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000040)='.\x00', 0x2000003) r2 = inotify_init1(0x0) inotify_add_watch(r2, &(0x7f0000000000)='./file0\x00', 0xa4000004) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r5 = dup3(r4, r3, 0x0) ioctl$TIOCPKT(r5, 0x5420, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) 13:48:03 executing program 6: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000480)=':,^(\x00') openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x0) openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000040)='.\x00', 0x2000003) r2 = inotify_init1(0x0) inotify_add_watch(r2, &(0x7f0000000000)='./file0\x00', 0xa4000004) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r5 = dup3(r4, r3, 0x0) ioctl$TIOCPKT(r5, 0x5420, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) 13:48:03 executing program 7: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) fsetxattr$trusted_overlay_upper(r0, &(0x7f0000000580), 0x0, 0x0, 0x2) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, &(0x7f0000000080)) 13:48:03 executing program 1: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00l\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 13:48:03 executing program 4: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00L\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 13:48:14 executing program 4: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00h\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 13:48:14 executing program 6: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000480)=':,^(\x00') openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x0) openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000040)='.\x00', 0x2000003) r2 = inotify_init1(0x0) inotify_add_watch(r2, &(0x7f0000000000)='./file0\x00', 0xa4000004) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r5 = dup3(r4, r3, 0x0) ioctl$TIOCPKT(r5, 0x5420, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) 13:48:14 executing program 5: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000480)=':,^(\x00') openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x0) openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000040)='.\x00', 0x2000003) r2 = inotify_init1(0x0) inotify_add_watch(r2, &(0x7f0000000000)='./file0\x00', 0xa4000004) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r5 = dup3(r4, r3, 0x0) ioctl$TIOCPKT(r5, 0x5420, &(0x7f0000000040)) 13:48:14 executing program 0: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00H\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 13:48:14 executing program 2: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00l\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 13:48:14 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000480)=':,^(\x00') openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x0) r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) r2 = inotify_init1(0x0) inotify_add_watch(r2, &(0x7f0000000040)='.\x00', 0x2000003) r3 = inotify_init1(0x0) inotify_add_watch(r3, &(0x7f0000000000)='./file0\x00', 0xa4000004) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r6 = dup3(r5, r4, 0x0) ioctl$TIOCPKT(r6, 0x5420, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r7 = dup2(r1, r1) close_range(r7, 0xffffffffffffffff, 0x0) 13:48:14 executing program 7: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) fsetxattr$trusted_overlay_upper(r0, &(0x7f0000000580), 0x0, 0x0, 0x0) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, &(0x7f0000000080)) 13:48:14 executing program 1: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00t\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 13:48:15 executing program 0: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00L\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 13:48:15 executing program 7: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) fsetxattr$trusted_overlay_upper(r0, &(0x7f0000000580), 0x0, 0x0, 0x0) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, 0x0) 13:48:15 executing program 6: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000480)=':,^(\x00') openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x0) openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000040)='.\x00', 0x2000003) r2 = inotify_init1(0x0) inotify_add_watch(r2, &(0x7f0000000000)='./file0\x00', 0xa4000004) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r5 = dup3(r4, r3, 0x0) ioctl$TIOCPKT(r5, 0x5420, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) 13:48:15 executing program 2: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00t\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 13:48:15 executing program 1: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00z\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 13:48:15 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000480)=':,^(\x00') openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x0) r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) r2 = inotify_init1(0x0) inotify_add_watch(r2, &(0x7f0000000040)='.\x00', 0x2000003) r3 = inotify_init1(0x0) inotify_add_watch(r3, &(0x7f0000000000)='./file0\x00', 0xa4000004) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r6 = dup3(r5, r4, 0x0) ioctl$TIOCPKT(r6, 0x5420, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r7 = dup2(r1, r1) close_range(r7, 0xffffffffffffffff, 0x0) 13:48:15 executing program 4: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00l\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 13:48:15 executing program 5: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000480)=':,^(\x00') openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x0) openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000040)='.\x00', 0x2000003) r2 = inotify_init1(0x0) inotify_add_watch(r2, &(0x7f0000000000)='./file0\x00', 0xa4000004) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000040)) 13:48:27 executing program 0: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00h\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 13:48:27 executing program 1: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x03\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 13:48:27 executing program 6: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000480)=':,^(\x00') openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x0) openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000040)='.\x00', 0x2000003) r2 = inotify_init1(0x0) inotify_add_watch(r2, &(0x7f0000000000)='./file0\x00', 0xa4000004) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r5 = dup3(r4, r3, 0x0) ioctl$TIOCPKT(r5, 0x5420, &(0x7f0000000040)) 13:48:27 executing program 4: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00t\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 13:48:27 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000480)=':,^(\x00') openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x0) r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) r2 = inotify_init1(0x0) inotify_add_watch(r2, &(0x7f0000000040)='.\x00', 0x2000003) r3 = inotify_init1(0x0) inotify_add_watch(r3, &(0x7f0000000000)='./file0\x00', 0xa4000004) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r6 = dup3(r5, r4, 0x0) ioctl$TIOCPKT(r6, 0x5420, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r7 = dup2(r1, r1) close_range(r7, 0xffffffffffffffff, 0x0) 13:48:27 executing program 7: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) fsetxattr$trusted_overlay_upper(r0, &(0x7f0000000580), 0x0, 0x0, 0x0) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, &(0x7f0000000080)) 13:48:27 executing program 2: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00z\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 13:48:27 executing program 5: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000480)=':,^(\x00') openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x0) openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000040)='.\x00', 0x2000003) r2 = inotify_init1(0x0) inotify_add_watch(r2, &(0x7f0000000000)='./file0\x00', 0xa4000004) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000040)) 13:48:27 executing program 7: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) fsetxattr$trusted_overlay_upper(r0, &(0x7f0000000580), 0x0, 0x0, 0x0) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, &(0x7f0000000080)) 13:48:27 executing program 6: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000480)=':,^(\x00') openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x0) openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000040)='.\x00', 0x2000003) r2 = inotify_init1(0x0) inotify_add_watch(r2, &(0x7f0000000000)='./file0\x00', 0xa4000004) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) dup3(r4, r3, 0x0) 13:48:27 executing program 4: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00z\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 13:48:27 executing program 5: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000480)=':,^(\x00') openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x0) openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000040)='.\x00', 0x2000003) r2 = inotify_init1(0x0) inotify_add_watch(r2, &(0x7f0000000000)='./file0\x00', 0xa4000004) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000040)) 13:48:27 executing program 0: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00l\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 13:48:27 executing program 1: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x05\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 13:48:27 executing program 2: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x03*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 13:48:27 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000480)=':,^(\x00') openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x0) r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) r2 = inotify_init1(0x0) inotify_add_watch(r2, &(0x7f0000000040)='.\x00', 0x2000003) r3 = inotify_init1(0x0) inotify_add_watch(r3, &(0x7f0000000000)='./file0\x00', 0xa4000004) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r6 = dup3(r5, r4, 0x0) ioctl$TIOCPKT(r6, 0x5420, &(0x7f0000000040)) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r7 = dup2(r1, r1) close_range(r7, 0xffffffffffffffff, 0x0) 13:48:41 executing program 7: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) fsetxattr$trusted_overlay_upper(r0, &(0x7f0000000580), 0x0, 0x0, 0x0) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, &(0x7f0000000080)) 13:48:41 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000480)=':,^(\x00') openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x0) r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) r2 = inotify_init1(0x0) inotify_add_watch(r2, &(0x7f0000000040)='.\x00', 0x2000003) r3 = inotify_init1(0x0) inotify_add_watch(r3, &(0x7f0000000000)='./file0\x00', 0xa4000004) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) dup3(r5, r4, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r6 = dup2(r1, r1) close_range(r6, 0xffffffffffffffff, 0x0) 13:48:41 executing program 5: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000480)=':,^(\x00') openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x0) openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000040)='.\x00', 0x2000003) r2 = inotify_init1(0x0) inotify_add_watch(r2, &(0x7f0000000000)='./file0\x00', 0xa4000004) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r4 = dup3(0xffffffffffffffff, r3, 0x0) ioctl$TIOCPKT(r4, 0x5420, &(0x7f0000000040)) 13:48:41 executing program 1: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x06\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 13:48:41 executing program 4: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x03*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 13:48:41 executing program 6: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000480)=':,^(\x00') openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x0) openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000040)='.\x00', 0x2000003) r2 = inotify_init1(0x0) inotify_add_watch(r2, &(0x7f0000000000)='./file0\x00', 0xa4000004) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) dup3(0xffffffffffffffff, r3, 0x0) 13:48:41 executing program 2: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x05*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 13:48:41 executing program 0: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00t\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 13:48:41 executing program 2: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x06*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 13:48:41 executing program 7: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) fsetxattr$trusted_overlay_upper(r0, &(0x7f0000000580), &(0x7f00000005c0)={0x0, 0xfb, 0x23, 0x6, 0xff, "f295bd360628cf6b4481df5fb6c000c6", "9d0999cae9798bb0075ef7da9831"}, 0x23, 0x2) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, &(0x7f0000000080)) 13:48:41 executing program 4: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x05*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 13:48:41 executing program 6: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000480)=':,^(\x00') openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x0) openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000040)='.\x00', 0x2000003) r2 = inotify_init1(0x0) inotify_add_watch(r2, &(0x7f0000000000)='./file0\x00', 0xa4000004) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) dup3(0xffffffffffffffff, r3, 0x0) 13:48:41 executing program 0: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00z\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 13:48:41 executing program 1: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\a\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 13:48:41 executing program 7: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) fsetxattr$trusted_overlay_upper(r0, &(0x7f0000000580), 0x0, 0x0, 0x0) (fail_nth: 1) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, 0x0) 13:48:41 executing program 5: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000480)=':,^(\x00') openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x0) openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000040)='.\x00', 0x2000003) r2 = inotify_init1(0x0) inotify_add_watch(r2, &(0x7f0000000000)='./file0\x00', 0xa4000004) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r4 = dup3(0xffffffffffffffff, r3, 0x0) ioctl$TIOCPKT(r4, 0x5420, &(0x7f0000000040)) 13:48:41 executing program 4: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x06*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 13:48:41 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000480)=':,^(\x00') openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x0) r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) r2 = inotify_init1(0x0) inotify_add_watch(r2, &(0x7f0000000040)='.\x00', 0x2000003) r3 = inotify_init1(0x0) inotify_add_watch(r3, &(0x7f0000000000)='./file0\x00', 0xa4000004) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r4 = dup2(r1, r1) close_range(r4, 0xffffffffffffffff, 0x0) [ 1455.225984] FAULT_INJECTION: forcing a failure. [ 1455.225984] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1455.227664] CPU: 1 PID: 10328 Comm: syz-executor.7 Not tainted 5.10.153 #1 [ 1455.228483] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1455.229443] Call Trace: [ 1455.229770] dump_stack+0x107/0x167 [ 1455.230203] should_fail.cold+0x5/0xa [ 1455.230654] strncpy_from_user+0x34/0x470 [ 1455.231145] setxattr+0xc8/0x330 [ 1455.231570] ? vfs_setxattr+0x270/0x270 [ 1455.232047] ? find_held_lock+0x2c/0x110 [ 1455.232532] ? lock_acquire+0x197/0x490 [ 1455.233001] ? __x64_sys_fsetxattr+0x176/0x290 [ 1455.233529] ? lock_release+0x6b0/0x6b0 [ 1455.234001] ? __fget_files+0x296/0x480 [ 1455.234469] ? __mnt_want_write+0x196/0x280 [ 1455.234985] __x64_sys_fsetxattr+0x1f9/0x290 [ 1455.235515] do_syscall_64+0x33/0x40 [ 1455.235958] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1455.236578] RIP: 0033:0x7f58fdbf6b19 [ 1455.237028] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1455.239274] RSP: 002b:00007f58fb16c188 EFLAGS: 00000246 ORIG_RAX: 00000000000000be [ 1455.240196] RAX: ffffffffffffffda RBX: 00007f58fdd09f60 RCX: 00007f58fdbf6b19 [ 1455.241033] RDX: 0000000000000000 RSI: 0000000020000580 RDI: 0000000000000004 [ 1455.241900] RBP: 00007f58fb16c1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1455.242770] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1455.243610] R13: 00007ffcf5819c5f R14: 00007f58fb16c300 R15: 0000000000022000 13:48:41 executing program 0: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x03*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) [ 1467.829410] kmemleak: 2 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 13:49:01 executing program 2: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\a*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 13:49:01 executing program 0: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x05*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 13:49:01 executing program 7: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) fsetxattr$trusted_overlay_upper(r0, &(0x7f0000000580), 0x0, 0x0, 0x0) (fail_nth: 2) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, 0x0) 13:49:01 executing program 4: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\a*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 13:49:01 executing program 1: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\t\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 13:49:01 executing program 6: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000480)=':,^(\x00') openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x0) openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000040)='.\x00', 0x2000003) r2 = inotify_init1(0x0) inotify_add_watch(r2, &(0x7f0000000000)='./file0\x00', 0xa4000004) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) dup3(0xffffffffffffffff, r3, 0x0) 13:49:01 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000480)=':,^(\x00') openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x0) r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) r2 = inotify_init1(0x0) inotify_add_watch(r2, &(0x7f0000000040)='.\x00', 0x2000003) r3 = inotify_init1(0x0) inotify_add_watch(r3, &(0x7f0000000000)='./file0\x00', 0xa4000004) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r4 = dup2(r1, r1) close_range(r4, 0xffffffffffffffff, 0x0) 13:49:01 executing program 5: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000480)=':,^(\x00') openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x0) openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000040)='.\x00', 0x2000003) r2 = inotify_init1(0x0) inotify_add_watch(r2, &(0x7f0000000000)='./file0\x00', 0xa4000004) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r4 = dup3(0xffffffffffffffff, r3, 0x0) ioctl$TIOCPKT(r4, 0x5420, &(0x7f0000000040)) [ 1475.121082] FAULT_INJECTION: forcing a failure. [ 1475.121082] name failslab, interval 1, probability 0, space 0, times 1 [ 1475.123952] CPU: 0 PID: 10352 Comm: syz-executor.7 Not tainted 5.10.153 #1 [ 1475.125444] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1475.127242] Call Trace: [ 1475.127848] dump_stack+0x107/0x167 [ 1475.128655] should_fail.cold+0x5/0xa [ 1475.129514] ? kvmalloc_node+0x119/0x170 [ 1475.130419] should_failslab+0x5/0x20 [ 1475.131257] __kmalloc_node+0x76/0x4b0 [ 1475.132128] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1475.133281] kvmalloc_node+0x119/0x170 [ 1475.134123] simple_xattr_alloc+0x43/0xa0 [ 1475.135023] simple_xattr_set+0x75/0x610 [ 1475.135920] ? shmem_xattr_handler_set+0x2e/0x50 [ 1475.136959] ? shmem_get_tree+0x20/0x20 [ 1475.137811] __vfs_setxattr+0x10f/0x180 [ 1475.138669] ? xattr_resolve_name+0x3e0/0x3e0 [ 1475.139671] ? security_capable+0x95/0xc0 [ 1475.140564] __vfs_setxattr_noperm+0x11a/0x4c0 [ 1475.141581] __vfs_setxattr_locked+0x1c3/0x250 [ 1475.142575] vfs_setxattr+0xe8/0x270 [ 1475.143391] ? __vfs_setxattr_locked+0x250/0x250 [ 1475.144441] ? strncpy_from_user+0x9e/0x470 [ 1475.145396] setxattr+0x23d/0x330 [ 1475.146159] ? vfs_setxattr+0x270/0x270 [ 1475.147056] ? lock_acquire+0x197/0x490 [ 1475.147918] ? __x64_sys_fsetxattr+0x176/0x290 [ 1475.148932] ? lock_release+0x6b0/0x6b0 [ 1475.149811] ? __fget_files+0x296/0x480 [ 1475.150682] ? __mnt_want_write+0x196/0x280 [ 1475.151651] __x64_sys_fsetxattr+0x1f9/0x290 [ 1475.152619] do_syscall_64+0x33/0x40 [ 1475.153452] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1475.154555] RIP: 0033:0x7f58fdbf6b19 [ 1475.155358] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1475.159789] RSP: 002b:00007f58fb16c188 EFLAGS: 00000246 ORIG_RAX: 00000000000000be [ 1475.161808] RAX: ffffffffffffffda RBX: 00007f58fdd09f60 RCX: 00007f58fdbf6b19 [ 1475.163670] RDX: 0000000000000000 RSI: 0000000020000580 RDI: 0000000000000004 [ 1475.165200] RBP: 00007f58fb16c1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1475.166731] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1475.168268] R13: 00007ffcf5819c5f R14: 00007f58fb16c300 R15: 0000000000022000 13:49:01 executing program 4: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\n*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 13:49:01 executing program 1: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\n\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 13:49:01 executing program 0: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x06*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 13:49:01 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000480)=':,^(\x00') openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x0) r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) r2 = inotify_init1(0x0) inotify_add_watch(r2, &(0x7f0000000040)='.\x00', 0x2000003) r3 = inotify_init1(0x0) inotify_add_watch(r3, &(0x7f0000000000)='./file0\x00', 0xa4000004) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r4 = dup2(r1, r1) close_range(r4, 0xffffffffffffffff, 0x0) 13:49:01 executing program 7: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) fsetxattr$trusted_overlay_upper(r0, &(0x7f0000000580), 0x0, 0x0, 0x0) (fail_nth: 3) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, 0x0) [ 1475.344463] FAULT_INJECTION: forcing a failure. [ 1475.344463] name failslab, interval 1, probability 0, space 0, times 0 [ 1475.346969] CPU: 1 PID: 10390 Comm: syz-executor.7 Not tainted 5.10.153 #1 [ 1475.348428] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1475.350162] Call Trace: [ 1475.350697] dump_stack+0x107/0x167 [ 1475.351458] should_fail.cold+0x5/0xa [ 1475.352230] ? create_object.isra.0+0x3a/0xa20 [ 1475.353181] should_failslab+0x5/0x20 [ 1475.353964] kmem_cache_alloc+0x5b/0x360 [ 1475.354796] create_object.isra.0+0x3a/0xa20 [ 1475.355712] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1475.356744] __kmalloc_node+0x1ae/0x4b0 [ 1475.357550] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1475.358614] kvmalloc_node+0x119/0x170 [ 1475.359407] simple_xattr_alloc+0x43/0xa0 [ 1475.360267] simple_xattr_set+0x75/0x610 [ 1475.361088] ? shmem_xattr_handler_set+0x2e/0x50 [ 1475.362051] ? shmem_get_tree+0x20/0x20 [ 1475.362855] __vfs_setxattr+0x10f/0x180 [ 1475.363671] ? xattr_resolve_name+0x3e0/0x3e0 [ 1475.364585] ? security_capable+0x95/0xc0 [ 1475.365429] __vfs_setxattr_noperm+0x11a/0x4c0 [ 1475.366361] __vfs_setxattr_locked+0x1c3/0x250 [ 1475.367287] vfs_setxattr+0xe8/0x270 [ 1475.368067] ? __vfs_setxattr_locked+0x250/0x250 [ 1475.369027] ? strncpy_from_user+0x9e/0x470 [ 1475.369921] setxattr+0x23d/0x330 [ 1475.370620] ? vfs_setxattr+0x270/0x270 [ 1475.371433] ? find_held_lock+0x2c/0x110 [ 1475.372275] ? lock_acquire+0x197/0x490 [ 1475.373107] ? __x64_sys_fsetxattr+0x176/0x290 [ 1475.374031] ? lock_release+0x6b0/0x6b0 [ 1475.374851] ? __fget_files+0x296/0x480 [ 1475.375708] ? __mnt_want_write+0x196/0x280 [ 1475.376616] __x64_sys_fsetxattr+0x1f9/0x290 [ 1475.377544] do_syscall_64+0x33/0x40 [ 1475.378321] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1475.379348] RIP: 0033:0x7f58fdbf6b19 [ 1475.380101] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1475.383778] RSP: 002b:00007f58fb16c188 EFLAGS: 00000246 ORIG_RAX: 00000000000000be [ 1475.385302] RAX: ffffffffffffffda RBX: 00007f58fdd09f60 RCX: 00007f58fdbf6b19 [ 1475.386754] RDX: 0000000000000000 RSI: 0000000020000580 RDI: 0000000000000004 [ 1475.388201] RBP: 00007f58fb16c1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1475.389614] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1475.391024] R13: 00007ffcf5819c5f R14: 00007f58fb16c300 R15: 0000000000022000 [ 1486.057660] kmemleak: 8 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 13:49:19 executing program 7: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) fsetxattr$trusted_overlay_upper(r0, &(0x7f0000000580), 0x0, 0x0, 0x0) (fail_nth: 4) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, 0x0) 13:49:19 executing program 6: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000480)=':,^(\x00') openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x0) openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000040)='.\x00', 0x2000003) r2 = inotify_init1(0x0) inotify_add_watch(r2, &(0x7f0000000000)='./file0\x00', 0xa4000004) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) dup3(r3, 0xffffffffffffffff, 0x0) 13:49:19 executing program 0: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\a*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 13:49:19 executing program 4: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x0f*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 13:49:19 executing program 2: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\n*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 13:49:19 executing program 5: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000480)=':,^(\x00') openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x0) openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000040)='.\x00', 0x2000003) r2 = inotify_init1(0x0) inotify_add_watch(r2, &(0x7f0000000000)='./file0\x00', 0xa4000004) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r4 = dup3(r3, 0xffffffffffffffff, 0x0) ioctl$TIOCPKT(r4, 0x5420, &(0x7f0000000040)) 13:49:19 executing program 1: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\f\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 13:49:19 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000480)=':,^(\x00') openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x0) r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) r2 = inotify_init1(0x0) inotify_add_watch(r2, &(0x7f0000000040)='.\x00', 0x2000003) inotify_init1(0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r3 = dup2(r1, r1) close_range(r3, 0xffffffffffffffff, 0x0) [ 1493.319405] FAULT_INJECTION: forcing a failure. [ 1493.319405] name failslab, interval 1, probability 0, space 0, times 0 [ 1493.321698] CPU: 1 PID: 10403 Comm: syz-executor.7 Not tainted 5.10.153 #1 [ 1493.323050] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1493.324677] Call Trace: [ 1493.325205] dump_stack+0x107/0x167 [ 1493.325929] should_fail.cold+0x5/0xa [ 1493.326685] should_failslab+0x5/0x20 [ 1493.327435] __kmalloc_track_caller+0x79/0x3c0 [ 1493.328335] ? simple_xattr_set+0x93/0x610 [ 1493.329175] kstrdup+0x36/0x70 [ 1493.329809] simple_xattr_set+0x93/0x610 [ 1493.330609] ? shmem_xattr_handler_set+0x2e/0x50 [ 1493.331559] ? shmem_get_tree+0x20/0x20 [ 1493.332350] __vfs_setxattr+0x10f/0x180 [ 1493.333131] ? xattr_resolve_name+0x3e0/0x3e0 [ 1493.334017] ? security_capable+0x95/0xc0 [ 1493.334834] __vfs_setxattr_noperm+0x11a/0x4c0 [ 1493.335747] __vfs_setxattr_locked+0x1c3/0x250 [ 1493.336655] vfs_setxattr+0xe8/0x270 [ 1493.337402] ? __vfs_setxattr_locked+0x250/0x250 [ 1493.338347] ? strncpy_from_user+0x9e/0x470 [ 1493.339215] setxattr+0x23d/0x330 [ 1493.339920] ? vfs_setxattr+0x270/0x270 [ 1493.340701] ? find_held_lock+0x2c/0x110 [ 1493.341512] ? lock_acquire+0x197/0x490 [ 1493.342287] ? __x64_sys_fsetxattr+0x176/0x290 [ 1493.343199] ? lock_release+0x6b0/0x6b0 [ 1493.344003] ? __fget_files+0x296/0x480 [ 1493.344795] ? __mnt_want_write+0x196/0x280 [ 1493.345650] __x64_sys_fsetxattr+0x1f9/0x290 [ 1493.346522] do_syscall_64+0x33/0x40 [ 1493.347271] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1493.348334] RIP: 0033:0x7f58fdbf6b19 [ 1493.349074] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1493.352687] RSP: 002b:00007f58fb16c188 EFLAGS: 00000246 ORIG_RAX: 00000000000000be [ 1493.354186] RAX: ffffffffffffffda RBX: 00007f58fdd09f60 RCX: 00007f58fdbf6b19 [ 1493.355585] RDX: 0000000000000000 RSI: 0000000020000580 RDI: 0000000000000004 [ 1493.357007] RBP: 00007f58fb16c1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1493.358408] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1493.359814] R13: 00007ffcf5819c5f R14: 00007f58fb16c300 R15: 0000000000022000 13:49:20 executing program 5: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000480)=':,^(\x00') openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x0) openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000040)='.\x00', 0x2000003) r2 = inotify_init1(0x0) inotify_add_watch(r2, &(0x7f0000000000)='./file0\x00', 0xa4000004) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r4 = dup3(r3, 0xffffffffffffffff, 0x0) ioctl$TIOCPKT(r4, 0x5420, &(0x7f0000000040)) 13:49:20 executing program 2: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x0f*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 13:49:20 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000480)=':,^(\x00') openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x0) r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) r2 = inotify_init1(0x0) inotify_add_watch(r2, &(0x7f0000000040)='.\x00', 0x2000003) inotify_init1(0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r3 = dup2(r1, r1) close_range(r3, 0xffffffffffffffff, 0x0) 13:49:20 executing program 0: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\n*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 13:49:20 executing program 6: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000480)=':,^(\x00') openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x0) openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000040)='.\x00', 0x2000003) r2 = inotify_init1(0x0) inotify_add_watch(r2, &(0x7f0000000000)='./file0\x00', 0xa4000004) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) dup3(r3, 0xffffffffffffffff, 0x0) 13:49:20 executing program 4: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00@*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 13:49:20 executing program 1: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\r\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 13:49:20 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000480)=':,^(\x00') openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x0) r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) r2 = inotify_init1(0x0) inotify_add_watch(r2, &(0x7f0000000040)='.\x00', 0x2000003) inotify_init1(0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r3 = dup2(r1, r1) close_range(r3, 0xffffffffffffffff, 0x0) [ 1505.483990] kmemleak: 2 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 13:49:39 executing program 6: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000480)=':,^(\x00') openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x0) openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000040)='.\x00', 0x2000003) r2 = inotify_init1(0x0) inotify_add_watch(r2, &(0x7f0000000000)='./file0\x00', 0xa4000004) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) dup3(r3, 0xffffffffffffffff, 0x0) 13:49:39 executing program 5: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000480)=':,^(\x00') openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x0) openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000040)='.\x00', 0x2000003) r2 = inotify_init1(0x0) inotify_add_watch(r2, &(0x7f0000000000)='./file0\x00', 0xa4000004) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r4 = dup3(r3, 0xffffffffffffffff, 0x0) ioctl$TIOCPKT(r4, 0x5420, &(0x7f0000000040)) 13:49:39 executing program 0: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x0f*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 13:49:39 executing program 2: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00H*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 13:49:39 executing program 7: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) fsetxattr$trusted_overlay_upper(r0, &(0x7f0000000580), 0x0, 0x0, 0x0) (fail_nth: 5) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, 0x0) 13:49:39 executing program 4: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00H*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 13:49:39 executing program 1: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x0f\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 13:49:39 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000480)=':,^(\x00') openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x0) r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) r2 = inotify_init1(0x0) inotify_add_watch(r2, &(0x7f0000000040)='.\x00', 0x2000003) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0xa4000004) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r3 = dup2(r1, r1) close_range(r3, 0xffffffffffffffff, 0x0) [ 1513.169277] FAULT_INJECTION: forcing a failure. [ 1513.169277] name failslab, interval 1, probability 0, space 0, times 0 [ 1513.171584] CPU: 1 PID: 10474 Comm: syz-executor.7 Not tainted 5.10.153 #1 [ 1513.172984] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1513.174636] Call Trace: [ 1513.175170] dump_stack+0x107/0x167 [ 1513.175913] should_fail.cold+0x5/0xa [ 1513.176698] ? create_object.isra.0+0x3a/0xa20 [ 1513.177617] should_failslab+0x5/0x20 [ 1513.178381] kmem_cache_alloc+0x5b/0x360 [ 1513.179193] create_object.isra.0+0x3a/0xa20 [ 1513.180076] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1513.181089] __kmalloc_track_caller+0x177/0x3c0 [ 1513.182008] ? simple_xattr_set+0x93/0x610 [ 1513.182855] kstrdup+0x36/0x70 [ 1513.183521] simple_xattr_set+0x93/0x610 [ 1513.184340] ? shmem_xattr_handler_set+0x2e/0x50 [ 1513.185321] ? shmem_get_tree+0x20/0x20 [ 1513.186136] __vfs_setxattr+0x10f/0x180 [ 1513.186952] ? xattr_resolve_name+0x3e0/0x3e0 [ 1513.187873] ? security_capable+0x95/0xc0 [ 1513.188740] __vfs_setxattr_noperm+0x11a/0x4c0 [ 1513.189683] __vfs_setxattr_locked+0x1c3/0x250 [ 1513.190626] vfs_setxattr+0xe8/0x270 [ 1513.191395] ? __vfs_setxattr_locked+0x250/0x250 [ 1513.192391] ? strncpy_from_user+0x9e/0x470 [ 1513.193281] setxattr+0x23d/0x330 [ 1513.193995] ? vfs_setxattr+0x270/0x270 [ 1513.194821] ? find_held_lock+0x2c/0x110 [ 1513.195739] ? lock_acquire+0x197/0x490 [ 1513.196645] ? __x64_sys_fsetxattr+0x176/0x290 [ 1513.197684] ? lock_release+0x6b0/0x6b0 [ 1513.198596] ? __fget_files+0x296/0x480 [ 1513.199504] ? __mnt_want_write+0x196/0x280 [ 1513.200510] __x64_sys_fsetxattr+0x1f9/0x290 [ 1513.201513] do_syscall_64+0x33/0x40 [ 1513.202360] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1513.203519] RIP: 0033:0x7f58fdbf6b19 [ 1513.204339] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1513.208123] RSP: 002b:00007f58fb16c188 EFLAGS: 00000246 ORIG_RAX: 00000000000000be [ 1513.209672] RAX: ffffffffffffffda RBX: 00007f58fdd09f60 RCX: 00007f58fdbf6b19 [ 1513.211132] RDX: 0000000000000000 RSI: 0000000020000580 RDI: 0000000000000004 [ 1513.212602] RBP: 00007f58fb16c1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1513.214049] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1513.215501] R13: 00007ffcf5819c5f R14: 00007f58fb16c300 R15: 0000000000022000 13:49:39 executing program 2: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00L*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 13:49:39 executing program 6: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000480)=':,^(\x00') openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x0) openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000040)='.\x00', 0x2000003) inotify_init1(0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) dup3(r3, r2, 0x0) 13:49:40 executing program 4: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00L*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 13:49:40 executing program 0: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00H*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 13:49:40 executing program 5: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000480)=':,^(\x00') openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x0) openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000040)='.\x00', 0x2000003) inotify_init1(0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r4 = dup3(r3, r2, 0x0) ioctl$TIOCPKT(r4, 0x5420, &(0x7f0000000040)) [ 1525.816226] kmemleak: 2 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 13:49:59 executing program 2: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00h*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 13:49:59 executing program 0: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00L*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 13:49:59 executing program 7: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) fsetxattr$trusted_overlay_upper(r0, &(0x7f0000000580), 0x0, 0x0, 0x0) (fail_nth: 6) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, 0x0) 13:49:59 executing program 5: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000480)=':,^(\x00') openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x0) openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000040)='.\x00', 0x2000003) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r4 = dup3(r3, r2, 0x0) ioctl$TIOCPKT(r4, 0x5420, &(0x7f0000000040)) 13:49:59 executing program 1: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00@\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 13:49:59 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000480)=':,^(\x00') openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x0) r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) r2 = inotify_init1(0x0) inotify_add_watch(r2, &(0x7f0000000040)='.\x00', 0x2000003) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0xa4000004) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r3 = dup2(r1, r1) close_range(r3, 0xffffffffffffffff, 0x0) 13:49:59 executing program 4: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00h*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 13:49:59 executing program 6: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000480)=':,^(\x00') openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x0) openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000040)='.\x00', 0x2000003) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) dup3(r3, r2, 0x0) [ 1532.862480] FAULT_INJECTION: forcing a failure. [ 1532.862480] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1532.864136] CPU: 0 PID: 10512 Comm: syz-executor.7 Not tainted 5.10.153 #1 [ 1532.864921] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1532.865846] Call Trace: [ 1532.866155] dump_stack+0x107/0x167 [ 1532.866576] should_fail.cold+0x5/0xa [ 1532.867026] _copy_to_user+0x2e/0x180 [ 1532.867469] simple_read_from_buffer+0xcc/0x160 [ 1532.868011] proc_fail_nth_read+0x198/0x230 [ 1532.868526] ? proc_sessionid_read+0x230/0x230 [ 1532.869042] ? security_file_permission+0x24e/0x570 [ 1532.869620] ? perf_trace_initcall_start+0x101/0x380 [ 1532.870206] ? proc_sessionid_read+0x230/0x230 [ 1532.870725] vfs_read+0x228/0x580 [ 1532.871131] ksys_read+0x12d/0x260 [ 1532.871545] ? __ia32_sys_pwrite64+0x230/0x230 [ 1532.872077] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1532.872680] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1532.873276] do_syscall_64+0x33/0x40 [ 1532.873710] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1532.874291] RIP: 0033:0x7f58fdba969c [ 1532.874711] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 1532.876771] RSP: 002b:00007f58fb16c170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1532.877631] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f58fdba969c [ 1532.878429] RDX: 000000000000000f RSI: 00007f58fb16c1e0 RDI: 0000000000000005 [ 1532.879230] RBP: 00007f58fb16c1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1532.880071] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1532.880885] R13: 00007ffcf5819c5f R14: 00007f58fb16c300 R15: 0000000000022000 13:49:59 executing program 1: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00H\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 13:49:59 executing program 5: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000480)=':,^(\x00') openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x0) openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) inotify_init1(0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r3 = dup3(r2, r1, 0x0) ioctl$TIOCPKT(r3, 0x5420, &(0x7f0000000040)) 13:49:59 executing program 2: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00l*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 13:49:59 executing program 4: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00l*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 13:49:59 executing program 7: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) fsetxattr$trusted_overlay_upper(r0, &(0x7f0000000580), 0x0, 0x0, 0x0) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, 0x0) 13:49:59 executing program 0: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00h*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 13:49:59 executing program 6: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000480)=':,^(\x00') openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x0) openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) inotify_init1(0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) dup3(r2, r1, 0x0) 13:49:59 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000480)=':,^(\x00') openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x0) r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) r2 = inotify_init1(0x0) inotify_add_watch(r2, &(0x7f0000000040)='.\x00', 0x2000003) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0xa4000004) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r3 = dup2(r1, r1) close_range(r3, 0xffffffffffffffff, 0x0) 13:49:59 executing program 2: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00t*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 13:49:59 executing program 5: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000480)=':,^(\x00') openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x0) openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r3 = dup3(r2, r1, 0x0) ioctl$TIOCPKT(r3, 0x5420, &(0x7f0000000040)) 13:49:59 executing program 1: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00L\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 13:50:12 executing program 4: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00t*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 13:50:12 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000480)=':,^(\x00') openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x0) r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) inotify_init1(0x0) r2 = inotify_init1(0x0) inotify_add_watch(r2, &(0x7f0000000000)='./file0\x00', 0xa4000004) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r3 = dup2(r1, r1) close_range(r3, 0xffffffffffffffff, 0x0) 13:50:12 executing program 7: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) fsetxattr$trusted_overlay_upper(r0, &(0x7f0000000580), 0x0, 0xc9ffff, 0x0) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, 0x0) 13:50:12 executing program 1: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00h\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 13:50:12 executing program 5: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000480)=':,^(\x00') openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x0) openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r3 = dup3(r2, r1, 0x0) ioctl$TIOCPKT(r3, 0x5420, &(0x7f0000000040)) 13:50:12 executing program 6: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000480)=':,^(\x00') openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x0) openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) dup3(r2, r1, 0x0) 13:50:12 executing program 2: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00z*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 13:50:12 executing program 0: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00l*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 13:50:12 executing program 7: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) fsetxattr$trusted_overlay_upper(r0, &(0x7f0000000580), 0x0, 0x1000000, 0x0) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, 0x0) 13:50:12 executing program 6: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000480)=':,^(\x00') openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x0) openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) dup3(r2, r1, 0x0) 13:50:12 executing program 5: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000480)=':,^(\x00') openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r3 = dup3(r2, r1, 0x0) ioctl$TIOCPKT(r3, 0x5420, &(0x7f0000000040)) 13:50:12 executing program 1: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00l\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 13:50:12 executing program 2: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x02*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 13:50:12 executing program 0: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00t*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 13:50:12 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000480)=':,^(\x00') openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x0) r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) inotify_init1(0x0) r2 = inotify_init1(0x0) inotify_add_watch(r2, &(0x7f0000000000)='./file0\x00', 0xa4000004) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r3 = dup2(r1, r1) close_range(r3, 0xffffffffffffffff, 0x0) 13:50:12 executing program 4: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00z*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) [ 1560.917726] kmemleak: 2 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 13:50:35 executing program 7: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) fsetxattr$trusted_overlay_upper(r0, &(0x7f0000000580), 0x0, 0x100000000000000, 0x0) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, 0x0) 13:50:35 executing program 1: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00t\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 13:50:35 executing program 4: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x02*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 13:50:35 executing program 6: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000480)=':,^(\x00') openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) dup3(r2, r1, 0x0) 13:50:35 executing program 5: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000480)=':,^(\x00') openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r3 = dup3(r2, r1, 0x0) ioctl$TIOCPKT(r3, 0x5420, &(0x7f0000000040)) 13:50:35 executing program 0: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00z*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 13:50:35 executing program 2: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x03*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 13:50:35 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000480)=':,^(\x00') openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x0) r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) inotify_init1(0x0) r2 = inotify_init1(0x0) inotify_add_watch(r2, &(0x7f0000000000)='./file0\x00', 0xa4000004) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r3 = dup2(r1, r1) close_range(r3, 0xffffffffffffffff, 0x0) 13:50:35 executing program 0: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x02*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 13:50:35 executing program 1: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00z\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 13:50:35 executing program 4: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x03*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 13:50:35 executing program 2: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x04*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 13:50:35 executing program 7: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) fsetxattr$trusted_overlay_upper(r0, &(0x7f0000000580), 0x0, 0xffffc90000000000, 0x0) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, 0x0) 13:50:35 executing program 5: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000480)=':,^(\x00') r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r3 = dup3(r2, r1, 0x0) ioctl$TIOCPKT(r3, 0x5420, &(0x7f0000000040)) 13:50:35 executing program 6: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000480)=':,^(\x00') openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) dup3(r2, r1, 0x0) 13:50:35 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000480)=':,^(\x00') openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x0) r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='.\x00', 0x2000003) r2 = inotify_init1(0x0) inotify_add_watch(r2, &(0x7f0000000000)='./file0\x00', 0xa4000004) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r3 = dup2(r1, r1) close_range(r3, 0xffffffffffffffff, 0x0) [ 1581.704258] kmemleak: 1 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 13:50:57 executing program 4: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x04*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 13:50:57 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000480)=':,^(\x00') openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x0) r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='.\x00', 0x2000003) r2 = inotify_init1(0x0) inotify_add_watch(r2, &(0x7f0000000000)='./file0\x00', 0xa4000004) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r3 = dup2(r1, r1) close_range(r3, 0xffffffffffffffff, 0x0) 13:50:57 executing program 6: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000480)=':,^(\x00') r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) dup3(r2, r1, 0x0) 13:50:57 executing program 2: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x05*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 13:50:57 executing program 0: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x03*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 13:50:57 executing program 5: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$TIOCPKT(r2, 0x5420, &(0x7f0000000040)) 13:50:57 executing program 7: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) fsetxattr$trusted_overlay_upper(r0, &(0x7f0000000580), 0x0, 0xffffffff00000000, 0x0) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, 0x0) 13:50:57 executing program 1: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\xff\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 13:50:57 executing program 7: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) fsetxattr$trusted_overlay_upper(r0, &(0x7f0000000580), 0x0, 0x0, 0xc9ffff) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, 0x0) 13:50:57 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$TIOCPKT(r2, 0x5420, &(0x7f0000000040)) 13:50:57 executing program 6: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) dup3(r1, r0, 0x0) 13:50:57 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000480)=':,^(\x00') openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x0) r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='.\x00', 0x2000003) r2 = inotify_init1(0x0) inotify_add_watch(r2, &(0x7f0000000000)='./file0\x00', 0xa4000004) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r3 = dup2(r1, r1) close_range(r3, 0xffffffffffffffff, 0x0) 13:50:57 executing program 0: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x04*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 13:50:57 executing program 1: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x02\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 13:50:57 executing program 4: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x05*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 13:50:57 executing program 2: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x06*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 13:50:57 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$TIOCPKT(r2, 0x5420, &(0x7f0000000040)) 13:51:10 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$TIOCPKT(r2, 0x5420, &(0x7f0000000040)) 13:51:10 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000480)=':,^(\x00') openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x0) r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x0) r2 = inotify_init1(0x0) inotify_add_watch(r2, &(0x7f0000000040)='.\x00', 0x2000003) r3 = inotify_init1(0x0) inotify_add_watch(r3, &(0x7f0000000000)='./file0\x00', 0xa4000004) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r4 = dup2(r1, r1) close_range(r4, 0xffffffffffffffff, 0x0) 13:51:10 executing program 7: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) fsetxattr$trusted_overlay_upper(r0, &(0x7f0000000580), 0x0, 0x0, 0x1000000) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, 0x0) 13:51:10 executing program 1: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x03\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 13:51:10 executing program 6: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) dup3(r1, r0, 0x0) 13:51:10 executing program 0: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x05*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 13:51:10 executing program 4: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x06*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 13:51:10 executing program 2: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\a*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 13:51:11 executing program 7: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) fsetxattr$trusted_overlay_upper(r0, &(0x7f0000000580), 0x0, 0x0, 0x100000000000000) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, 0x0) 13:51:11 executing program 0: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x06*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 13:51:11 executing program 5: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$TIOCPKT(r2, 0x5420, &(0x7f0000000040)) 13:51:11 executing program 6: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) dup3(r1, r0, 0x0) 13:51:11 executing program 1: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x04\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 13:51:11 executing program 4: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\a*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) [ 1615.487420] kmemleak: 3 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 13:51:29 executing program 2: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\n*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 13:51:29 executing program 6: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) dup3(r1, r0, 0x0) 13:51:29 executing program 0: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\a*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 13:51:29 executing program 1: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x05\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 13:51:29 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000480)=':,^(\x00') openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x0) r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x0) r2 = inotify_init1(0x0) inotify_add_watch(r2, &(0x7f0000000040)='.\x00', 0x2000003) r3 = inotify_init1(0x0) inotify_add_watch(r3, &(0x7f0000000000)='./file0\x00', 0xa4000004) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r4 = dup2(r1, r1) close_range(r4, 0xffffffffffffffff, 0x0) 13:51:29 executing program 7: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) fsetxattr$trusted_overlay_upper(r0, &(0x7f0000000580), 0x0, 0x0, 0xffffc90000000000) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, 0x0) 13:51:29 executing program 4: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\n*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 13:51:29 executing program 5: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$TIOCPKT(r2, 0x5420, &(0x7f0000000040)) 13:51:29 executing program 6: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) dup3(r1, r0, 0x0) 13:51:29 executing program 5: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$TIOCPKT(r2, 0x5420, &(0x7f0000000040)) 13:51:29 executing program 7: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) fsetxattr$trusted_overlay_upper(r0, &(0x7f0000000580), 0x0, 0x0, 0xffffffff00000000) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, 0x0) 13:51:29 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000480)=':,^(\x00') openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x0) r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x0) r2 = inotify_init1(0x0) inotify_add_watch(r2, &(0x7f0000000040)='.\x00', 0x2000003) r3 = inotify_init1(0x0) inotify_add_watch(r3, &(0x7f0000000000)='./file0\x00', 0xa4000004) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r4 = dup2(r1, r1) close_range(r4, 0xffffffffffffffff, 0x0) 13:51:29 executing program 1: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x06\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 13:51:29 executing program 4: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x0f*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 13:51:29 executing program 0: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\n*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 13:51:29 executing program 2: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x0f*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) [ 1633.416402] kmemleak: 1 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 13:51:47 executing program 6: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) dup3(r1, r0, 0x0) 13:51:47 executing program 5: perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$TIOCPKT(r2, 0x5420, &(0x7f0000000040)) 13:51:47 executing program 1: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\a\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 13:51:47 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000480)=':,^(\x00') openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000040)='.\x00', 0x2000003) r2 = inotify_init1(0x0) inotify_add_watch(r2, &(0x7f0000000000)='./file0\x00', 0xa4000004) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r3 = dup2(0xffffffffffffffff, 0xffffffffffffffff) close_range(r3, 0xffffffffffffffff, 0x0) 13:51:47 executing program 4: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00H*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 13:51:47 executing program 0: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x0f*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 13:51:47 executing program 2: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00H*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 13:51:47 executing program 7: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'veth1\x00', 0x0}) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000004d00)={{{@in=@broadcast, @in=@private, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@private2}, 0x0, @in=@remote}}, &(0x7f0000004cc0)=0xe8) sendmmsg$inet(r0, &(0x7f0000004b40)=[{{&(0x7f0000000140)={0x2, 0x4e20, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, &(0x7f0000000640)=[{&(0x7f0000000180)="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", 0xfa}, {&(0x7f0000000280)="8d56bc673db6630aae2170fa1e4a2d9fe2ec1f21196edcb5ed9d9078991818104b15d459652a6c33752ff64b457cd53b76803b", 0x33}, {&(0x7f00000002c0)="d961adb28348022b3203116a7f6a357801ae0229b65013ccc0dcd23f9cce0f", 0x1f}, {&(0x7f0000000300)="7f8f62b12feb4bb263596ff674aabd4bd2bec8345b4370d282849836b1dc65f81c245888fe426ecb05b22e66bfbf42cde8784eefdd0369bb51cfeb42f5e2dcb83e688bc677ea7d363078ddb16c3864925602f5334f6929836aa82530cd26f59f870f92593902767cae1ceca92ae491c177243c0af9b45b477bb2cfaccd3feb43a1536f816da43ffb6f7151e483bedc2f1aa11720f74957a1061347f997d94b65570374ef4eaa3f1f5289e4984238fd14c0e62b20d83c85b08a250740b15d761d8af344d522cce28b31b165b161c0f53a5481ee7b1a0fa93c2f3e2b73810aaf4d251c9f19c37be3223b23a9495497827bc867fe", 0xf3}, {&(0x7f0000000400)="fed353e8c1a535026319510d20e08e6a50e816ccd16e4f9a473b81cab3bf0db035955aca5baf1ebae8a9f5cc63eb5a851380ee88d893245f759a4b0db82d259486cea566941d9e783773c9a7117b8fc734061d0c6d8d072bbb6fbbd19fef7063d56d8f7c666898c988380237c1e10230bfaf70fe7e459baf8335df27e04870e2f0cf9478c8e02e4decd0f2fb5e67845de53800abc4c746ffbc2c0f5b19236e8109c0f84d023be3328ecaf2e76bec28df9ded0a8a53209bd1516278f04ae1a89352323c906f474a", 0xc7}, {&(0x7f0000000500)="5005d4d1de161e6d96bd6796259507eff3da5355a2c524a87e2438182f7af3a03b7e6b65e0ce4cf2bdc10836871b68a8e0f55f82bc29b01682562fea5150543e69edaea6a691fa8c290f4ffe5c990c113bc1083e2bbc0a32d536edebdc2b5034d9", 0x61}, {&(0x7f00000005c0)="d825c081aa2e24c1da8bee5dd9eb18a8672fc08900291bf8b2fec1234cce56bb585798973924d0ca959f273a9c7ff725484fa30645b9da7de8091f3afe1d82cfdbbc1638c6ff73db1255145bf6", 0x4d}], 0x7}}, {{&(0x7f00000006c0)={0x2, 0x4e24, @private=0xa010101}, 0x10, &(0x7f0000001a80)=[{&(0x7f0000000700)="de889f711ad54940ea3c6aee193608ebeeb9a922b7fa949a22900eebb73939d6fe6e7448c4e4cde81aba565263079530ba20479171d8710b4984e31f0f014f283a9a2cdc666f858c10ce853a5e9920656a35d611d9a843625bc0fae2c19319cf08bcd60ba90e41529e63ae3870530605bba010d280bfac54e4ad2cfb48039f67ee72224f641524950d86e32b4185b13150015bd2b697057f962a0b0d473be33ae74facd266a5b6c88c5e5c8161f0bfd6a1a5cb89d9137a7805db244a51fbada973708f", 0xc3}, {&(0x7f0000000800)="8a4b75a882562beb7ffaca06ccf9b97947bc60868f9838bad317272a173045a005b2dc8f801051700322ae9296faff092859b7c6a239f3f2ca0b9c598f979af3ad1266d57312ae535c17e07d01d7e4e47c5abc7a039ff436437579f5e5649173cb348a92f4e35946b5a03e9737fd80c71b8ec91deb1501d406147555cfcac651ff5253ba67d4eea479", 0x89}, {&(0x7f00000008c0)="e819ad596ae4f4942b6a735e45e42cb035923de8045c86c94104a3b9e11b0becee64d69bf5ad3fc7434c257add592657726134f8b0f7368c417f2e84940faf39171ab0b51bf966ec9d0199d84219c7759763c2aa7158d539f02fb5c65f1c5316caa072a123222d6d2c", 0x69}, {&(0x7f0000000940)="b2c80d29c03332b909d9fac104d460d451dc94c4c0e473e37738f11b397ce3", 0x1f}, {&(0x7f0000000980)="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", 0x1000}, {&(0x7f0000001980)="b0ac", 0x2}, {&(0x7f00000019c0)="e9534d62acec5dc984c9c8c457d8698b2859eb48a1bd2a1021bbaa2f4f86b5e31602722f30a553b961ceac0b80a649932b483942a7b58a59aac3dab8ce1a6147f66abee10728bb5a6e1d225e4fc7d1ac1e6137e0b2e08b08f0267c2a551edb3a1cdbaae43b35e72441329b40c2f09303c9dc9167d69084e81f1026b162c9b1d3a8facfde39764e7e3a91f46360", 0x8d}], 0x7, &(0x7f0000001b00)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @empty, @broadcast}}}, @ip_ttl={{0x14, 0x0, 0x2, 0x3ff}}, @ip_ttl={{0x14, 0x0, 0x2, 0xffffffff}}], 0x50}}, {{&(0x7f0000001b80)={0x2, 0x4e20, @multicast1}, 0x10, &(0x7f0000001e00)=[{&(0x7f0000001bc0)="78932482f9be7da8381876e16ab637a06d61fa5f98e650182db555bf0c0362a49ec6261bb97139261d2e7a5592896c40a1fda7353dd11ef05677f3a746f63d467f1bec5f4ec48fd5ae0cac616ebd0e3040211ff13d75df1660fda3059a0cf857e35d12ba76b85ace658708348607028b1a255f1e5a538c9c0f62ce2be2b55b3ffefd9f05ede33be80c8b8e88f75be25f36eb807e8f1a0e1d6a65e74c2485f0f6dee78a505c97b7e38347d18452cd087d232e387352dac7c4b5874809f28c9533c3c1e74497c15c0a873bf7f06a64e2b180e7e50a09180969706e5a1ee67e34c68a", 0xe1}, {&(0x7f0000001cc0)="52852e08795e5e0a8b5a1ebc38a01dd7bbd7605036ddbe635b1b0743f441d22534c24e72ade8e1c50c28fe09e1a11695d0cbfd1e79e2f497297b879aac252ecfb09eb3884e45f2db8df39cc304e4fcf954acae5973aabe6f41da59225ca94f8d98ca905581ba7d870df1d55438008840f68c8f68db9540f3c11af8f73542bd3eb3ca5d97aafff750e805b7b88c79af8cbc307b901b4d0731a9980d38a9eaa2cdd7a014", 0xa3}], 0x2, &(0x7f00000030c0)=ANY=[@ANYBLOB="3c000000000000000000000007000000940401008625000000000010301e8140c64065f74e3b9a8732dd020d8f4d0e6f2a7001000100340602000000000000001c000000000000000000000008000000f4d45ec2d8a185402622b8f1ccad96f01f21514cf6ab6b02fd30e540f24adce7", @ANYRES32=r1, @ANYBLOB="ac1414aae00000010000000054000000000000000000000007000000000144148530000000000000ffff0000054c2251799201862dffffffff07090d3f563d2b19830510b2be5673fe8f8dc9c126bc822ec6070efee82b60c0c413fe0d40165700000000140000000000000000000000010000000001000000000000"], 0xd0}}, {{0x0, 0x0, &(0x7f0000003080)=[{&(0x7f0000001f40)="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", 0x1000}, {&(0x7f0000002f40)="ae4944d6c7d952217664cb54e3f773992421bf6624691d0acf9b1677a80d798ab59a96cb46ad32d0acf0bbf3e52fcff04388f13846c5896b18a48a748c45f699d720a1e938d07727a3e6d0a00f", 0x4d}, {&(0x7f0000002fc0)="0a0d90c760e821ce54f4e7c15bccb834864c16f780aef978d559477af42f5e08693629053166b78003055e672f41e688fb78e96d9f8ef4a5442b6a91dcc17274c2718b2e3f5e8c6f203b7b49375668dfc5a0fee37326ba12706a24e536d8762a32", 0x61}, {&(0x7f0000003040)="9538613611ce46cbd434b446fc74fb4afb45a2c4e65ad8f6715d0c32be2b2da34a2888c6e7631cba131fe982342d8909035ac10d724365", 0x37}], 0x4, &(0x7f0000003200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @multicast1, @multicast1}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @rand_addr=0x64010100, @multicast2}}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0xb6}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @private=0xa010101, @private=0xa010101}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x9}}, @ip_ttl={{0x14, 0x0, 0x2, 0x4}}], 0xa8}}, {{&(0x7f00000032c0)={0x2, 0x4e24, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x10, &(0x7f0000003640)=[{&(0x7f0000003300)="76a3bddf74d0bed110a63c5ae4c39d42ab48af3b61229b9d4b1cae1ddd2c952544c953fad60d9040186c2ad181228d28ef2fce7c1298fe76e1080cf19b1a179ca9fede634733a16fddecc100b62e", 0x4e}, {&(0x7f0000003380)="10e43a616687895e1838ecb7af8f77379881dd9b13a21c177f82b42b55d4dc46740c8a6954c17febad57e2e5c56204fbfc83cb05a6b2be617fae3b0f44ad9d53e01abf98bcfaf835b13969ce01dbc64aa70dc067b572f661c1a5604d995456ad7de16d1c964940ef43cba75e05fffe55750aa7be84", 0x75}, {&(0x7f0000003400)="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", 0xfd}, {&(0x7f0000003500)="3a3e104923eb5ad64ce668b3f143e0dba01a66cecbe1a000bd5c91965b75626dab8acccd32c65a8113007b5551e97aebc2fcb35576ed68ceee67abd9", 0x3c}, {&(0x7f0000003540)="da13150858c70c7611adbd7566ccf732ac0cde6fbfc14d869525f70130a5cdef0b888f326d3dd380d7b935428cbdefc95c4788fad3d39237cf970419570e0267616155dbb2abfd2f0e1f71f6e1e6b126db353dfbdb6a1133a02a2a811e8a7a4e543cff306dbfc72e676c72ced38e3239f04d7376137a55c9b212ab63bfcbe595446fef320bf9d4490a082ab6e66f683042754ae8ffed27b48c4df02178dfe946100b90753cf253dafafdd678d7b001e0b33005dc0fb458a9df6c0c7afad9ae00c44a4d81339760f197a903bb6ae3e27e6b931c23d5ac28e6565a17ec0f66b0a45f8adc29", 0xe4}], 0x5, &(0x7f00000036c0)=[@ip_tos_u8={{0x11, 0x0, 0x1, 0x8}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @multicast2, @dev={0xac, 0x14, 0x14, 0x1b}}}}, @ip_ttl={{0x14, 0x0, 0x2, 0x5}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x80000001}}, @ip_tos_int={{0x14}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x800}}], 0x98}}, {{&(0x7f0000003780)={0x2, 0x4e20, @broadcast}, 0x10, &(0x7f0000004a40)=[{&(0x7f00000037c0)="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", 0x1000}, {&(0x7f00000047c0)="4ffea62ab37e63bdb46e9bee23991fd43449144be328039938d7162a3cb4f469ab741fa3b5311ff0e671e6659fac041c138446027f506c6e4b881957334e18fcbc697cbf4523c8540bcaa808dafc1421567cda435807a532e225082b4f711296032d63e56a48d711bc5c6daa0dd5914ec23501b94c416f8c9f63c8c4f34df6a6a893c4e107610562e0a4817d9b1d517a7d8d96fdb541da89cc74a883109073e3fe607d6956acfbb864b5635e7ee1", 0xae}, {&(0x7f0000004880)="cabdab2668d758c887472e55e9968f5257d09263347142bc59441159aa9c4778b1fb9fe431d0653e2679aa3f697ef589bbaaa4e533bc866afdfe80d66cb788ed36432ebc77e96f50dee7b8649e94bda0efb7075f168735434e586721636603ec74d399f3494a332f7b000c6012c4d860c60ef617bb8f831ae901e99e64582c02a08a313ba073f24752e2a015b3bcc25d47532dd86935830c2a54cd6468bfaea7f6f2a626edda0a3a6259d9edc3736b5bfa855b89a0181bbe99527937fe007f99b7c586718f27e383d85cc8c79e03f1ffe9952b0edf7d3a3a6b07418dab87d16685dbcf7ef7e7c5e3e85036c72e76a3b146a0f0", 0xf3}, {&(0x7f0000004980)="23b1515d93d118ca296c547693792acbdf9b9361870a9d8093e374d4951373ece12dabef99b1ea9261107cbb769c236081a03a55ae5c1b73928b5396b4d0e1368988623061d7f9e84f4654ebf0bad68d083eab", 0x53}, {&(0x7f0000004a00)="c06b3d5919ff79d3bef79794870c7d917f630c59cb86899f72d63adc259172b26fad804aadbf2ea6ec9854", 0x2b}], 0x5, &(0x7f0000004ac0)=[@ip_ttl={{0x14, 0x0, 0x2, 0x9}}, @ip_retopts={{0x54, 0x0, 0x7, {[@ra={0x94, 0x4}, @cipso={0x86, 0x40, 0x1, [{0x1, 0x5, "4072c1"}, {0x5, 0x5, "99d6a1"}, {0x7, 0x7, "d38661c717"}, {0x5, 0x2}, {0x2, 0xa, "0c98a7b46f456984"}, {0x5, 0xa, "2e2b68acf3b85b7b"}, {0x1, 0xf, "fb75ccbb177545ec157c7b4dc8"}, {0x7, 0x2}, {0x5, 0x2}]}]}}}], 0x70}}], 0x6, 0x24008004) fsetxattr$trusted_overlay_upper(r2, &(0x7f0000000580), 0x0, 0x0, 0x0) r4 = syz_open_dev$vcsu(&(0x7f0000000040), 0x0, 0x401) getsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f0000000080)={@multicast2, @broadcast, 0x0}, &(0x7f00000000c0)=0xc) setsockopt$packet_add_memb(r4, 0x107, 0x1, &(0x7f0000000100)={r5, 0x1, 0x6, @random="78913fa6875e"}, 0x10) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, 0x0) 13:51:47 executing program 5: perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$TIOCPKT(r2, 0x5420, &(0x7f0000000040)) 13:51:47 executing program 4: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00L*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 13:51:47 executing program 0: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00H*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 13:51:47 executing program 6: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) dup3(r1, r0, 0x0) 13:51:47 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000480)=':,^(\x00') openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000040)='.\x00', 0x2000003) r2 = inotify_init1(0x0) inotify_add_watch(r2, &(0x7f0000000000)='./file0\x00', 0xa4000004) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r3 = dup2(0xffffffffffffffff, 0xffffffffffffffff) close_range(r3, 0xffffffffffffffff, 0x0) 13:51:47 executing program 2: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00L*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 13:51:47 executing program 1: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\b\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 13:51:47 executing program 5: perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$TIOCPKT(r2, 0x5420, &(0x7f0000000040)) [ 1652.576981] kmemleak: 1 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 13:52:06 executing program 5: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$TIOCPKT(r2, 0x5420, &(0x7f0000000040)) 13:52:06 executing program 1: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\t\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 13:52:06 executing program 4: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00h*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 13:52:06 executing program 0: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00L*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 13:52:06 executing program 6: perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) dup3(r1, r0, 0x0) 13:52:06 executing program 7: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000040)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @private1}}}, 0x108) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000300)={0x3, {{0xa, 0x0, 0x0, @mcast1}}, 0x0, 0x2, [{{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @mcast2}}]}, 0x190) setsockopt$inet6_group_source_req(r0, 0x29, 0x2b, &(0x7f00000001c0)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x55a}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) openat$zero(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f00000004c0)='./file0\x00', 0x60000, 0x9) fsetxattr$trusted_overlay_upper(r1, &(0x7f0000000580), 0x0, 0x0, 0x0) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, 0x0) 13:52:06 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000480)=':,^(\x00') openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000040)='.\x00', 0x2000003) r2 = inotify_init1(0x0) inotify_add_watch(r2, &(0x7f0000000000)='./file0\x00', 0xa4000004) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r3 = dup2(0xffffffffffffffff, 0xffffffffffffffff) close_range(r3, 0xffffffffffffffff, 0x0) 13:52:06 executing program 2: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00h*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 13:52:06 executing program 4: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00l*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 13:52:06 executing program 5: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$TIOCPKT(r2, 0x5420, &(0x7f0000000040)) 13:52:06 executing program 0: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00h*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 13:52:06 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000480)=':,^(\x00') openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) r2 = inotify_init1(0x0) inotify_add_watch(r2, &(0x7f0000000040)='.\x00', 0x2000003) r3 = inotify_init1(0x0) inotify_add_watch(r3, &(0x7f0000000000)='./file0\x00', 0xa4000004) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r4 = dup2(r1, r1) close_range(r4, 0xffffffffffffffff, 0x0) 13:52:06 executing program 1: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\n\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 13:52:06 executing program 6: perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) dup3(r1, r0, 0x0) 13:52:06 executing program 7: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000600)={0xa, 0x0, 0x0, @mcast2, 0x3}, 0x1c) fcntl$getownex(r0, 0x10, &(0x7f0000000040)={0x0, 0x0}) fcntl$lock(0xffffffffffffffff, 0x26, &(0x7f0000000000)={0x0, 0x1, 0x4, 0x4000009, r1}) tgkill(r1, 0x0, 0x1f) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) fsetxattr$trusted_overlay_upper(r2, &(0x7f0000000580), 0x0, 0x0, 0x0) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) recvmmsg(0xffffffffffffffff, &(0x7f00000018c0)=[{{&(0x7f0000000000)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000080)=""/25, 0x19}], 0x1, &(0x7f00000005c0)=""/4096, 0x1000}, 0x4}, {{&(0x7f0000000100)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={""/10, ""/2, @multicast1}}}}, 0x80, &(0x7f0000000440)=[{&(0x7f0000000180)=""/108, 0x6c}, {&(0x7f0000000200)}, {&(0x7f0000000240)=""/232, 0xe8}, {&(0x7f0000000340)=""/238, 0xee}], 0x4, &(0x7f0000000480)=""/199, 0xc7}, 0x80}, {{&(0x7f00000015c0)=@l2tp6={0xa, 0x0, 0x0, @remote}, 0x80, &(0x7f00000017c0)=[{&(0x7f0000001640)=""/133, 0x85}, {&(0x7f0000001700)=""/171, 0xab}], 0x2, &(0x7f0000001800)=""/191, 0xbf}, 0x8}], 0x3, 0x10042, &(0x7f0000001980)={0x77359400}) dup2(r3, r4) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, 0x0) 13:52:06 executing program 2: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00l*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 13:52:20 executing program 2: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00t*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 13:52:20 executing program 5: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$TIOCPKT(r2, 0x5420, &(0x7f0000000040)) 13:52:20 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000480)=':,^(\x00') r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) r2 = inotify_init1(0x0) inotify_add_watch(r2, &(0x7f0000000040)='.\x00', 0x2000003) r3 = inotify_init1(0x0) inotify_add_watch(r3, &(0x7f0000000000)='./file0\x00', 0xa4000004) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r4 = dup2(r1, r1) close_range(r4, 0xffffffffffffffff, 0x0) 13:52:20 executing program 0: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00l*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 13:52:20 executing program 4: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00t*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 13:52:20 executing program 6: perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) dup3(r1, r0, 0x0) 13:52:20 executing program 7: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x80, 0x1, 0x0, 0x0, 0x9, 0x0, 0xfffffffffffffffc, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0xa07, 0x0, @perf_bp={&(0x7f0000000180), 0x2}, 0x20400, 0x2, 0x200, 0x5, 0x0, 0x7, 0x7fff, 0x0, 0x1, 0x0, 0x4000000000000000}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0xa) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r1, 0x4b63, 0x0) fcntl$setpipe(r1, 0x407, 0x20) r2 = creat(&(0x7f0000000080)='./file0\x00', 0x201) fsetxattr$trusted_overlay_upper(r0, &(0x7f00000000c0), 0x0, 0x0, 0x2) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r5 = dup3(r4, r3, 0x0) sendmsg$GTP_CMD_GETPDP(r2, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000240)=ANY=[@ANYBLOB='B\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="10002abd7000fddbdf25020000000600060001000000080008000400000008000400ac14141c08000100", @ANYRES32=0x0, @ANYBLOB="08252381305af480efc165d566b5a5fcdd652cd398f3669bddf747"], 0x3c}, 0x1, 0x0, 0x0, 0x20008004}, 0x1) ioctl$TIOCPKT(r5, 0x5420, &(0x7f0000000040)) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r5, 0xc0406618, &(0x7f0000000000)={@id={0x2, 0x0, @c}}) 13:52:20 executing program 1: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\f\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 13:52:20 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000040)='.\x00', 0x2000003) r2 = inotify_init1(0x0) inotify_add_watch(r2, &(0x7f0000000000)='./file0\x00', 0xa4000004) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r3 = dup2(r0, r0) close_range(r3, 0xffffffffffffffff, 0x0) 13:52:20 executing program 6: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) dup3(r1, r0, 0x0) 13:52:20 executing program 5: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$TIOCPKT(r2, 0x5420, &(0x7f0000000040)) 13:52:20 executing program 1: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\r\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 13:52:20 executing program 0: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00t*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 13:52:20 executing program 2: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00z*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 13:52:20 executing program 4: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00z*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 13:52:20 executing program 7: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x82220, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) fsetxattr$trusted_overlay_upper(r0, &(0x7f0000000580), 0x0, 0x0, 0x0) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, 0x0) ioctl$CDROMSETSPINDOWN(r0, 0x531e, &(0x7f0000000000)=0xe) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r3 = dup3(r2, r1, 0x0) ioctl$TIOCL_PASTESEL(r0, 0x541c, &(0x7f0000000080)) ioctl$TIOCPKT(r3, 0x5420, &(0x7f0000000040)) accept4$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14, 0x800) ioctl$TUNSETIFINDEX(r3, 0x400454da, &(0x7f0000000180)=r4) 13:52:20 executing program 5: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$TIOCPKT(r2, 0x5420, &(0x7f0000000040)) [ 1687.452908] kmemleak: 3 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 13:52:41 executing program 5: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$TIOCPKT(r2, 0x5420, &(0x7f0000000040)) 13:52:41 executing program 0: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00z*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 13:52:41 executing program 7: ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'wlan0\x00', 0x0}) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f0000000080)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_SET_INTERFACE(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000140)={0x24, r2, 0x5, 0x0, 0x0, {{}, {@val={0x8, 0x3, r3}, @void}}, [@NL80211_ATTR_IFTYPE={0x8, 0x5, 0x7}]}, 0x24}}, 0x0) sendmsg$NL80211_CMD_JOIN_MESH(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000200)={0x30, r2, 0x5, 0x0, 0x0, {{}, {@val={0x8, 0x3, r3}, @void}}, [@NL80211_ATTR_MESH_ID={0xa}, @chandef_params=[@NL80211_ATTR_WIPHY_FREQ={0x8}]]}, 0x30}}, 0x0) sendmsg$NL80211_CMD_GET_MPP(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000002c0)={0x28, r2, 0x5, 0x0, 0x0, {{}, {@val={0x8, 0x3, r3}, @void}}, [@NL80211_ATTR_MAC={0xa}]}, 0x28}}, 0x0) sendmsg$NL80211_CMD_SET_STATION(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x64, 0x0, 0x100, 0x70bd26, 0x25dfdbfc, {{}, {@val={0x8, 0x3, r0}, @void}}, [@NL80211_ATTR_STA_TX_POWER={0x6, 0x114, 0x7f}, @NL80211_ATTR_STA_VLAN={0x8, 0x14, r3}, @NL80211_ATTR_AIRTIME_WEIGHT={0x6, 0x112, 0x8000}, @NL80211_ATTR_LOCAL_MESH_POWER_MODE={0x8, 0xa4, 0x2}, @NL80211_ATTR_STA_PLINK_ACTION={0x5, 0x19, 0x2}, @NL80211_ATTR_STA_FLAGS2={0xc, 0x43, {0xffffffff, 0x57b}}, @NL80211_ATTR_PEER_AID={0x6, 0xb5, 0x3de}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}]}, 0x64}, 0x1, 0x0, 0x0, 0x20000000}, 0x20048081) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0x2, 0x4, 0xff, 0x7, 0x0, 0x80, 0x4, 0x8, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xb7c, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x102, 0xe8f, 0x3, 0x7, 0xfffffffffffffff9, 0x5, 0x8, 0x0, 0xc3}, 0x0, 0xe, 0xffffffffffffffff, 0x8) fsetxattr$trusted_overlay_upper(r4, &(0x7f0000000580), 0x0, 0x0, 0x0) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, 0x0) r5 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='setgroups\x00') ioctl$F2FS_IOC_FLUSH_DEVICE(r5, 0x4008f50a, &(0x7f0000000040)={0x2, 0x1000006}) 13:52:42 executing program 3: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000040)='.\x00', 0x2000003) r2 = inotify_init1(0x0) inotify_add_watch(r2, &(0x7f0000000000)='./file0\x00', 0xa4000004) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r3 = dup2(r0, r0) close_range(r3, 0xffffffffffffffff, 0x0) 13:52:42 executing program 1: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x0f\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 13:52:42 executing program 4: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x02\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 13:52:42 executing program 2: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x02\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 13:52:41 executing program 6: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) dup3(r1, r0, 0x0) 13:52:42 executing program 6: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) dup3(r1, r0, 0x0) 13:52:42 executing program 3: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000040)='.\x00', 0x2000003) r2 = inotify_init1(0x0) inotify_add_watch(r2, &(0x7f0000000000)='./file0\x00', 0xa4000004) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r3 = dup2(r0, r0) close_range(r3, 0xffffffffffffffff, 0x0) 13:52:42 executing program 5: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$TIOCPKT(r2, 0x5420, &(0x7f0000000040)) 13:52:42 executing program 1: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00H\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 13:52:42 executing program 0: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x02\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 13:52:42 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r1, 0x4b63, 0x0) sendfile(r0, r1, &(0x7f0000000040)=0x5, 0x6) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) r3 = socket$inet6_icmp(0xa, 0x2, 0x3a) ioctl$FAT_IOCTL_GET_VOLUME_ID(r3, 0x80047213, &(0x7f0000000000)) fsetxattr$trusted_overlay_upper(r2, &(0x7f0000000580), 0x0, 0x0, 0x0) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, 0x0) 13:52:42 executing program 4: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x03\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 13:52:42 executing program 2: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x03\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 13:52:56 executing program 0: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x03\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 13:52:56 executing program 6: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) dup3(r1, r0, 0x0) 13:52:56 executing program 2: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x04\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 13:52:56 executing program 4: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x04\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 13:52:56 executing program 5: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$TIOCPKT(r2, 0x5420, &(0x7f0000000040)) 13:52:56 executing program 3: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000040)='.\x00', 0x2000003) r2 = inotify_init1(0x0) inotify_add_watch(r2, &(0x7f0000000000)='./file0\x00', 0xa4000004) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r3 = dup2(r0, r0) close_range(r3, 0xffffffffffffffff, 0x0) 13:52:56 executing program 1: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00L\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 13:52:56 executing program 7: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = fork() tkill(r0, 0xb) r1 = openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x480000, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x3, 0x80, 0x4, 0x3, 0x81, 0x6, 0x0, 0xe20c, 0x0, 0x5, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x40, 0x4, @perf_bp={&(0x7f0000000000), 0x8}, 0x4040, 0x3f, 0x8000, 0x4, 0x20, 0x7, 0x3, 0x0, 0x3, 0x0, 0x4f5}, r0, 0x5, r1, 0xa) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) fsetxattr$trusted_overlay_upper(r3, &(0x7f0000000580), 0x0, 0x0, 0x0) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, 0x0) clone3(&(0x7f0000000340)={0x800, &(0x7f0000000100), &(0x7f0000000140)=0x0, &(0x7f0000000180), {0x1c}, &(0x7f00000001c0)=""/117, 0x75, &(0x7f0000000240)=""/183, &(0x7f0000000300)=[r0, r0, r0, r0, r0, r0, r0, r0], 0x8, {r1}}, 0x58) fcntl$setown(r2, 0x8, r4) 13:52:56 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000040)='.\x00', 0x2000003) r2 = inotify_init1(0x0) inotify_add_watch(r2, &(0x7f0000000000)='./file0\x00', 0xa4000004) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r3 = dup2(r0, r0) close_range(r3, 0xffffffffffffffff, 0x0) 13:52:56 executing program 5: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$TIOCPKT(r2, 0x5420, &(0x7f0000000040)) 13:52:56 executing program 4: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x05\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 13:52:56 executing program 1: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00h\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 13:52:56 executing program 6: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) dup3(r1, r0, 0x0) 13:53:08 executing program 6: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) dup3(r1, r0, 0x0) 13:53:08 executing program 1: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00l\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 13:53:08 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000040)='.\x00', 0x2000003) r2 = inotify_init1(0x0) inotify_add_watch(r2, &(0x7f0000000000)='./file0\x00', 0xa4000004) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r3 = dup2(r0, r0) close_range(r3, 0xffffffffffffffff, 0x0) 13:53:08 executing program 2: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x05\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 13:53:08 executing program 0: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x04\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 13:53:08 executing program 5: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$TIOCPKT(r2, 0x5420, &(0x7f0000000040)) 13:53:08 executing program 4: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x06\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 13:53:08 executing program 7: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) fsetxattr$trusted_overlay_upper(r0, &(0x7f0000000580), 0x0, 0x0, 0x0) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/cgroups\x00', 0x0, 0x0) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000340), r1) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'lo\x00', 0x0}) ioctl$sock_inet6_SIOCADDRT(r3, 0x890b, &(0x7f0000000080)={@ipv4={'\x00', '\xff\xff', @empty}, @private1, @ipv4={'\x00', '\xff\xff', @dev}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x65026c, r5}) sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000100)={&(0x7f0000000380)=ANY=[@ANYBLOB="34010010", @ANYRES16=r2, @ANYBLOB="00012bbd7000fbdbdf2503000000040005001400070000000000000000000000ffffe000000108000b00", @ANYRES32=r5, @ANYBLOB="ecbf4380b7f35ff68ac5fca447be61025b0649b8b6fdefb57861a758f05c30f70709505fca96006053258c"], 0x34}, 0x1, 0x0, 0x0, 0x88d0}, 0x410) sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x20, r2, 0x800, 0x70bd27, 0x25dfdbff, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e24}]}, 0x20}, 0x1, 0x0, 0x0, 0x50c09}, 0x44085) 13:53:08 executing program 5: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$TIOCPKT(r2, 0x5420, &(0x7f0000000040)) 13:53:08 executing program 0: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x05\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 13:53:08 executing program 6: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) dup3(r1, r0, 0x0) 13:53:08 executing program 7: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) fsetxattr$trusted_overlay_upper(r0, &(0x7f0000000580), 0x0, 0x0, 0x0) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, 0x0) 13:53:08 executing program 2: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x06\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 13:53:08 executing program 1: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00t\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 13:53:08 executing program 4: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\a\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 13:53:08 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000040)='.\x00', 0x2000003) r2 = inotify_init1(0x0) inotify_add_watch(r2, &(0x7f0000000000)='./file0\x00', 0xa4000004) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r3 = dup2(r0, r0) close_range(r3, 0xffffffffffffffff, 0x0) [ 1735.991628] kmemleak: 2 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 13:53:31 executing program 4: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\b\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 13:53:31 executing program 1: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00z\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 13:53:31 executing program 2: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\a\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 13:53:31 executing program 5: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$TIOCPKT(r2, 0x5420, &(0x7f0000000040)) 13:53:31 executing program 7: r0 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000100)='ns/cgroup\x00') ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000000140)) r1 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4f9f9f86f4a997f7, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) fsetxattr$trusted_overlay_upper(r2, &(0x7f0000000580), 0x0, 0x0, 0x0) r3 = fork() tkill(r3, 0xb) r4 = perf_event_open$cgroup(&(0x7f0000000080)={0x4, 0x80, 0x8, 0x1, 0xff, 0x5, 0x0, 0x172, 0x20200, 0x3, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0xf3e, 0x4, @perf_config_ext={0x7, 0x1}, 0x40c0, 0x3, 0xd8, 0x1, 0x3, 0x80, 0xb40, 0x0, 0x7fffffff}, 0xffffffffffffffff, 0x2, r1, 0x4) perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0xd3, 0x2, 0x50, 0x5, 0x0, 0x0, 0x4, 0x3, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, @perf_config_ext={0x1, 0x7}, 0x10000, 0x19, 0x0, 0x1, 0xa14, 0xb0fa, 0xfff, 0x0, 0x3, 0x0, 0x3}, r3, 0x7, r4, 0xa) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, 0x0) 13:53:31 executing program 6: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) dup3(r1, r0, 0x0) 13:53:31 executing program 0: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x06\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 13:53:31 executing program 3: perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000040)='.\x00', 0x2000003) r2 = inotify_init1(0x0) inotify_add_watch(r2, &(0x7f0000000000)='./file0\x00', 0xa4000004) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r3 = dup2(r0, r0) close_range(r3, 0xffffffffffffffff, 0x0) 13:53:31 executing program 5: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = dup3(0xffffffffffffffff, r0, 0x0) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000040)) 13:53:31 executing program 2: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\b\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 13:53:31 executing program 1: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x03*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 13:53:31 executing program 0: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\a\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 13:53:31 executing program 4: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\t\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 13:53:31 executing program 3: perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000040)='.\x00', 0x2000003) r2 = inotify_init1(0x0) inotify_add_watch(r2, &(0x7f0000000000)='./file0\x00', 0xa4000004) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r3 = dup2(r0, r0) close_range(r3, 0xffffffffffffffff, 0x0) 13:53:31 executing program 6: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) dup3(r1, r0, 0x0) 13:53:31 executing program 5: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = dup3(0xffffffffffffffff, r0, 0x0) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000040)) 13:53:31 executing program 1: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x05*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) [ 1756.161205] kmemleak: 3 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 13:53:49 executing program 1: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x06*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 13:53:49 executing program 3: perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000040)='.\x00', 0x2000003) r2 = inotify_init1(0x0) inotify_add_watch(r2, &(0x7f0000000000)='./file0\x00', 0xa4000004) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r3 = dup2(r0, r0) close_range(r3, 0xffffffffffffffff, 0x0) 13:53:49 executing program 0: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\b\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 13:53:49 executing program 5: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = dup3(0xffffffffffffffff, r0, 0x0) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000040)) 13:53:49 executing program 2: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\t\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 13:53:49 executing program 4: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\n\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 13:53:49 executing program 6: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) dup3(r1, r0, 0x0) 13:53:49 executing program 7: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) fsetxattr$trusted_overlay_upper(r0, &(0x7f0000000580), 0x0, 0x0, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000040)=0x4) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, 0x0) 13:53:49 executing program 7: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$F2FS_IOC_GARBAGE_COLLECT_RANGE(r0, 0x4018f50b, &(0x7f0000000040)={0x0, 0x1000, 0x2}) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) fsetxattr$trusted_overlay_upper(r1, &(0x7f0000000580), 0x0, 0x0, 0x0) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, 0x0) ioctl$int_in(0xffffffffffffffff, 0x5421, &(0x7f0000000000)=0x6) 13:53:49 executing program 2: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\n\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 13:53:49 executing program 5: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = dup3(r0, 0xffffffffffffffff, 0x0) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000040)) 13:53:49 executing program 1: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\a*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 13:53:49 executing program 0: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\t\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 13:53:49 executing program 6: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) dup3(r1, r0, 0x0) 13:53:49 executing program 2: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\v\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 13:53:50 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000040)='.\x00', 0x2000003) r2 = inotify_init1(0x0) inotify_add_watch(r2, &(0x7f0000000000)='./file0\x00', 0xa4000004) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r3 = dup2(r0, r0) close_range(r3, 0xffffffffffffffff, 0x0) 13:53:50 executing program 4: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\v\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) [ 1776.374664] kmemleak: 3 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 13:54:11 executing program 5: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = dup3(r0, 0xffffffffffffffff, 0x0) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000040)) 13:54:11 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000040)='.\x00', 0x2000003) r2 = inotify_init1(0x0) inotify_add_watch(r2, &(0x7f0000000000)='./file0\x00', 0xa4000004) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r3 = dup2(r0, r0) close_range(r3, 0xffffffffffffffff, 0x0) 13:54:11 executing program 6: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) dup3(0xffffffffffffffff, r0, 0x0) 13:54:11 executing program 0: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\n\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 13:54:11 executing program 1: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\t*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 13:54:11 executing program 7: sendmsg$NL80211_CMD_JOIN_MESH(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000200)={0x30, 0x0, 0x5, 0x0, 0x0, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_MESH_ID={0xa}, @chandef_params=[@NL80211_ATTR_WIPHY_FREQ={0x8}]]}, 0x30}}, 0x0) sendmsg$NL80211_CMD_GET_MPP(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000002c0)={0x28, 0x0, 0x5, 0x0, 0x0, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_MAC={0xa}]}, 0x28}}, 0x0) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_START_SCHED_SCAN(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000280)={&(0x7f00000009c0)={0x1110, 0x0, 0x0, 0x70bd29, 0x25dfdbfb, {{}, {@val={0x8, 0x3, r0}, @val={0xc, 0x99, {0x0, 0x4}}}}, [@NL80211_ATTR_TX_NO_CCK_RATE={0x4}, @NL80211_ATTR_SCHED_SCAN_MULTI={0x4}, @NL80211_ATTR_SCAN_SUPP_RATES={0x10ac, 0x7d, 0x0, 0x1, [@NL80211_BAND_6GHZ={0x1004, 0x3, "ca8d76c986c08ebbf4f75d03edc7d0465f4ebe61f5a84eba70b0b7376597778d96711d649bbc9be708869cfc08908a84dce35e8045fe86fe947b4426c50c39bc717e9d33cbf0cac39c911940451d99e3166bf71f5fe0cbb2d613160e3d1db507c12948db70851d4c31607c4aae148f04c6e4339210c3693621cddd9936b79779e65b8c1f1643d1a3891d1825e4b0486dc40616b180bed4b76fd756cc0d731d8e88bf8c2a0277d6880607894673b63b3ce7b2695764421d98d84ba1d5a8b416438f4f631c7d45040f31e1e9af86a61523a5c477adc60162db32e3524529334b30d7400c0fb8e85d2fd41e12a0bdc10341df56ba31a5f175681f408c17182986105d68d16cb931d114f82d60c1c1f03119d189d65b801a63ebabf65b1084f3a001aa736ee4aceb15030882e3a1e8aa2462284a17703298bcd0bd9b2d0a4c709ac8b455815d47c5dfbab4eb7fac1887ea4a216e73c42683eb0d7af4e4d12d6b3c7a5958e1143bc9cd03a4aaf67b0fd2b22124fc657ee10b4310b62bef937ea39d550f54891d95c27d9bd8ee35f5942b94f2318f3ecd0c20f63471984c90eaab4d4f8168b62b7ec357b676f452a9f41c864f6437009d68728141f28748b3672e9698b8d1c88f64011faf06bbfdbaed3b71c13e7a5493e63136f140c92eb53153e87ac79cc98c5ffd4fc756aa9f807f2e2367f2d1ddf4cd98a6a44123ad9429b5b9a7a52c0b3d3a4c39fd601ae64aee9362338e8d1fb2aab73b7173eb2179a6f93e1405f553985a190cfc0a2478587d21c4fa92b57996ba3f8fff94a765d3999818b74072dc2bf34cf627a9c24a9812246ea9bede97681e5c07b2bac6e65f630a07b5d89837f985b53fdf04d8f8d198feb29cc917b9d6bc89833eb45ce25c13876048934161013a7df24c965227f82309287a386ed4ce1b1bc011161d14fb01cde80570cec209bdd7e492c68bd991ad838f63bb7888150b4a762eca8d028fc6aa234779ac12712285bfb2a26fd1f6c8f7335d7cec63d953ce38407ce355347284b4571dcb996bd6b8d4bf0f58ee12667ac0ad81dd4d494a33b5be9fad76acf49dbdac277ffbdf6ba321acaccb69214a65f1a1590f846f7f57e4114901ef8eff04d7f283f2aa9cf7aec76c535d9ba71fbc1de4d97da21a9abcf43fdf5d69a28cc8529c3a9fc4317e176f641da64723949cdaf70dfaa4811d69b5156735da63c29834cb118f4b519af07100e01b88a7509524d93eaef3b814e9a1ebd660e97cc438ff5c0f37fb65c1d18c8cc097fdca0637ea8893aab29399f74db0e7c45d7468bed1ddcfbacb1b94fbd675fc95c92d83eb180973e393e88ca9e45f87aa5c06fdeafee8bb9d8dc3dfd94e1bd8c108126279cb4744df2af47c669675dd9103509a664c42b1060af99bd069102fb2d8e9600676e5e65b98a68ccdec45585be9d9beb4c941163809cc0da2ea2bb2f1566bc87aed21e4281c6451ece51333f47fd150e1feaa73219fe9719f06eacc47bbdcca70c6166cd88591ce2da007368112cdfa0837e481a2090117e9844ae97edde9d0b030446e179391ca24bcb188cb3a71d84e437f241838dece566715304d80c8f624ccc3593141f508d562e4ec01942fa08fa92ace92474ed120e5ab0f4eb8669d8933921288cdb5a551d12133256a96631eee2afb6fd6a6e0901ef673325d6f98d6688fbb6723ea789bae903ce2f52c378aa0f0a1abdd199ecb88e9387f7bf504af86c7ff75734a4d62170277ba1d1b99c2c25f89a5e064716fb22cc805892659c3e084b186d526145ce2802d44addab6480be7b4a964567d7160b3d131ed975c4d1785ba9e4d151684d0b4b8b5811c16ecc266cdf7993eea119e878305eb47c8833f7a96d7fbf2b8a9e083ce217b2d607ec8e3e206435c49a2ecaf6025947947bbb5b9c2ceec5435cda824f7602bd2868e5d57c46af6fe35ebd0697df1ec85d6c9f09d8fa888b836b268b0161fdc7fccce164fb504ce38a4cf42b64187a9b4ecbe7482a770ace10ac560c40879f0442ff0266d31d6ba4ccd14b6eec77b48ff323d16fc25a0f1f30f95a6862c4d951f08cda27a1f06b8bddbe99b8facc58a45c15c64df9f9563f1023fb65e4922fc402e040c96fffada351bdaefd79a74852453844b55093b39795bbe209af12679f2e52ba0af3f7da16921ead2df15f77130c5cf527ecb4892f0ff62d0e85d2d37ea815b35d32248622cee659fa976c1c7e396e1340645f8eb16a480867b19865586ae15c5f081a1d097c322b91035a70adb34d764af3e7aadcf2936e8440b49fe522d10fdcbf1cb9bfaf61ff85b164eccf44c73af417fe0ce48ea1aff045dfcc33c67d57363be2e92f9573d9c35f7d2fca6f092e583283b959c6644d678385454a4bc23a2f525b072c4ca8f104943e662c0f560359484c468857089c63eba02ec204d76bc3a145d7ebf4a77abd6d4ac168c44d491fcac61fcc0923ecd889141f52bd46b863271e7e33511e7eac6ad02899aca61961e1fcdb08087edfb22fd040be84342af47c5dfe11a0a7ab593cc4e9512c84ebb5c1662671a05d07b0fc20a23a9bb65c0f429a86130bc884b0968d9233c9a082334489592af8f0667166394dc61a65840bdac255d5c8657ad4f80a3adaf498e9a777756c7e4f4a6a2e754e381c1243fbe1858a2d02a408ae9b976f8e05aa04595b86a3ee0b17ec7d4b110976ae2e10eda7d38191fb95989a1820949448cc0a6500a3aba214aa338c06b5673005c25b875c78a6b97df3f52f4369ecdcd9b6072dc64c41205a79172b408aa6fb8e94f52b7f9fe7bc39d7041f24330a788c3ea3e134be39d15b571b227c2f5b12ce35a5b2447007b9aa090d5f40e0f3bf5e1e948ed2da31dc8eefb72acf33f9d47b88af0cfc8f5da197d953ddcc39d46043e255a3ed4e7b6d3f1b0b001e1e0626e9ee06bc8da63cf1f4303a05f27d54c50e5051f4560898d99646f73e7942b641a5140a69f222f23cbae897fdd018be8b92fe6f1ad4af9e69fb91ba6f19e75fa9593dbe93ed9f418c0e8cec685b7dec613469077bd8961ea93d08c117247e7aee362b6d519b700cc6bcf161e704a73d87a01c315151f76242fc439e004bb095fcff2a18697d1ab0b51e56c5c48f612614e34348a68b441373bc115279700809c1ffbac5e3dce305f0cfcc78acdca567663055dfe9337dacdc4adb76f45503ff3e3ef985ea1d27a76976df20ee71f95f1581d763fdf4c82961700e5674e2d6264dfb2048b3e13de16e1927d0cbcefd9a25e3c18bf84538c5d5f8a075b7c96c58a6652b4e295533166761e695b86d58ef7eeb3727167753c5f90b282d128f068ca7725508c52b6476cc3ab4c59399496b4fee4b3d7c5beefe0a4529b85a1db0697d1fc729539732adb00a933d039beed0b0c5ee19645553b5c33c5b849d647c2016fcfac516be732c31a5058d71bda210aea7d6ad90a624d927cfbd57e35d4df4f39205904d3c245d380b51be730855eb60f18803cfd0e2773ef458b0e439dd993237374f3a3c05712617c4bffe10df860f7c0414216a70c11118bc39b3cdd61c1584513387ccc51f9861e3659f24f9a8480a396e869dc8c9bc03aa5b37a3e92954e7dd6ec0669b819755753da9eecfa30004024e1f00225e3be73043114665e928bad8ed0b883cf4ffacfcbfa9fac3d4e4e5190c82d79f0471ce7d0901e7c86bbda490e97b967f0d6ff208777e0382b5eab616e3ebaf6d40f5bbe1df84c7931dd6d89d5829fba99095d399077483f210bd5f657b0692129fecdb05934b21a205ba9edc9aa71a8245ba036661871ab9413e775eef1b1f475cb2789c43f6c463f3c5b2b2409fc3a861940067ab380c1bd987f1f12074fcda8e58c9c5b0d85a580f34aea02be15f127e85cbe0c10c62263eddab4ea317d04abeae3ee8dbe46c8bbdcc3ad955af9177478e027aa34e6afb5dcc21c5a2957f2f080bdc0ff3b14fbaf6976222a2db915e7de812d97eeaa8ca0e1ca83073ea048a0f3db8a7febda1e881a2cac9e62af216132e085fdd2fc6bdcc298e9ac2208935093fdb13f114adea0213ee6b0329ba8ef88b40ef6b8afb36eded85088eee33bfe08d7e588d5a4429d0b10b0edac51980cb6a1d8cad9e8261b901a864959d62c17f89365950c0d0eca885d8ad8ec039b889f1c360ce00a40110f0e1c5f301fad08b40d22088f08d9750b38370141a8f861387674e3fdd303fb3e200e02e9c8ec1a2a6bdb8b1c8e87588e95f1b44c7a79a8a98fbf6c95cc73b18d522b804713514e5aad1508e2588924d2bc87055519afc7c53b3bc6a99868d2a65a2d86a0bc47a9f074b6a6df08c6ffeffd1c212eeb9dc57136d9a72fc172b2be82f75e273be188d7230c3cdb8b8420c4543e76abfff75b026f268a60f9d37f7fda6deeb509bc3272bea42139b05d2d3507ab2129ee598cd6b2340a3160e56220c5d4cf190f2744b0c35ac271f74248bd5caf3c8f579b55735f2abf26c29e739d4b3592ddae777cca29a60adf3f47b9a63da85602dda57c11c75f5f34b94a5c18d9ed530665f4e2a487edc62a5c91fbec581db318980f8408d59599e8c73337216da776bb377c07bcf7946c307605e169c7f691a2a461f57863fc52d35cb0922e84eca21e6da477765ae9f41fafedce5a7a1bd5f2f038acee91132d798dec9d0b48ab79b64a8f7aef4fff7b32f0d8a42dd27e3782da4260eaf7ef6a27a0c55e7e0f0f2470fc9382520d92e72dd44266fda984b6731963cae4962f1d03fdef72fb783f70f4afaae23ef0fde4d128b5af422c70c7e8cc7e35139a68d808e9663af05162d5791cdfda4a97b1701f2d0f4ed942ef02892ef605c5de5a486dfd9723134064eddcd8f88f31fede1599454ab99f49ea9741fe10aa5c502779064a1c095190eaca5f952d3979c30770a913596c9bff891feeae557c96b37ea576decb70d43ce10b975496175ced5d6b3e2b643f47d15a53c7544332a995c16d55579295fbef104f67cebc5a89ddf90960e12738efb85cd9a5b9f54394ac66c9ff5fc1fcdd77d94cf5a0f8ecba1099a2355203f8d64249ec21afacc8f16332fc4e35eb16c53cd468006ff56cccc6820cf9aef954f470c45c9eeaa53d11117a27b3a085cfb8282acccac567bd77f99e11758d21c22e827e948aa377701d7ab7a67d39fa5b0970b3108430766eaaca4148e1cee856370c7391c016e15110243ee03291e0ced1d0a0163e6bb7ce29d11a35d4f11d5b7751b70fedd434fbff57883e0e6cc5ca930d38a0a0fe3183690071602964785210fdb213b9b92104ebadce39d08e767a316fcea32e15f2053ff076ef9cb92688cc8379706333aa0a7686ad842ddc9e018b7d6338023fd10e5b50a0a0ad9c1039d3a346122d0c4acd22e83c2dc2ab3e3f12dd0b633e999b9acb81739126905bad54fb2af1e5042400c24faa826a698a24657db805239eb669bf85d06373541655ddbbcd770d62646dd0c9185668a94027d8e013e2ca43621b97fa069ad7a06fe049d4fe1cbd0272554e8a26189f622a2c0adafc35df191e66bf1cf5e99655de282d88a836ebc6906066993468e8a72d67654730e38d5499345fa20b6bb574f8dd775586142fa1359b6458ef1e33c36318d4b7c2abbf97b673ecfc3c5966c31c08f603d4206d1e34451dd1d97949909e68a473d22b2f98936c9b9d1eed67e0dd4fbd207257d2251bb8e39a38e3ed34dc3ac9317156495bc2db08559c46ca77963e4b7614a53713ea2d5e82c9a7ebcaa562c9bd6ea6a85a46c4912958e6401b17d93e9cfdf9119316"}, @NL80211_BAND_60GHZ={0x73, 0x2, "f10030ea3507c2467c1b80ee20bbe8adcfa9d2f5bfd1805a67d060ff81f325ba05e91144ee0b3546c9bced4bc9d279388fe130df35b9b89cbf86f6c7fdc405f9989c4d572321f3bcb6ef2c66e82d5c6ba25a006f54c61ee48ce210c9f219441f826ca36502f1a9a5e0335d26e9a52d"}, @NL80211_BAND_5GHZ={0x2d, 0x1, "a3cfcd3291ab46d9cabf0c3b43b006a12250da965eac95036a65ab5486929b534b4c4f3607d3eda3a3"}]}, @NL80211_ATTR_SCHED_SCAN_MULTI={0x4}, @NL80211_ATTR_SCAN_FLAGS={0x8, 0x9e, 0x1004}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_BSSID={0xa, 0xf5, @from_mac}, @NL80211_ATTR_MEASUREMENT_DURATION_MANDATORY={0x4}, @NL80211_ATTR_MAC={0xa}]}, 0x1110}}, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r1, 0x4b63, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x78900, 0x154) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r2, 0xc0189373, &(0x7f0000000140)={{0x1, 0x1, 0x18, r1, {0xaff}}, './file1\x00'}) ioctl$TIOCVHANGUP(r3, 0x5437, 0x0) ioctl$KDFONTOP_GET(r2, 0x4b72, &(0x7f00000000c0)={0x1, 0x1, 0x1, 0x12, 0xdf, &(0x7f00000005c0)}) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) ioctl$FS_IOC_FSSETXATTR(r4, 0x401c5820, &(0x7f0000000000)={0x8020}) close(r4) unlink(&(0x7f0000000080)='./file1\x00') ioctl$TIOCGETD(r1, 0x5424, &(0x7f0000000000)) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x40040, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = syz_open_dev$tty1(0xc, 0x4, 0x1) fsetxattr$trusted_overlay_upper(r5, &(0x7f0000000580), 0x0, 0x0, 0x0) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, 0x0) 13:54:11 executing program 2: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\f\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 13:54:11 executing program 4: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\f\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 13:54:11 executing program 4: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\r\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 13:54:11 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000040)='.\x00', 0x2000003) r2 = inotify_init1(0x0) inotify_add_watch(r2, &(0x7f0000000000)='./file0\x00', 0xa4000004) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r3 = dup2(r0, r0) close_range(r3, 0xffffffffffffffff, 0x0) 13:54:11 executing program 6: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) dup3(0xffffffffffffffff, r0, 0x0) 13:54:11 executing program 5: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = dup3(r0, 0xffffffffffffffff, 0x0) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000040)) 13:54:11 executing program 2: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\r\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 13:54:11 executing program 0: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\v\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 13:54:11 executing program 1: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\n*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 13:54:12 executing program 7: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x44240, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) fsetxattr$trusted_overlay_upper(r0, &(0x7f0000000580), 0x0, 0x0, 0x0) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, 0x0) 13:54:12 executing program 4: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x0e\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 13:54:12 executing program 6: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) dup3(0xffffffffffffffff, r0, 0x0) [ 1799.476856] kmemleak: 3 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 13:54:34 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000040)='.\x00', 0x2000003) r2 = inotify_init1(0x0) inotify_add_watch(r2, &(0x7f0000000000)='./file0\x00', 0xa4000004) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r3 = dup2(r0, r0) close_range(r3, 0xffffffffffffffff, 0x0) 13:54:34 executing program 0: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\f\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 13:54:34 executing program 6: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) dup3(r0, 0xffffffffffffffff, 0x0) 13:54:34 executing program 2: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x0e\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 13:54:34 executing program 1: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\f*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 13:54:34 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000140)={&(0x7f0000000040)={0xb8, 0x1b, 0x1, 0x70bd28, 0x25dfdbfc, {0x1}, [@generic="22a1c1cb3ebcb58b0138419097dfd688f7942476cff30eeb98f852385a52773b8fea955546f148821506f8e1b7b17c106a97c6f5c6bf7d2759eabc9bf5a1969a558d9835d7495f3379ff0b0a4e04263f3f0ed75709d301ea0c6d122f4d28a64c74a1607b1b8d8505bee0524cecad37bc1b09c7d681906c97882b666e9cc7f0e38c3a1071894daf21e0ff1fe144f47743c7036175994b1da5fa91e7dc454846", @typed={0x4}]}, 0xb8}, 0x1, 0x0, 0x0, 0x10}, 0x4040040) ioctl$int_in(r0, 0x5452, &(0x7f0000000100)=0x6) fsetxattr$trusted_overlay_upper(r1, &(0x7f0000000580), 0x0, 0x0, 0x0) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, 0x0) 13:54:34 executing program 5: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) dup3(r1, r0, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000040)) 13:54:34 executing program 4: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x0f\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 13:54:34 executing program 6: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) dup3(r0, 0xffffffffffffffff, 0x0) 13:54:34 executing program 2: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x0f\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 13:54:34 executing program 0: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\r\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 13:54:34 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, 0x0, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000040)='.\x00', 0x2000003) r2 = inotify_init1(0x0) inotify_add_watch(r2, &(0x7f0000000000)='./file0\x00', 0xa4000004) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r3 = dup2(r0, r0) close_range(r3, 0xffffffffffffffff, 0x0) 13:54:46 executing program 4: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x11\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 13:54:46 executing program 5: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) dup3(r1, r0, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000040)) 13:54:46 executing program 2: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x11\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 13:54:46 executing program 0: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x0e\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 13:54:46 executing program 1: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\r*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 13:54:46 executing program 6: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) dup3(r0, 0xffffffffffffffff, 0x0) 13:54:46 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, 0x0, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000040)='.\x00', 0x2000003) r2 = inotify_init1(0x0) inotify_add_watch(r2, &(0x7f0000000000)='./file0\x00', 0xa4000004) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r3 = dup2(r0, r0) close_range(r3, 0xffffffffffffffff, 0x0) 13:54:46 executing program 7: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000600)={0xa, 0x0, 0x0, @mcast2, 0x3}, 0x1c) fcntl$getownex(r1, 0x10, &(0x7f0000000040)={0x0, 0x0}) fcntl$lock(0xffffffffffffffff, 0x26, &(0x7f0000000000)={0x0, 0x1, 0x4, 0x4000009, r2}) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0), 0x202000, 0x0) perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x9, 0x7f, 0x4, 0x38, 0x0, 0x98, 0x48, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x8000, 0x1, @perf_bp={&(0x7f0000000000), 0x2}, 0x2000, 0x4, 0x3, 0x3, 0xc8, 0x3, 0x2, 0x0, 0x6, 0x0, 0x9}, r2, 0x0, r3, 0x1) fsetxattr$trusted_overlay_upper(r0, &(0x7f0000000580), 0x0, 0x0, 0x0) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, 0x0) 13:54:46 executing program 7: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = socket$unix(0x1, 0x5, 0x0) close_range(r1, r0, 0x0) fsetxattr$trusted_overlay_upper(r0, &(0x7f0000000580), 0x0, 0x0, 0x0) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, 0x0) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r2, 0x4b63, 0x0) dup2(r2, r0) 13:54:46 executing program 1: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x0f*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 13:54:46 executing program 4: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x12\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 13:54:46 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, 0x0, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000040)='.\x00', 0x2000003) r2 = inotify_init1(0x0) inotify_add_watch(r2, &(0x7f0000000000)='./file0\x00', 0xa4000004) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r3 = dup2(r0, r0) close_range(r3, 0xffffffffffffffff, 0x0) 13:54:46 executing program 5: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) dup3(r1, r0, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f0000000040)) 13:54:46 executing program 2: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x12\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 13:54:46 executing program 0: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x0f\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 13:54:47 executing program 1: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00@*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 13:55:00 executing program 2: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x14\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 13:55:00 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x0) creat(0x0, 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000040)='.\x00', 0x2000003) r2 = inotify_init1(0x0) inotify_add_watch(r2, &(0x7f0000000000)='./file0\x00', 0xa4000004) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r3 = dup2(r0, r0) close_range(r3, 0xffffffffffffffff, 0x0) 13:55:00 executing program 0: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x11\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 13:55:00 executing program 7: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) fsetxattr$trusted_overlay_upper(r0, &(0x7f0000000580), 0x0, 0x0, 0x0) ioctl$SG_GET_SCSI_ID(0xffffffffffffffff, 0x2276, &(0x7f0000000000)) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, 0x0) 13:55:00 executing program 4: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x14\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 13:55:00 executing program 5: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$TIOCPKT(r2, 0x5420, 0x0) 13:55:00 executing program 1: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00H*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 13:55:00 executing program 6: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x0e\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 13:55:00 executing program 6: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, 0x0, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000040)='.\x00', 0x2000003) r2 = inotify_init1(0x0) inotify_add_watch(r2, &(0x7f0000000000)='./file0\x00', 0xa4000004) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r3 = dup2(r0, r0) close_range(r3, 0xffffffffffffffff, 0x0) 13:55:00 executing program 0: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x12\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 13:55:00 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x0) creat(0x0, 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000040)='.\x00', 0x2000003) r2 = inotify_init1(0x0) inotify_add_watch(r2, &(0x7f0000000000)='./file0\x00', 0xa4000004) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r3 = dup2(r0, r0) close_range(r3, 0xffffffffffffffff, 0x0) 13:55:00 executing program 5: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$TIOCPKT(r2, 0x5420, 0x0) 13:55:00 executing program 4: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*/\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 13:55:00 executing program 1: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00L*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 13:55:00 executing program 2: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*/\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 13:55:00 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r2, 0x4b63, 0x0) ioctl$TIOCVHANGUP(r1, 0x5437, 0x0) ioctl$VT_DISALLOCATE(r2, 0x5608) fsetxattr$trusted_overlay_upper(r1, &(0x7f0000000580), 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000040)=ANY=[@ANYBLOB="0100000100000000001ce846735aa63577d58ab5c29c7d3b000000"]) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, 0x0) 13:55:01 executing program 6: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\f\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 13:55:16 executing program 6: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\t\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 13:55:16 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = dup3(r1, 0xffffffffffffffff, 0x0) ioctl$TIOCPKT(r2, 0x5420, &(0x7f0000000040)) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r3, 0x4b63, 0x0) r4 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000300)='.pending_reads\x00', 0x400082, 0x0) r5 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r5, 0x4b63, 0x0) r6 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r7 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r8 = dup3(r7, r6, 0x0) ioctl$TIOCPKT(r8, 0x5420, &(0x7f0000000040)) r9 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r9, 0x4b63, 0x0) io_submit(0x0, 0x6, &(0x7f0000000540)=[&(0x7f0000000140)={0x0, 0x0, 0x0, 0xa, 0x2, r0, &(0x7f0000000040)="2afa0a61d77f8f2c2834506c21f620ea8b6dc86de7cb07de7780bd2d65a23ab9c649fd9904d31f26134e03c98f682f1ef834887aa0903a06df9fc249a1ce48179d261d04faed4f6f03a4922b63be648967cdcbb48e7cc488e27d986d42d32d855acbf47f62f2cd5e2b9a58c8d6e58ad0d13dd129ae5c7c0f838f67415a73f27747374b2499aac5b66b35907cff734d03737a0e0fb0eb2ff3577d97c385fb3cef5a49328907f97cf77b79268085cdff2eb8c0f8d7aec6062ba79dc29d0c72e3286f6ccb00baac04ed8776c090333e13", 0xcf, 0xa479}, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x1, 0x2, r0, &(0x7f0000000180)="317ddc01c13526dd5151a04cf501204243717dfb84c410a502d321f99b5e2751113eda6330324921f87b389315fef37562b4d2de107a75a1adc9f2218ad0921d6efcb2361eb588edafa354f0c7d3b803558a97dc63ec2a667c9781a7413c05abcceef9192fb2a57ef1650196c077a8618985edff756c8515cb95c027d4f2e1f3503074408b1d83daacffeb1eb7568ab200ae5e7c02dceb650df01b03a2b562b9eddbc6bf9f8f53b3b0403e2a043712e4175501a012712571abb1f17c2dde6708305d095c8fc712e29b77d1c26b88", 0xce, 0xc1, 0x0, 0x1, r2}, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x1, 0x5, r3, &(0x7f00000002c0)="b70c05d5c50e9b33a98fa9812385b7462e2636c15a0c8bee1f74c90ed99cb027fd8ec4d62e14857605216c61d3c29b084d12a6375c1f2bcbabd2", 0x3a, 0xae, 0x0, 0x3, r4}, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x3, r5, &(0x7f0000000380)="077ad2e38889750fb4a8f5982e57b238e43be4388d636b6695784378cf6fed9515113a575414cb6df7a7e26cecf4e79204ec8ecfbe511f719fa5285efca2dfb24e78f9181c10944159a9e40e5ae2bbff0d26739ad61376d23ba5c2076c909610d813c898646b559c8da9d5abf5dbcca303b9", 0x72, 0x7, 0x0, 0x0, r8}, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x8, 0xff, r9, &(0x7f0000000440)="967d7c88a9e781228cc34f74750c385adcc3b34a44da7c1252f23bc920464280e437bf06fe8defe347b4df004065802c0caa4cd063a45cf9ebf287151e79abebb8794f6d0241f4fe5a2919ab1fb0c5e31399", 0x52, 0x584, 0x0, 0x3}, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x5, 0x3, r0, &(0x7f00000005c0)="d5205fcba0df8a3f22d9c864fa159484ec4fa8c035ecbbb1b757026631ef478e80524bab68bef8dab1b6ac3abbbb764257a0ae3fb076abcadcec3903bd2d526fd312772078f2f9f5b90a1c9718edea35e27c308931cd4547fd74b5dc1fa22d81a72c0c4cf29c9a7672f5ab68a26c63afb8428a8b47b3230969cbc0c4ad5e650ab997ec3f7f64f0a0f69938a4576b323ca39e0094d22c8bd165cf20d933aa635648f4bec9944dbd8c70304af431c606a49188bc6926905fcc4bfcd32867dd55fee21c3b3d8e803abe9b8653042b", 0xcd, 0x17, 0x0, 0x1}]) creat(&(0x7f0000000000)='./file0\x00', 0x51) r10 = syz_open_dev$tty1(0xc, 0x4, 0x1) fsetxattr$trusted_overlay_upper(r10, &(0x7f0000000580), 0x0, 0x0, 0x0) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, 0x0) 13:55:16 executing program 4: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*2\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 13:55:16 executing program 5: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$TIOCPKT(r2, 0x5420, 0x0) 13:55:16 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x0) creat(0x0, 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000040)='.\x00', 0x2000003) r2 = inotify_init1(0x0) inotify_add_watch(r2, &(0x7f0000000000)='./file0\x00', 0xa4000004) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r3 = dup2(r0, r0) close_range(r3, 0xffffffffffffffff, 0x0) 13:55:16 executing program 0: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x14\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 13:55:16 executing program 2: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*2\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 13:55:16 executing program 1: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00h*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 13:55:16 executing program 4: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcb\t\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 13:55:16 executing program 6: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*2\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 13:55:16 executing program 5: perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000040)='.\x00', 0x2000003) r2 = inotify_init1(0x0) inotify_add_watch(r2, &(0x7f0000000000)='./file0\x00', 0xa4000004) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r3 = dup2(r0, r0) close_range(r3, 0xffffffffffffffff, 0x0) 13:55:16 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) inotify_init1(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='.\x00', 0x2000003) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000000)='./file0\x00', 0xa4000004) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = dup2(r0, r0) close_range(r2, 0xffffffffffffffff, 0x0) 13:55:16 executing program 0: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*/\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 13:55:16 executing program 7: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000), 0x301ac0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) fsetxattr$trusted_overlay_upper(r1, &(0x7f0000000580), 0x0, 0x0, 0x0) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, 0x0) 13:55:16 executing program 1: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00l*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 13:55:16 executing program 2: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcb\t\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 13:55:16 executing program 0: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*2\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 13:55:16 executing program 6: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*2\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 13:55:30 executing program 5: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x03\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 13:55:30 executing program 6: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*2\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 13:55:30 executing program 0: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcb\t\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 13:55:30 executing program 2: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x14D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 13:55:30 executing program 4: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x14D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 13:55:30 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) inotify_init1(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='.\x00', 0x2000003) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000000)='./file0\x00', 0xa4000004) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = dup2(r0, r0) close_range(r2, 0xffffffffffffffff, 0x0) 13:55:30 executing program 1: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00t*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 13:55:30 executing program 7: perf_event_open(&(0x7f0000001d80)={0x4, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x1}, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) fsetxattr$trusted_overlay_upper(r0, &(0x7f0000000580), 0x0, 0x0, 0x0) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, 0x0) r1 = syz_io_uring_complete(0x0) r2 = socket$inet(0x2, 0x3, 0xff) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) sendmsg$inet(r2, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000280)="b683ae7d0000000000000000000000000000000200000000", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @broadcast}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x40}, 0x0) r5 = socket$inet(0x2, 0x3, 0xff) r6 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) sendmsg$inet(r5, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000280)="b683ae7d0000000000000000000000000000000200000000", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r7, @broadcast}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x40}, 0x0) r8 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r8, 0x4b63, 0x0) ioctl$KDGKBMETA(r8, 0x4b62, &(0x7f00000002c0)) sendmsg$ETHTOOL_MSG_DEBUG_GET(r1, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000000c0)={&(0x7f0000000300)=ANY=[@ANYBLOB="260000e26bd008000000000000af0000ca61ff20bfd18105a329a92a24d1fd4d3fb6f85d3965dd37aa4fad8ab576613c25d9a5eae0c6a25d750975f5d491b605299acc68a12581b69a78e9000000002bff0b4cc0e3f2516bff9ef68512d26cecc57b641b3c77bf5cbe54220f144a7f9374fd99b705837b2cce72281138ecd15a33dba1f4", @ANYRES16=0x0, @ANYBLOB="00022cbd7000fedbdf250700000004000180"], 0x18}, 0x1, 0x0, 0x0, 0x8c0}, 0x40) 13:55:30 executing program 6: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00H*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 13:55:30 executing program 5: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x05\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 13:55:30 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) inotify_init1(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='.\x00', 0x2000003) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000000)='./file0\x00', 0xa4000004) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = dup2(r0, r0) close_range(r2, 0xffffffffffffffff, 0x0) 13:55:30 executing program 2: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa62D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 13:55:31 executing program 0: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x14D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 13:55:31 executing program 1: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00z*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 13:55:31 executing program 4: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa62D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 13:55:31 executing program 7: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$TIOCPKT(r2, 0x5420, &(0x7f0000000040)) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x16001, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={&(0x7f0000000180), 0xa}, 0x1, 0xfffffffffffffffc, 0x9, 0x0, 0x3f, 0x4, 0x22, 0x0, 0xfe, 0x0, 0x800}, 0x0, 0x0, r2, 0x0) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) fsetxattr$trusted_overlay_upper(r3, &(0x7f0000000580), 0x0, 0x0, 0x0) ioctl$PIO_UNIMAP(r3, 0x4b67, &(0x7f00000000c0)={0x3, &(0x7f0000000080)=[{0x3, 0x6f4}, {0x5, 0x1f}, {0x4, 0xfffc}]}) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, 0x0) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/consoles\x00', 0x0, 0x0) ioctl$BTRFS_IOC_DEFRAG_RANGE(r4, 0x40309410, &(0x7f0000000040)={0x8, 0x5, 0x1, 0x3, 0x1, [0x849, 0x0, 0x80000000, 0xffff]}) [ 1877.769994] kmemleak: 2 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 13:55:52 executing program 6: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000480)=':,^(\x00') openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x0) r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) r2 = inotify_init1(0x0) inotify_add_watch(r2, &(0x7f0000000040)='.\x00', 0x2000003) r3 = inotify_init1(0x0) inotify_add_watch(r3, &(0x7f0000000000)='./file0\x00', 0xa4000004) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r4 = dup2(r1, r1) close_range(r4, 0xffffffffffffffff, 0x0) 13:55:52 executing program 5: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000480)=':,^(\x00') openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x0) r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) r2 = inotify_init1(0x0) inotify_add_watch(r2, &(0x7f0000000040)='.\x00', 0x2000003) inotify_init1(0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r3 = dup2(r1, r1) close_range(r3, 0xffffffffffffffff, 0x0) 13:55:52 executing program 7: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) fsetxattr$trusted_overlay_upper(r0, &(0x7f0000000580), 0x0, 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r3 = dup3(r2, r1, 0x0) ioctl$TIOCPKT(r3, 0x5420, &(0x7f0000000040)) r4 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x9, 0x4, &(0x7f0000000400)=[{&(0x7f0000000100)="bb04b518cbcb4ccea88c543d0d2aa0a8c13fee4a1d329132e9919fca57b92fc238ea6385a2f0d1bfa24f3dd2f4a7066b8df372cd2c700b9e99e108187e20c0a3cb665fa410e0fb1c62160dbddd1c2f44270776f4c0373a87819c8450e9f938bf8236274f1b88412587553246ba89d2c923f90069236ac6ba6a2a590a4e9c961588ab8d97ad1d1f6dd66bbd86d9cb318b0e79963420c358d682e4825294174f8c2969573977d3e5c824960bc2ec9e205f12fa0102626ff423df3b9a5f2024af3a4e1b07cc46868ec18623796f967427b3556f570f9aab9acd915faca69da8d33a61619f38a4d7869a", 0xe8, 0x5}, {&(0x7f0000000200)="2928d4a2f6ec93c5aa003e3d365405e631b45a9b08d9cca6b0fe296e2b505316b7d73fbb99dda1a1acd6a42125662cae64e43322f6c803db3db8d947dfe80041448d182133cca3953d2d389a501f7b77d6fef8ebf63eb66748dba2bf69215a326f57ae2fd3a7c8471f3373e10ae6f564e1754fb06f7eab191fc55b6e47cf971566f5f3e8dedf3aac7f9605407a4fbc1cf3a304ac22d53dbac48f18d5f11dfa358d809c1626ef472cd2c234af16e48abe4be562d044bb50c30083784f0c0e3a2e6a9c4816c1cfeca59b79a0ed36", 0xcd, 0x8}, {&(0x7f0000000300)="e320303d20906f802b21c3e9ef710a9eda77480e9c7d8fc1e11631dcab9af214493ea88cffd8ea9f8840adb0466bef5ba71f24f366884d7dbf881198383d1ea45bfb9d3df6fe8fdeec4ed15b5e9d1f36fe7c75cf8230f30db8a9560151336864f94108b9", 0x64, 0x3}, {&(0x7f0000000380)="d23cbfc00782e225b66c3fc7de56c849276492a81561020804e62960e1bbc3bfa05b326bed4aaab2fd8d98e0eabb1c7f43ee730cc6fb9ef396f0ac88b1ef35869d2621649acea110dd03b165", 0x4c, 0x7}], 0x20010, &(0x7f0000000480)={[{@shortname_mixed}, {@numtail}, {@uni_xlate}, {@fat=@gid={'gid', 0x3d, 0xee01}}], [{@euid_lt}]}) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0x8000, &(0x7f0000000500)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r4}, 0x2c, {[{@version_9p2000}], [{@obj_type={'obj_type', 0x3d, '\\'}}]}}) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, 0x0) 13:55:52 executing program 1: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\xff*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 13:55:52 executing program 4: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D,\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 13:55:52 executing program 2: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x0f\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 13:55:52 executing program 0: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa62D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 13:55:52 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, 0x0, 0x2000003) r2 = inotify_init1(0x0) inotify_add_watch(r2, &(0x7f0000000000)='./file0\x00', 0xa4000004) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r3 = dup2(r0, r0) close_range(r3, 0xffffffffffffffff, 0x0) [ 1885.954719] 9pnet: Insufficient options for proto=fd [ 1885.984352] 9pnet: Insufficient options for proto=fd 13:55:52 executing program 1: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x02*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 13:55:52 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, 0x0, 0x2000003) r2 = inotify_init1(0x0) inotify_add_watch(r2, &(0x7f0000000000)='./file0\x00', 0xa4000004) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r3 = dup2(r0, r0) close_range(r3, 0xffffffffffffffff, 0x0) 13:55:52 executing program 0: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x0f\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 13:55:52 executing program 4: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x0f\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 13:55:52 executing program 2: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x10\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 13:55:52 executing program 5: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$TIOCPKT(r2, 0x5420, &(0x7f0000000040)) (fail_nth: 1) 13:55:52 executing program 7: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4, 0x8}}, 0x0, 0x10000, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = fork() r2 = openat2(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)={0x4000, 0x82, 0x8}, 0x18) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xe1, 0x2, 0x4, 0x9, 0x0, 0x3, 0x593c0, 0x7, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x9, 0x1, @perf_bp={&(0x7f0000000000), 0x6}, 0x8000, 0x6, 0x9, 0x1, 0x5, 0x5f85, 0x101, 0x0, 0x1ff, 0x0, 0x5}, r1, 0xe, r2, 0xa) fsetxattr$trusted_overlay_upper(r0, &(0x7f0000000580), 0x0, 0x0, 0x0) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, 0x0) 13:55:52 executing program 6: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) dup3(r1, r0, 0x0) (fail_nth: 1) [ 1886.191019] FAULT_INJECTION: forcing a failure. [ 1886.191019] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1886.193543] CPU: 0 PID: 11817 Comm: syz-executor.5 Not tainted 5.10.153 #1 [ 1886.195000] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1886.196715] Call Trace: [ 1886.197271] dump_stack+0x107/0x167 [ 1886.198038] should_fail.cold+0x5/0xa [ 1886.198834] _copy_to_user+0x2e/0x180 [ 1886.199645] simple_read_from_buffer+0xcc/0x160 [ 1886.200639] proc_fail_nth_read+0x198/0x230 [ 1886.201544] ? proc_sessionid_read+0x230/0x230 [ 1886.202496] ? security_file_permission+0x24e/0x570 [ 1886.203531] ? perf_trace_initcall_start+0x101/0x380 [ 1886.204598] ? proc_sessionid_read+0x230/0x230 [ 1886.205573] vfs_read+0x228/0x580 [ 1886.206325] ksys_read+0x12d/0x260 [ 1886.207068] ? __ia32_sys_pwrite64+0x230/0x230 [ 1886.208029] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1886.209130] do_syscall_64+0x33/0x40 [ 1886.209918] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1886.210985] RIP: 0033:0x7f2ce8bfa69c [ 1886.211765] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 1886.215576] RSP: 002b:00007f2ce61bd170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1886.217171] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f2ce8bfa69c [ 1886.218654] RDX: 000000000000000f RSI: 00007f2ce61bd1e0 RDI: 0000000000000006 [ 1886.220137] RBP: 00007f2ce61bd1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1886.221631] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 13:55:52 executing program 0: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x10\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) [ 1886.223115] R13: 00007fffe701289f R14: 00007f2ce61bd300 R15: 0000000000022000 13:55:52 executing program 4: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x10\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) [ 1886.252864] FAULT_INJECTION: forcing a failure. [ 1886.252864] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1886.255395] CPU: 1 PID: 11823 Comm: syz-executor.6 Not tainted 5.10.153 #1 [ 1886.256812] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1886.258495] Call Trace: [ 1886.259039] dump_stack+0x107/0x167 [ 1886.259788] should_fail.cold+0x5/0xa [ 1886.260574] _copy_to_user+0x2e/0x180 [ 1886.261361] simple_read_from_buffer+0xcc/0x160 [ 1886.262319] proc_fail_nth_read+0x198/0x230 [ 1886.263207] ? proc_sessionid_read+0x230/0x230 [ 1886.264132] ? security_file_permission+0x24e/0x570 [ 1886.265174] ? perf_trace_initcall_start+0x101/0x380 [ 1886.266223] ? proc_sessionid_read+0x230/0x230 [ 1886.267153] vfs_read+0x228/0x580 [ 1886.267869] ksys_read+0x12d/0x260 [ 1886.268595] ? __ia32_sys_pwrite64+0x230/0x230 [ 1886.269542] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1886.270610] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1886.271661] do_syscall_64+0x33/0x40 [ 1886.272417] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1886.273466] RIP: 0033:0x7fb68f0fc69c [ 1886.274226] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 1886.277963] RSP: 002b:00007fb68c6bf170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1886.279502] RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 00007fb68f0fc69c [ 1886.280952] RDX: 000000000000000f RSI: 00007fb68c6bf1e0 RDI: 0000000000000006 [ 1886.282394] RBP: 00007fb68c6bf1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1886.283839] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1886.285290] R13: 00007fffa0f0fa7f R14: 00007fb68c6bf300 R15: 0000000000022000 13:55:52 executing program 2: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x14\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 13:55:52 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, 0x0, 0x2000003) r2 = inotify_init1(0x0) inotify_add_watch(r2, &(0x7f0000000000)='./file0\x00', 0xa4000004) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r3 = dup2(r0, r0) close_range(r3, 0xffffffffffffffff, 0x0) [ 1899.826107] kmemleak: 2 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 13:56:14 executing program 4: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x14\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 13:56:14 executing program 1: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x03*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 13:56:14 executing program 0: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x14\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 13:56:14 executing program 7: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0xa5, 0x20, 0x0, 0x9, 0x0, 0x6, 0x200, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x2, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x8, 0xcddec091424755c8, @perf_config_ext={0x3, 0x412}, 0x10005, 0x7, 0x7f, 0x6, 0xae0f, 0x400, 0x7ff, 0x0, 0x81, 0x0, 0x3}, 0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x3) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x450002, 0x0) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r3, 0x4b63, 0x0) write$binfmt_elf64(r3, &(0x7f00000005c0)={{0x7f, 0x45, 0x4c, 0x46, 0x8, 0xff, 0x8, 0x1f, 0x3, 0x2, 0x6, 0x200, 0x2e7, 0x40, 0x3a4, 0x9, 0xfffc, 0x38, 0x2, 0x1, 0xdd, 0x6}, [{0x4, 0xffff, 0x3, 0x800, 0x1550, 0xd8, 0x2, 0xbbd9}, {0x2, 0x3fa, 0x5, 0x5, 0x9ed2, 0x7, 0x2400000000, 0xffffffff}], "0cd6b7fccf7eb5abad2917d7a62a05111d", ['\x00', '\x00', '\x00']}, 0x3c1) r4 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000180), 0x208600) fcntl$dupfd(r1, 0x0, r4) ioctl$PIO_UNISCRNMAP(r2, 0x4b6a, &(0x7f0000000080)="33c003751f52dc853fb720b3ba0f5d1fbe16a9d0d36ce61999c704c7d150962a67fd481d14722865455f7b0966478c8c85b6f432015e77a15c5011f275ee7568fe3a3a50d92c7df8b251480a43850ef452e8fea485f1da5e15350a4e6c6c92697f9b99b9f8cf08d04c91139e9288f817f3a7c2c51e702822b05c3b07828bc89c6c887d576477fa7b78afeffb0239c292f4a1d6710ae14e2640be0971c60b8226a27eb54bcc801dbe65cbdb5407f096060f01f18fe45a8c5f4ff24b820262e314c78234626952fa733c793e5367ec879b6744f4fb90cec382a0c5b72b7456edea21be083c0c1fa546800960c2401aa3cd3de0") fsetxattr$trusted_overlay_upper(r1, &(0x7f0000000580), 0x0, 0x0, 0x0) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, 0x0) r5 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) ioctl$FS_IOC_FSSETXATTR(r5, 0x401c5820, &(0x7f0000000000)={0xe8ea, 0x5, 0x10, 0x2, 0x7}) close(r0) 13:56:14 executing program 6: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) dup3(r1, r0, 0x0) 13:56:14 executing program 2: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7#:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 13:56:14 executing program 5: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$TIOCPKT(r2, 0x5420, &(0x7f0000000040)) 13:56:14 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000040)='.\x00', 0x0) r2 = inotify_init1(0x0) inotify_add_watch(r2, &(0x7f0000000000)='./file0\x00', 0xa4000004) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r3 = dup2(r0, r0) close_range(r3, 0xffffffffffffffff, 0x0) 13:56:14 executing program 5: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$TIOCPKT(r2, 0x2, &(0x7f0000000040)) [ 1921.509499] kmemleak: 1 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 13:56:35 executing program 6: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) dup3(r1, r0, 0xfeffffff) 13:56:35 executing program 7: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) fsetxattr$trusted_overlay_upper(r0, &(0x7f0000000580), 0x0, 0x0, 0x0) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, 0x0) r1 = openat2$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={0x10001, 0x44, 0x1d}, 0x18) clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) timerfd_settime(0xffffffffffffffff, 0x1, &(0x7f0000000100)={{0x77359400}, {r2, r3+10000000}}, &(0x7f0000000140)) ioctl$TUNSETVNETBE(0xffffffffffffffff, 0x400454de, &(0x7f0000000080)) dup(r1) 13:56:35 executing program 2: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7%:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 13:56:35 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000040)='.\x00', 0x0) r2 = inotify_init1(0x0) inotify_add_watch(r2, &(0x7f0000000000)='./file0\x00', 0xa4000004) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r3 = dup2(r0, r0) close_range(r3, 0xffffffffffffffff, 0x0) 13:56:35 executing program 4: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7#:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 13:56:35 executing program 1: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x04*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 13:56:35 executing program 0: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7#:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 13:56:35 executing program 5: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$TIOCPKT(r2, 0x4b47, &(0x7f0000000040)) 13:56:35 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000040)='.\x00', 0x0) r2 = inotify_init1(0x0) inotify_add_watch(r2, &(0x7f0000000000)='./file0\x00', 0xa4000004) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r3 = dup2(r0, r0) close_range(r3, 0xffffffffffffffff, 0x0) 13:56:35 executing program 2: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7*:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 13:56:35 executing program 5: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$TIOCPKT(r2, 0x4b49, &(0x7f0000000040)) 13:56:35 executing program 4: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7%:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 13:56:35 executing program 0: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7%:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 13:56:35 executing program 6: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) dup3(r1, r0, 0xfffffffe) 13:56:35 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={&(0x7f00000000c0), 0x5}, 0x0, 0x0, 0x100000, 0x0, 0x0, 0x0, 0x2, 0x0, 0x100000, 0x0, 0x7f}, 0x0, 0x20000000000005, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000880)='./file0\x00', 0x180, 0x20) perf_event_open(&(0x7f0000000800)={0x0, 0x80, 0x7, 0x4, 0x80, 0x40, 0x0, 0x9, 0x2822, 0x8, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3ff, 0x4, @perf_bp={&(0x7f00000007c0), 0x2}, 0x6400, 0x200, 0x1, 0x3, 0x6, 0x5, 0xd79, 0x0, 0x2}, 0x0, 0x4, r1, 0xb) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) fsetxattr$trusted_overlay_upper(r2, &(0x7f0000000580), 0x0, 0x0, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r5 = dup3(r4, r3, 0x0) ioctl$TIOCPKT(r5, 0x5420, &(0x7f0000000040)) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000000)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r5, 0x40182103, &(0x7f0000000080)={r6, 0x3, r0, 0x80000001}) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, 0x0) r7 = syz_mount_image$vfat(&(0x7f0000000100), &(0x7f0000000180)='./file0\x00', 0x1, 0x6, &(0x7f00000006c0)=[{&(0x7f00000001c0)="14996390aadbd9870d24cc0a4fa3a3ecf89255ed0b69c84e110955586eec9f35992c9735d1620322104a6f35332588ce73d52b2ed135e1aa8a4d42273baae9ef5f5a70faa6c40f04a6e2a8224cb580e07c92bae660afdd7e567063be7b645fed7c997b4dbe6ff3f168193b28429dc2679d18f5154b56166a4c08957a23b3cfce57d3da1ec5f82d4d46ef55563e88981cce9da40f3072f1b7bf213f8f212b749006a3eab72488d9ad1c58401ec057c9a33e5003089422848b8738f8aa323bcfc8c7cb1d219e6e1417", 0xc8, 0x4}, {&(0x7f00000002c0)="6a61711cd55e5f076fb318ba418001451903899dfed05b33cfea8408e598cf05043542274609b8756c94292efce636a6520f99bc9d0e4f62282caf", 0x3b, 0x2}, {&(0x7f0000000300)="636c96a22ffa272a8e139c205d9de54788dfcfdb03aa0ad2c0253a2c25d403f369c814b237dcf61c5e5f7be95a57d82d968db8754b32d147c36d98dfc0815effe118eae448ce06f52b2468e786dea833a1c05c80a4f74e908ddeaaeac2fc567f1bd975839f503278c9a036fd862e888e6d35", 0x72, 0x401}, {&(0x7f0000000380)="0a28f510b3e68960a436ef28ef4b137f49ca80e749fb2ef8914b389d12e1392bb0353aff57240cadf3fcefeb4f71bbce0eff740eeb32d64438c275291d8d0316570ae32e90bd945ab2d453a3e77de48db30e264981f9a064c29930e4fbfd51c13b2d77b255613705038cab600ca90e92672b25d191497da04d849ccea45b448e3fe9dff64e4f34315fdeb65ddd03401974553a943c7f7d129d2d52ff209e7fe6438e3a1cbc49fda2479cae0b9f69c8ae30c9ee5860dfd8fe1ff6c64602369773a313328f92394948976c2960e22f7f204cd58996f86272c2c5bdd0dc2bc136740b8a73d73a898eccc548f30957e5", 0xee, 0x1}, {&(0x7f0000000480)="1750aad787c2617de7ffd45c8655a15eb99c066bfa7c2db8f8ac1199f418556a24e13024b43b950b976e5f35c9aafc7904e28fa86fc98f0e76a0b4901023b798d272ca1ce6ee58058b99fe6cd0661126e047219a4f2cc132b20727ca26d83b016bdc5953df229a923cd323154c2bf5e62509d0d7b450ef053a8c72edb0be7d563f195c", 0x83, 0x8001}, {&(0x7f00000005c0)="31cf6422955212c3d21023079d0577ca0fb1a7c26c70d3a073f6bde26b523057afc09b055855db72a59c0617dbdf00e889a73da65a48cefe7b6b988fa84e607e35ce239b8726e1b795625a7031327daa496641284ed75798fa955610363e3386db26fbf965f914f1c0e5fa6a3f5d56d1a970ba5f1a596acf7053c5c97d2012736c8deb004b2b03e2b37ddec0dc63e92eb35f8337ec7112529eccc3f126908cd21b531736830ec579f2bb30c12f0055e61472de9e396062349fbd591ded218a778d66a2d27248f56a6c186721a5c197859a59f47f5b1561f33dbae14608a11250bf368c228bcb819042", 0xe9, 0x200}], 0x10000, &(0x7f0000000540)={[{@utf8no}, {@utf8no}], [{@euid_eq}]}) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r5, 0xc018937d, &(0x7f0000000780)={{0x1, 0x1, 0x18, r7, {0x951b}}, './file0\x00'}) 13:56:35 executing program 1: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x05*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) [ 1929.050154] FAT-fs (loop7): Unrecognized mount option "euid=00000000000000000000" or missing value 13:56:35 executing program 5: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$TIOCPKT(r2, 0x5409, &(0x7f0000000040)) 13:56:35 executing program 2: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7+:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 13:56:35 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000040)='.\x00', 0x2000003) inotify_init1(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0xa4000004) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = dup2(r0, r0) close_range(r2, 0xffffffffffffffff, 0x0) [ 1929.104335] FAT-fs (loop7): Unrecognized mount option "euid=00000000000000000000" or missing value [ 1941.809103] kmemleak: 6 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 13:57:02 executing program 4: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7*:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 13:57:02 executing program 5: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$TIOCPKT(r2, 0x540b, &(0x7f0000000040)) 13:57:02 executing program 1: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x06*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 13:57:02 executing program 2: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7-:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 13:57:02 executing program 6: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) dup3(r1, r0, 0x1000000000000) 13:57:02 executing program 7: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$TIOCPKT(r2, 0x5420, &(0x7f0000000040)) write$rfkill(r2, &(0x7f0000000000)={0x400, 0x7, 0x3, 0x0, 0x1}, 0x8) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) fsetxattr$trusted_overlay_upper(r3, &(0x7f0000000580), 0x0, 0x0, 0x0) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, 0x0) 13:57:02 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000040)='.\x00', 0x2000003) inotify_init1(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0xa4000004) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = dup2(r0, r0) close_range(r2, 0xffffffffffffffff, 0x0) 13:57:02 executing program 0: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7*:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 13:57:02 executing program 0: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7+:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 13:57:02 executing program 1: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\a*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 13:57:02 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000040)='.\x00', 0x2000003) inotify_init1(0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0xa4000004) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = dup2(r0, r0) close_range(r2, 0xffffffffffffffff, 0x0) 13:57:02 executing program 5: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$TIOCPKT(r2, 0x540c, &(0x7f0000000040)) 13:57:02 executing program 7: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r0, 0x4b63, 0x0) ioctl$TIOCL_PASTESEL(r0, 0x541c, &(0x7f00000001c0)) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000140), r1) sendmsg$NLBL_MGMT_C_ADDDEF(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000200)={0x24, r2, 0x1, 0x0, 0x0, {}, [@NLBL_MGMT_A_IPV4ADDR={0x8}, @NLBL_MGMT_A_PROTOCOL={0x8}]}, 0x24}}, 0x0) sendmsg$IEEE802154_ADD_IFACE(r1, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x30082003}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x60, 0x0, 0x400, 0x80000001, 0x25dfdbfd, {}, [@IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan0\x00'}, @IEEE802154_ATTR_HW_ADDR={0xc}, @IEEE802154_ATTR_PHY_NAME={0x9, 0x1f, 'phy2\x00'}, @IEEE802154_ATTR_DEV_TYPE={0x5, 0x20, 0x1}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan0\x00'}, @IEEE802154_ATTR_DEV_TYPE={0x5}, @IEEE802154_ATTR_HW_ADDR={0xc, 0x5, {0x200}}]}, 0x60}, 0x1, 0x0, 0x0, 0x40840}, 0x4) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) fsetxattr$trusted_overlay_upper(r3, &(0x7f0000000580), 0x0, 0x0, 0x0) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, 0x0) 13:57:02 executing program 6: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) dup3(r1, r0, 0xfeffffff00000000) 13:57:02 executing program 2: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7.:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 13:57:02 executing program 4: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7+:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) [ 1971.575330] kmemleak: 4 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 13:57:26 executing program 0: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7-:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 13:57:26 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000040)='.\x00', 0x2000003) r2 = inotify_init1(0x0) inotify_add_watch(r2, 0x0, 0xa4000004) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r3 = dup2(r0, r0) close_range(r3, 0xffffffffffffffff, 0x0) 13:57:26 executing program 2: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb70:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 13:57:26 executing program 4: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7-:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 13:57:26 executing program 5: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$TIOCPKT(r2, 0x540d, &(0x7f0000000040)) 13:57:26 executing program 6: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x8840, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) dup3(r1, r0, 0x0) 13:57:26 executing program 7: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = fork() r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x2, &(0x7f0000000080)=0x90, 0x4) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty, 0xfffffffd}, 0x1c) sendmsg$unix(0xffffffffffffffff, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sendmsg$inet6(r2, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x4, 0xffffffffffffffff, 0x0) recvfrom$inet6(r2, &(0x7f0000000700)=""/4096, 0xe34e, 0xcd08, 0x0, 0x6b4) ptrace$setopts(0x4200, r1, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x3, 0x80, 0x0, 0x2, 0x41, 0x5, 0x0, 0x3, 0x40600, 0xa, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x8, 0x4, @perf_bp={&(0x7f0000000000), 0x3}, 0x140, 0x0, 0x7, 0x4, 0x4, 0x400, 0xffff, 0x0, 0xfffff8a1, 0x0, 0x7fff}, r1, 0x8, 0xffffffffffffffff, 0x9) fsetxattr$trusted_overlay_upper(r0, &(0x7f0000000580), 0x0, 0x0, 0x0) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, 0x0) 13:57:26 executing program 1: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\b*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 13:57:26 executing program 2: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7X:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 13:57:26 executing program 4: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7.:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 13:57:26 executing program 0: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7.:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 13:57:26 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000040)='.\x00', 0x2000003) r2 = inotify_init1(0x0) inotify_add_watch(r2, 0x0, 0xa4000004) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r3 = dup2(r0, r0) close_range(r3, 0xffffffffffffffff, 0x0) 13:57:26 executing program 1: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\t*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 13:57:26 executing program 6: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$TIOCGPTPEER(r1, 0x5441, 0x100000001) r3 = dup3(r2, r2, 0x80000) ioctl$TIOCGPTPEER(r3, 0x5441, 0x0) 13:57:26 executing program 5: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$TIOCPKT(r2, 0x540e, &(0x7f0000000040)) [ 1993.154471] kmemleak: 2 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 13:57:47 executing program 2: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7c:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 13:57:47 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000040)='.\x00', 0x2000003) r2 = inotify_init1(0x0) inotify_add_watch(r2, 0x0, 0xa4000004) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r3 = dup2(r0, r0) close_range(r3, 0xffffffffffffffff, 0x0) 13:57:47 executing program 6: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x5}, 0x0, 0x3, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000000)=0x7fff) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TIOCSPTLCK(r1, 0x40045431, &(0x7f0000000040)) dup3(r2, r1, 0x0) 13:57:47 executing program 0: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb70:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 13:57:47 executing program 5: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$TIOCPKT(r2, 0x540f, &(0x7f0000000040)) 13:57:47 executing program 1: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\n*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 13:57:47 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) fsetxattr$trusted_overlay_upper(r1, &(0x7f0000000580), 0x0, 0x0, 0x0) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, 0x0) r2 = syz_genetlink_get_family_id$team(&(0x7f0000000040), 0xffffffffffffffff) r3 = socket$inet6(0xa, 0x3, 0x3f) dup2(r3, r0) r4 = socket$inet(0x2, 0x3, 0xff) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) sendmsg$inet(r4, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000280)="b683ae7d0000000000000000000000000000000200000000", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r6, @broadcast}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x40}, 0x0) r7 = socket$inet(0x2, 0x3, 0xff) r8 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r8, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) sendmsg$inet(r7, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000280)="b683ae7d0000000000000000000000000000000200000000", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r9, @broadcast}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x40}, 0x0) getpeername(r7, &(0x7f0000006840)=@can={0x1d, 0x0}, &(0x7f00000068c0)=0x80) sendmsg$TEAM_CMD_NOOP(r0, &(0x7f0000000240)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000200)={&(0x7f0000000080)={0x148, r2, 0x4, 0x70bd2c, 0x25dfdbfc, {}, [{{0x8}, {0x12c, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8, 0x4, r10}}}, {0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0xabd1}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r9}}}]}}]}, 0x148}, 0x1, 0x0, 0x0, 0x4040001}, 0x4000001) 13:57:47 executing program 4: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb70:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 13:57:47 executing program 4: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7X:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 13:57:47 executing program 1: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\f*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 13:57:47 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000040)='.\x00', 0x2000003) r2 = inotify_init1(0x0) inotify_add_watch(r2, &(0x7f0000000000)='./file0\x00', 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r3 = dup2(r0, r0) close_range(r3, 0xffffffffffffffff, 0x0) 13:57:47 executing program 6: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000000), 0x1}, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$PIO_UNIMAP(r0, 0x4b67, &(0x7f0000000080)={0x4, &(0x7f0000000040)=[{0x7, 0x1}, {0x6, 0x6}, {0x6, 0x800}, {0xfff7, 0x9}]}) write$binfmt_script(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="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"], 0x146) dup3(r1, r0, 0x0) openat$sr(0xffffffffffffff9c, &(0x7f00000000c0), 0x8200, 0x0) 13:57:47 executing program 2: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7i:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 13:57:47 executing program 5: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$TIOCPKT(r2, 0x5410, &(0x7f0000000040)) 13:57:47 executing program 0: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7X:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) [ 2011.524699] kmemleak: 4 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 13:58:05 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xe}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) dup3(r1, r0, 0x0) 13:58:05 executing program 1: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\r*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 13:58:05 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000040)='.\x00', 0x2000003) r2 = inotify_init1(0x0) inotify_add_watch(r2, &(0x7f0000000000)='./file0\x00', 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r3 = dup2(r0, r0) close_range(r3, 0xffffffffffffffff, 0x0) 13:58:05 executing program 4: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7c:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 13:58:05 executing program 0: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7c:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 13:58:05 executing program 2: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7l:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 13:58:05 executing program 5: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$TIOCPKT(r2, 0x5412, &(0x7f0000000040)) 13:58:05 executing program 7: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) fsetxattr$trusted_overlay_upper(r0, &(0x7f0000000580), 0x0, 0x0, 0x0) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, 0x0) r1 = fsmount(0xffffffffffffffff, 0x2cc128f00b71e7a0, 0x8a) r2 = syz_genetlink_get_family_id$mptcp(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r1, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)={0xa8, r2, 0x312, 0x70bd2d, 0x25dfdbff, {}, [@MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x8}, @MPTCP_PM_ATTR_ADDR={0x38, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_IF_IDX={0x8}, @MPTCP_PM_ADDR_ATTR_ID={0x5, 0x2, 0x7}, @MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @ipv4={'\x00', '\xff\xff', @multicast2}}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @remote}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8}]}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x6}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x2}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x7}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x4}, @MPTCP_PM_ATTR_ADDR={0xc, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_ID={0x5, 0x2, 0x9}]}, @MPTCP_PM_ATTR_ADDR={0x28, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_FAMILY={0x6}, @MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @private2}, @MPTCP_PM_ADDR_ATTR_ID={0x5, 0x2, 0x8}]}]}, 0xa8}, 0x1, 0x0, 0x0, 0x40}, 0x800) 13:58:05 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000040)='.\x00', 0x2000003) r2 = inotify_init1(0x0) inotify_add_watch(r2, &(0x7f0000000000)='./file0\x00', 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r3 = dup2(r0, r0) close_range(r3, 0xffffffffffffffff, 0x0) 13:58:05 executing program 6: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TIOCGPTPEER(r0, 0x5441, 0x1ff) dup3(r1, r0, 0x0) 13:58:05 executing program 0: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7i:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 13:58:05 executing program 2: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7o:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 13:58:05 executing program 4: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7i:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 13:58:05 executing program 1: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x0f*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 13:58:05 executing program 7: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r1, 0x4b63, 0x0) dup(r1) fsetxattr$trusted_overlay_upper(r0, &(0x7f0000000580), 0x0, 0x0, 0x0) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, 0x0) 13:58:05 executing program 5: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$TIOCPKT(r2, 0x5413, &(0x7f0000000040)) 13:58:05 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000040)='.\x00', 0x2000003) r2 = inotify_init1(0x0) inotify_add_watch(r2, &(0x7f0000000000)='./file0\x00', 0xa4000004) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = dup2(r0, r0) close_range(r3, 0xffffffffffffffff, 0x0) 13:58:05 executing program 6: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$sock_FIOGETOWN(r2, 0x8903, &(0x7f0000000000)=0x0) ioctl$TIOCCBRK(r2, 0x5428) syz_open_procfs(r3, &(0x7f0000000040)='net/rt_acct\x00') 13:58:05 executing program 7: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) fsetxattr$trusted_overlay_upper(r0, &(0x7f0000000580), 0x0, 0x0, 0x0) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x4) ioctl$TCSETSW2(r1, 0x402c542c, &(0x7f0000000040)={0x8, 0x100, 0x2, 0x4, 0x7, "ab2e7afa3c61704fd98cf1edacd9bd51a2cb1e", 0xb8, 0xb46c}) 13:58:05 executing program 4: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7l:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) [ 2033.430592] kmemleak: 8 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 13:58:28 executing program 1: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00H*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 13:58:28 executing program 2: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7p:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 13:58:28 executing program 6: ptrace$peeksig(0x4209, 0xffffffffffffffff, &(0x7f0000000000)={0x1, 0x0, 0x4}, &(0x7f0000000180)=[{}, {}, {}, {}]) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x2) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) dup3(r1, r0, 0x0) 13:58:28 executing program 5: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$TIOCPKT(r2, 0x5414, &(0x7f0000000040)) 13:58:28 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000040)='.\x00', 0x2000003) r2 = inotify_init1(0x0) inotify_add_watch(r2, &(0x7f0000000000)='./file0\x00', 0xa4000004) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = dup2(r0, r0) close_range(r3, 0xffffffffffffffff, 0x0) 13:58:28 executing program 4: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7o:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 13:58:28 executing program 0: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7l:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 13:58:28 executing program 7: clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) mq_timedsend(0xffffffffffffffff, &(0x7f0000000080)="e5dab99f7306f2a4e786b7c4fa5cd7dbd103392721d0b9246d226419f608338b389be9aa668fc726f9c4f349f430f3d2e33ecca0e297ae5e06faf094b98475f8619f2cd8fae33df82ad49c3255a1b0b5ebec9235d3d5b4b83f73086a6e9a68e3f311cfdd137230e780a97f20c097a53c20f8fcf2b59f2c880daa288a", 0x7c, 0x7, &(0x7f0000000180)={r0, r1+10000000}) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) fsetxattr$trusted_overlay_upper(r2, &(0x7f0000000580), 0x0, 0x0, 0x0) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r5 = dup3(r4, r3, 0x0) ioctl$TIOCPKT(r5, 0x5420, &(0x7f0000000040)) ioctl$TUNSETIFINDEX(r5, 0x400454da, &(0x7f0000000000)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000280)="b683ae7d0000000000000000000000000000000200000000", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r6, @broadcast}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x40}, 0x0) r7 = socket$inet(0x2, 0x3, 0xff) r8 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r8, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) sendmsg$inet(r7, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x4, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000280)="b683ae7d0000000000000000000000000000000200000000", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r9, @multicast1}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r9, @remote, @broadcast}}}], 0x40}, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r5, 0x89f1, &(0x7f0000000440)={'syztnl2\x00', &(0x7f0000000980)=ANY=[@ANYBLOB='syztnl0\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="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"]}) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000500)={'syztnl1\x00', &(0x7f0000000480)={'ip6_vti0\x00', 0x0, 0x2f, 0x1, 0x0, 0x7, 0x44, @remote, @loopback, 0x1, 0x7800, 0x0, 0x6}}) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000540)={&(0x7f0000000ac0)=ANY=[@ANYBLOB="68030000", @ANYRES16=0x0, @ANYRESHEX, @ANYRES32=0x0, @ANYBLOB="3401028038000100240001006e6f746966795f70656572735f696e74657276616c00000000000000000000000500030003000000080004000180000040000100240001006c625f706f72745f737461747300000000000000000000000000000000000000050003000b000000080004000300000008000600", @ANYRES32=0x0, @ANYRESOCT=r3, @ANYRES32=0x0, @ANYBLOB="0400028008000100", @ANYRES32=0x0, @ANYBLOB="fc00028040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000050003000300000008000400", @ANYRES32=0x0, @ANYBLOB="08000700000000003c00010024000100656e61626c65640000000000000000000000000000000000000000000000000005000300060000000400040008000600", @ANYRES32=0x0, @ANYBLOB="3c00010024000100757365725f6c696e6b75705f656e61626c65640000000000000000000000000005000300060000000400040008000600", @ANYRES32=0x0, @ANYBLOB="400001002400010071756575655f69640000000000000000000000000000000000000000000000000500030003000000080004000000000008000600", @ANYRES32=0x0, @ANYRES16=r5, @ANYRES32=r6, @ANYBLOB="780002803c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000005000300060000000400040008000600", @ANYRES32=0x0, @ANYBLOB="38000100240001006d636173745f72656a6f696e5f696e74657276616c00000000000000000000000500030003000000080004002000000008000100", @ANYRES32=r9, @ANYBLOB="8000028040000100240001006c625f706f72745f737461747300000000000000000000000000000000000000050003000b000000080004000600000008000600", @ANYRES32=r10, @ANYBLOB="3c000100240001006270665f3d6173685f66756e6300000000000000000000000000000000000000050003000b0000000c0004000300f77fed0a0000"], 0x368}, 0x1, 0x0, 0x0, 0x1}, 0x200c003) 13:58:28 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000040)='.\x00', 0x2000003) r2 = inotify_init1(0x0) inotify_add_watch(r2, &(0x7f0000000000)='./file0\x00', 0xa4000004) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = dup2(r0, r0) close_range(r3, 0xffffffffffffffff, 0x0) [ 2055.550213] kmemleak: 3 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 13:58:51 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000040)='.\x00', 0x2000003) r2 = inotify_init1(0x0) inotify_add_watch(r2, &(0x7f0000000000)='./file0\x00', 0xa4000004) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r3 = dup2(0xffffffffffffffff, r0) close_range(r3, 0xffffffffffffffff, 0x0) 13:58:51 executing program 0: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7o:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 13:58:51 executing program 4: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7p:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 13:58:51 executing program 1: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00L*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 13:58:51 executing program 6: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x40, 0x40, 0x4d, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffff001}, 0x40483, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) dup3(r1, r0, 0x0) 13:58:51 executing program 2: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7s:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 13:58:51 executing program 7: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) fsetxattr$trusted_overlay_upper(r0, &(0x7f0000000580), 0x0, 0x0, 0x0) ioctl$AUTOFS_IOC_PROTOVER(r0, 0x80049363, &(0x7f0000000000)) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, 0x0) 13:58:51 executing program 5: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$TIOCPKT(r2, 0x5415, &(0x7f0000000040)) 13:58:51 executing program 7: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) fsetxattr$trusted_overlay_upper(r0, &(0x7f0000000580), 0x0, 0x0, 0x0) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, 0x0) ioctl$TIOCSCTTY(r0, 0x540e, 0x2814) 13:58:51 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000040)='.\x00', 0x2000003) r2 = inotify_init1(0x0) inotify_add_watch(r2, &(0x7f0000000000)='./file0\x00', 0xa4000004) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r3 = dup2(0xffffffffffffffff, r0) close_range(r3, 0xffffffffffffffff, 0x0) 13:58:51 executing program 5: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$TIOCPKT(r2, 0x5416, &(0x7f0000000040)) 13:58:51 executing program 4: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7s:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 13:58:51 executing program 1: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00h*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 13:58:51 executing program 0: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7p:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 13:58:51 executing program 2: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7u:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 13:58:51 executing program 6: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = fork() tkill(r0, 0xb) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='maps\x00') perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x4, 0xff, 0x7, 0x80, 0x0, 0x8000, 0x8, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7fff, 0x0, @perf_config_ext={0x0, 0x80000001}, 0x40, 0xfffffffffffffff7, 0x4, 0x3, 0x20, 0x1, 0x0, 0x0, 0xd1, 0x0, 0x493}, r0, 0x10, r1, 0x2) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) dup3(r3, r2, 0x0) 13:58:51 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000040)='.\x00', 0x2000003) r2 = inotify_init1(0x0) inotify_add_watch(r2, &(0x7f0000000000)='./file0\x00', 0xa4000004) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r3 = dup2(0xffffffffffffffff, r0) close_range(r3, 0xffffffffffffffff, 0x0) 13:58:51 executing program 7: perf_event_open(&(0x7f0000001d80)={0x2, 0x9c, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) fsetxattr$trusted_overlay_upper(r0, &(0x7f0000000580), 0x0, 0x0, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff}) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, 0x0) r2 = syz_open_dev$tty1(0xc, 0x4, 0x3) ioctl$VT_RESIZE(r2, 0x4b63, 0x0) r3 = fork() ptrace$setopts(0x4200, r3, 0x0, 0x0) r4 = ioctl$TUNGETDEVNETNS(r1, 0x54e3, 0x0) fcntl$setownex(r4, 0xf, &(0x7f0000000040)={0x1, r3}) 13:58:51 executing program 4: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7u:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 13:58:51 executing program 2: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7x:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 13:58:51 executing program 5: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$TIOCPKT(r2, 0x5418, &(0x7f0000000040)) [ 2077.275568] kmemleak: 1 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 13:59:10 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000040)='.\x00', 0x2000003) r2 = inotify_init1(0x0) inotify_add_watch(r2, &(0x7f0000000000)='./file0\x00', 0xa4000004) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r3 = dup2(r0, 0xffffffffffffffff) close_range(r3, 0xffffffffffffffff, 0x0) 13:59:10 executing program 0: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7s:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 13:59:10 executing program 4: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7x:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 13:59:10 executing program 6: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) fsetxattr$security_ima(r0, &(0x7f0000000000), &(0x7f0000000040)=@v2={0x5, 0x1, 0x5, 0x8001, 0x5f, "c20f56a53c8cd3d703ea8d7ec3e34344335f4ca161cfd033442b3422c07e18d43231257948ae6d6647f65ccc997271e6bb06f6654c44d455673f3a89e84c51365578fabd8c9a32ac46ae65c2c5f7ac83ba125551e5c48695faa39565d064d1"}, 0x68, 0x1) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r5 = dup3(r4, r3, 0x0) ioctl$TIOCPKT(r5, 0x5420, &(0x7f0000000040)) openat(r5, &(0x7f0000001640)='./file0\x00', 0x8040, 0x2) r6 = dup3(r2, r1, 0x0) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r6, 0xc018937e, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r2, @out_args}, './file0\x00'}) readv(r7, &(0x7f00000015c0)=[{&(0x7f0000000180)=""/127, 0x7f}, {&(0x7f0000000200)=""/250, 0xfa}, {&(0x7f0000000300)=""/244, 0xf4}, {&(0x7f0000000400)=""/100, 0x64}, {&(0x7f0000000100)=""/51, 0x33}, {&(0x7f0000000480)=""/4096, 0x1000}, {&(0x7f0000001480)=""/133, 0x85}, {&(0x7f0000001540)=""/93, 0x5d}], 0x8) 13:59:10 executing program 5: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$TIOCPKT(r2, 0x541b, &(0x7f0000000040)) 13:59:10 executing program 2: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\x0f\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 13:59:10 executing program 7: r0 = fork() ptrace$setopts(0x4200, r0, 0x0, 0x0) r1 = fork() tkill(r1, 0xb) r2 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x20800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2}, 0x8408, 0x2000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, r1, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r2, 0x6612) syz_open_dev$tty1(0xc, 0x4, 0x4) r3 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x40, 0x0) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r6 = dup3(r5, r4, 0x0) ioctl$TIOCPKT(r6, 0x5420, &(0x7f0000000040)) ioctl$CDROMPLAYBLK(r6, 0x5317, &(0x7f0000000080)={0x0, 0x80}) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000040)=0x3) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, 0x0) 13:59:10 executing program 1: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00l*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 13:59:10 executing program 2: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\x10\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 13:59:10 executing program 1: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00t*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 13:59:10 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000040)='.\x00', 0x2000003) r2 = inotify_init1(0x0) inotify_add_watch(r2, &(0x7f0000000000)='./file0\x00', 0xa4000004) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r3 = dup2(r0, 0xffffffffffffffff) close_range(r3, 0xffffffffffffffff, 0x0) 13:59:23 executing program 1: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00z*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 13:59:23 executing program 2: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xab\t\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 13:59:23 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000040)='.\x00', 0x2000003) r2 = inotify_init1(0x0) inotify_add_watch(r2, &(0x7f0000000000)='./file0\x00', 0xa4000004) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r3 = dup2(r0, 0xffffffffffffffff) close_range(r3, 0xffffffffffffffff, 0x0) 13:59:23 executing program 6: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$TIOCPKT(r2, 0x5420, &(0x7f0000000040)=0xffffffff) ioctl$TUNSETQUEUE(r2, 0x400454d9, &(0x7f0000000000)={'team_slave_0\x00'}) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TIOCGPTPEER(r2, 0x5441, 0x69) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) dup3(r4, r3, 0x0) 13:59:23 executing program 5: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$TIOCPKT(r2, 0x541d, &(0x7f0000000040)) 13:59:23 executing program 4: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\x0f\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 13:59:23 executing program 0: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7u:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 13:59:23 executing program 7: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x40000, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) fsetxattr$trusted_overlay_upper(r0, &(0x7f0000000580), 0x0, 0x0, 0x0) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, 0x0) 13:59:23 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000040)='.\x00', 0x2000003) r2 = inotify_init1(0x0) inotify_add_watch(r2, &(0x7f0000000000)='./file0\x00', 0xa4000004) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) dup2(r0, r0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 13:59:23 executing program 5: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$TIOCPKT(r2, 0x541e, &(0x7f0000000040)) 13:59:23 executing program 6: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0xb, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) dup3(r1, r0, 0x0) 13:59:23 executing program 2: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\x82\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 13:59:23 executing program 7: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) preadv2(r0, &(0x7f0000000080)=[{&(0x7f0000000000)=""/108, 0x6c}], 0x1, 0x4, 0x8, 0x17) fsetxattr$trusted_overlay_upper(r0, &(0x7f0000000580), 0x0, 0x0, 0x0) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r1, 0x4b63, 0x0) ioctl$BTRFS_IOC_QUOTA_RESCAN_WAIT(r1, 0x942e, 0x0) 13:59:23 executing program 1: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x02\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 13:59:23 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000040)='.\x00', 0x2000003) r2 = inotify_init1(0x0) inotify_add_watch(r2, &(0x7f0000000000)='./file0\x00', 0xa4000004) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) dup2(r0, r0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 13:59:23 executing program 4: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\x10\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 13:59:23 executing program 0: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7x:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 13:59:23 executing program 7: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) fsetxattr$trusted_overlay_upper(r0, &(0x7f0000000580), 0x0, 0x0, 0x0) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, 0x0) 13:59:23 executing program 5: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$TIOCPKT(r2, 0x541e, &(0x7f0000000040)) [ 2107.398105] kmemleak: 2 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 13:59:40 executing program 2: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b%\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 13:59:40 executing program 1: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x03\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 13:59:40 executing program 0: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\x0f\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 13:59:40 executing program 7: perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x3, 0x100d0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x10000}, 0x18a0, 0x2, 0x0, 0x7, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) fsetxattr$trusted_overlay_upper(r0, &(0x7f0000000580), 0x0, 0x0, 0x0) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, 0x0) 13:59:40 executing program 6: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = fork() tkill(r1, 0xb) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r4 = dup3(r3, r2, 0x0) ioctl$TIOCPKT(r4, 0x5420, &(0x7f0000000040)) perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x4, 0x1e, 0x6, 0x6, 0x0, 0x7fffffff000, 0x4a00a, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x7ff, 0x1, @perf_config_ext={0x3, 0x1}, 0x100, 0x10001, 0x6, 0x45d908b2d502548d, 0x4, 0x62a, 0x3, 0x0, 0x3ff, 0x0, 0x7}, r1, 0x5, r4, 0xb) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) dup3(r5, r0, 0x0) 13:59:40 executing program 4: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xab\t\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 13:59:40 executing program 5: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$TIOCPKT(r2, 0x5421, &(0x7f0000000040)) 13:59:40 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000040)='.\x00', 0x2000003) r2 = inotify_init1(0x0) inotify_add_watch(r2, &(0x7f0000000000)='./file0\x00', 0xa4000004) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) dup2(r0, r0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 13:59:40 executing program 7: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x2, 0x0, 0x0, 0x0, 0x4000000003, 0x480a9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext={0x2000000000}, 0x0, 0x9, 0x0, 0x3, 0x0, 0x0, 0x2}, 0x0, 0x5, 0xffffffffffffffff, 0x11) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) fsetxattr$trusted_overlay_upper(r0, &(0x7f0000000580), 0x0, 0x0, 0x0) ioctl$TIOCSCTTY(r0, 0x540e, 0x8) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, 0x0) 13:59:40 executing program 5: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$TIOCPKT(r2, 0x5422, &(0x7f0000000040)) 13:59:40 executing program 4: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\x82\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 13:59:40 executing program 2: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b/\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 13:59:40 executing program 1: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x04\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 13:59:40 executing program 0: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\x10\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 13:59:40 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000000)=0x6) fsetxattr$trusted_overlay_upper(r1, &(0x7f0000000580), 0x0, 0x0, 0x0) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, 0x0) [ 2125.507800] kmemleak: 3 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 14:00:01 executing program 7: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x19202, 0x0, 0xb80f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) fsetxattr$trusted_overlay_upper(r0, &(0x7f0000000580), 0x0, 0x0, 0x0) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, 0x0) 14:00:01 executing program 4: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b%\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 14:00:01 executing program 0: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xab\t\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 14:00:01 executing program 6: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r0, 0x4b63, 0x0) fsetxattr$system_posix_acl(r0, &(0x7f0000000000)='system.posix_acl_default\x00', 0xfffffffffffffffc, 0x0, 0x2) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x3}, 0x40084, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TCGETS2(r1, 0x802c542a, &(0x7f0000000080)) dup3(r2, r1, 0x0) 14:00:01 executing program 2: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x02\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 14:00:01 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$TIOCPKT(r2, 0x541b, &(0x7f0000000040)) 14:00:01 executing program 5: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$TIOCPKT(r2, 0x5423, &(0x7f0000000040)) 14:00:01 executing program 1: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x05\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 14:00:01 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) fsetxattr$trusted_overlay_upper(r1, &(0x7f0000000580), 0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f00000005c0)={{0x7f, 0x45, 0x4c, 0x46, 0x5, 0x7, 0x20, 0x9, 0x5, 0x3, 0x3, 0x1ff, 0x28, 0x40, 0x29a, 0x2, 0x4, 0x38, 0x1, 0x6d21, 0x5, 0x1}, [{0x1, 0x4, 0x7, 0x7, 0xffff, 0x7fffffff, 0x1, 0x1}], "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"}, 0x1078) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, 0x0) 14:00:01 executing program 4: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x02\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 14:00:01 executing program 0: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\x82\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 14:00:01 executing program 5: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$TIOCPKT(r2, 0x5424, &(0x7f0000000040)) 14:00:01 executing program 2: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x03\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 14:00:01 executing program 1: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x06\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 14:00:01 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$TIOCPKT(r2, 0x541b, &(0x7f0000000040)) 14:00:01 executing program 6: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) dup3(r1, r0, 0x0) 14:00:01 executing program 4: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x03\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 14:00:01 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) r2 = getpgid(0x0) perf_event_open(&(0x7f0000000040)={0x3, 0x80, 0x40, 0x30, 0x4, 0x20, 0x0, 0x2, 0x10855, 0xc, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xd34, 0x0, @perf_bp={&(0x7f0000000000), 0x3}, 0x0, 0xbfa, 0x8001, 0x9, 0x9, 0x84, 0x4, 0x0, 0x5, 0x0, 0x8}, r2, 0x5, r0, 0x2) fsetxattr$trusted_overlay_upper(r1, &(0x7f0000000580), 0x0, 0x0, 0x0) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, 0x0) [ 2147.290071] kmemleak: 5 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 14:00:22 executing program 4: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x04\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 14:00:22 executing program 5: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$TIOCPKT(r2, 0x5425, &(0x7f0000000040)) 14:00:22 executing program 7: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) fsetxattr$trusted_overlay_upper(r0, &(0x7f0000000580), 0x0, 0x0, 0x0) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r1, 0x4b63, 0x0) ioctl$KDFONTOP_GET(r1, 0x4b72, &(0x7f0000000400)={0x1, 0x0, 0x1d, 0x1d, 0x13f}) 14:00:22 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TIOCGPTPEER(r0, 0x5441, 0x1ff) dup3(r1, r0, 0x0) 14:00:22 executing program 2: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x04\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 14:00:22 executing program 0: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b%\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 14:00:22 executing program 1: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\a\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 14:00:22 executing program 6: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x7, 0x524}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x125000, 0x0) r1 = socket$inet(0x2, 0x3, 0xff) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) sendmsg$inet(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000280)="b683ae7d0000000000000000000000000000000200000000", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @broadcast}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x40}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000080)={&(0x7f0000000180)=@newsa={0x25c, 0x10, 0x10, 0x70bd2c, 0x25dfdbff, {{@in=@broadcast, @in=@rand_addr=0x64010101, 0x4e24, 0x101, 0x4e22, 0x3, 0x2, 0xc0, 0x80, 0xff, r3, 0xffffffffffffffff}, {@in6=@mcast1, 0x3, 0xff}, @in6=@private2={0xfc, 0x2, '\x00', 0x1}, {0x7, 0x3, 0x3, 0x9, 0x289, 0x5, 0x6, 0x7fff}, {0x7fffffff, 0x11, 0x7fffffff, 0xc5e}, {0xc4b, 0xe7, 0x81}, 0x70bd25, 0x3505, 0x2, 0x1, 0x1}, [@proto={0x5, 0x19, 0x6c}, @etimer_thresh={0x8, 0xc, 0x1f}, @policy_type={0xa}, @lifetime_val={0x24, 0x9, {0x27b8, 0x3, 0xe305, 0x768}}, @algo_comp={0x129, 0x3, {{'deflate\x00'}, 0x708, "a0b91bc39220dd75b57e46efb40d90fa8569ec55018925e639fa32e0f5c2e6e50f4c4929c1636c4509e389ca92d6c19181ee028d3a2cb2e758923324112992300d92c7a9fa457a5d6b2f1aea522b6d99119d279c7cbf3cee2938a26ecc5cfd01306a3d18aec96f8f622c0775dce076f09344ac7157661f68929752c2a4a707e3e7e06ed66622e97f1b45f051ababaacc6efd8d0031606fe795ba6ba99bcd99f845e0294a906eaea64965ae5859b2d7b436885e712a59c0753696e7c21ff06dccbc8c4b60d9337565083ea07a6884e3b2cb796bc8a655a0471780d695e30773b23b"}}]}, 0x25c}, 0x1, 0x0, 0x0, 0x200448c2}, 0x200480c5) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) dup3(r5, r4, 0x0) 14:00:22 executing program 0: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x02\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 14:00:22 executing program 1: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\b\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 14:00:22 executing program 4: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x05\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 14:00:22 executing program 2: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x05\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 14:00:22 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xe}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) dup3(r1, r0, 0x0) 14:00:22 executing program 5: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$TIOCPKT(r2, 0x5427, &(0x7f0000000040)) [ 2168.439701] kmemleak: 2 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 14:00:42 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) fsetxattr$trusted_overlay_upper(r1, &(0x7f0000000580), 0x0, 0x0, 0x0) ioctl$TCGETS2(r1, 0x802c542a, &(0x7f0000000100)) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, 0x0) r2 = fspick(r1, &(0x7f0000000180)='./file0\x00', 0x1) splice(r0, &(0x7f0000000140), r2, &(0x7f00000001c0)=0x7ff, 0xfffffffffffffffe, 0x4) readv(r0, &(0x7f00000000c0)=[{&(0x7f0000000000)=""/60, 0x3c}, {&(0x7f0000000040)=""/101, 0x65}, {&(0x7f00000005c0)=""/4096, 0x1000}], 0x3) 14:00:42 executing program 1: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\t\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 14:00:42 executing program 2: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x06\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 14:00:42 executing program 6: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r0, 0x4b63, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {0x8}}, './file0\x00'}) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) dup3(r2, r1, 0x0) 14:00:42 executing program 5: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$TIOCPKT(r2, 0x5428, &(0x7f0000000040)) 14:00:42 executing program 0: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x03\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 14:00:42 executing program 4: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x06\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 14:00:42 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000040)='.\x00', 0x2000003) r2 = inotify_init1(0x0) inotify_add_watch(r2, &(0x7f0000000000)='./file0\x00', 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r3 = dup2(r0, r0) close_range(r3, 0xffffffffffffffff, 0x0) 14:00:42 executing program 7: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) fsetxattr$trusted_overlay_upper(r0, &(0x7f0000000580), 0x0, 0x0, 0x0) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, 0x0) 14:00:42 executing program 1: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\n\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 14:00:42 executing program 0: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x04\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 14:00:42 executing program 5: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$TIOCPKT(r2, 0x5429, &(0x7f0000000040)) 14:00:42 executing program 2: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\a\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 14:00:42 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) fsetxattr$trusted_overlay_upper(r0, &(0x7f0000000580), 0x0, 0x0, 0x0) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r1, 0x4b63, 0x0) ioctl$KDFONTOP_GET(r1, 0x4b72, &(0x7f0000000400)={0x1, 0x0, 0x1d, 0x1d, 0x13f}) 14:00:42 executing program 6: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x2, 0x0, 0x0, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'netpci0\x00'}) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) dup3(r2, r1, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100), 0x101800, 0x0) r3 = openat$random(0xffffffffffffff9c, &(0x7f0000000080), 0x8a000, 0x0) ioctl$BTRFS_IOC_DEFAULT_SUBVOL(r3, 0x40089413, &(0x7f00000000c0)=0x3) 14:00:42 executing program 4: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\a\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 14:00:42 executing program 6: perf_event_open(&(0x7f0000001d80)={0x4, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) dup3(r1, r0, 0x0) 14:00:42 executing program 7: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x40001, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x400000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) fsetxattr$trusted_overlay_upper(r0, &(0x7f0000000580), 0x0, 0x0, 0x0) ioctl$PIO_UNIMAPCLR(r0, 0x4b68, &(0x7f0000000000)={0x4, 0x92, 0x2}) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, 0x0) r1 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x42aed6b7849cfc83, 0x0) ioctl$VT_RELDISP(r1, 0x5605) 14:00:43 executing program 1: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\v\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 14:00:43 executing program 0: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x05\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) [ 2189.192883] kmemleak: 4 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 14:01:05 executing program 5: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$TIOCPKT(r2, 0x5437, &(0x7f0000000040)) 14:01:05 executing program 4: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\b\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 14:01:05 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000040)='.\x00', 0x2000003) r2 = inotify_init1(0x0) inotify_add_watch(r2, &(0x7f0000000000)='./file0\x00', 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r3 = dup2(r0, r0) close_range(r3, 0xffffffffffffffff, 0x0) 14:01:05 executing program 7: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext, 0x0, 0x4000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000001}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) fsetxattr$trusted_overlay_upper(r0, &(0x7f0000000580), 0x0, 0x0, 0x0) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, 0x0) 14:01:05 executing program 6: prctl$PR_SVE_SET_VL(0x32, 0x3cb59) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$TIOCPKT(r2, 0x5420, &(0x7f0000000040)) r3 = perf_event_open(&(0x7f0000001d80)={0x3, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x8}, 0x3010, 0x0, 0x0, 0x5}, 0x0, 0x8, r2, 0x0) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$VT_RESIZE(r5, 0x4b63, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x16, 0x1f, 0x3f, 0x6, 0x0, 0x7fffffff, 0x40100, 0x8, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x6, 0x2, @perf_config_ext={0x1, 0xfffffffffffffffa}, 0x21, 0x4, 0xfffffff7, 0x9, 0x1, 0x3e01, 0x3, 0x0, 0x101, 0x0, 0x9}, 0x0, 0xe, r3, 0xc) poll(&(0x7f0000000000)=[{0xffffffffffffffff, 0x5215}], 0x1, 0x5) r6 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r6, 0x4b63, 0x0) ioctl$TIOCGPKT(r6, 0x80045438, &(0x7f0000000180)) r7 = syz_open_dev$tty1(0xc, 0x4, 0x1) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x450080, 0x0) ioctl$VT_RESIZE(r7, 0x4b63, 0x0) close_range(0xffffffffffffffff, r4, 0x2) syncfs(r7) dup3(r5, r4, 0x0) 14:01:05 executing program 0: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x06\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 14:01:05 executing program 1: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\f\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 14:01:05 executing program 2: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\b\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 14:01:05 executing program 7: ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xee00, 0xee01}}, './file0\x00'}) fcntl$setpipe(r0, 0x407, 0x0) r1 = openat2$dir(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)={0x242080, 0x84, 0x6}, 0x18) r2 = accept4(r0, &(0x7f0000000180)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @remote}}, &(0x7f0000000200)=0x80, 0x0) dup2(r1, r2) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000040)={&(0x7f0000001e00)=ANY=[@ANYBLOB="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", @ANYRES32, @ANYBLOB="fa2f0e9af174029ab73ce09a413c13e797ab3910050a22c7095f51477b659f42adfbee3ac76dd06f6b24cf9ac1010c00000003000000000000001a003400747275737465642e6f7665726c61792e75707065720000001bdfcf5e013421149acab3b39c59f917d71c431c010d8c15f4d3e377aa7e53b0a740fc32b6a37052dc67ae2ffc15dc9bbdc9fea7fd59cf340f5ad99fc5bb6bf77caf291c965f876ea180a901518dcb01d4dbcfabf768daf71a8ba9b6bf73a7116de800eb591e2f8317e092b9e9b823766292727892a199b791c2cff3a4fc9059cfe21ce9b4978be08bbee08b8c7a4f01eab13a9d2ba7569e1d69790686be6231c12133d142b50c0585996e8357954984b2acb5ae9f4e2af3631c84644399445662e6c8024edf0400790097092c64cc45159a00fb2fdb8c96127ce151e8fc26b5a9562dfd11e8652d065481aaffce22e02268800e158dd28f785ae887d0e688bfc2e142354b9d40d019090cf8dc9b2410c7576606b74f8505bac9bc98e63b305bebf223241e1fed22ba3863a01e1794bbbba7ce9947569b8e159c33f5d9e2e654f85eaeb66dda8b69f70b3f4b4fd4d668ac95a8adf5a6ad2559aeed3a285ff4c28c3d5f1236b4e1bba4313209828e969fc4dba6109657e484df7084eb1606caa0392b8a86db4185d63d6217f4e8e8293585e600436854570eb852a807c09327c360da5a63826c79e7ea47de6dbef9cc58e7f4d1b15baa33d265db459ede70931efe296f9f96c266a79eb4a6624c54e6de2d43b3b0befb49fea050b56303f289724027444f5e80fdb7cff77865eb3e356579877398a0fc1cad01478d44e0c8afda8e35f06d22fc257ec8885ff2a998f0e7110a5ca7d48e4a3bbe54d079c84b0748df611868e79973e95da63322cb42ba4709837d119e63eda5ac2b85f8b230d243039d6de97916b59cc237b0cec08c9583aef17586d2b1f68d778421341e334c80e6ff4650eef2d863c8c901c9a1d78ff0d869d91cdc355bdf14736541645b2d5b5a30d222bfbf737be467de266cbf071b2d042c5f61aaed7c3f185a3180919fe9a92cf86d2c6940b12de8d5c0e7524c117c8351bdf5f4e40b8983ff702f8eed7054774da0937794e769f0bcd05dbefc20994d2b5950d15f914ff552c4ccc65a6c9c8f7574d1f1cd8cb4ad553bfc7276e00889acf6fc132f9d05f9ebdc8270a378ffbdded57e69ff6b8dd5f2c32bf4aa3fff5c6da28dcfe763e497042d691bb6157e1a37c1741aa4e53bb983ac065e5e842a314a158e9d42c9165ab71b87f9480fc8b3824b331d5699417c09b3f051de6db675ac83764ca62df6aabe81b5484c5864f126c12413811096847cfed0434414d84d05fda073f8932d8461e705d2337ae3fb8df83bc958161878148358f816e90228c919795b4e8918175db8095214ff7adcbb9a3aed14e4887e63aa0656fa4b7f52daee13d98e995f1a22fe1fdb15d84edb968872d7af883dbb8d82fec62db14bfb87e4f878fc7458eedbd2d7275f354b23d4069bd5a79df366e93aacf5fbdf529cd3ddc929ff85de5cb416ce2335d6bb62ed2e6275fa19e4e466aad54ec88b6dd06e3980b23c6447d274d134be13a8686efb0364f37786178af951814ffae35932cbf5bdbe194535f11d879f8fd19eac6e81a9968c5511c18fc0a35abc5fc1963b4c224850ca57e0cec0ea7ca02b6ca26b24cf809bca6fb5569d6819a52f5d63c199fb4f6e4e3f6466fe454ad78c2376f1b5ed97135c553960a62d2abf193cfd600d2c5b286e04419e71c7b42b3b1a86701243302ef710c0c8e51d459fd6c3f1ef638e4b317a8b69a9b282de52d7e04ac5a3c8e0ec3d566360e4c4d5afccee4127f872bdceb6c4fba3fcf1dd2b2187e21d1e47a46bf3e0dc37154791de438d39778335b18852e6b54d9769cc4cdfa50c4b0aff4709da2c6db41d9c691a34b15a0c20e2234681839de4549638c2bf1d02bb7102b0149aa65504a3d28f30deacf694c84cd5c484c67b6a4fc517dbbb9773cea69de78a4bcdf28a2d19f9156fd92858657dbcc5295b0bac6b4213fe355e7f7511ca8c47bc582dd391ebde27df2bc8100db19e67ffae06ba830684d0baae789a820d15f3548af9e81304a4a85bb655c106448bdadd73aff07c2e2772cee2f080ac4049b1c2b0804a5162189299f28f33f3898fd75bedbb7e499a6591f83bb417b087a1cc41110fe5a882c62266af2e50c3433cd87f6adac548e9960829afeacf1f343c15e4ce3d102755eaf41424b0ab3797a2f2f40bf739ef1f9aa5debd6af511be23c66dda6519f79ec0c6975ef8e7391dd9d5a33a4790b23d777ef3838df09592b9d3cfbf3e2a66525c65740b188aa0697aad89f39431d67bf9ef6529d0ca9b63217c61782c64a5fbbb13bb0d3446ac70c7e710292aa7a1fc3d2eec2a3c1586c7f3b7df0e3f71564191dc89a32eeeae917dc8ac032ba1a5c5aaf1cf489ac41472a415ed1739ff0b05557eb313e044903fcc2f39897c176fb29475460725d66a9dd0e0eb9e036f93d7eb8634651d3ca3f5911409a37e4034ce0244fe3c5eb30373245946114358e7634095ef5bfc4e1300f6f00ca6780d2bf25a5246dca0e43e5a57992db8cb81f372a8af45270ff7fb7b5dab19256daed7db81260e9b94c2ef68c69a02b4d4dd5635be7168d0adce835def9e52d684189bd6f097a7e1239bb01a0a162b069b2b5488ec436d35ab856352617098cb623b1c447e7ded562837d244d46e8d652baa78685a3d7c9fa154004cec746316c5c4ce71489ab8c8593e45f379a1137ede47430a1771e047375cf7aa0e743b7cf294088e0450f98c5fa0f05fa6176e0107ce7434f6899ec6dc6210e93729dc688188c522e0101526e287e277ca17fc2b14aa3068c8044e6f5f8a542663f93cf74a6eb2a7d521e4b3da2f072f3d4d6c3677102c13f5e26fc74c6c65a1da24084ccbc75f6b33fa4368f67f5c29f44a7b068e8b12cf9ab5099b9da728c934340cdda947af1a70be11ef6d1a199ecf874b7e3f2188be331e78bcc7b6ac1de75d55252a31af62bc2d9a62f85746d532e7dfecf2898106cbe414ea9116f25704cbba9f68453fd5db8a91063893a19e0260cf7536c97a859e1ac9130d38fbe694b31223135a4fc92fbd628e37dff9b0af925b1ec81cdc5b0e9085bb890af56d38ccefb17ddd337aa758e764f4785b1216ff0a6a0c2f0b0332de496e235bb36e9077c6326698a108cd268481359c1e496d8ef7a95eda4126d2b5a66d97b52f8a84e65247de42087b69a1b044835fc413a188c184f8e95197d81cd6d705c42a0a8c60de09b7c83b414cd7cdb4eae70e23ad86bf28582dd4f81dfe3da744e1bd2e710745f8aa20d20f4d3c1f9aa119dcaf724bb1c95836c3dadaa48d13336c567752d2fb70d88633cc171a82b851b612a96bfb5e4c1637d72770e81ff4b53e34e7b97041368520424c87be56bc9ad63d024e0046174a826bac84b265122d472f3661f1c9950f397d4e62f55088847608a8b4181001c26530d4e1cb935325dec01d4c5fac6635f4237786621871fef640a0f39b1f502216a896b5c49d65e2e1cf844ae844dfd9999536aeab46a3aba0fb54c290c4b3a7c9ae67cc9b98cc1cee647788b381704b72591f6e16c0bddf78fc66e77c9160bc19bffa0f7130b4947deb24b491e8679c67eb59664c51cc60a38a066d9c4a15329330bdca12f9aec5000ef0aa90fd89405459e9a24e6705ab93501db9c62ea8f2e6171d7e00e3f4bb86ccb6df797aee16c56c3aeb07b882f5a333a3e3b774d695e0d2fe937686b5b3941f0829c7245297913d66b282b7b9aabed9d28fe23a766a92feeb9436d93c342b0ce5bf85447437a61cdb6b95a2d32d46e6febead7009b697f8b16cdab2173f3194f0060a3d3a3271c7ed017b2d8cab6cb4f3042b4c9fefb6faee5b9a4ca988f14d456bad3a889561eb842047cad6f98480d2e5195d7aa8531e345177bf54dca6878f07d4b4d70df692de242f2acfab159e130ae4d2498d28cd67b0f3d14ac8d4e53433d62e0f3ef0946753f6d6242df08f0224befcf597a76a1d37b0ba752813111b7d34cfb0aed49cfde44e932f4ae44a7b7ea13a5b64817a2b9e48bcfebada1ed4040b0e0debfa6280be2f446754809a6d3fa0fe73d8685d4457c1debd471faec003c2c12c9ed1211fd5602b709dc1b8cd8ee8f07c806c895b65f02afc9b67ed4bd9d4dae5963ca24b28b3d17b5510db7f30714f9daafa80f780f8a9d64083be38d1b91d488fe9630fcbef9303ce51dbffec645753710a9937d52070e3cadf546d634661d2c0310381adb257e680c6f49b45b2c5840a010e6f368659f81d28bae1c4aeae6db426a18129a1ff44cbe54e3ca718d6763d3dca73aab88350ae6c33ea73b74a073db09f53cac965cf410875d9cf53275025e7874a2bf05cb806fd74d9eb689ed58e2cdd18c97e5465152368d4ac42e776795d3b68997c1bb01dae5bd22f001286cdbda1e9415f059c76b7410651956bca27aaf572f1eee3d8e440a44eff28089adac3c1c391a88e3f60d2261b5d4dd8f4bfcf8feb31cf0ef070abb2625e8c7230d1d9552caaccf6d58feb85a612087dcdcbae5a214b0ca88c0121c7baf8ab60656317356bfe387b9f797326a1f0458fb32862e8f78551a54698ee5a04c710b7efe5af714cba8dda1ba2a4b1e44f9ebccb65be1d98b887ee8b128dacb4218a26fc2a27dc7a05d95a873e0427788e34b86405acd70e5cdcb83e755fd65547e55308e8042bccefd7442ebc625f3715c05739be389ffbee1673edc18e4ee08709dbbdb2106ba791f6c6563d86cf5af248e34729ad612e9088d3310c9db26fa86019f46c0c3b5f98c34cc6c6bcc266b60149a0ae9a2551dc13a9ce705ceb75dd7fa4aabbbb124869c81311c97342c90dfc1d9f4144e1f9744b1eb65272eda44f2cfd87c85bcd733ac4fe59d4ba27300498e7d6b14c05f47466cab1b0aec089b1201668c82e2f19508f73fc0d9b8f075bf71e38cdc05c8d2dddf5c2bf27332a64b2722e844a81be58b1c2420850bbe9ecb88d385b6f0bd63ce48975838ff08bb82a8353080809454b8902449cee0cdc257028d0f7ab1e5d72aeaf9a0afc3df832ac7d474e68bca3fdefdf8690505fc2b99f39c513813c01ec60bb0f0e11cfc37d7693176bc2b94dae46fdf3b4b62a93924c8ee6bec180a22eebeee47ef7679309a0b6976dca2f8bcf8fcc9e165bd95a887fd756323780e6181b14fa33f9a7361d000987514eeeef1a41e2ebd7e636bbc904d0ca9142053d39c580190e3e4d2d31acd2accc1e5daa78c8b134d9ba4699e636a377e403c466f055741c08308d5631171eb594533547537a024168f2b4121e1deb3d13bda021083468573db1ea8f2f6391f8fc8f84ed36bb1d5694e54390783da631fe1336b28d67a233eebab319755ee85e11b09bb6a233ba18610836029436f84f0162295552f415036663a9058886d68be82c161d95ed4d290e319e2d3ec25fa6a9376041f5a2367774ea5426d3718e1f7584cdf78ec67b5db4bff51f613a42f8d5895a72d49dd11081606a4c1eb849849d9b44850cdff40ea1d9920181f0b90d9a3b867b88722ce9a670f5c8c105bb4445d98c6787ce42feedb02140db88bf5b5d0370bd5d4ad05c9331bcf7743ac7bff049dd068e2fa47925c6bdc5a5c183dafcea9733001cbda0de98407615f3fb5a2d4ced334bf9bdd18c2aeffa002a108420635d2a3d1c3bd8cb9743587ab8cd50baa4115afd48739d54679191c3c7a6f8250609e91b4631cb7f7bf88c4c03d23ddd88f838547270c8828992bd76c46e8dcb8770778cc077ed15ebb8b25d359aaa17a40f1c6ce46ac62191e823aa9ec07d307b7ae4c5f1239ff66a04fca6bfa44b44b943fb8bb00c50425c03e0b0f0e3f02bf5b8f3b8e53ec830d441df60a9e98e805a0adc173cffeca54bae4ae48d4a00dfcfa5fbd6e16efe8e3c8fbd468940652cf7ae342a227d29269fa3a24608542400e9d67b460e5f925daf69c07aa09b41985ef0d0796c58e22c56af338a8ca68a793df8230482e35aa4b8590a548b7f445b9e188221e59ab50772a1e12cac60c689b81c7dffea1018abe7b36ed2575c4704067b793e384f347f01b5446102091b3fa9bf533de81f59d30f3195628d59e8fe6240cf6935556f19adaca45ef8cff19b8800c0e9884c2b0f1c6fc960eda972523278c5eca8c9a87a6c1cd0d013c9ede05ef88a1fae4d5d7a33b0060ee7d9000900898599688d9fbb34d032efff18e245f294d3d44086e2eef726dd832095ebd3f87b494a9fc7bfba992a37fc3d96309d0723a8dfe442338fac2a34219a11da48d1a793c51594d1716c7b498d9b825331aec854dd6501ecb28c8442de79b2be824ae78482db4e99151f0e90edb74cd62118d74cb8e976836130e4eb1296f4140343c4f1d711530e991a7fe119a1f44ece4126fd3b63e6e8f1a69f151fa44c41e8fdc9cc288ef691b3ba4b74c4d9c30f94e2653cf92a7e29c2fa651cb04d83e162452091d5d657e56855d3959641ec27d533085924c1970000004cbaa759d856fe1770f47072c9d5b05db5e12780943fbec596889d638392f1b9f5d3934ba1c50bc573ceb4e0d785283a9ff57ee9ae508112e66b60dd99bcc86a447188abc77b27904a05f570ba7e96540fe10cd8e9e333fba7d5626ad13e3a53692201f6bf980bcb8a8303b1c027a519e68b34793e3cac906bd4381db626bf44194c8fa4730bcb348e56e4dcdd813d35965ef086b21e2863e3843828967a196c04f34bc3c66486969c77c08441ff8ae7e8776213918054ae1d9b9314000600fe8000000000000000000000000000aa769166b2abd445ac338ca22f92d24b193b453d461bf2c139157083b625b33b385d3fb4cf673c07fe799c2962d729c4f3eb18b82686dddda6a93a506ef71fdcb65a07bb36cabf04c0096de9c750b876d051299bed315bff95f402279992b9a32d5145f6def3ec1fb1f6a12701279ddf39c6f8a4d44aee025bfd2570df3b527921bd8954ccbdb4bae4ebf0f138ae67c340b7aab45355ff03ccbb9e504a3036c473176f5e71f34911d9723582cf11ab546604b90903c4d6141e0b906cede816bf5dfb91813946df0cbb7144dc03bb045dcb8132e901fc68c82ba33fd252cd775703349052e66e446bd9d0066cae752024f8c2c034ba25456a43ef0d00ee0fa0c99997f520404abe2ea16d1ec791356df0432434f5bbca2f0eda3c45b2e1dc06f292136734c90df1fee607185597274af334c9d3ab00f8d58bef37fcf1a9a60d8d0c06f5c703dbe10c2139609ebff2d6ff53fd1ec788d0e998647b7a0b03eb952aecab8214c13c8e1f81505b8d1ebfdd9fc8d841380cb186ccf80d697c7075d007e4cbaa7ef65c7fbfbdca31389002dd0943fb26960ab9fb5be562ab783c7349ab3e67373ef4121b968c6a1f22e23ce92c97066311237db8bce08e530c08f74c4a49e5ed685984d6bc7f7ee92929b6535a30e6a658fd60d72a11b0e2fe5a9a0f143fd75a1bcc34f8109d8e0d10108c21e179042b50ebf23aceeedc81c694538f07af2d3cfe7067b5b13f7b0cc327ae54b916293c682b0c7e4d848649fc49cf6b044e34abe714e42d13921264dc2cfa480be6ddd62e9850a48e75a68b5954220e336b97dc642b55a7f22683aac204d7bd51517e7feaa8cc7b62785d46532d35833cb1ffd16474bb5d8cc7f64dc5243f31d270089d434dd6ac12d5a60497c67cff926f2f144836864db02fcf372e705c8d882e6aa88724a097d02eb4ea0eeeeb0998400ebb2a571326e422351a21498e9ce59970c337d3e81442301e23c2503481df0a8af383c3191ee0be072c3246ceeff01f94d3f0c357aa469bbad1624be73fa727ed9a613de951c863c017a5eb50f650cbe98cae71cc38c4cb3cde5841465195f8e9639d4334031440245f50d840a8f50c69373fc3477bd3bdcfe8faac3d6db1b4a7aa75af0b1839bec9624cb74e2c3686801dace47dad59b6d1e4b7aaa4514b407630bd9cdcbb7d5e7c133acf754607f62ccb968971bfeae1338399d1a4a156e9479fc03566fb1cd09725d7889a26c761e6f58d2ea4ca37c80da82fa12a32c3e6d73c67513fd59319edfb9cbf1170335b42da15410b113ce72bc1e0d47de99a8e2332ac6306acb80a8e52a900c5ea5d965ed544fb40ab8a5f9d411e0ddeb889901b848574620795928bac42812dd34ab84bc3ff344ae617ed28849ca816d5d3bcc913c94c43166711cdf3616429f183a34d84a41a3845362a0e39541934fc35b8032780c08c63c42feb5ec1942a73e89b5cfb871bfbf1e4a293316748248af2daf9d190c49903fb52a6f911b0ff989e985b00a8d586362ae9a1c8bce6c7626c0ee09ceae1dc8d4ae7c4e2f543cb85cb506bc71cafd6aaaa5ae042a88e5e7df535322a3cfd3f23fe66edf7aa48255db77f25b0cbccb3b380a21a936ea6f39f74fb0cce0a725cb75c4a2de9d52aea3618a0bd05d4b7f6ce4a3aa44750bece44dcca37a7066ae9fd37c092eec6b891cf3b180e0eda79de69251650e180df84019b5d67c34a0058cc7381ad62655e3eb028912e5fd25c2174dd3c972372bf80c0437acc94f98581fa16e72456f4f9359e033e65513869e314441cfbdbe24d6ec231915e78dbb8411c686c453082e2b51a95a57c3bfb69d5ce93e353adaef5160a7d738edfbea139dcafebcec678353715aa86aeea95e76fe09fb5230944f9efa6bf8c32bc3d92264e9aea0146b30cdd172e559a8f0db71aa15986c61c233c95617eb4b4090a50b3eaebceba301ae93654895f6c71ee847912e1cd4ee8a3e8b5d7125e2a9b5fd6e5ed724904664bbdd32a25f519b9b2871fb56d2d2fe593797c36768fd17aa2b173742cc64dde16c604d53a0896ce317829d4df6a432bbf6a5ae8b882b7ce434174fb39bd3b276a1b054b638253f5f2eeca90958029dd049090019700ce96b11231b48ecb3833e2832fb41b8555e1d60496bee242a9052a72e2cf2d277111b43e169c1ed36fa4dca738cc589067a3741c63cc7c05ad643d609a3fabb12a01af5d716b611e8f962fdcc960c2c9368e13088851c9d76f6b6e8e0b0bd273997737d8fed7f16da9856d6eea724a0d10d7d775d75c79a823555fe80913cf327c1b50991aded144e587b04eaf7dfcdaaf3b240542978d7fff21783f74282f8230fd358787746587c76098a28053706e5fd370e50d0fd71312c14d12203f380692039a8e15699d311024285ffe4886e256ed2a795b1dce0c09f66c7543fa0b6d33d3cc709b283acc62ee73e5c81168dd32829bf7f4f59d5350aace5dba7a4770505d674ea526dbc369fe07efc6a8a25406a34ea7e07cee331289f2b0c80b7f532c5c4cbf02ce7e74306fbdbc411ee83c354c8b93a83cb36eb4f08360a8d42abf53b1a3cde9d64d296812c37c11c3d0da10fd5ed0d24ea7f8420155af9d0ddb8f5e301495029e38ed2e6364a42d0f4937c4d1e11aed42f3ec498bd2dc301b04a985eb8f18923fc9bfd9a63815039eb84c6d78842567adc124f2947dc6592cf18bba6edc5ee2f2825c457857b0541eaedd6dc5e5a468272a88900c5a884940e0a32a9c659734a7fad959c6ce2b294e94d3959fbab5306ff0634e3360bec07dfd3aeb603edd6447ec883d23dfa2cacc5977de215745837df689b505d629bddb709278925980e5663fa2ba9b67a287e070612902e5860413540aa8fd7884253c3773cfa954c11b0d433c11294ff686031416215ed47694e139c29ff0da17a4f9a0a00a798d008ee1f9ee961e0b89ac0c567db545a06e5d7e5677066da3537ea8c49f70c10f8f856119e02c24858464b99230713435ab54e4e1e2f358d647735b36ba497910f8b70b15639125320ba888ab6b4cf907f3e50e4576241706d254ae4fe34d1dd6f691c8cc51ba217147271cf62819ce7664afabc9f2c8b40663bb27914855a49ee37b5a94d30efe7a44fa934df07a02123cf4ae501d2eb9afd73ef98011eee538d59301b4d6ebfe820f3bbd57ad760f668074f2c6ecaab66353cbf94f897414a9dfb9e804bdea4da7577d2d49d065e977678fbc79516308ae87e1c0e60265c491faf0a145642fd15c77ccac1e8d60f922b0dfea1a4c327e9f92f0917047eaeece709eceae9bb113d5a3290cd7d322a67081f52c354a99657cc503f47ca6db1c9445953942c0750e5c6afc20fdca42be68ef0c73942c691ed44d90e30cbf8cbdf43779d3591151b01517655c976c06d40cb8346b7aca531586dbdfd348ff1df0c6f1c93237ad89e7931796258860e0aceea94439c10e5210d10e5402ab54592e637903e899f8562d583472055e561a37bf8b256f46dd5ee1dbab5fff3dd3dc0a1aa47cbd6d29c366cfb275f745ee89730ba0825526a66b69c5db3c2d48111b526e4872f74e0c640267b7717ad7bc4f5ab91107e47195c944d5f0985dd0746ccb81ac0f8996d3183133d7d676937ba12079c169e10593988f8f1df4c9e70aee9ed787f7cc7357701221695f4a094f69413352ed945863a0883d927e9a9f50657c2656e834ceefe6010703a57355a5a9c0a29859e943ebbdee9282a63494cc74968084fc50afa655b9145a50a4f92e1d61348819b396f9012bc8ba1006fca2e594d59a9a2e5910e95e9e32e73550fe45bd5e246f20aa3e1a2c3a11c05ac4f921ef3b730a5e19ed33d79435c7e7331c888ed9b85ee4cb8c512c75cc90a9bfa8cf2a2f76963bd3d80390ec84340b6a89cce4fd00b2c1339141ca392461c5da930b606a9c694fa6e1c7ddb1ecf8325662df92b71ef33ce917c16b6522de03c22d60ed3d356b9bb780944488d084e64e4b767e08755a5fa7c48dc70972d157888261daf50dc31db7f1921b9fcbda4c765d1a541f4b79beb81d0ed366ec63afd47d631221ed3bf25243b148e0bac0c76a0539dde3b612628632f89488e8c38c75ba6a3aba923a9f4e73bd1a655f2ec5c1f5c696475f6e169ce224f44c05ecc1ece41cecd2d257c74e470cd7cff2c6e8da1f485616cac7cf78f3756524a12763dc2b1ad902f35eb2e01f4d77963732bd2506b78adf48e69e8a830b07252519d4a7c0da7dc6538cb7f61c3d6643db282815c67ddbe364e2110527ed896bcb577d0a877a93d5c732ea6fbd78d5e2cf49ea25ba3ff909aed52a5ef9f198eb05efa387af90430bba078d343f4419a0d7273d59dd641f7963a5b27915616fefe8cfc1b92a5691238433c7896b2b5c7a7f69174512f66c7a7862e9c3225a57f7dcf9225d92b0889c9142c8cb1d1f758bd8663b6b23d71d2328d2ad881c8786397818903cd6d0ba8af33fa9359e632c6b5f5f570717dbe3fc24733f33e7034c37592915d0af939d1e3e2ce16e0df4455eab50f5105526503ebf67af2befcf496a4d8c6638409b6facfeff95bf5ef47d69ca157c0985ecbc725cdda29d9e0ddff93d6bc68a999d370fdc989644e03c206276c91302c4210e05df0623b0f748052054e224cafb5a52767d923b22ee868cbc5201a77b5045d8b845e7dd2989e9b3e7a22a0ee347aa7b6c130dee1891d085ceb3ed23c0103e6afc6a9fd219856bbae53081e7e628089496109e788a7da64df323f43a4b860f5391d6466759ca356580db4444aa50726008e3c708ca8bff0b44ef0f4f853d2467a690ce2ce08c8885986adb2968cc1115528fc4892d1c601057bd5e66dcb255d830e452e76dc2666d9e3db6e7d968f1d0f0c0422b31c503a21811a59f73ea04b3e997fde4ff7de15b32c15a24737467473e7ab2baf2dc37af042a15f66b711e7f25bf6085c7b7f27d652d568a3773c0a74facfb2c155bb8733f28032dbb5130e4977df2357869d588264e37b6f71fb1f4e15ca7556abdcf17f8e73cbc431351701d3d4d0a2e9854aa2de3b6ddd3952948cc16f7c8fc760080ea195f4f159ad289c453b298712498f6abe78894e39b8d04be892295ef56ecaf950e5896ae6304ebf87821a49f780611194ba0ffc2c519e41bc4c0b524d19f1834cac66afeea4a7b0fdd0e2502bc24eb11349296ff15812f22ae1d026b24a5285dc0a83506cceb8b78f7413e9f8e8c4ff9277f18903244785d64acdc52991fe0ec0854fbfad0d56b4853a9064e8b1dfa7f123403312373a0442c60c8011ff36d3399fcc6484b918b7010273ad67a6370281cbb51cd3c2ca872656896242be35edcc5845ea11257bdcbc3ec2e1418a7f0cc683dd3dd4fee4e23c35f61436daf33347644480b1d6ff0b3490bd2443a073965844d74fcdf83fe6f1cd30c692215bd75425fc063c0529ba4aab895670a56fabd56e0eae9b2d2e1655ce9f778ae44fb6c75fa8a5905aa92e3c4acd28d375c0c037732239209b67a688ab443932604c3641bf31b4f079ed22902a1ea3f0e8587ba5fd8a9b1a966b68f1ccc27b6d241f29fff5753a63d807e9ac1803688d7df8b58dea78e5d0f60829b1770ccbb45dc8073ed61cb9e9f86d54fa4cc05a788fea0bc304cfe4c6c30dd4f105c74914e9762e98e61b941558a1a30135840548aa48cd70ec365925a60e41a35995457368bba2e8782970423145d8cc54cd6598a98829b93ac5ec793e2487d0def1df417bac0017208b0bee103d8e620a85edf24c8e2f58f9bb7bc7364ae6a6604feaf7bea0b637a7bb8e61a5ea8becfa19bc45ba07aebcbcd97342467a248a0d7cdf01f7e9522c1839c3b19976a5e589261604e366b4aa42bf1aa0bf98cef8a1a17905c4f54f33f347637e37ad3b8b595e3dbe7d032a61bf8c6b0784f6be921cb9e60408e70a01aafed4384322a0a42b53e4b4fc9edda27933aee34413e07bc576f8d74867499b17456f205005a00000000000f59f0d747a0336a829b4be996e83fbb5e365e30b63aa9967c2461cfc385acc84d15c465f9b3014c8044ca317ee5d9dc5b7438e3e48684e1ae9f13c9489c72c239a19f6f786b858aef8ea62e9cfe2b9b27133da911123ad2367539d43181480446e9aa7dd292fb7bf255e3024efed5be91a0da7812ec12271ecc49f412c2d10d2665c6c7a8ba7c40702a6fa98be1"], 0x2528}}, 0x20000084) fsetxattr$trusted_overlay_upper(r3, &(0x7f0000000580), 0x0, 0x0, 0x0) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, 0x0) 14:01:20 executing program 1: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\r\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 14:01:20 executing program 0: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\a\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 14:01:20 executing program 5: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$TIOCPKT(r2, 0x5441, &(0x7f0000000040)) 14:01:20 executing program 4: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\t\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 14:01:20 executing program 6: ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=0xffffffffffffffff, @ANYBLOB="6b0500003b0000002e2f6669416ae0a1"]) syz_genetlink_get_family_id$tipc(&(0x7f0000000000), r0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) dup3(r2, r1, 0x0) 14:01:20 executing program 7: r0 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_SET_INTERFACE(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000140)={0x24, r0, 0x5, 0x0, 0x0, {{}, {@val={0x8, 0x3, r1}, @void}}, [@NL80211_ATTR_IFTYPE={0x8, 0x5, 0x7}]}, 0x24}}, 0x0) sendmsg$NL80211_CMD_JOIN_MESH(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000200)={0x30, r0, 0x5, 0x0, 0x0, {{}, {@val={0x8, 0x3, r1}, @void}}, [@NL80211_ATTR_MESH_ID={0xa}, @chandef_params=[@NL80211_ATTR_WIPHY_FREQ={0x8}]]}, 0x30}}, 0x0) sendmsg$NL80211_CMD_GET_MPP(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000002c0)={0x28, r0, 0x5, 0x0, 0x0, {{}, {@val={0x8, 0x3, r1}, @void}}, [@NL80211_ATTR_MAC={0xa}]}, 0x28}}, 0x0) sendmsg$NL80211_CMD_GET_WOWLAN(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x28, r0, 0x200, 0x70bd27, 0x25dfdbff, {{}, {@val={0x8, 0x1, 0x58}, @void, @val={0xc, 0x99, {0x800, 0x67}}}}, ["", "", "", "", "", "", "", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x4084}, 0x0) r2 = syz_genetlink_get_family_id$nl802154(&(0x7f00000002c0), 0xffffffffffffffff) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_SET_CHANNEL(r3, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000440)={0x2c, r2, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_CHANNEL={0x5, 0x8, 0xff}, @NL802154_ATTR_WPAN_PHY={0x8}, @NL802154_ATTR_PAGE={0x5}]}, 0x2c}}, 0x0) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'wpan0\x00', 0x0}) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x50, r2, 0x400, 0x70bd2d, 0x25dfdbfb, {}, [@NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x3}, @NL802154_ATTR_NETNS_FD={0x8}, @NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_IFINDEX={0x8, 0x3, r4}, @NL802154_ATTR_PID={0x8}, @NL802154_ATTR_WPAN_DEV={0xc}, @NL802154_ATTR_PID={0x8}]}, 0x50}, 0x1, 0x0, 0x0, 0x40}, 0x5) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = syz_open_dev$tty1(0xc, 0x4, 0x1) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r6, 0x6, 0x13, &(0x7f00000000c0)=0x1, 0x4) connect$inet6(r6, &(0x7f0000000040)={0xa, 0x4e22, 0x1, @empty, 0x7fffffff}, 0x1c) connect$inet6(r6, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) getsockopt$inet6_int(r6, 0x29, 0x10, 0x0, &(0x7f0000000e00)) fsetxattr$trusted_overlay_upper(r5, &(0x7f0000000580), 0x0, 0x0, 0x0) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, 0x0) 14:01:20 executing program 2: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\t\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 14:01:20 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$TIOCPKT(r2, 0x5429, &(0x7f0000000040)) 14:01:20 executing program 0: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\b\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 14:01:20 executing program 1: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x0e\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 14:01:20 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$TIOCPKT(r2, 0x5429, &(0x7f0000000040)) 14:01:20 executing program 4: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\n\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 14:01:20 executing program 7: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x82a0}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) fsetxattr$trusted_overlay_upper(r0, &(0x7f0000000580), 0x0, 0x0, 0x0) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, 0x0) 14:01:20 executing program 6: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x401}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r2) ioctl$TIOCGPTPEER(r1, 0x5441, 0x7fffffff) 14:01:20 executing program 0: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\t\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 14:01:20 executing program 5: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$TIOCPKT(r2, 0x5450, &(0x7f0000000040)) 14:01:20 executing program 2: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\n\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 14:01:20 executing program 7: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x101}, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = openat$incfs(0xffffffffffffffff, &(0x7f0000000000)='.pending_reads\x00', 0x62000, 0x54) ioctl$TIOCL_SETSEL(r1, 0x541c, &(0x7f0000000040)={0x2, {0x2, 0x1, 0x81, 0x8, 0x1, 0xf}}) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r2, 0x4b63, 0x0) write$binfmt_elf64(r2, &(0x7f0000000080)=ANY=[@ANYBLOB="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"], 0x110) fsetxattr$trusted_overlay_upper(r0, &(0x7f0000000580), 0x0, 0x0, 0x0) fsconfig$FSCONFIG_SET_BINARY(r1, 0x2, &(0x7f00000001c0)='\x00', &(0x7f00000005c0)="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", 0x1000) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, 0x0) 14:01:20 executing program 1: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x0f\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 14:01:20 executing program 4: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\v\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 14:01:20 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$TIOCPKT(r2, 0x5410, &(0x7f0000000040)) 14:01:20 executing program 6: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000080)=0x0) perf_event_open(&(0x7f0000000000)={0x5, 0x80, 0x7f, 0x5, 0x4, 0x3, 0x0, 0x39429e1e, 0x43062, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x0, @perf_config_ext={0x43, 0x7}, 0x1004, 0x6, 0x7ff, 0x4, 0x400, 0x3e1c, 0x200, 0x0, 0x200, 0x0, 0x7fffffff}, r2, 0x7, r0, 0x8) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) dup3(r3, r1, 0x0) 14:01:20 executing program 5: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$TIOCPKT(r2, 0x5451, &(0x7f0000000040)) 14:01:20 executing program 1: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x11\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 14:01:20 executing program 4: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\f\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) [ 2226.432745] kmemleak: 4 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 14:01:41 executing program 4: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\r\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 14:01:41 executing program 6: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = dup3(r1, r0, 0x0) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$FS_IOC_FSSETXATTR(r3, 0x401c5820, &(0x7f00000002c0)={0x3, 0xfff, 0x1f, 0xffff, 0xd9}) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r4, 0x8933, &(0x7f0000000080)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_SET_INTERFACE(r4, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000140)={0x24, r5, 0x5, 0x0, 0x0, {{}, {@val={0x8, 0x3, r6}, @void}}, [@NL80211_ATTR_IFTYPE={0x8, 0x5, 0x7}]}, 0x24}}, 0x0) sendmsg$NL80211_CMD_JOIN_MESH(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000200)={0x28, r5, 0x5, 0x0, 0x0, {{}, {@val={0x8, 0x3, r6}, @void}}, [@NL80211_ATTR_MESH_ID={0xa}, @chandef_params]}, 0x28}}, 0x0) sendmsg$NL80211_CMD_GET_MPP(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000300)={0x58, r5, 0x5, 0x0, 0x0, {{}, {@val={0x8, 0x3, r6}, @void}}, [@NL80211_ATTR_MAC={0xa}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_MPATH_NEXT_HOP={0xa, 0x1a, @broadcast}, @NL80211_ATTR_MPATH_NEXT_HOP={0xa, 0x1a, @device_b}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}]}, 0x58}}, 0x0) sendmsg$NL80211_CMD_LEAVE_MESH(r2, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x0, 0x100, 0x70bd29, 0x25dfdbfb, {{}, {@val={0x8, 0x3, r6}, @void}}, ["", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x40081}, 0x0) 14:01:41 executing program 7: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r1, 0x4b63, 0x0) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x3000000, 0x1010, r1, 0xf2ca2000) ioctl$VT_RESIZE(r0, 0x4b63, 0x0) fsetxattr$trusted_overlay_upper(r0, &(0x7f0000000580), 0x0, 0x61, 0x0) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, 0x0) 14:01:41 executing program 0: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\n\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 14:01:41 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$TIOCPKT(r2, 0x5410, &(0x7f0000000040)) 14:01:41 executing program 2: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\v\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 14:01:41 executing program 5: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$TIOCPKT(r2, 0x5452, &(0x7f0000000040)) 14:01:41 executing program 1: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x12\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 14:01:41 executing program 4: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x0e\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 14:01:41 executing program 6: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x70a01, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f0000000080)=ANY=[@ANYBLOB="01000000", @ANYRES32=r1, @ANYBLOB="04000000000000002e2f66696c653000"]) perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0xb7, 0xff, 0x45, 0x3, 0x0, 0x18, 0xa2040, 0x2, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x8, 0x2, @perf_config_ext={0x400, 0x3}, 0x200, 0x1, 0x257, 0x9, 0x0, 0x80000000, 0x3, 0x0, 0x80000000, 0x0, 0x1a6e}, 0xffffffffffffffff, 0xc, r2, 0x1) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r3, 0x4b63, 0x0) dup(r3) ioctl$VT_RESIZE(r1, 0x4b63, 0x0) r4 = ioctl$TIOCGPTPEER(r1, 0x5441, 0x1) ioctl$PIO_CMAP(r4, 0x4b71, &(0x7f00000000c0)={0x5, 0x1000, 0x1e4, 0x1, 0x8000, 0x2c3c}) ioctl$TIOCGPTPEER(r1, 0x5441, 0x81) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) dup3(r5, r0, 0x0) 14:01:41 executing program 1: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x14\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 14:01:41 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$TIOCPKT(r2, 0x5410, &(0x7f0000000040)) 14:01:41 executing program 0: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\v\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) [ 2246.605208] kmemleak: 2 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 14:02:01 executing program 0: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\f\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 14:02:01 executing program 2: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\f\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 14:02:01 executing program 6: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r2, 0x4b63, 0x0) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r3, 0x4b63, 0x0) ioctl$BTRFS_IOC_SEND(r2, 0x40489426, &(0x7f0000000040)={{r3}, 0x4, &(0x7f0000000000)=[0x100000000, 0x4, 0x7f, 0x800], 0x9, 0x1, [0x4, 0x3, 0x0, 0x100]}) dup3(r1, r0, 0x0) 14:02:01 executing program 5: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$TIOCPKT(r2, 0x545d, &(0x7f0000000040)) 14:02:01 executing program 4: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x0f\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 14:02:01 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5410, &(0x7f0000000040)) 14:02:01 executing program 1: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*/\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 14:02:01 executing program 7: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) fsetxattr$trusted_overlay_upper(r0, &(0x7f0000000580), 0x0, 0x0, 0x0) sendmsg$DEVLINK_CMD_RATE_GET(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000040)={0x84, 0x0, 0xa01, 0x70bd2d, 0x25dfdbff, {}, [@DEVLINK_ATTR_PORT_INDEX={0x8, 0x3, 0x3}, @handle=@pci={{0x8}, {0x11}}, @handle=@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_PORT_INDEX={0x8, 0x3, 0x1}, @DEVLINK_ATTR_PORT_INDEX={0x8, 0x3, 0x3}, @handle=@pci={{0x8}, {0x11}}]}, 0x84}}, 0x8094) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, 0x0) 14:02:01 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5410, &(0x7f0000000040)) 14:02:01 executing program 1: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*2\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 14:02:01 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x400000000, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0xa) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000000)=@IORING_OP_FSYNC={0x3, 0x0, 0x0, @fd_index=0x1, 0x0, 0x0, 0x0, 0x1, 0x1}, 0xbcf) fsetxattr$trusted_overlay_upper(r0, &(0x7f0000000580), 0x0, 0x0, 0x0) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r3 = dup3(r2, r1, 0x0) ioctl$TIOCPKT(r3, 0x5420, &(0x7f0000000040)) pidfd_getfd(r3, r0, 0x0) 14:02:01 executing program 4: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x11\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 14:02:01 executing program 0: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\r\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 14:02:01 executing program 5: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$TIOCPKT(r2, 0x5460, &(0x7f0000000040)) 14:02:01 executing program 6: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r2, 0x4b63, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x24c80, 0x0) ioctl$TIOCGPTPEER(r2, 0x5441, 0x9) syz_open_dev$tty1(0xc, 0x4, 0x2) ioctl$TIOCL_GETKMSGREDIRECT(r2, 0x541c, &(0x7f0000000040)) dup3(r1, r0, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close_range(r3, r1, 0x0) 14:02:01 executing program 2: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\r\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 14:02:15 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5410, &(0x7f0000000040)) 14:02:15 executing program 4: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x12\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 14:02:15 executing program 6: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x2) pwrite64(r0, &(0x7f0000000040)="f1957f9e4c5b0cb59588d96d517ca7b24d3d698b6209defdad937812957213501f163141ad433590968204a16b9e58e6a9b6793dd566d10d", 0x38, 0x4) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) dup3(r2, r1, 0x0) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r3, 0x4b63, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) dup2(r3, r4) ioctl$BTRFS_IOC_QUOTA_CTL(0xffffffffffffffff, 0xc0109428, &(0x7f0000000000)={0x1, 0x10001}) 14:02:15 executing program 7: setxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080), &(0x7f00000000c0)={'U-', 0x7}, 0x16, 0x2) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) r2 = dup3(r0, r0, 0x0) r3 = syz_open_dev$mouse(&(0x7f0000000000), 0x2, 0x747880) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r3) fsetxattr$trusted_overlay_upper(r1, &(0x7f0000000580), 0x0, 0x0, 0x0) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, 0x0) 14:02:15 executing program 1: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcb\t\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 14:02:15 executing program 2: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x0e\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 14:02:15 executing program 0: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x0e\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 14:02:15 executing program 5: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$TIOCPKT(r2, 0x40045431, &(0x7f0000000040)) 14:02:15 executing program 4: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x14\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 14:02:15 executing program 2: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x0f\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 14:02:15 executing program 0: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x0f\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 14:02:15 executing program 5: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$TIOCPKT(r2, 0x40045436, &(0x7f0000000040)) 14:02:15 executing program 6: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = fcntl$getown(r0, 0x9) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000040)={&(0x7f0000001e00)={0x2244, 0x15, 0x10, 0x70bd29, 0x25dfdbfd, {0xa}, [@generic="e8057bd88be7af64505cec2b4e3f9b5f9451cdfcb183c309ea8477f216623eb5685901078f407526d443178562d0313e75907a3cbaed80319eefffe8ce6ead97543590f8c08884d36070c0a971811dbda94ea213b5fc0556e7c398059b1b8f0009ce2a58293ef6fa876311128f5739ae48fa28350b8d2b89d366b7fb7d5920f1268d46a833c9c0aeed874cff", @typed={0x8, 0x72, 0x0, 0x0, @ipv4=@remote}, @typed={0x14, 0x2e, 0x0, 0x0, @ipv6=@loopback}, @nested={0x4c, 0x5e, 0x0, 0x1, [@generic="b2935adca3f4fc4f457bd388562bda7bca7fd31b2c4276851edff8e30417279aa0e3614d3879ba4ff4e25a977f563d92316f71047e7e8909", @generic="7254c742", @typed={0xc, 0x6a, 0x0, 0x0, @u64=0x8}]}, @nested={0x38, 0x18, 0x0, 0x1, [@generic="8c3de9f598d522f99832eef19ceef034b946da46d4b9fc78e4b2947582d9a239895c892c7c807114fa5264504ea709720c586ada"]}, @typed={0x8, 0x6d, 0x0, 0x0, @pid=r1}, @generic="922893d632a4057b1aec17228818e123ebe2a0eddd4f304079b631a7ff02a74bf2d1192319660dc45178d0787f4287921734ddb9c82be8e1b6dac22e98998c2785a117de76a24e1e80bba90e18a3c179dd41d71949029b20a6d0909280648b74744b975482e391c59bc1f148d692df5a83fa36be6072293c4344146b669bbf03d0c2448ed33720054a77", @typed={0x14, 0x2f, 0x0, 0x0, @ipv6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}, @nested={0x2059, 0x8b, 0x0, 0x1, [@typed={0x4, 0x46}, @typed={0x8, 0x38, 0x0, 0x0, @u32=0x5}, @generic="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", @typed={0x1004, 0x55, 0x0, 0x0, @binary="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"}, @generic="5b68a03f0e7edd51626b03a927d6ce10f2b9af6d1fe7e36ab6d31f230072eca796b009c539166d78e3c0f8c73cc22069d88b06f14a01f85dcdc7941f0d4ba4f876aa94acb0"]}]}, 0x2244}, 0x1, 0x0, 0x0, 0x40004}, 0x810) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) dup3(r2, r0, 0x0) 14:02:15 executing program 7: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x52fb, &(0x7f0000000040)={0x0, 0x223c, 0x1, 0x1, 0x2e7}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f00000000c0), &(0x7f0000000100)) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x220000, 0x4) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) syz_io_uring_setup(0x7624, &(0x7f0000000140)={0x0, 0x936c, 0x20, 0x0, 0x3a2}, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f00000001c0), &(0x7f0000000200)) fsetxattr$trusted_overlay_upper(r0, &(0x7f0000000580), 0x0, 0x0, 0x0) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, 0x0) 14:02:15 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = dup3(0xffffffffffffffff, r0, 0x0) ioctl$TIOCPKT(r1, 0x5410, &(0x7f0000000040)) 14:02:15 executing program 1: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x14D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 14:02:32 executing program 1: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa62D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 14:02:32 executing program 4: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b./\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 14:02:32 executing program 6: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$TIOCPKT(r2, 0x5420, &(0x7f0000000040)) perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x9, 0x4, 0xa0, 0x3, 0x0, 0x6, 0x85683, 0xc, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x8, 0x0, @perf_bp={&(0x7f0000000000), 0x7}, 0x10000, 0x6, 0x6, 0x9, 0xf9c, 0x401, 0x3, 0x0, 0x1}, 0xffffffffffffffff, 0x5, r2, 0x1) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) dup3(r4, r3, 0x0) 14:02:32 executing program 7: r0 = socket$inet(0x2, 0x3, 0xff) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000280)="b683ae7d0000000000000000000000000000000200000000", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r2, @broadcast}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x40}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000140)={'ip6gre0\x00', &(0x7f00000000c0)={'ip6gre0\x00', r2, 0x4, 0x4, 0x1, 0x400, 0x2, @mcast1, @local, 0x700, 0x20, 0x3, 0x9}}) r3 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$tty1(0xc, 0x4, 0x1) fsetxattr$trusted_overlay_upper(r4, &(0x7f0000000580), 0x0, 0x0, 0x0) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, 0x0) r5 = syz_open_dev$tty1(0xc, 0x4, 0x1) r6 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x80000, 0x0) ioctl$GIO_UNIMAP(r6, 0x4b66, &(0x7f0000000080)={0x8, &(0x7f0000000040)=[{}, {}, {}, {}, {}, {}, {}, {}]}) ioctl$VT_RESIZE(r5, 0x4b63, 0x0) dup3(r5, r3, 0x0) 14:02:32 executing program 5: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$TIOCPKT(r2, 0x40049409, &(0x7f0000000040)) 14:02:32 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = dup3(0xffffffffffffffff, r0, 0x0) ioctl$TIOCPKT(r1, 0x5410, &(0x7f0000000040)) 14:02:32 executing program 2: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x11\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 14:02:32 executing program 0: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x11\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 14:02:32 executing program 1: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x02\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 14:02:32 executing program 4: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.2\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 14:02:32 executing program 2: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x12\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 14:02:32 executing program 6: perf_event_open(&(0x7f0000001d80)={0x5, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc8000, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000040), 0x7}, 0x1002, 0x0, 0xfffffffd, 0x4, 0x10000000000006, 0x0, 0x0, 0x0, 0xfffff52b}, 0x0, 0x0, 0xffffffffffffffff, 0xa) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x213000, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) dup3(r1, r0, 0x0) 14:02:32 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = dup3(0xffffffffffffffff, r0, 0x0) ioctl$TIOCPKT(r1, 0x5410, &(0x7f0000000040)) 14:02:32 executing program 0: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x12\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 14:02:32 executing program 5: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$TIOCPKT(r2, 0x40086602, &(0x7f0000000040)) 14:02:32 executing program 7: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) fsetxattr$trusted_overlay_upper(r0, &(0x7f0000000580), 0x0, 0x0, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f0000000080)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_SET_INTERFACE(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000140)={0x24, r2, 0x5, 0x0, 0x0, {{}, {@val={0x8, 0x3, r3}, @void}}, [@NL80211_ATTR_IFTYPE={0x8, 0x5, 0x7}]}, 0x24}}, 0x0) sendmsg$NL80211_CMD_JOIN_MESH(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000200)={0x30, r2, 0x5, 0x0, 0x0, {{}, {@val={0x8, 0x3, r3}, @void}}, [@NL80211_ATTR_MESH_ID={0xa}, @chandef_params=[@NL80211_ATTR_WIPHY_FREQ={0x8}]]}, 0x30}}, 0x0) sendmsg$NL80211_CMD_GET_MPP(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000002c0)={0x28, r2, 0x5, 0x0, 0x0, {{}, {@val={0x8, 0x3, r3}, @void}}, [@NL80211_ATTR_MAC={0xa}]}, 0x28}}, 0x0) sendmsg$NL80211_CMD_SET_CQM(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000180)={&(0x7f0000000040)={0x118, r2, 0x8, 0x70bd2c, 0x25dfdbfc, {{}, {@void, @void}}, [@NL80211_ATTR_CQM={0xc, 0x5e, 0x0, 0x1, [@NL80211_ATTR_CQM_TXE_INTVL={0x8, 0x7, 0x301}]}, @NL80211_ATTR_CQM={0x24, 0x5e, 0x0, 0x1, [@NL80211_ATTR_CQM_RSSI_LEVEL={0x8, 0x9, 0x10000}, @NL80211_ATTR_CQM_RSSI_LEVEL={0x8, 0x9, 0xdd8d}, @NL80211_ATTR_CQM_RSSI_HYST={0x8, 0x2, 0x10000000}, @NL80211_ATTR_CQM_RSSI_THRESHOLD_EVENT={0x8, 0x3, 0x563}]}, @NL80211_ATTR_CQM={0xc, 0x5e, 0x0, 0x1, [@NL80211_ATTR_CQM_RSSI_LEVEL={0x8, 0x9, 0xf1fe}]}, @NL80211_ATTR_CQM={0x44, 0x5e, 0x0, 0x1, [@NL80211_ATTR_CQM_TXE_RATE={0x8, 0x5, 0x56}, @NL80211_ATTR_CQM_RSSI_LEVEL={0x8, 0x9, 0x6}, @NL80211_ATTR_CQM_TXE_PKTS={0x8, 0x6, 0x3}, @NL80211_ATTR_CQM_RSSI_LEVEL={0x8, 0x9, 0x5}, @NL80211_ATTR_CQM_RSSI_THOLD={0x10, 0x1, [0x4, 0x401, 0xba5d]}, @NL80211_ATTR_CQM_TXE_RATE={0x8, 0x5, 0x3f}, @NL80211_ATTR_CQM_TXE_RATE={0x8, 0x5, 0x6}]}, @NL80211_ATTR_CQM={0x60, 0x5e, 0x0, 0x1, [@NL80211_ATTR_CQM_RSSI_THRESHOLD_EVENT={0x8, 0x3, 0xb7a9}, @NL80211_ATTR_CQM_TXE_PKTS={0x8, 0x6, 0x60}, @NL80211_ATTR_CQM_RSSI_THRESHOLD_EVENT={0x8, 0x3, 0x2}, @NL80211_ATTR_CQM_RSSI_LEVEL={0x8, 0x9, 0x10001}, @NL80211_ATTR_CQM_RSSI_THOLD={0x14, 0x1, [0x1, 0x5, 0x6, 0x7]}, @NL80211_ATTR_CQM_TXE_INTVL={0x8, 0x7, 0x44e}, @NL80211_ATTR_CQM_RSSI_THRESHOLD_EVENT={0x8, 0x3, 0x1}, @NL80211_ATTR_CQM_RSSI_THRESHOLD_EVENT={0x8, 0x3, 0x81}, @NL80211_ATTR_CQM_RSSI_LEVEL={0x8}, @NL80211_ATTR_CQM_RSSI_THRESHOLD_EVENT={0x8, 0x3, 0x3}]}, @NL80211_ATTR_CQM={0x24, 0x5e, 0x0, 0x1, [@NL80211_ATTR_CQM_RSSI_THRESHOLD_EVENT={0x8, 0x3, 0x3}, @NL80211_ATTR_CQM_TXE_RATE={0x8, 0x5, 0x2a}, @NL80211_ATTR_CQM_RSSI_HYST={0x8, 0x2, 0x3}, @NL80211_ATTR_CQM_TXE_RATE={0x8, 0x5, 0x20}]}]}, 0x118}, 0x1, 0x0, 0x0, 0x40c0}, 0x0) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, 0x0) 14:02:32 executing program 6: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100), 0x40cc0, 0x0) ioctl$TIOCGPTPEER(r2, 0x5441, 0x0) dup3(r1, r0, 0x0) r3 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000), 0xc2200, 0x0) sendmsg$nl_generic(r3, &(0x7f00000000c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000180)={0x528, 0x26, 0x100, 0x70bd27, 0x25dfdbfb, {0x2}, [@nested={0x3a0, 0x62, 0x0, 0x1, [@generic="da757ef624f674aa0252c8a735a3ef9a92888ca07b240f6f08af60cec7531bcaef230e75efdc32b4bed9b1cca5f0ce782db47f72c87df2fc63a503af6f9fb4b7f8c3abb038d179afcd7104addd0fdb5b500a11ebc429c8729f1ebbf0992e6e1e78f64238688fc19bebfd7a2e23b60c6ebb4cfe4895844e706de3e0e43e6ad80099e00af75ab6895fd6b16f7b3291e1d26b1daeeb088352ed19f1124213ff832526c1b94637e483c179b03e108d38e3a5d9d49a992cb04f164dcc8003c4bfa5c3a1cad4505a4971c266270465116069c1e1f7d7615fd4108ced", @generic="a69a8c6a7593c5100ae183c4db18dbff091bdf999ea3ebde", @generic="b416ba78dee04996b68d9023f67d8b2f48ac01b3e6d43e08b33461447b5741211e17dd5c63b143085a52ae46fe581daed0d38d1fa666780ca4a183cb6053c8139b8c806ac801d13d2182d77bd3fc1d0c01fc369283dad7d39ffc3a5fa1ca6356aad6a4538ba21d9635023234482c0604b99b02b9a0370c8e72c4625fe05c84553edf378f0031a3ca3da4ae111fe441c01bc6c4d1c7df19424dd162b37bfdefad68cf834170b6211a4e871f3f280b84b92a4b55c3396dcd434bc286552a2501e8ede08f", @generic="af24f61f3a3a373c7ea65829f77e176631231a84cba1bfc4e705dd3d717494bdb5ac69e2c3e8239c53f678b8ac3e9f6d3937192f456a5f7e783e85f8b87b8805f00a55", @generic="6520c70d5270fe1b981695a4398fc44be8b2c274cabaf4df375eb53b81020d270311f5a80b72291175104a8ff529532de56e79c13dd47b80fdde1c009f9bbb4e85c8b8b651cb523895506f25be1bfe4ee250a9ef8769943466bf6fb1ae147a3084983f0d58fc9f4b882f92b729bd8fd2af6c3b760c68fbd080f353d67e95d2d74fbd8e391317900434f0001cf8f22420da9cd63e23c1ca74406793d13b107d12eb4c779e7bd9d3311e80917c6b59980b0351d4f7594807465d", @generic="bb4105bfbdbae79dd3ea5abed1db501de0431d82cfbc8bef143b0adbbc813f31bcfb8ec2fc764e47db8faceca6259e88188791aef0a6ef400f69caef529ef15e5edbe88ca244013ab73636c909c0e996e3297918e61670de5b1ef002e057bc5946036414a6312384daf2be59f198c8771c79da6f87d8228295ead941b7109cb50489ee6437c7f23d9d55af7a8a19beb59e428799ccc18b6ccc0b433018dee726b34f3ef5cc6e80f29c891c7b09a5c823e51058f687c5ba5d25365903fdcc37ed0ad8038e2bcc1a0b4a9a88a236f900f7780161332b17d029c693815805062d219ed06df71cf8a9d83b59534d"]}, @generic="6f1fdd4fa22175202c5fd33b16c77f9d8de13709568d925b01a87d69f64eb01da1e51c420f257c0b795af074a68ec28e543d67117da6b5d80dd1bbd6c48c031fae09c0eb24b6165fd11da3c73fed0f37c6b9b97460198c642d035c1fe23c21e53013b1a32dee1a47e45c0cb9e4dfb51e63b15564bd", @nested={0xf9, 0x89, 0x0, 0x1, [@generic="d98d3701c14c665216a744325adf61fd0bdace9b3a412978aff048b6e44af44ee2b00577", @generic="37807a2313931dfbecba94cededdcb26db47ae8320b6779a27a78fe24bac906854dabee04925f3385c087d6dc6d04e47cf13475b2d165e05e9fda48e57e0c51a858152f99f92334fe6fbe3ce21f518cc17a9752cec3c9d1f5048c6e83041d08eb90dbecae94748a5f4b81c5dfa1e156bb58f66f340840e703c4d727f63f68e2c829bd14074e483f5f0a3aa7c233c0c0fae4bf0909e80e7af2eda3d50a1687f4d4e384ea7009c80319a55388a9f90ea90f09d3444ab47a842c90b8e6cb96194aa8b6b380c9d7e27a4eece984001d97406b5"]}]}, 0x528}, 0x1, 0x0, 0x0, 0x10}, 0x0) 14:02:32 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = dup3(r0, 0xffffffffffffffff, 0x0) ioctl$TIOCPKT(r1, 0x5410, &(0x7f0000000040)) 14:02:32 executing program 2: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x14\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) [ 2296.708675] kmemleak: 6 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 14:02:51 executing program 1: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x04\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 14:02:51 executing program 2: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b./\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 14:02:51 executing program 6: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) perf_event_open(&(0x7f0000000380)={0x5, 0x80, 0x7f, 0x5, 0x67, 0xa2, 0x0, 0x855, 0x500, 0x9, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x5, @perf_config_ext={0xfe, 0x1}, 0x402, 0xffffffffffff0001, 0x200, 0x5, 0x7, 0x8, 0x1, 0x0, 0x3, 0x0, 0x9}, 0x0, 0x2, r0, 0x0) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r3, 0x4b63, 0x0) readv(r2, &(0x7f0000000300), 0x0) ioctl$TIOCSPTLCK(r3, 0x40045431, &(0x7f0000000000)=0x1) dup3(r2, r1, 0x0) 14:02:51 executing program 7: ioctl$CDROMVOLCTRL(0xffffffffffffffff, 0x530a, &(0x7f0000000000)={0xb8, 0x2d, 0x1, 0x2}) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) fsetxattr$trusted_overlay_upper(r0, &(0x7f0000000580), 0x0, 0x0, 0x0) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, 0x0) 14:02:51 executing program 4: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x02Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 14:02:51 executing program 0: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x14\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 14:02:51 executing program 5: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$TIOCPKT(r2, 0x40087602, &(0x7f0000000040)) 14:02:51 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = dup3(r0, 0xffffffffffffffff, 0x0) ioctl$TIOCPKT(r1, 0x5410, &(0x7f0000000040)) 14:02:52 executing program 5: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$TIOCPKT(r2, 0x4020940d, &(0x7f0000000040)) 14:02:52 executing program 1: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x06\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 14:02:52 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = dup3(r0, 0xffffffffffffffff, 0x0) ioctl$TIOCPKT(r1, 0x5410, &(0x7f0000000040)) [ 2318.480397] kmemleak: 1 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 14:03:12 executing program 5: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$TIOCPKT(r2, 0x80045430, &(0x7f0000000040)) 14:03:12 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$TIOCPKT(r2, 0x5410, &(0x7f0000000040)) 14:03:12 executing program 0: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b./\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 14:03:12 executing program 6: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x3, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = dup3(r1, r0, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f0000000000)='pids.events\x00', 0x0, 0x0) r4 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r4, 0x4b63, 0x0) close_range(r3, r4, 0x2) 14:03:12 executing program 4: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x04Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 14:03:12 executing program 2: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.2\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 14:03:12 executing program 7: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, &(0x7f0000000000)={0x1f, 0xffffffffffffffff, 0x3}, 0x65) bind$bt_hci(r0, &(0x7f0000000040)={0x1f, 0x1}, 0x6) socketpair(0x11, 0x4, 0x100, &(0x7f0000000340)={0xffffffffffffffff}) write$bt_hci(r1, &(0x7f0000000380)={0x1, @create_phy_link={{0x435, 0x33}, {0xc9, 0x20, 0x20, "5236d0ecd77f0884b9999436bcbb75a2a29922d0a25ec872ca7215b70621b763921bd10d9209070e719c0fffd217d2e3"}}}, 0x37) write$bt_hci(r0, &(0x7f0000000080)=ANY=[@ANYRES64=r0], 0x6) ioctl$sock_SIOCSIFVLAN_SET_VLAN_FLAG_CMD(r0, 0x8983, &(0x7f0000000000)={0x7, 'gre0\x00', {0x6}, 0x4000}) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = perf_event_open(&(0x7f0000001d80)={0x4, 0x80, 0x70, 0x3, 0xfd, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x9, 0x101}, 0x4984, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xc, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) fsetxattr$trusted_overlay_upper(r3, &(0x7f0000000580), 0x0, 0x0, 0x0) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, 0x0) r4 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000003c0)=0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) write$bt_hci(0xffffffffffffffff, &(0x7f0000000300)={0x1, @le_accept_cis={{0x2066, 0x2}, {0xc8}}}, 0x6) syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x4, 0x8, 0x6, 0x7, 0x0, 0x6, 0x10290, 0x2, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x4, @perf_bp={&(0x7f00000000c0), 0x2}, 0x1, 0x7fff, 0x8, 0x0, 0x100000001, 0xd5, 0x7, 0x0, 0x10001, 0x0, 0x1}, r5, 0x8, r4, 0x8) close(r2) io_cancel(0x0, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x3db73fb12974062f, 0x7fff, r4, &(0x7f00000001c0)="8f1e54b3cffbe3a0435c2cbad0380b3caeb8183a708a22572617c4d2c66e609120fbe454e92340ef097b03a467c4256c39181e9adf35b7458586aee34873bcceb006968e0e1a012ec20ac7172bd87ac3be528c65062595478bfd8ae586760a328f419b198973ebdd7604bd86f9dcde139f9787601a3dbc006080e42ea5677e7b1e9b6bccfcba7bcb9f47dcee368f320dad8c071be750949fbe8941de0fdaa0082a427981a23c3c", 0xa7, 0x1, 0x0, 0x1}, &(0x7f00000002c0)) 14:03:12 executing program 1: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\a\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 14:03:12 executing program 0: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.2\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 14:03:13 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$TIOCPKT(r2, 0x5410, &(0x7f0000000040)) 14:03:13 executing program 5: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$TIOCPKT(r2, 0x80045432, &(0x7f0000000040)) 14:03:13 executing program 6: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$TIOCPKT(r2, 0x5420, &(0x7f0000000040)) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x4, @perf_config_ext}, 0xffffffffffffffff, 0x0, r2, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x840, 0x120) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) dup3(r4, r3, 0x0) r5 = ioctl$TIOCGPTPEER(r0, 0x5441, 0x0) ioctl$TIOCGPTPEER(r5, 0x5441, 0x1) ioctl$TIOCVHANGUP(r0, 0x5437, 0x0) 14:03:13 executing program 1: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\b\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 14:03:13 executing program 4: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x05Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 14:03:13 executing program 2: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x02Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 14:03:13 executing program 0: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x02Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 14:03:13 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$TIOCPKT(r2, 0x5410, &(0x7f0000000040)) 14:03:13 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) fsetxattr$trusted_overlay_upper(r1, &(0x7f0000000580), 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000040)=ANY=[@ANYBLOB="010000000100000018000100", @ANYRES32=r0, @ANYRES32, @ANYRES32=0xee01, @ANYBLOB='./file0\x00']) ioctl$TIOCSBRK(r2, 0x5427) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, 0x0) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) r4 = syz_open_pts(0xffffffffffffffff, 0x200) fallocate(r4, 0x44, 0x5, 0x10000) ioctl$VT_RESIZE(r3, 0x4b63, 0x0) ioctl$AUTOFS_IOC_CATATONIC(r3, 0x9362, 0x0) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x8002, 0x0) dup3(r0, r5, 0x80000) 14:03:13 executing program 4: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x06Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) [ 2340.441287] kmemleak: 6 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 14:03:34 executing program 5: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$TIOCPKT(r2, 0x80045438, &(0x7f0000000040)) 14:03:34 executing program 4: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\aBp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 14:03:34 executing program 7: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4140, 0xbe, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) fsetxattr$trusted_overlay_upper(r0, &(0x7f0000000580), 0x0, 0x0, 0x0) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, 0x0) 14:03:34 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$TIOCPKT(r2, 0x5410, &(0x7f0000000040)) 14:03:34 executing program 1: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\t\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 14:03:34 executing program 2: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x04Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 14:03:34 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x400000, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x4}, 0x4000, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r0, 0x4b63, 0x0) r1 = fork() tkill(r1, 0xb) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r4 = dup3(r3, r2, 0x0) ioctl$TIOCPKT(r4, 0x5420, &(0x7f0000000040)) perf_event_open(&(0x7f0000000180)={0x5, 0x80, 0x3, 0x1, 0x4, 0x1f, 0x0, 0x0, 0x2, 0x4, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3ff, 0x2, @perf_bp={&(0x7f00000000c0), 0x4}, 0x4200, 0x5bd6, 0x100, 0x3, 0x24b, 0x7ff, 0x8, 0x0, 0x6, 0x0, 0x7b16ac9a}, r1, 0x0, r4, 0x3) ioctl$BTRFS_IOC_RESIZE(0xffffffffffffffff, 0x50009403, &(0x7f0000000080)={{r0}, {@void, @actul_num={@val=0x2b, 0x100, 0x6b}}}) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r6 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) dup3(r6, r5, 0x0) 14:03:34 executing program 0: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x04Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 14:03:34 executing program 7: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x401, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) fsetxattr$trusted_overlay_upper(r0, &(0x7f0000000580), 0x0, 0x0, 0x0) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000000)={@in={{0x2, 0x4e22, @multicast2}}, 0x0, 0x0, 0x39, 0x0, "38e84337a3bd3b3ee4901a332bc5eceb9c8fbe7c7e3ad15f2c750c85f3011e189c2084c4d39edaf39beb71ad8b81dd4c4cfc59ca8f9baa1b971142ed01b841268741a0c2c8d03ab56b5e7036b87d5bcb"}, 0xd8) 14:03:34 executing program 1: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\n\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 14:03:34 executing program 2: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x05Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 14:03:34 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$TIOCPKT(r2, 0x5410, &(0x7f0000000040)) 14:03:34 executing program 5: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$TIOCPKT(r2, 0x80045439, &(0x7f0000000040)) [ 2362.252710] kmemleak: 1 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 14:03:58 executing program 5: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$TIOCPKT(r2, 0x80045440, &(0x7f0000000040)) 14:03:58 executing program 0: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x05Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 14:03:58 executing program 7: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100), 0x2}, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) fsetxattr$trusted_overlay_upper(r0, &(0x7f0000000580), 0x0, 0x0, 0x0) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000040)={'ip6tnl0\x00', 0x0, 0x29, 0x1, 0x3, 0x82, 0x9, @private1, @dev={0xfe, 0x80, '\x00', 0xa}, 0x8000, 0x8000, 0x7, 0xe7}}) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, &(0x7f0000000000)) ioctl$TIOCGRS485(r0, 0x542e, &(0x7f0000000140)) 14:03:58 executing program 4: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\nBp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 14:03:58 executing program 1: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\f\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 14:03:58 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$TIOCPKT(r2, 0x5410, &(0x7f0000000040)) 14:03:58 executing program 2: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x06Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 14:03:58 executing program 6: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_complete(0x0) perf_event_open(&(0x7f0000000000)={0x3, 0x80, 0x1, 0x78, 0x5, 0x81, 0x0, 0x5, 0x10230, 0x3, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext={0x80, 0x3}, 0x22, 0x0, 0x4, 0x9, 0x0, 0xfffffffd, 0x81, 0x0, 0xffffffff}, 0x0, 0xe, r0, 0xa) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r3 = getpid() r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r6 = dup3(r5, r4, 0x0) ioctl$TIOCPKT(r6, 0x5420, &(0x7f0000000040)) perf_event_open(&(0x7f00000000c0)={0x4, 0x80, 0x60, 0x6, 0xf1, 0x3f, 0x0, 0x5, 0x12004, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000080), 0xb}, 0x400, 0x1ff, 0x18, 0x2, 0x9, 0x2, 0xffff, 0x0, 0x9}, r3, 0x8, r6, 0x0) ioctl$TIOCSIG(r1, 0x40045436, 0x1) r7 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$int_out(r2, 0x5462, &(0x7f0000000180)) ioctl$VT_RESIZE(r7, 0x4b63, 0x0) ioctl$TIOCEXCL(r7, 0x540c) dup3(r2, r1, 0x0) r8 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r8, 0x4b63, 0x0) ioctl$TIOCGPTPEER(r8, 0x5441, 0x29) 14:03:58 executing program 0: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x06Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 14:03:58 executing program 3: perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$TIOCPKT(r2, 0x5410, &(0x7f0000000040)) 14:03:58 executing program 7: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x2a0982, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0xb) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) fsetxattr$trusted_overlay_upper(r1, &(0x7f0000000580), 0x0, 0x0, 0x0) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, 0x0) 14:03:58 executing program 1: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\r\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 14:03:58 executing program 4: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x0fBp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 14:03:58 executing program 2: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\aBp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 14:03:58 executing program 5: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$TIOCPKT(r2, 0x80086601, &(0x7f0000000040)) 14:03:58 executing program 6: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x0, 0x0, 0x3f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) dup3(r1, r0, 0x0) 14:03:58 executing program 3: perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$TIOCPKT(r2, 0x5410, &(0x7f0000000040)) [ 2386.708317] kmemleak: 2 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 14:04:20 executing program 0: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\aBp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 14:04:20 executing program 7: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) fsetxattr$trusted_overlay_upper(r0, &(0x7f0000000580), 0x0, 0x0, 0x0) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r1, 0x4b63, 0x0) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, &(0x7f0000000040)) ioctl$TIOCGDEV(r1, 0x80045432, &(0x7f0000000000)) 14:04:20 executing program 3: perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$TIOCPKT(r2, 0x5410, &(0x7f0000000040)) 14:04:20 executing program 6: r0 = dup(0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1}, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, r0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r2, 0x4b63, 0x0) r3 = openat$cgroup_netprio_ifpriomap(r0, &(0x7f0000000040), 0x2, 0x0) ioctl$BTRFS_IOC_SUBVOL_CREATE(r2, 0x5000940e, &(0x7f0000000180)={{r3}, "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"}) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x242081, 0x0) dup3(r4, r1, 0x0) 14:04:20 executing program 5: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$TIOCPKT(r2, 0x80087601, &(0x7f0000000040)) 14:04:20 executing program 4: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x10Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 14:04:20 executing program 2: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\tBp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 14:04:20 executing program 1: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x0f\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 14:04:21 executing program 0: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\nBp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 14:04:21 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$TIOCPKT(r2, 0x5410, &(0x7f0000000040)) 14:04:21 executing program 6: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x4, 0x80, 0x0, 0x5, 0x40, 0x9, 0x0, 0x7f, 0x200, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7f, 0x4, @perf_bp, 0x0, 0x9, 0x5, 0x8, 0x80000001, 0xfb47, 0x8001, 0x0, 0x7ff, 0x0, 0x5}, 0x0, 0xa, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) dup3(r1, r0, 0x0) 14:04:21 executing program 2: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\nBp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 14:04:21 executing program 4: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x02D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 14:04:21 executing program 1: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x10\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 14:04:21 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f00000000c0), 0x3}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x80) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) fsetxattr$trusted_overlay_upper(r1, &(0x7f0000000580), 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r0, 0xc0189375, &(0x7f0000000040)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) dup3(r1, r2, 0x0) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, 0x0) 14:04:21 executing program 5: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$TIOCPKT(r2, 0xc0045878, &(0x7f0000000040)) 14:04:21 executing program 0: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x0fBp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) [ 2407.135115] kmemleak: 5 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 14:04:43 executing program 0: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x10Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 14:04:43 executing program 5: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$TIOCPKT(r2, 0xc0045878, &(0x7f0000000040)) 14:04:43 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$TIOCPKT(r2, 0x5410, &(0x7f0000000040)) 14:04:43 executing program 6: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext, 0x0, 0x0, 0x100, 0x0, 0x4000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) dup3(r1, r0, 0x0) 14:04:43 executing program 1: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x14\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 14:04:43 executing program 4: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x03D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 14:04:43 executing program 2: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x0fBp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 14:04:43 executing program 7: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x56aa8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x40}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) fsetxattr$trusted_overlay_upper(r0, &(0x7f0000000580), 0x0, 0x0, 0x0) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, &(0x7f0000000000)={0x4, 0x3, 0x8, 0x552}) 14:04:43 executing program 6: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) dup3(r1, r0, 0x0) r2 = openat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={0x10c00, 0x8, 0x9}, 0x18) ioctl$TIOCSPTLCK(r2, 0x40045431, &(0x7f0000000080)) 14:04:43 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) fsetxattr$trusted_overlay_upper(r1, &(0x7f0000000580), 0x0, 0x0, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/timer_list\x00', 0x0, 0x0) ioctl$TIOCGDEV(r2, 0x80045432, &(0x7f0000000040)) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, 0x0) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r3, 0x4b63, 0x0) copy_file_range(r0, &(0x7f0000000080)=0x10000, r3, &(0x7f00000000c0)=0x3, 0x3, 0x0) 14:04:43 executing program 1: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7#:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 14:04:43 executing program 4: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x04D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 14:04:43 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$TIOCPKT(r2, 0x5410, &(0x7f0000000040)) 14:04:43 executing program 5: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$TIOCPKT(r2, 0xc0189436, &(0x7f0000000040)) 14:04:43 executing program 0: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x02D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 14:04:43 executing program 2: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x10Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 14:04:43 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$TIOCPKT(r2, 0x5410, &(0x7f0000000040)) 14:04:43 executing program 7: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_DISALLOCATE(r0, 0x5608) fsetxattr$trusted_overlay_upper(r0, &(0x7f0000000580), 0x0, 0x0, 0x0) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, 0x0) 14:04:43 executing program 5: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$TIOCPKT(r2, 0xc020660b, &(0x7f0000000040)) [ 2430.373283] kmemleak: 3 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 14:05:04 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x10000, 0x6}, 0x0, 0xe, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x2, 0x0, 0x0, 0x0, 0x81, 0x50412, 0x3, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x81, 0x0, @perf_bp={&(0x7f0000000000), 0x9}, 0x409, 0x1f, 0x6f4, 0x1, 0x8, 0x8, 0x1, 0x0, 0x7, 0x0, 0x10001}, 0xffffffffffffffff, 0x5, r0, 0x8) fsetxattr$trusted_overlay_upper(r1, &(0x7f0000000580), 0x0, 0x0, 0x0) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, 0x0) 14:05:04 executing program 6: r0 = openat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={0x129702, 0x100, 0x10}, 0x18) copy_file_range(r0, &(0x7f0000000080), 0xffffffffffffffff, &(0x7f00000000c0)=0x2, 0x2, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x5) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) dup3(r2, r1, 0x0) 14:05:04 executing program 5: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$TIOCPKT(r2, 0x5420, &(0x7f0000000040)) 14:05:04 executing program 1: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7%:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 14:05:04 executing program 2: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\cBp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 14:05:04 executing program 4: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x05D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 14:05:04 executing program 0: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x03D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 14:05:04 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$TIOCPKT(r2, 0x5410, &(0x7f0000000040)) 14:05:04 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) r2 = fork() tkill(r2, 0xb) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x5, 0x1, 0x44, 0x72, 0x0, 0x0, 0x100, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x5, 0x0, @perf_bp={&(0x7f0000000000), 0x1a}, 0x110, 0x5, 0x101, 0x3, 0x0, 0x1000, 0x20, 0x0, 0x6, 0x0, 0x7}, r2, 0x5, r0, 0x1) fsetxattr$trusted_overlay_upper(r1, &(0x7f0000000580), 0x0, 0x0, 0x0) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, 0x0) 14:05:04 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$TIOCPKT(r2, 0x5410, &(0x7f0000000040)) 14:05:04 executing program 1: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7*:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 14:05:04 executing program 0: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x04D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 14:05:17 executing program 6: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x8, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r1, 0x4b63, 0x0) dup2(r1, r0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$PIO_UNIMAP(r3, 0x4b67, &(0x7f0000000080)={0x5, &(0x7f0000000040)=[{0x3d6, 0x3f}, {0x8, 0x6}, {0x4bb0, 0x98a7}, {0x3ff, 0x2}, {0x9, 0x74b}]}) dup3(r3, r2, 0x0) ioctl$KDFONTOP_SET_DEF(r3, 0x4b72, &(0x7f0000000000)={0x2, 0x1, 0x18, 0x1c, 0x1bf, &(0x7f0000000180)="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"}) 14:05:17 executing program 4: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x06D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 14:05:17 executing program 7: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) fsetxattr$trusted_overlay_upper(r0, &(0x7f0000000580), 0x0, 0x0, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) tee(r0, r1, 0xd3a, 0xa) r2 = signalfd4(0xffffffffffffffff, &(0x7f0000000080), 0x8, 0x0) ioctl$KDADDIO(r2, 0x4b34, 0x5d) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r3, 0x4b63, 0x0) ioctl$TIOCSCTTY(r3, 0x540e, 0x10000) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, &(0x7f0000000000)={'TPROXY\x00'}, &(0x7f0000000040)=0x1e) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, 0x0) 14:05:17 executing program 0: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x05D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 14:05:17 executing program 5: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$TIOCPKT(r2, 0x5420, &(0x7f0000000040)=0xfdfdffff) 14:05:17 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$TIOCPKT(r2, 0x5410, &(0x7f0000000040)) 14:05:17 executing program 1: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7+:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 14:05:17 executing program 2: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x02D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 14:05:17 executing program 7: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = dup3(r1, 0xffffffffffffffff, 0x0) ioctl$TIOCPKT(r2, 0x5420, &(0x7f0000000040)) sendmmsg$inet6(r2, &(0x7f0000000940)=[{{&(0x7f0000000000)={0xa, 0x4e20, 0x2e6, @private2, 0x81}, 0x1c, &(0x7f0000000180)=[{&(0x7f0000000040)="fca741a141c945b04d2fb04fe98eb10b7bbbd378758bdaaee11cf1f4470c1c92ef2ceacd6c47fc2114888e77a64d9c4488432f5e5b4cb94aa16a6a7e42ceabebee2bb367019fb2093d1f", 0x4a}, {&(0x7f00000000c0)="23e382484d80db46bc676f98afd9c3078d5d0c973848c535b499a89f07b09bd4f28853ade3a14355c421e996e903db81e79bb2e7da961190ced777cf2662bc7bface704c27eb49cfd3fd2eeb47b189a791cb7edfc51d5bd528b98e063ebb9f64869086a95fb66eefb4bac32431759f0e53ec58471075cfddbc0dbf3ce8969a26b6484ea6cb82342ab3ded6330c140b5e11347c275f466f52c3b4b2acd1a3705d51ba080f0dd492fafe616aa058d62f4749960360c7f72db1f380f2c63bff3b", 0xbf}], 0x2, &(0x7f00000001c0)=[@dstopts={{0x58, 0x29, 0x37, {0x5e, 0x7, '\x00', [@jumbo={0xc2, 0x4, 0xa7}, @calipso={0x7, 0x28, {0x1, 0x8, 0x1, 0x1, [0x8, 0x4, 0xc9a6, 0x81]}}, @ra={0x5, 0x2, 0x9}, @padn={0x1, 0x1, [0x0]}, @pad1]}}}, @tclass={{0x14, 0x29, 0x43, 0xc0}}, @dontfrag={{0x14, 0x29, 0x3e, 0x7}}, @flowinfo={{0x14, 0x29, 0xb, 0x6}}], 0xa0}}, {{&(0x7f0000000280)={0xa, 0x4e20, 0xff, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x3}, 0x1c, &(0x7f00000003c0)=[{&(0x7f00000002c0)="80feeb93cc9d00c44b7cb037dc0514bcf528006274fa54ae9ce3c6c16cfb9c917c5d5fefee5828ff9a98c5afc18b8a50150c0bda87d0a4b73880ab013b30ec86623808b522008e9d9b851ce99254eaf5d37ba62c009009035278cd0d9b664005d8bfe421ef90964ae498040a47d18ec927a99ff19a59b1b9fb710cd409ffb0710c31026a7012092fc0b04910fd14507d727920541272e83cceaf6ed62424e2e620a79fe07e7adbd8b10c3258137448467323ac700602c2732b5ab44fc9366e887a6d9bc133c9cced2c9ed492924631d7", 0xd0}], 0x1}}, {{&(0x7f0000000400)={0xa, 0x4e23, 0xfffffff9, @private0={0xfc, 0x0, '\x00', 0x1}, 0xcb}, 0x1c, &(0x7f00000004c0)=[{&(0x7f0000000440)="21af05d646e17ffc402ac2b024ed90cc443b26896e8d3d28d003cd1e1d4374d6fbfc5b1104c751a14683568ba014ef8e2761554e4eec04e080535cb45fdfa73c6e336ebb01085e5f9a4e91dd7318", 0x4e}, {&(0x7f00000005c0)="95da6bd2294b09ebcbc078eb8cb599c343e462bc6eb2d3962f6bdc6e2e8d0697a19ad129f09d34fe23bbffa7303048dbda651de1c6ef51f95a355af3277eb6b8b587e1b4ff1212c59e15f89db8abca2781f8e37b736d4273b35ed15ed267658742c5f8dc6faabfbabf089d69f645ab01ae058c90e26564287fa757a8a0d4cf4d711536df0c60216ca7ccd93575aace085cc7ec8d0875eb68757821dfacd23b8d9d6d54fe31034defda79ccd840cde7c41e7315ddfcb441e1d788bcc1c1d41baddf14b8b4d28f3569e4a7016d1e2a5411", 0xd0}], 0x2, &(0x7f00000006c0)=[@hoplimit_2292={{0x14, 0x29, 0x8, 0x7}}, @rthdr={{0x58, 0x29, 0x39, {0x2b, 0x8, 0x1, 0xd8, 0x0, [@private0={0xfc, 0x0, '\x00', 0x1}, @private2={0xfc, 0x2, '\x00', 0x1}, @private1={0xfc, 0x1, '\x00', 0x1}, @private2]}}}, @flowinfo={{0x14, 0x29, 0xb, 0xb975}}, @rthdrdstopts={{0x30, 0x29, 0x37, {0x5e, 0x2, '\x00', [@padn={0x1, 0x2, [0x0, 0x0]}, @ra={0x5, 0x2, 0x36ce}, @enc_lim={0x4, 0x1, 0x81}, @jumbo]}}}], 0xb8}}, {{&(0x7f0000000500)={0xa, 0x4e20, 0x9, @ipv4={'\x00', '\xff\xff', @private=0xa010100}, 0x800}, 0x1c, &(0x7f0000000540)=[{&(0x7f0000000780)="59c41d7e006506c22c6886da778bd3f76f8b943dc6e90b11ffc097c8828be6d6414b939e919a2a37f3f1a650f7993b2d81066d8643b31660d1deb4fedb9fe6bdd7371d78369e06893be5e7f24134bf4423c96b1dc3d456282fd6fa216bb8be47c39dd080473610288a274bac6831c8d6de210b6f6c039bc6a4f15e149d2f51f320ffb31d63abbfacd2c4fd96ebecb1036b8c8160bcbd8eef05b269e88447ddf710f830ff9826b7643a7471ea", 0xac}], 0x1, &(0x7f0000000840)=[@tclass={{0x14, 0x29, 0x43, 0x8}}, @rthdrdstopts={{0x48, 0x29, 0x37, {0x87, 0x6, '\x00', [@ra={0x5, 0x2, 0x90}, @calipso={0x7, 0x10, {0x2, 0x2, 0x7f, 0x800, [0x400]}}, @calipso={0x7, 0x18, {0x3, 0x4, 0x5, 0x8, [0xfffffffffffffff8, 0x7f]}}]}}}, @dstopts_2292={{0x78, 0x29, 0x4, {0x2e, 0xc, '\x00', [@enc_lim={0x4, 0x1, 0x20}, @calipso={0x7, 0x58, {0x0, 0x14, 0x84, 0x8, [0x7, 0x7fffffff00, 0x9, 0x5, 0x8, 0x8, 0x8, 0x101, 0x7fffffff, 0x100000001]}}, @pad1]}}}], 0xd8}}], 0x4, 0x40) fsetxattr$trusted_overlay_upper(r0, &(0x7f0000000580), 0x0, 0x0, 0x0) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, 0x0) 14:05:17 executing program 2: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x03D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 14:05:17 executing program 5: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$TIOCPKT(r2, 0x5420, &(0x7f0000000040)=0xfffffdfd) 14:05:17 executing program 0: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x06D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 14:05:17 executing program 4: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\aD\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 14:05:17 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$TIOCPKT(r2, 0x5410, &(0x7f0000000040)) 14:05:17 executing program 1: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7-:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 14:05:17 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) fcntl$getownex(r1, 0x10, &(0x7f0000000180)={0x0, 0x0}) perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0xb, 0xff, 0x3, 0x8, 0x0, 0x7fff, 0x100, 0x4, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x3, 0x0, @perf_bp={&(0x7f00000000c0), 0x2}, 0x10380, 0x100000001, 0x8, 0x1, 0x1, 0xf96, 0x100, 0x0, 0xdc4d, 0x0, 0xcc}, r2, 0xc, r0, 0x2) perf_event_open(&(0x7f0000000040)={0x3, 0x80, 0xf7, 0x9, 0xaa, 0x1f, 0x0, 0x8, 0x2800, 0x2, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1d, 0x4, @perf_config_ext={0x1, 0x4}, 0x1, 0x40db, 0x1, 0x3, 0x3, 0x10000, 0x401, 0x0, 0xfffffd9f}, 0x0, 0xc, r0, 0x8) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r5 = dup3(r4, r3, 0x0) ioctl$TIOCPKT(r5, 0x5420, &(0x7f0000000040)) ioctl$SG_IO(r5, 0x2285, &(0x7f0000000300)={0x53, 0xfffffffffffffffe, 0x20, 0xb1, @buffer={0x0, 0x49, &(0x7f00000001c0)=""/73}, &(0x7f0000000240)="d2edee3bb7498cf354958294ca08a4b31158a5c60fcc10451843e8d591dd7ba6", &(0x7f0000000280)=""/48, 0x4, 0x4, 0xffffffffffffffff, &(0x7f00000002c0)}) ioctl$TIOCL_SETSEL(r1, 0x541c, &(0x7f0000000000)={0x2, {0x2, 0x0, 0x8, 0x9, 0x6, 0xf}}) fsetxattr$trusted_overlay_upper(r1, &(0x7f0000000580), 0x0, 0x0, 0x0) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, 0x0) 14:05:17 executing program 6: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$AUTOFS_DEV_IOCTL_READY(r2, 0xc0189376, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {0xfffff001}}, './file1\x00'}) r4 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r4, 0x4b63, 0x0) r5 = openat2(r2, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)={0x4000, 0x41, 0x4}, 0x18) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r5, 0xc018937d, &(0x7f0000000180)={{0x1, 0x1, 0x18, r3, {0x6}}, './file0\x00'}) ioctl$F2FS_IOC_GARBAGE_COLLECT_RANGE(r4, 0x4018f50b, &(0x7f0000000080)={0x0, 0x8, 0x100000000}) ioctl$sock_SIOCGIFVLAN_SET_VLAN_FLAG_CMD(r3, 0x8982, &(0x7f0000000040)={0x7, 'ip6_vti0\x00', {0x20}, 0x97}) 14:05:30 executing program 6: ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000000)=0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x200}, r0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) dup3(r2, r1, 0x0) 14:05:30 executing program 0: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\aD\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 14:05:30 executing program 2: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x04D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 14:05:30 executing program 7: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x4) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r1, 0x4b63, 0x0) ioctl$INCFS_IOC_READ_FILE_SIGNATURE(r1, 0x8010671f, &(0x7f0000000080)={&(0x7f0000000040)=""/52, 0x34}) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) r3 = accept$packet(0xffffffffffffffff, &(0x7f0000000100), &(0x7f0000000140)=0x14) fcntl$setstatus(r3, 0x4, 0x0) ioctl$VT_RESIZE(r2, 0x4b63, 0x0) r4 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r4, 0x4b63, 0x0) ioctl$TIOCGETD(r4, 0x5424, &(0x7f00000000c0)) ioctl$TIOCGPTLCK(r2, 0x80045439, &(0x7f0000000000)) fsetxattr$trusted_overlay_upper(r0, &(0x7f0000000580), 0x0, 0x0, 0x0) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, 0x0) 14:05:30 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$TIOCPKT(r2, 0x5410, &(0x7f0000000040)) 14:05:30 executing program 4: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\bD\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 14:05:30 executing program 1: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7.:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 14:05:30 executing program 5: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r1, 0x4b63, 0x0) r2 = dup3(r1, r0, 0x0) r3 = syz_open_dev$rtc(&(0x7f0000000000), 0x10000, 0x82a81) dup2(r3, 0xffffffffffffffff) ioctl$TIOCPKT(r2, 0x5420, &(0x7f0000000040)) 14:05:31 executing program 0: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\bD\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 14:05:31 executing program 6: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = gettid() perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x2, 0x1f, 0x4, 0x7f, 0x0, 0xaa, 0x20, 0x3, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x8, 0x2, @perf_bp={&(0x7f0000000040), 0x2}, 0x40080, 0x8, 0x6, 0x9, 0x7, 0x7, 0xfff, 0x0, 0x400, 0x0, 0xffffffff}, r1, 0x10, r0, 0x9) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TIOCL_PASTESEL(r3, 0x541c, &(0x7f0000000000)) dup3(r3, r2, 0x0) 14:05:31 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = dup3(0xffffffffffffffff, r0, 0x0) ioctl$TIOCPKT(r1, 0x5410, &(0x7f0000000040)) 14:05:31 executing program 4: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\tD\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 14:05:31 executing program 2: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x05D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 14:05:31 executing program 1: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb70:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 14:05:31 executing program 7: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) fsetxattr$trusted_overlay_upper(r0, &(0x7f0000000580), 0x0, 0x0, 0x0) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, 0x0) ioctl$PIO_UNIMAP(r0, 0x4b67, &(0x7f0000000100)={0x4, &(0x7f00000000c0)=[{0x2, 0xa090}, {0x0, 0x7}, {0x1ff, 0x7f}, {0x5441, 0xf2e1}]}) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r2, 0x4b63, 0x0) flock(r2, 0x5) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r4 = dup3(r3, r1, 0x0) ioctl$TIOCPKT(r4, 0x5420, &(0x7f0000000040)) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r4, 0x89f1, &(0x7f0000000080)={'syztnl2\x00', &(0x7f0000000000)={'ip6tnl0\x00', 0x0, 0x29, 0xc5, 0x1, 0x5, 0x38, @private0, @dev={0xfe, 0x80, '\x00', 0x22}, 0x8000, 0x7, 0x2, 0x100}}) 14:05:31 executing program 5: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x801}, 0x0, 0x10000, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r2, 0x4b63, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000180)) perf_event_open(&(0x7f0000000080)={0x5, 0x80, 0x9, 0x5, 0x1, 0x2f, 0x0, 0x800, 0x2022c, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x7, 0x1, @perf_bp={&(0x7f0000000000), 0x8}, 0x14d00, 0x6, 0x205574e2, 0x4, 0x642d, 0x1f, 0xb9a8, 0x0, 0x4, 0x0, 0x9}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x2) r3 = dup3(r1, r0, 0x0) ioctl$TIOCPKT(r3, 0x5420, &(0x7f0000000040)) [ 2476.165445] kmemleak: 4 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 14:05:51 executing program 0: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\tD\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 14:05:51 executing program 5: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0x1}}, 0x0, 0xa, 0xffffffffffffffff, 0x0) sendfile(r0, r0, &(0x7f0000000100)=0x7, 0x1) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000), 0x28000, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r3, 0x4b63, 0x0) ioctl$VT_RESIZEX(r3, 0x560a, &(0x7f0000000180)={0x3, 0xe43d, 0x5, 0xfff8, 0x740b, 0x4}) ioctl$TIOCSTI(r1, 0x5412, &(0x7f0000000080)=0x4) r4 = dup3(r2, r1, 0x0) ioctl$TIOCPKT(r4, 0x5420, &(0x7f0000000040)) 14:05:51 executing program 4: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\nD\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 14:05:51 executing program 2: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x06D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 14:05:51 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = dup3(0xffffffffffffffff, r0, 0x0) ioctl$TIOCPKT(r1, 0x5410, &(0x7f0000000040)) 14:05:51 executing program 6: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x1c9900, 0x48) dup3(r1, r0, 0x0) 14:05:51 executing program 7: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000), 0x82, 0x0) read(r1, &(0x7f0000000040)=""/133, 0x85) fsetxattr$trusted_overlay_upper(r0, &(0x7f0000000580), 0x0, 0x0, 0x0) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, 0x0) 14:05:51 executing program 1: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7X:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 14:05:51 executing program 7: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8000000000000}, 0x0, 0x0, 0x800000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x8000000) semget$private(0x0, 0x4000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semctl$SETALL(0x0, 0x0, 0xd, &(0x7f00000000c0)) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) fsetxattr$trusted_overlay_upper(r0, &(0x7f0000000580), 0x0, 0x0, 0x0) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, 0x0) 14:05:51 executing program 2: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\aD\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 14:05:51 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = dup3(0xffffffffffffffff, r0, 0x0) ioctl$TIOCPKT(r1, 0x5410, &(0x7f0000000040)) 14:05:51 executing program 4: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\vD\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 14:05:51 executing program 6: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) dup(0xffffffffffffffff) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) dup3(r1, r0, 0x0) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r2, 0x4b63, 0x0) ioctl$TIOCEXCL(r2, 0x540c) 14:05:51 executing program 5: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8021, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x9) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TCFLSH(r1, 0x540b, 0x0) ioctl$TIOCL_SELLOADLUT(r1, 0x541c, &(0x7f0000000000)={0x5, 0x9, 0x3, 0x0, 0xe697}) r2 = dup3(r1, r0, 0x0) ioctl$TIOCPKT(r2, 0x5420, &(0x7f0000000040)) 14:05:51 executing program 0: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\nD\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 14:05:51 executing program 1: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7c:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 14:05:52 executing program 4: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\fD\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 14:05:52 executing program 2: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\bD\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 14:05:52 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = dup3(r0, 0xffffffffffffffff, 0x0) ioctl$TIOCPKT(r1, 0x5410, &(0x7f0000000040)) 14:05:52 executing program 5: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x1ffffe, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$TIOCPKT(r2, 0x5420, &(0x7f0000000040)) 14:05:52 executing program 6: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000040), 0x7fffffff, 0x630480) syz_io_uring_submit(0x0, 0x0, &(0x7f00000000c0)=@IORING_OP_READ=@pass_buffer={0x16, 0x3, 0xc75c8ecc8e6fee03, @fd=r0, 0x8, &(0x7f0000000080)=""/41, 0x29, 0x0, 0x1}, 0x9) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TIOCVHANGUP(r1, 0x5437, 0x0) ioctl$TCSETSF(r2, 0x5404, &(0x7f0000000000)={0x8e14, 0x1, 0x7, 0x250, 0x19, "db0b0758abbd449cfe25fe851571508341ff0d"}) r3 = dup3(r2, r1, 0x0) ioctl$TCXONC(r3, 0x540a, 0x3) 14:05:52 executing program 0: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\vD\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 14:05:52 executing program 1: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7i:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 14:05:52 executing program 5: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0xfe, 0x0, 0x0, 0x4, 0xc2c24d2e3d9d31b3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x9}, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x2e2600, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$TIOCPKT(r2, 0x5420, &(0x7f0000000040)) [ 2495.753771] kmemleak: 8 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 14:06:12 executing program 2: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\tD\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 14:06:12 executing program 4: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\rD\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 14:06:12 executing program 7: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_SETSEL(r0, 0x541c, &(0x7f0000000000)={0x2, {0x2, 0x4, 0x8, 0x7fff, 0x81, 0xf}}) fsetxattr$trusted_overlay_upper(r0, &(0x7f0000000580), 0x0, 0x0, 0x0) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, 0x0) r1 = syz_genetlink_get_family_id$team(&(0x7f0000000080), 0xffffffffffffffff) r2 = socket$inet(0x2, 0x3, 0xff) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) sendmsg$inet(r2, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000280)="b683ae7d0000000000000000000000000000000200000000", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @broadcast}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x40}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000140)={'ip6gre0\x00', &(0x7f00000000c0)={'syztnl0\x00', 0x0, 0x2, 0x8a, 0x80, 0xfff, 0x0, @empty, @loopback, 0x700, 0x8, 0x3, 0x6}}) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000180)={0x198, r1, 0x400, 0x70bd26, 0x25dfdbfe, {}, [{{0x8, 0x1, r4}, {0x100, 0x2, 0x0, 0x1, [{0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x7}}, {0x8}}}, {0x4c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x19, 0x4, 'hash_to_port_mapping\x00'}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0x80000000}}}]}}, {{0x8}, {0x74, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x3}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8, 0x4, r5}}}]}}]}, 0x198}, 0x1, 0x0, 0x0, 0x40041}, 0x0) 14:06:12 executing program 6: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffd}, 0x0, 0x5, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000000)) dup3(r1, r0, 0x0) 14:06:12 executing program 5: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='wchan\x00') r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = dup3(r0, r1, 0x0) r3 = fork() tkill(r3, 0xb) perf_event_open(&(0x7f0000000080)={0x4, 0x80, 0x1, 0x2, 0xff, 0x1, 0x0, 0x4, 0x5010, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x1, @perf_bp, 0x1, 0x1ff, 0x116cb4a8, 0x1, 0xa7a7, 0x6, 0x1, 0x0, 0x3, 0x0, 0x6812}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) ioctl$TIOCPKT(r2, 0x5420, &(0x7f0000000040)) 14:06:12 executing program 0: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\fD\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 14:06:12 executing program 1: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7l:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 14:06:12 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = dup3(r0, 0xffffffffffffffff, 0x0) ioctl$TIOCPKT(r1, 0x5410, &(0x7f0000000040)) 14:06:12 executing program 1: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7o:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) [ 2518.745118] kmemleak: 1 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 14:06:32 executing program 6: perf_event_open(&(0x7f0000001d80)={0x4, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000000), 0x3}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TIOCVHANGUP(r0, 0x5437, 0x0) dup3(r1, r0, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r4 = dup3(r3, r2, 0x0) ioctl$TIOCPKT(r4, 0x5420, &(0x7f0000000040)) r5 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r5, 0x4b63, 0x0) epoll_ctl$EPOLL_CTL_ADD(r4, 0x1, r5, &(0x7f0000000040)={0x40000000}) 14:06:32 executing program 2: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\nD\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 14:06:32 executing program 5: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r1, 0x4b63, 0x0) dup(r1) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r3 = dup3(r2, r0, 0x0) ioctl$TIOCPKT(r3, 0x5420, &(0x7f0000000040)) 14:06:32 executing program 1: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7p:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 14:06:32 executing program 0: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\rD\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 14:06:32 executing program 4: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x0eD\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 14:06:32 executing program 7: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x400}, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r3 = dup3(r2, r1, 0x0) ioctl$TIOCPKT(r3, 0x5420, &(0x7f0000000040)) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuacct.stat\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r3, 0x2405, r4) fsetxattr$trusted_overlay_upper(r0, &(0x7f0000000580), 0x0, 0x0, 0x0) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, 0x0) 14:06:32 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = dup3(r0, 0xffffffffffffffff, 0x0) ioctl$TIOCPKT(r1, 0x5410, &(0x7f0000000040)) 14:06:45 executing program 6: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) dup3(r1, r0, 0x0) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r2, 0x4b63, 0x0) ioctl$TIOCSPTLCK(r2, 0x40045431, &(0x7f0000000000)=0x1) 14:06:45 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) dup3(r1, r0, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5410, &(0x7f0000000040)) 14:06:45 executing program 2: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\vD\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 14:06:45 executing program 0: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x0eD\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 14:06:45 executing program 1: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7s:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 14:06:45 executing program 7: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = getpgrp(0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r4 = dup3(r3, r2, 0x0) ioctl$TIOCPKT(r4, 0x5420, &(0x7f0000000040)) perf_event_open(&(0x7f0000000000)={0x5, 0x80, 0x8, 0xf6, 0x70, 0x36, 0x0, 0x4, 0x0, 0xb, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, @perf_config_ext={0x2, 0x8}, 0x4462a, 0xc000000000000000, 0xf256, 0x3, 0x3, 0x4314, 0x6, 0x0, 0x1, 0x0, 0x6}, r1, 0xd, r4, 0x11) fsetxattr$trusted_overlay_upper(r0, &(0x7f0000000580), 0x0, 0x0, 0x0) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, 0x0) 14:06:45 executing program 5: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$TIOCPKT(r2, 0x5420, &(0x7f0000000040)) openat(r2, &(0x7f0000000080)='./file0\x00', 0x341000, 0x40) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r4 = dup3(r3, 0xffffffffffffffff, 0x0) ioctl$TIOCPKT(r4, 0x5420, &(0x7f0000000040)) ioctl$sock_SIOCINQ(r4, 0x541b, &(0x7f0000000000)) 14:06:45 executing program 4: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x0fD\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 14:06:45 executing program 2: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\fD\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 14:06:45 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) dup3(r1, r0, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5410, &(0x7f0000000040)) 14:06:46 executing program 5: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$TIOCPKT(r2, 0x5420, &(0x7f0000000040)) 14:06:46 executing program 4: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x11D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 14:06:46 executing program 1: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7u:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 14:06:46 executing program 0: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x0fD\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 14:06:46 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) dup3(r1, r0, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5410, &(0x7f0000000040)) 14:06:46 executing program 6: r0 = fork() ptrace$setopts(0x4200, r0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x5, 0x0, 0xfffffffe, 0x0, 0x0, 0x2}, r0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000600)={0xa, 0x0, 0x0, @mcast2, 0x3}, 0x1c) fcntl$getownex(r2, 0x10, &(0x7f0000000040)={0x0, 0x0}) fcntl$lock(0xffffffffffffffff, 0x26, &(0x7f0000000000)={0x0, 0x1, 0x4, 0x4000009, r3}) ptrace$getsig(0x4202, r3, 0x1, &(0x7f0000000000)) r4 = dup3(0xffffffffffffffff, r1, 0x0) ioctl$TIOCGSOFTCAR(0xffffffffffffffff, 0x5419, &(0x7f0000000080)) ioctl$TIOCGPTPEER(r4, 0x5441, 0x101) 14:06:46 executing program 7: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xd}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) fsetxattr$trusted_overlay_upper(r1, &(0x7f0000000580), 0x0, 0x0, 0x0) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, 0x0) 14:06:46 executing program 2: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\rD\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 14:06:46 executing program 1: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7x:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 14:06:46 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$TIOCPKT(r2, 0x5410, 0x0) 14:06:46 executing program 5: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$TIOCPKT(r2, 0x5420, &(0x7f0000000040)) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000100)=0xc) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x40, 0x8, 0x6, 0xa7, 0x0, 0x3f, 0x406, 0x8, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x8, 0x4, @perf_config_ext={0x80000001, 0x9}, 0x124, 0x80000001, 0x0, 0x7, 0xaa8, 0xfffff000, 0x0, 0x0, 0x8, 0x0, 0x9}, r3, 0xc, r2, 0x0) 14:06:46 executing program 4: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x12D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 14:06:46 executing program 0: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x11D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 14:07:01 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000080)=0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x9, 0x4, 0x2, 0x1f, 0x0, 0x8, 0x4061, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6, 0x6, @perf_config_ext={0x20000000000000, 0xfffffffffffffff7}, 0x46090, 0x3, 0x3, 0x2, 0xe5e3, 0x0, 0x691, 0x0, 0x6a}, r1, 0xe, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) fsetxattr$trusted_overlay_upper(r2, &(0x7f0000000580), 0x0, 0x0, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x2000000, 0x8010, r0, 0xdbe51000) r3 = eventfd(0x6) r4 = openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000100)='devices.allow\x00', 0x2, 0x0) r5 = fork() ptrace$setopts(0x4200, r5, 0x0, 0x0) r6 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r7 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r8 = dup3(r7, r6, 0x0) ioctl$TIOCPKT(r8, 0x5420, &(0x7f0000000040)) perf_event_open(&(0x7f0000000180)={0x3, 0x80, 0x1, 0xf8, 0x7, 0x3, 0x0, 0x5, 0x51010, 0xa, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_config_ext={0x800, 0x7}, 0x30c, 0x0, 0x80, 0x5, 0x1, 0x5, 0x40, 0x0, 0x568, 0x0, 0xd813}, r5, 0x7, r8, 0x0) copy_file_range(r3, &(0x7f00000000c0)=0x9, r4, &(0x7f0000000140)=0xfff, 0x80, 0x0) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, 0x0) 14:07:01 executing program 6: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='coredump_filter\x00') r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = syz_open_dev$ptys(0xc, 0x3, 0x0) ioctl$TIOCSPTLCK(r1, 0x40045431, &(0x7f0000000040)=0x1) dup3(r0, 0xffffffffffffffff, 0x0) 14:07:01 executing program 0: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x12D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 14:07:01 executing program 5: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/devices/virtual', 0x80, 0x180) ioctl$TCGETA(r2, 0x5405, &(0x7f0000000100)) r3 = dup3(r1, r0, 0x0) ioctl$TIOCL_PASTESEL(r1, 0x541c, &(0x7f0000000080)) ioctl$TIOCPKT(r3, 0x5420, &(0x7f0000000040)) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000000)={0x20, 0x2, 0x3f, 0x9c, 0x16, "fe3aa72063eb67c9"}) 14:07:01 executing program 4: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x14D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 14:07:01 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$TIOCPKT(r2, 0x5410, 0x0) 14:07:01 executing program 2: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x0eD\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 14:07:01 executing program 1: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\x0f\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 14:07:01 executing program 0: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x14D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 14:07:01 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$TIOCPKT(r2, 0x5410, 0x0) 14:07:01 executing program 1: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\x10\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 14:07:01 executing program 4: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp/D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 14:07:01 executing program 6: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) dup3(r1, r0, 0x0) 14:07:01 executing program 2: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x0fD\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 14:07:01 executing program 5: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2100}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$TIOCPKT(r2, 0x5420, &(0x7f0000000040)) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r5 = dup3(r4, r3, 0x0) ioctl$TIOCPKT(r5, 0x5420, &(0x7f0000000040)) perf_event_open(&(0x7f0000000080)={0x5, 0x80, 0x8, 0x1, 0x7, 0x3, 0x0, 0x93e, 0x8000, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x6, @perf_bp={&(0x7f0000000000), 0x8}, 0x1286, 0x5, 0x8, 0x2, 0x5, 0x941, 0x3f, 0x0, 0x8, 0x0, 0x9}, 0xffffffffffffffff, 0xa, r5, 0x0) [ 2568.209668] kmemleak: 1 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 14:07:29 executing program 1: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xab\t\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 14:07:29 executing program 0: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp/D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 14:07:29 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x20, 0xc08, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x5, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) fsetxattr$trusted_overlay_upper(r0, &(0x7f0000000580), 0x0, 0x0, 0x0) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x408003, 0x0) r3 = dup3(r2, r1, 0x0) ioctl$TIOCEXCL(r2, 0x540c) ioctl$TIOCPKT(r3, 0x5420, &(0x7f0000000040)) ioctl$TUNSETCARRIER(r3, 0x400454e2, &(0x7f0000000100)) ioctl$CDROMREADAUDIO(r3, 0x530e, &(0x7f0000000040)={@msf={0x20, 0x0, 0xf0}, 0x3, 0x1f, &(0x7f0000000000)=""/31}) 14:07:29 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/devices/virtual', 0x80, 0x180) ioctl$TCGETA(r2, 0x5405, &(0x7f0000000100)) r3 = dup3(r1, r0, 0x0) ioctl$TIOCL_PASTESEL(r1, 0x541c, &(0x7f0000000080)) ioctl$TIOCPKT(r3, 0x5420, &(0x7f0000000040)) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000000)={0x20, 0x2, 0x3f, 0x9c, 0x16, "fe3aa72063eb67c9"}) 14:07:29 executing program 4: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp2D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 14:07:29 executing program 2: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x11D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 14:07:30 executing program 6: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) dup3(r1, r0, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r4 = dup3(r3, r2, 0x0) r5 = accept4(0xffffffffffffffff, &(0x7f00000000c0)=@ethernet={0x0, @random}, &(0x7f0000000180)=0x80, 0x800) r6 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r6, 0x4b63, 0x0) dup2(r5, r6) ioctl$TIOCPKT(r4, 0x5420, &(0x7f0000000040)) perf_event_open(&(0x7f0000000040)={0x3, 0x80, 0x3f, 0x2, 0x56, 0x3, 0x0, 0x80000001, 0x10, 0x2, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x2, 0x2, @perf_bp, 0x80, 0xed, 0x8, 0x4, 0x825, 0x0, 0x800, 0x0, 0x80, 0x0, 0x3f}, 0xffffffffffffffff, 0xc, r4, 0x3) 14:07:30 executing program 5: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(r0, 0x5) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r2, 0x4b63, 0x0) ioctl$TIOCMSET(r2, 0x5418, &(0x7f00000000c0)=0x7f) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r4 = dup3(r3, r1, 0x0) ioctl$TIOCPKT(r4, 0x5420, &(0x7f0000000040)) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r4, 0xc018937b, &(0x7f0000000200)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xee00, 0xee00}}, './file0\x00'}) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080), 0x2, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r4}, 0x2c, {'wfdno', 0x3d, r4}, 0x2c, {[{@afid={'afid', 0x3d, 0x20}}, {@cache_none}, {@cachetag={'cachetag', 0x3d, '\\$\\{i\x9e'}}, {@access_client}, {@msize={'msize', 0x3d, 0x2}}, {@access_client}, {@nodevmap}, {@cache_fscache}, {@dfltgid={'dfltgid', 0x3d, r5}}], [{@fowner_gt={'fowner>', 0xee00}}, {@dont_hash}, {@permit_directio}]}}) 14:07:30 executing program 1: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\x82\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 14:07:30 executing program 2: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x12D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 14:07:30 executing program 4: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\a\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 14:07:30 executing program 1: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b%\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 14:07:30 executing program 3: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7x:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 14:07:30 executing program 0: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp2D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 14:07:30 executing program 7: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = epoll_create(0x2) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r4 = dup3(r3, r2, 0x0) ioctl$TIOCPKT(r4, 0x5420, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x9) ftruncate(r1, 0x7) fsetxattr$trusted_overlay_upper(r0, &(0x7f0000000580), 0x0, 0x0, 0x0) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, 0x0) 14:07:30 executing program 5: perf_event_open(&(0x7f0000001d80)={0x2, 0x18, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r3 = dup3(r2, r1, 0x0) ioctl$TIOCPKT(r3, 0x5420, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, &(0x7f0000000000)='\xde\x00') r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r5 = dup3(r4, r0, 0x0) ioctl$TIOCPKT(r5, 0x5420, &(0x7f0000000040)) 14:07:30 executing program 6: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) dup3(r1, r0, 0x0) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r2, 0x4b63, 0x0) ioctl$TIOCPKT(r2, 0x5420, &(0x7f0000000000)=0x80000000) 14:07:30 executing program 3: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7x:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 14:07:30 executing program 4: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\t\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) [ 2597.512199] kmemleak: 2 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 14:07:52 executing program 4: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\x0f\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 14:07:52 executing program 2: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x14D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 14:07:52 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_SETSEL(r0, 0x541c, &(0x7f0000000000)={0x2, {0x2, 0x4, 0x8, 0x7fff, 0x81, 0xf}}) fsetxattr$trusted_overlay_upper(r0, &(0x7f0000000580), 0x0, 0x0, 0x0) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, 0x0) r1 = syz_genetlink_get_family_id$team(&(0x7f0000000080), 0xffffffffffffffff) r2 = socket$inet(0x2, 0x3, 0xff) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) sendmsg$inet(r2, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000280)="b683ae7d0000000000000000000000000000000200000000", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @broadcast}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x40}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000140)={'ip6gre0\x00', &(0x7f00000000c0)={'syztnl0\x00', 0x0, 0x2, 0x8a, 0x80, 0xfff, 0x0, @empty, @loopback, 0x700, 0x8, 0x3, 0x6}}) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000180)={0x198, r1, 0x400, 0x70bd26, 0x25dfdbfe, {}, [{{0x8, 0x1, r4}, {0x100, 0x2, 0x0, 0x1, [{0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x7}}, {0x8}}}, {0x4c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x19, 0x4, 'hash_to_port_mapping\x00'}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0x80000000}}}]}}, {{0x8}, {0x74, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x3}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8, 0x4, r5}}}]}}]}, 0x198}, 0x1, 0x0, 0x0, 0x40041}, 0x0) 14:07:52 executing program 0: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\a\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 14:07:52 executing program 1: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x02\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 14:07:52 executing program 7: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) fsetxattr$trusted_overlay_upper(r0, &(0x7f0000000580), 0x0, 0x0, 0x0) r1 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000000)='./binderfs2/binder1\x00', 0x2, 0x0) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r2, 0x4b63, 0x0) dup3(r1, r2, 0x0) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, 0x0) 14:07:52 executing program 5: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000600)={0xa, 0x0, 0x0, @mcast2, 0x3}, 0x1c) fcntl$getownex(r1, 0x10, &(0x7f0000000040)={0x0, 0x0}) fcntl$lock(0xffffffffffffffff, 0x26, &(0x7f0000000000)={0x0, 0x1, 0x4, 0x4000009, r2}) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xa0, 0x95, 0x5, 0x3f, 0x0, 0x2, 0x4808, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x3, 0x0, @perf_config_ext={0x8, 0x6}, 0x10981, 0x7, 0x8000, 0x8, 0x9, 0x3, 0x3, 0x0, 0x9, 0x0, 0x1f}, r2, 0x6, r0, 0x3) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r5 = dup3(r4, r3, 0x0) ioctl$TIOCPKT(r5, 0x5420, &(0x7f0000000040)) 14:07:52 executing program 6: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r1, 0x4b63, 0x0) ioctl$TIOCGPTPEER(r1, 0x5441, 0xe00000000) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x8502, 0x0) r3 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000000), 0x2, 0x0) vmsplice(r3, &(0x7f0000000240)=[{&(0x7f0000000040)="088f4bd078d2ddff93db0e48e2f0e70a029e312a94c4b0ea6ba4629fe628dec98dcc868f8777a6ab89a2b54a4f06e3e91dcd4dbe465eb54fb69ba29e61d74a4b88e26a1824c426aa74a46b6881354df9f49d871ba5474916093c357f1da432ab203e2a78a4b9d86d544e38c0c0cb54e334be4f10acbe45965c4760afaa30392b390e2e47966ae3e756ba3704eded8cde9991695103632a750549b9c8a3e1d09200fda13e216b770201b89b09de5ebba10dca8dbada64c0b5ac00d9c9426986e54370eb03e1078b94ae946c5779bd147eac1126317b650fecbe6c7f21ce", 0xdd}, {&(0x7f0000000180)="58d768234307affa37b49ab97e6c059e7e5204626b103511ada10929585cd4b7d13c812ac6ef56e91858c6b4d7b737c230a89374b69834ad04da9d686a5eab0662b322cb3394d96a889a738254b856afb0094b81ee5cc187158ffc9462f6722ed297e66d36e588d7e8fbce3580fd9302548b021d20ebb1d661fef5b8b8d5beb6731c9f20bf08e3cd47d40ffb7b0526cc6cdba044f36e", 0x96}], 0x2, 0x5) dup3(r2, r0, 0x0) 14:07:52 executing program 7: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000600)={0xa, 0x0, 0x0, @mcast2, 0x3}, 0x1c) fcntl$getownex(r0, 0x10, &(0x7f0000000040)={0x0, 0x0}) fcntl$lock(0xffffffffffffffff, 0x26, &(0x7f0000000000)={0x0, 0x1, 0x4, 0x4000009, r1}) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) fsetxattr$trusted_overlay_upper(r2, &(0x7f0000000580), 0x0, 0x0, 0x0) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, 0x0) 14:07:53 executing program 4: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\x10\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 14:07:53 executing program 0: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\x0f\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) [ 2619.579663] kmemleak: 1 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 14:08:14 executing program 4: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\x14\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 14:08:14 executing program 5: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000000)) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$TIOCPKT(r2, 0x5420, &(0x7f0000000040)) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000080)={0x7ff, 0x5, 0x101, 0x0, 0x7, "a8c3c19b186c6c50343a3fa53d85f8ab87fb3a"}) 14:08:14 executing program 0: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\x10\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 14:08:14 executing program 3: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\rD\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 14:08:14 executing program 1: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x03\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 14:08:14 executing program 2: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp/D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 14:08:14 executing program 6: ioctl$TIOCL_UNBLANKSCREEN(0xffffffffffffffff, 0x541c, &(0x7f0000000000)) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x400}, 0x0, 0x0, 0x2, 0x0, 0x7, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) dup3(r1, r0, 0x0) 14:08:14 executing program 7: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) fsetxattr$trusted_overlay_upper(r0, &(0x7f0000000580), 0x0, 0x0, 0x0) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, 0x0) 14:08:14 executing program 7: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1}}, 0xffffffffffffffff, 0x7ffffffd, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) fsetxattr$trusted_overlay_upper(r0, &(0x7f0000000580), 0x0, 0x0, 0x0) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, 0x0) 14:08:14 executing program 4: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf22\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 14:08:14 executing program 2: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp2D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 14:08:14 executing program 3: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7l:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 14:08:14 executing program 1: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x04\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 14:08:14 executing program 6: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000100), 0x240000, 0x0) perf_event_open(&(0x7f0000000180)={0x4, 0x80, 0xff, 0x6, 0x20, 0x9c, 0x0, 0x5, 0x8000, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x7fffffff, 0x2, @perf_bp={&(0x7f00000000c0), 0xb}, 0x210, 0x7, 0x100, 0x6, 0x7fff, 0x6f2, 0xfff, 0x0, 0x200, 0x0, 0x41}, 0x0, 0xb, r1, 0xb) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r3 = dup3(r2, r0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r3, 0xc0189379, &(0x7f0000000080)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x40, 0x1f, 0x1, 0xc, 0x0, 0x9, 0x21000, 0x9a8ce495ea1e8b9a, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3, 0x1, @perf_config_ext={0x1, 0x81}, 0x40400, 0x5, 0x6, 0x6, 0x5, 0x7fffffff, 0x7, 0x0, 0x4}, 0x0, 0xf, r4, 0x1) 14:08:14 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$TIOCPKT(r2, 0x5420, &(0x7f0000000040)) pidfd_getfd(r2, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r5 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r5, 0x4b63, 0x0) r6 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r6, 0x4b63, 0x0) ioctl$FICLONE(r5, 0x40049409, r6) r7 = dup3(r4, r3, 0x0) ioctl$TIOCPKT(r7, 0x5420, &(0x7f0000000040)) 14:08:14 executing program 0: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\x14\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 14:08:14 executing program 7: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) fsetxattr$trusted_overlay_upper(r0, &(0x7f0000000580), 0x0, 0x0, 0x0) syz_io_uring_complete(0x0) ftruncate(0xffffffffffffffff, 0x2) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, 0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(0xffffffffffffffff, 0x3309) 14:08:27 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x7}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000000)) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) fsetxattr$trusted_overlay_upper(r1, &(0x7f0000000580), 0x0, 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000040)={0x0, 0x6, 0x7, 0x2, 0x3}) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, 0x0) 14:08:27 executing program 3: ioctl$TIOCL_UNBLANKSCREEN(0xffffffffffffffff, 0x541c, &(0x7f0000000000)) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x400}, 0x0, 0x0, 0x2, 0x0, 0x7, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) dup3(r1, r0, 0x0) 14:08:27 executing program 0: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf22\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 14:08:27 executing program 6: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) dup3(r0, r0, 0x0) r1 = syz_open_dev$vcsu(&(0x7f0000000000), 0x3ff, 0x581) ioctl$PIO_UNIMAP(r1, 0x4b67, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x1, 0x9}, {0xfffd, 0x3}]}) 14:08:27 executing program 1: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x05\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 14:08:27 executing program 4: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\t\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 14:08:27 executing program 5: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r0, 0x4b63, 0x0) ioctl$TIOCSTI(r0, 0x5412, &(0x7f0000000000)=0x40) r1 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000040)) r2 = syz_open_dev$ttys(0xc, 0x2, 0x1) ioctl$TIOCSTI(r2, 0x5412, &(0x7f0000000080)=0x3) ioctl$PIO_UNIMAP(r1, 0x4b67, &(0x7f0000000140)={0x3, &(0x7f00000000c0)=[{0x3, 0x1}, {0x4, 0xfffb}, {0xd8, 0x9}]}) 14:08:27 executing program 2: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\a\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 14:08:27 executing program 2: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\t\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 14:08:28 executing program 7: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8000000000000}, 0x0, 0x0, 0x800000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x8000000) semget$private(0x0, 0x4000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semctl$SETALL(0x0, 0x0, 0xd, &(0x7f00000000c0)) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) fsetxattr$trusted_overlay_upper(r0, &(0x7f0000000580), 0x0, 0x0, 0x0) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, 0x0) 14:08:28 executing program 5: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x10}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$TIOCPKT(r2, 0x5420, &(0x7f0000000040)) ioctl$TIOCGPTPEER(r0, 0x5441, 0x6) 14:08:28 executing program 1: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x06\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 14:08:28 executing program 4: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\n\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 14:08:28 executing program 0: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\t\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 14:08:28 executing program 6: r0 = openat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={0x40000, 0x52, 0x3}, 0x18) setsockopt$inet6_opts(r0, 0x29, 0x39, &(0x7f0000000080)=@fragment={0xdb, 0x0, 0x88, 0x0, 0x0, 0x0, 0x68}, 0x8) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r3 = dup3(r2, r1, 0x0) ioctl$TIOCPKT(r3, 0x5420, &(0x7f0000000040)) setsockopt$inet6_IPV6_RTHDR(r3, 0x29, 0x39, &(0x7f0000000180)={0x4, 0xc, 0x1, 0xac, 0x0, [@mcast1, @remote, @empty, @mcast1, @remote, @private2={0xfc, 0x2, '\x00', 0x1}]}, 0x68) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x1c1482, 0x0) r5 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r5, 0x4b63, 0x0) ioctl$TIOCGPGRP(r5, 0x540f, &(0x7f00000000c0)) ioctl$TIOCGPTPEER(r0, 0x5441, 0x7f) r6 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) dup3(r6, r4, 0x0) 14:08:28 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8021, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x9) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TCFLSH(r1, 0x540b, 0x0) ioctl$TIOCL_SELLOADLUT(r1, 0x541c, &(0x7f0000000000)={0x5, 0x9, 0x3, 0x0, 0xe697}) r2 = dup3(r1, r0, 0x0) ioctl$TIOCPKT(r2, 0x5420, &(0x7f0000000040)) 14:08:41 executing program 7: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8000000000000}, 0x0, 0x0, 0x800000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x8000000) semget$private(0x0, 0x4000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semctl$SETALL(0x0, 0x0, 0xd, &(0x7f00000000c0)) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) fsetxattr$trusted_overlay_upper(r0, &(0x7f0000000580), 0x0, 0x0, 0x0) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, 0x0) 14:08:41 executing program 5: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = dup3(r1, r0, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r5 = dup3(r4, r3, 0x0) ioctl$TIOCPKT(r5, 0x5420, &(0x7f0000000040)) ioctl$SNAPSHOT_ATOMIC_RESTORE(r5, 0x3304) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100), 0x202001, 0x0) ioctl$TIOCPKT(r2, 0x5420, &(0x7f0000000040)) r6 = perf_event_open(&(0x7f0000000080)={0x4, 0x80, 0x9b, 0xbc, 0x9, 0x2, 0x0, 0x1, 0x90542, 0x8, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x5, 0x0, @perf_bp, 0x800, 0x3, 0x5, 0x3, 0x8001, 0x4, 0x1, 0x0, 0x4, 0x0, 0x6}, 0x0, 0xe, 0xffffffffffffffff, 0x8) write$binfmt_elf64(r6, &(0x7f0000000180)=ANY=[@ANYBLOB="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"/5752], 0x1678) 14:08:41 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x6c, 0x0, 0x40, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3, 0xa}, 0x0, 0x0, 0x0, 0x8, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0xff}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = syz_open_dev$tty1(0xc, 0x4, 0x2) ioctl$TIOCVHANGUP(r2, 0x5437, 0x0) dup3(r1, r0, 0x0) ioctl$TIOCL_SETSEL(0xffffffffffffffff, 0x541c, &(0x7f0000000000)={0x2, {0x2, 0x7fff, 0x1568, 0x6, 0x0, 0x1}}) 14:08:41 executing program 0: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\n\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 14:08:41 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) dup3(r0, r0, 0x0) r1 = syz_open_dev$vcsu(&(0x7f0000000000), 0x3ff, 0x581) ioctl$PIO_UNIMAP(r1, 0x4b67, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x1, 0x9}, {0xfffd, 0x3}]}) 14:08:41 executing program 2: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\x0f\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 14:08:41 executing program 1: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\a\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 14:08:41 executing program 4: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x0f\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 14:08:41 executing program 3: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.2\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 14:08:41 executing program 0: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x0f\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 14:08:42 executing program 1: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\b\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 14:08:42 executing program 2: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\x10\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 14:08:42 executing program 4: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x10\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 14:08:42 executing program 6: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='autogroup\x00') ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r0, 0xc0189373, &(0x7f0000000040)={{0x1, 0x1, 0x18, r0, {0x1f}}, './file0\x00'}) statx(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r1, 0xc018937b, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r2, {0x0, r3}}, './file0\x00'}) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) dup3(r5, r4, 0x0) 14:08:42 executing program 5: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0x0, 0x0, 0x0, 0x1, 0x400000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$TIOCPKT(r2, 0x5420, &(0x7f0000000040)) 14:08:42 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) fsetxattr$trusted_overlay_upper(r0, &(0x7f0000000580), 0x0, 0x0, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f0000000080)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_SET_INTERFACE(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000140)={0x24, r2, 0x5, 0x0, 0x0, {{}, {@val={0x8, 0x3, r3}, @void}}, [@NL80211_ATTR_IFTYPE={0x8, 0x5, 0x7}]}, 0x24}}, 0x0) sendmsg$NL80211_CMD_JOIN_MESH(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000200)={0x30, r2, 0x5, 0x0, 0x0, {{}, {@val={0x8, 0x3, r3}, @void}}, [@NL80211_ATTR_MESH_ID={0xa}, @chandef_params=[@NL80211_ATTR_WIPHY_FREQ={0x8}]]}, 0x30}}, 0x0) sendmsg$NL80211_CMD_GET_MPP(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000002c0)={0x28, r2, 0x5, 0x0, 0x0, {{}, {@val={0x8, 0x3, r3}, @void}}, [@NL80211_ATTR_MAC={0xa}]}, 0x28}}, 0x0) sendmsg$NL80211_CMD_SET_CQM(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000180)={&(0x7f0000000040)={0x118, r2, 0x8, 0x70bd2c, 0x25dfdbfc, {{}, {@void, @void}}, [@NL80211_ATTR_CQM={0xc, 0x5e, 0x0, 0x1, [@NL80211_ATTR_CQM_TXE_INTVL={0x8, 0x7, 0x301}]}, @NL80211_ATTR_CQM={0x24, 0x5e, 0x0, 0x1, [@NL80211_ATTR_CQM_RSSI_LEVEL={0x8, 0x9, 0x10000}, @NL80211_ATTR_CQM_RSSI_LEVEL={0x8, 0x9, 0xdd8d}, @NL80211_ATTR_CQM_RSSI_HYST={0x8, 0x2, 0x10000000}, @NL80211_ATTR_CQM_RSSI_THRESHOLD_EVENT={0x8, 0x3, 0x563}]}, @NL80211_ATTR_CQM={0xc, 0x5e, 0x0, 0x1, [@NL80211_ATTR_CQM_RSSI_LEVEL={0x8, 0x9, 0xf1fe}]}, @NL80211_ATTR_CQM={0x44, 0x5e, 0x0, 0x1, [@NL80211_ATTR_CQM_TXE_RATE={0x8, 0x5, 0x56}, @NL80211_ATTR_CQM_RSSI_LEVEL={0x8, 0x9, 0x6}, @NL80211_ATTR_CQM_TXE_PKTS={0x8, 0x6, 0x3}, @NL80211_ATTR_CQM_RSSI_LEVEL={0x8, 0x9, 0x5}, @NL80211_ATTR_CQM_RSSI_THOLD={0x10, 0x1, [0x4, 0x401, 0xba5d]}, @NL80211_ATTR_CQM_TXE_RATE={0x8, 0x5, 0x3f}, @NL80211_ATTR_CQM_TXE_RATE={0x8, 0x5, 0x6}]}, @NL80211_ATTR_CQM={0x60, 0x5e, 0x0, 0x1, [@NL80211_ATTR_CQM_RSSI_THRESHOLD_EVENT={0x8, 0x3, 0xb7a9}, @NL80211_ATTR_CQM_TXE_PKTS={0x8, 0x6, 0x60}, @NL80211_ATTR_CQM_RSSI_THRESHOLD_EVENT={0x8, 0x3, 0x2}, @NL80211_ATTR_CQM_RSSI_LEVEL={0x8, 0x9, 0x10001}, @NL80211_ATTR_CQM_RSSI_THOLD={0x14, 0x1, [0x1, 0x5, 0x6, 0x7]}, @NL80211_ATTR_CQM_TXE_INTVL={0x8, 0x7, 0x44e}, @NL80211_ATTR_CQM_RSSI_THRESHOLD_EVENT={0x8, 0x3, 0x1}, @NL80211_ATTR_CQM_RSSI_THRESHOLD_EVENT={0x8, 0x3, 0x81}, @NL80211_ATTR_CQM_RSSI_LEVEL={0x8}, @NL80211_ATTR_CQM_RSSI_THRESHOLD_EVENT={0x8, 0x3, 0x3}]}, @NL80211_ATTR_CQM={0x24, 0x5e, 0x0, 0x1, [@NL80211_ATTR_CQM_RSSI_THRESHOLD_EVENT={0x8, 0x3, 0x3}, @NL80211_ATTR_CQM_TXE_RATE={0x8, 0x5, 0x2a}, @NL80211_ATTR_CQM_RSSI_HYST={0x8, 0x2, 0x3}, @NL80211_ATTR_CQM_TXE_RATE={0x8, 0x5, 0x20}]}]}, 0x118}, 0x1, 0x0, 0x0, 0x40c0}, 0x0) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, 0x0) 14:08:57 executing program 1: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\t\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 14:08:57 executing program 2: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\x14\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 14:08:57 executing program 0: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x10\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 14:08:57 executing program 5: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$F2FS_IOC_START_VOLATILE_WRITE(r0, 0xf503, 0x0) ioctl$TIOCPKT(r2, 0x5420, &(0x7f0000000040)) 14:08:57 executing program 3: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x11\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 14:08:57 executing program 7: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcb\t\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 14:08:57 executing program 6: r0 = socket$inet(0x2, 0x3, 0xff) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$VFAT_IOCTL_READDIR_BOTH(r1, 0x82307201, &(0x7f0000000680)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000280)="b683ae7d0000000000000000000000000000000200000000", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r2, @broadcast}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x40}, 0x0) sendmsg$TCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000040)={&(0x7f0000000940)=ANY=[@ANYBLOB="cc040000120000082abd7000fddbdf2503a73507000000030000f100000007000000040000000700000000000000000000000000000000000066f77f21142b490fa024e1f2e955519b1ecba9c15407ba61caf57540cdda65d6c076cd19a49a824587ee07e6a6d4024191948df42fd8b6603295fde8753a9ea381a6e0eb7fba3dbed57e04c49f77bb9c8558333e14233ca42e47e00349a5d300005cc7a27ac27d47bf2b3b81ce6c6d", @ANYRES32=r2, @ANYBLOB="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"], 0x4cc}, 0x1, 0x0, 0x0, 0x20000000}, 0x4004000) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) dup3(r4, r3, 0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000008c0)={0x0, {0x2, 0x4e23, @remote}, {0x2, 0x4e22, @loopback}, {0x2, 0x4e22, @empty}, 0x200, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000100)='erspan0\x00', 0xfffffffffffffe01, 0x7}) 14:08:57 executing program 4: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x14\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 14:08:57 executing program 4: ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f0000000040)={0x3, 0xc, "441e875fcd1c0f90ad709dc0"}) clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000000c0)) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 14:08:57 executing program 1: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\n\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 14:08:57 executing program 5: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$TIOCPKT(r2, 0x5420, &(0x7f0000000040)) ioctl$TIOCGPTPEER(r1, 0x5441, 0x7ff) dup3(r2, r1, 0x80000) 14:08:57 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$TIOCPKT(r2, 0x540f, &(0x7f0000000040)) 14:08:57 executing program 7: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcb\t\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 14:08:57 executing program 0: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x14\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 14:08:57 executing program 2: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf22\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 14:08:57 executing program 6: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) dup3(r1, r0, 0x0) r2 = creat(&(0x7f0000000000)='./file0\x00', 0x8) write(r2, &(0x7f0000000040)="1093ad7cd0e64cf343bb2be71d05bc9d63110c2887979c748525d5ac0636c9d1949e0d5d70f3aacdf212df5b804413f71721fdf92646c8813b43afc50beaabdfa0db88a4453fec96d77bc0d8cfa8df20bbf556d076703ee0ddc0b57fa5f9ce7bf9e6f1847dce528df5106d88c18f53c12b1e27f0b5a019d1", 0x78) 14:08:57 executing program 1: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\v\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) [ 2683.147206] kmemleak: 3 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 14:09:18 executing program 1: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\f\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 14:09:18 executing program 0: r0 = clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) r1 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000600)={0xa, 0x0, 0x0, @mcast2, 0x3}, 0x1c) fcntl$getownex(r1, 0x10, &(0x7f0000000040)={0x0, 0x0}) fcntl$lock(0xffffffffffffffff, 0x26, &(0x7f0000000000)={0x0, 0x1, 0x4, 0x4000009, r2}) r3 = fork() setsockopt$SO_TIMESTAMP(r1, 0x1, 0x23, &(0x7f0000000400)=0x8, 0x4) ptrace$setopts(0x4200, r3, 0x0, 0x0) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) dup3(r4, r4, 0x0) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) syz_open_dev$vcsn(&(0x7f00000003c0), 0x8, 0x500000) r6 = dup3(r5, r4, 0x0) ioctl$TIOCPKT(r6, 0x5420, &(0x7f0000000040)) clone3(&(0x7f0000000340)={0x40000, &(0x7f0000000040), &(0x7f00000000c0), &(0x7f0000000200), {0x24}, &(0x7f0000000240)=""/153, 0x99, &(0x7f0000001280)=""/4096, &(0x7f0000000300)=[r0, r2, r3], 0x3, {r6}}, 0x58) 14:09:18 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$TIOCPKT(r2, 0x5420, &(0x7f0000000040)) 14:09:18 executing program 3: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x06*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 14:09:18 executing program 4: r0 = clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r1, 0x4b63, 0x0) r2 = syz_open_procfs$userns(r0, &(0x7f0000000040)) dup2(r1, r2) 14:09:18 executing program 7: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$TIOCPKT(r2, 0x540e, &(0x7f0000000040)) 14:09:18 executing program 2: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\t\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 14:09:18 executing program 6: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x900, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x30, 0x0, @perf_config_ext, 0x42503, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) dup3(r1, r0, 0x0) 14:09:18 executing program 5: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) dup3(r1, r0, 0x0) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r2, 0x4b63, 0x0) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000080)=0x5) r3 = socket$inet_icmp(0x2, 0x2, 0x1) signalfd(r3, &(0x7f0000000000)={[0x9]}, 0x8) 14:09:18 executing program 1: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\r\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 14:09:19 executing program 3: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x06*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 14:09:19 executing program 7: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$TIOCPKT(r2, 0x5410, &(0x7f0000000040)) (fail_nth: 1) 14:09:19 executing program 2: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\n\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 14:09:19 executing program 4: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = fork() ptrace$setopts(0x4200, r0, 0x0, 0x0) pidfd_open(r0, 0x0) r1 = request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) add_key(&(0x7f0000000040)='keyring\x00', &(0x7f00000000c0)={'syz', 0x2}, 0x0, 0x0, r1) 14:09:19 executing program 6: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) dup3(r1, r0, 0x0) [ 2692.439673] FAULT_INJECTION: forcing a failure. [ 2692.439673] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2692.441553] CPU: 0 PID: 14543 Comm: syz-executor.7 Not tainted 5.10.153 #1 [ 2692.442574] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2692.443845] Call Trace: [ 2692.444255] dump_stack+0x107/0x167 [ 2692.444803] should_fail.cold+0x5/0xa [ 2692.445373] _copy_to_user+0x2e/0x180 [ 2692.445962] simple_read_from_buffer+0xcc/0x160 [ 2692.446664] proc_fail_nth_read+0x198/0x230 [ 2692.447325] ? proc_sessionid_read+0x230/0x230 [ 2692.448020] ? security_file_permission+0x24e/0x570 [ 2692.448769] ? perf_trace_initcall_start+0x101/0x380 [ 2692.449555] ? proc_sessionid_read+0x230/0x230 [ 2692.450252] vfs_read+0x228/0x580 [ 2692.450810] ksys_read+0x12d/0x260 [ 2692.451358] ? __ia32_sys_pwrite64+0x230/0x230 [ 2692.452067] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2692.452879] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2692.453683] do_syscall_64+0x33/0x40 [ 2692.454262] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2692.455067] RIP: 0033:0x7f58fdba969c [ 2692.455644] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 2692.458372] RSP: 002b:00007f58fb16c170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 2692.459540] RAX: ffffffffffffffda RBX: ffffffffffffffff RCX: 00007f58fdba969c [ 2692.460611] RDX: 000000000000000f RSI: 00007f58fb16c1e0 RDI: 0000000000000006 [ 2692.461680] RBP: 00007f58fb16c1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2692.462750] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2692.463832] R13: 00007ffcf5819c5f R14: 00007f58fb16c300 R15: 0000000000022000 [ 2703.399397] kmemleak: 2 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 14:09:37 executing program 7: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$TIOCPKT(r2, 0x5410, &(0x7f0000000040)) 14:09:37 executing program 1: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x0e\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 14:09:37 executing program 6: sync() r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r2, 0x4b63, 0x0) ioctl$TCSETSF(r2, 0x5404, &(0x7f0000000000)={0x1, 0x7ff, 0xfffffff8, 0x80000000, 0x4, "6717399a21135781334cdba85dbdd22ff22f47"}) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r4 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r4, 0x4b63, 0x0) perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0x3, 0x1e, 0x4, 0xaf, 0x0, 0x0, 0x404, 0x2, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x5985, 0x0, @perf_bp={&(0x7f0000000040), 0xa}, 0x10050, 0xbf, 0xedee, 0x4, 0x7fff, 0x2, 0x59, 0x0, 0x2}, 0x0, 0x7, r0, 0xa) ioctl$TIOCVHANGUP(r4, 0x5437, 0x0) dup3(r3, r1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000100)=0x2c) 14:09:37 executing program 2: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x0f\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 14:09:37 executing program 5: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$TIOCPKT(r2, 0x5420, &(0x7f0000000040)) 14:09:37 executing program 0: r0 = socket(0x5, 0xb28ae848db1aba7a, 0x1df) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f0000000080)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_SET_INTERFACE(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000140)={0x24, r2, 0x5, 0x0, 0x0, {{}, {@val={0x8, 0x3, r3}, @void}}, [@NL80211_ATTR_IFTYPE={0x8, 0x5, 0x7}]}, 0x24}}, 0x0) sendmsg$NL80211_CMD_JOIN_MESH(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000200)={0x30, r2, 0x5, 0x0, 0x0, {{}, {@val={0x8, 0x3, r3}, @void}}, [@NL80211_ATTR_MESH_ID={0xa}, @chandef_params=[@NL80211_ATTR_WIPHY_FREQ={0x8}]]}, 0x30}}, 0x0) sendmsg$NL80211_CMD_GET_MPP(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000002c0)={0x28, r2, 0x5, 0x0, 0x0, {{}, {@val={0x8, 0x3, r3}, @void}}, [@NL80211_ATTR_MAC={0xa}]}, 0x28}}, 0x0) sendmsg$NL80211_CMD_NEW_INTERFACE(r0, &(0x7f00000002c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000200)={0x88, r2, 0x4, 0x70bd2a, 0x25dfdbfd, {{}, {@val={0x8, 0x1, 0x65}, @void, @val={0xc, 0x99, {0x6a, 0x23}}}}, [@NL80211_ATTR_SOCKET_OWNER={0x4}, @NL80211_ATTR_SOCKET_OWNER={0x4}, @NL80211_ATTR_IFTYPE={0x8, 0x5, 0x17}, @NL80211_ATTR_4ADDR={0x5}, @NL80211_ATTR_IFTYPE={0x8, 0x5, 0xb}, @NL80211_ATTR_MESH_ID={0xa}, @NL80211_ATTR_IFNAME={0x14, 0x4, 'geneve1\x00'}, @NL80211_ATTR_IFNAME={0x14, 0x4, 'veth0_macvtap\x00'}, @NL80211_ATTR_SOCKET_OWNER={0x4}, @NL80211_ATTR_4ADDR={0x5, 0x53, 0x1}]}, 0x88}, 0x1, 0x0, 0x0, 0x5f248c84178b6d7c}, 0x80) clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 14:09:37 executing program 4: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='id_resolver\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f00000000c0)='\x00\x00\x00\x00*\x10\"\x95}rNl\by\xf3]\xa3\x92\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce\xb6x\xdb\x12\xb4\x8d\xfb\x11\x8e7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8&d\xb44\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\xbb}z\x85\xe5BDn\xaa\xf8\"X\xb7\x92>\xcf\x83\x16\x00\x002\xc4\x84x\x00\x00\x00\x00\x00\x00\x00\x00\x00\xa7\xaf\x1d\xbd\xef\x12\xbb\xf2\x88)\x9e\x8b\x92\x98\"4\xc5\xdd\xea\xb7d\xfb\x9a\xfa\xfe\x1dW\x88\xa1\xb8p^U@F\x05\x00g^\x8d\xf0\xb8\xb5\xbb\xd4!1\xb5\x85p\x99\xb1Q\xec\xd0\x17\x0f]G\xa6\xe7D\xe4]\x17\xf7Q\xf4\x12\x90\x91\x83\x16\x97\xb5\xd4\xd8\xb9DC\xc2\x00=\xb6\xe5P(\xaa6d\xba~ d\xbb\xb7\x85\x06\xf8|\x14\xd6\xbe\x9cr*\x9b\x17U\xe8\xcb\xdd\xbe\x84\bA\xeb\xb9\xf4d\x11\x17\xe9\xa7:\x1c\xfe\x04\\\xbc\x8b\xcc\x8f\xc2\xbc;\xfd\xad<\xdc9\xa2o\xa4\xa8\x00\x00\x00\x00\x00\x00\x00\x04W\xd1\x87\x1bU\x0fOu\v\xec\fh\xcf\xbfN\xfdVg*b\x990D\xf1\xe3\xf4\x8d', 0xfffffffffffffffb) 14:09:37 executing program 3: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x06*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 14:09:37 executing program 5: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffc}, 0x48202}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TCSETSW2(r0, 0x402c542c, &(0x7f0000000000)={0x5, 0x68f, 0x7, 0x6e9, 0x8, "98f9c5813c286af04c4b46dc440f0d1ddcf4a0", 0x8, 0x7}) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = dup3(r0, r0, 0x0) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, &(0x7f0000000080)) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000040)) 14:09:37 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000040)='.\x00', 0x2000003) r2 = inotify_init1(0x0) inotify_add_watch(r2, &(0x7f0000000000)='./file0\x00', 0xa4000004) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r3 = dup2(r0, r0) close_range(r3, 0xffffffffffffffff, 0x0) (fail_nth: 1) [ 2711.036360] FAULT_INJECTION: forcing a failure. [ 2711.036360] name failslab, interval 1, probability 0, space 0, times 0 14:09:37 executing program 1: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x0f\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) [ 2711.038759] CPU: 1 PID: 14594 Comm: syz-executor.3 Not tainted 5.10.153 #1 [ 2711.040370] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2711.042590] Call Trace: [ 2711.043179] dump_stack+0x107/0x167 [ 2711.044074] should_fail.cold+0x5/0xa [ 2711.044869] ? inotify_handle_inode_event+0x112/0x5c0 [ 2711.046310] should_failslab+0x5/0x20 [ 2711.047407] __kmalloc+0x72/0x3f0 [ 2711.048127] ? lock_downgrade+0x6d0/0x6d0 [ 2711.049151] inotify_handle_inode_event+0x112/0x5c0 [ 2711.050181] inotify_ignored_and_remove_idr+0x24/0x70 [ 2711.051452] ? inotify_free_event+0x20/0x20 [ 2711.052337] fsnotify_free_mark+0xe8/0x140 [ 2711.053376] fsnotify_clear_marks_by_group+0x282/0x3c0 [ 2711.054439] ? lock_downgrade+0x6d0/0x6d0 [ 2711.055482] ? do_raw_spin_lock+0x121/0x260 [ 2711.056374] ? fsnotify_add_mark+0x90/0x90 [ 2711.057410] ? rwlock_bug.part.0+0x90/0x90 [ 2711.058272] ? quarantine_put+0x8b/0x1a0 [ 2711.059263] fsnotify_destroy_group+0xd0/0x310 [ 2711.060193] ? fsnotify_group_stop_queueing+0x60/0x60 [ 2711.061252] ? fsnotify_first_mark+0x200/0x200 [ 2711.062212] ? locks_remove_file+0x403/0x620 [ 2711.063148] ? fcntl_setlk+0xee0/0xee0 [ 2711.063971] inotify_release+0x33/0x50 [ 2711.064758] __fput+0x285/0x980 [ 2711.065444] ? inotify_remove_from_idr+0x450/0x450 [ 2711.066477] task_work_run+0xe2/0x1a0 [ 2711.067295] exit_to_user_mode_prepare+0x155/0x160 [ 2711.068303] syscall_exit_to_user_mode+0x38/0x230 [ 2711.069299] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2711.070356] RIP: 0033:0x7f596826cb19 [ 2711.071156] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2711.074902] RSP: 002b:00007f59657e2188 EFLAGS: 00000246 ORIG_RAX: 00000000000001b4 [ 2711.076479] RAX: 0000000000000000 RBX: 00007f596837ff60 RCX: 00007f596826cb19 [ 2711.077938] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000000000004 [ 2711.079405] RBP: 00007f59657e21d0 R08: 0000000000000000 R09: 0000000000000000 [ 2711.080853] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2711.082319] R13: 00007ffcfa1fb9ff R14: 00007f59657e2300 R15: 0000000000022000 14:09:37 executing program 2: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x10\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 14:09:37 executing program 0: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x100000c, 0x2010, 0xffffffffffffffff, 0xb011b000) 14:09:37 executing program 7: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$TIOCPKT(r2, 0x2, &(0x7f0000000040)) 14:09:37 executing program 4: r0 = syz_mount_image$nfs4(&(0x7f0000000380), &(0x7f00000003c0)='./file0\x00', 0x3, 0x1, &(0x7f0000000480)=[{&(0x7f0000000400)="29ce3cdfd2bd87773c145d10b12b10a24c3253cffb2b732d47079f4801bf036c7aa1f9e9216d948ace1f10fe54dfa36550eae8eedebe3217ab0115337f088389ad50ada94bf26a81e19a8114c2c629fe", 0x50, 0x8}], 0x80, &(0x7f00000004c0)={[{'\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16'}, {'\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16'}, {'\\)}:\x00'}, {}, {'\xa0#@*]'}, {'\\)}:\x00'}, {}], [{@appraise}, {@uid_eq={'uid', 0x3d, 0xffffffffffffffff}}, {@uid_gt={'uid>', 0xee00}}, {@hash}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\\)}:\x00'}}, {@subj_role={'subj_role', 0x3d, '\xa4@'}}, {@fowner_eq={'fowner', 0x3d, 0xffffffffffffffff}}, {@smackfshat={'smackfshat', 0x3d, '/#-%$(('}}]}) dup2(0xffffffffffffffff, r0) r1 = request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) r2 = add_key$keyring(&(0x7f00000021c0), &(0x7f0000002200)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$setperm(0x5, r1, 0x1200008) keyctl$chown(0xb, r2, 0x0, 0x0) keyctl$get_security(0x11, r2, &(0x7f00000002c0)=""/131, 0x83) r3 = add_key$keyring(&(0x7f00000021c0), &(0x7f0000002200)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$setperm(0x5, r3, 0x8001400) keyctl$chown(0xb, r3, 0x0, 0x0) keyctl$describe(0x6, r3, &(0x7f0000000240)=""/70, 0x46) request_key(&(0x7f0000000040)='ceph\x00', &(0x7f00000000c0)={'syz', 0x1}, &(0x7f0000000200)='\\)}:\x00', r2) 14:09:37 executing program 2: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x14\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 14:09:52 executing program 1: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x11\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 14:09:52 executing program 2: clone3(&(0x7f0000000200)={0x99000000, 0x0, 0x0, 0x0, {0x10000}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$TIOCPKT(r2, 0x5420, &(0x7f0000000040)) mkdirat$cgroup(r2, &(0x7f0000000040)='syz0\x00', 0x1ff) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 14:09:52 executing program 0: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) recvmmsg$unix(0xffffffffffffffff, &(0x7f0000000a80)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000080)=""/96, 0x60}, {&(0x7f0000000100)=""/238, 0xee}, {&(0x7f0000000200)=""/156, 0x9c}], 0x3, &(0x7f0000000300)=[@cred={{0x1c, 0x1, 0x2, {0x0}}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x118}}, {{&(0x7f0000000440)=@abs, 0x6e, &(0x7f0000000540)=[{&(0x7f00000004c0)=""/75, 0x4b}], 0x1, &(0x7f0000000580)=[@rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x110}}, {{&(0x7f00000006c0)=@abs, 0x6e, &(0x7f0000000a00)=[{&(0x7f0000000740)=""/85, 0x55}, {&(0x7f00000007c0)=""/90, 0x5a}, {&(0x7f0000000840)=""/94, 0x5e}, {&(0x7f00000008c0)=""/117, 0x75}, {&(0x7f0000000940)=""/134, 0x86}], 0x5}}], 0x3, 0x2, 0x0) r1 = perf_event_open$cgroup(&(0x7f0000000b40)={0x5, 0x80, 0x2, 0x5, 0x4, 0x2, 0x0, 0x3, 0x800, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x8, 0x2, @perf_config_ext={0x3, 0x1770}, 0x1010, 0xfffffffffffffff8, 0x73, 0x7, 0x94e1, 0x6d, 0x7fff, 0x0, 0x1ff, 0x0, 0x200}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x5, 0x80, 0x20, 0xfe, 0x7e, 0xf8, 0x0, 0x0, 0x8000, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, @perf_config_ext={0x2, 0x15}, 0x1014, 0xe00c, 0x100, 0x0, 0x189, 0x2dbb, 0xff, 0x0, 0x0, 0x0, 0x200000000000}, r0, 0x1, r1, 0x2) 14:09:52 executing program 4: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) add_key$fscrypt_v1(&(0x7f0000000040), &(0x7f00000000c0)={'fscrypt:', @desc4}, &(0x7f0000000200)={0x0, "032b3f31611bf7bb374789fa3125f96c17f57c91144f63395005b2e26c71f07d47e62c539869a9ac73b5f99dbcd181b3833f3e0730f66fbbfc669fcfaa40a95b", 0x1d}, 0x48, r0) 14:09:52 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000040)='.\x00', 0x2000003) r2 = inotify_init1(0x0) inotify_add_watch(r2, &(0x7f0000000000)='./file0\x00', 0xa4000004) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r3 = dup2(r0, r0) close_range(r3, 0xffffffffffffffff, 0x0) 14:09:52 executing program 6: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="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"/1870], 0x758) dup3(r2, r1, 0x0) 14:09:52 executing program 7: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$TIOCPKT(r2, 0x4b47, &(0x7f0000000040)) 14:09:52 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$TIOCPKT(r2, 0x5420, &(0x7f0000000040)) ioctl$TUNGETFEATURES(r2, 0x800454cf, &(0x7f0000000000)) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) syz_open_dev$tty20(0xc, 0x4, 0x1) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x80000, 0x0) r5 = dup3(r4, r3, 0x0) ioctl$TIOCPKT(r5, 0x5420, &(0x7f0000000040)) r6 = syz_mount_image$nfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x8, 0x2, &(0x7f0000000100)=[{&(0x7f0000000180)="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", 0x1000, 0x6}, {&(0x7f0000001180)="13f590aa861f3b0c47e00213cce471bbcfe4b511e65392d07fd282fe0b5ecd67572b1d9751c81cb6e0283d3cdd7f45b7a2d645dba21ece79c1abacadc32c474c5379e910577f44469f3a1780cf7fe14b09e88bd42bb19190a34c3dfbe035d7ebf55fec94942ece81c539b26e5f06f39ee6671cee345d484d3bee4a47ccf5d82de8144c3c1d5d1ac72cfea26c43df2583c9eb5d0d068565a716b8491f2a537e5aa20e9fe31315a0fc6b488eb81c9d4a00bbd60d53578a34e7469743f1369d6c43872c6fe9d90a6d", 0xc7, 0x9}], 0x4001, &(0x7f0000001300)={[{'/\\#^'}, {'/dev/ptmx\x00'}, {}, {'/dev/ptmx\x00'}, {}], [{@measure}, {@func={'func', 0x3d, 'POLICY_CHECK'}}, {@dont_appraise}, {@seclabel}, {@appraise_type}, {@obj_type={'obj_type', 0x3d, 'nfs\x00'}}]}) dup3(r0, r6, 0x0) 14:09:52 executing program 2: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r0, 0x4b63, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r1, 0x4b63, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x40, 0x8, 0x0, 0x8000}) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 14:09:52 executing program 4: r0 = clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r1, 0x4b63, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r1, 0x40286608, &(0x7f0000000680)={0x8, 0x6, 0x80, 0x5, 0xffff7fff, 0x8000}) r2 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000200), 0x400000, 0x0) r3 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r4 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f0000000600)={0xa, 0x0, 0x0, @mcast2, 0x3}, 0x1c) fcntl$getownex(r4, 0x10, &(0x7f0000000040)={0x0, 0x0}) fcntl$lock(0xffffffffffffffff, 0x26, &(0x7f0000000000)={0x0, 0x1, 0x4, 0x4000009, r5}) r6 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r7 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r8 = dup3(r7, r6, 0x0) ioctl$TIOCPKT(r8, 0x5420, &(0x7f0000000040)) clone3(&(0x7f0000000600)={0x42000000, &(0x7f0000000400), &(0x7f0000000440), &(0x7f0000000480), {0x26}, &(0x7f00000004c0)=""/171, 0xab, &(0x7f0000000580)=""/8, &(0x7f00000005c0)=[r5, r0], 0x2, {r8}}, 0x58) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0xc) ioctl$CDROM_LOCKDOOR(r2, 0x5329, 0x1) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), 0x402, &(0x7f00000002c0)=ANY=[@ANYBLOB="7472616e733d03000000000000003d", @ANYRESHEX=r2, @ANYBLOB=',wfdno=', @ANYRESHEX=r3, @ANYBLOB=',posixacl,fscache,appraise_type=imasig,measure,smackfstransmute=^(,euid>', @ANYRESDEC=0xee01, @ANYBLOB=',audit,obj_type=&\\%[%,fsmagic=0x0000000000000007,func=FILE_CHECK,fowner<', @ANYRESDEC=r9, @ANYBLOB=',smackfstransmute=dns_resolver\x00,\x00']) 14:09:52 executing program 6: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0x0, 0x8001, 0x0, 0x5, 0x0, 0x8, 0x2, 0x0, 0x80000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r2, 0x40286608, &(0x7f0000000040)={0x849f, 0x3f, 0x8, 0x6, 0x3}) [ 2725.619410] nfs: Unknown parameter '/\#^' 14:09:52 executing program 0: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r1 = dup3(r0, r0, 0x0) clone3(&(0x7f0000000200)={0x25201000, 0x0, 0x0, 0x0, {0x11}, 0x0, 0x0, 0x0, 0x0, 0x50, {r1}}, 0x58) r2 = request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x2}, 0x0, 0x0, r2) 14:09:52 executing program 1: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x12\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 14:09:52 executing program 7: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$TIOCPKT(r2, 0x4b49, &(0x7f0000000040)) 14:09:52 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000040)='.\x00', 0x2000003) r2 = inotify_init1(0x0) inotify_add_watch(r2, &(0x7f0000000000)='./file0\x00', 0xa4000004) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r3 = dup2(r0, r0) close_range(r3, 0xffffffffffffffff, 0x2) 14:09:52 executing program 2: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) add_key(&(0x7f0000000040)='pkcs7_test\x00', &(0x7f00000000c0)={'syz', 0x0}, &(0x7f0000000200)="9720e2b401a4175d55cdb80b01ebc48abd6b97df2edb4dcc", 0x18, r0) 14:09:52 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000040)='.\x00', 0x2000003) r2 = inotify_init1(0x0) inotify_add_watch(r2, &(0x7f0000000000)='./file0\x00', 0xa4000004) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r3 = dup2(r0, r0) close_range(r3, 0xffffffffffffffff, 0x4) 14:09:52 executing program 5: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$TIOCPKT(r2, 0x5420, &(0x7f0000000040)) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r5 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) ioctl$AUTOFS_IOC_ASKUMOUNT(r5, 0x80049370, &(0x7f0000000080)) r6 = dup3(r4, r3, 0x0) ioctl$TIOCPKT(r6, 0x5420, &(0x7f0000000040)) r7 = fsmount(r6, 0x0, 0x8) ioctl$TCSETS2(r7, 0x402c542b, &(0x7f0000000000)={0x0, 0x29a, 0x74, 0x1f, 0x4, "fcf236f8d02b75a43ed6abb838dc7670578102", 0x40, 0x10000}) 14:09:52 executing program 1: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x14\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) [ 2740.025777] kmemleak: 3 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 14:10:16 executing program 5: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(r0, 0x846f) io_uring_enter(0xffffffffffffffff, 0x5a1f, 0x4a77, 0x2, &(0x7f0000000000)={[0x4]}, 0x8) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$TIOCPKT(r2, 0x5420, &(0x7f0000000040)) 14:10:16 executing program 4: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = add_key$keyring(&(0x7f00000021c0), &(0x7f0000002200)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$setperm(0x5, r0, 0x8001400) keyctl$chown(0xb, r0, 0x0, 0x0) r1 = request_key(&(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000000)={'syz', 0x0}, &(0x7f00000000c0)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\x7f\x86l59\xf4#\xc1D\x93\x82>\xbf,\x8f\x96=;\xd4`\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1\xb94\x12\xbfFT\xc8v\xe4\x94\xf94\xbcnD\x04S-\xadL0\xa4\xb1\x8d\x9e\x96\xd2\xdc?Kj\xbeR)\x9aNf\x06\x90(\f\xb5\x91S\xe1\x0fjq\x1d-?\xd8\xcb\x9a\xd8\x83l\xff\xe9D\xf6[\xcf\x85\xd1\x8d\xd1\x00\x80\x98\xa4t\xf4%\xf0\xc7\xd5\x8b\x11\v\r\xe2\xb5\xca\xbeb9~\xee\xbf\xaeQ\x9f1\xc1\x16\xe1\xaa\x00m\x11d\xbe\xb0\xa6s\f5\x9b\xd8\xed\xa9\xfa\xa0\xb8L\xd8\xb2rP\xf7\xc3z\xb2\x80\xc38\xd1\xd6iz\x19J\xaa\x01OHO\x1e\xcf\x97\xad\xb0B/', r0) r2 = add_key$keyring(&(0x7f0000000080), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, r0) keyctl$KEYCTL_MOVE(0x1e, r1, r1, r2, 0x1) 14:10:16 executing program 1: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b./\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 14:10:16 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$TIOCPKT(r2, 0x5420, &(0x7f0000000040)) r3 = signalfd(r2, &(0x7f00000000c0)={[0x20]}, 0x8) clone3(&(0x7f0000000200)={0x8000000, 0x0, 0x0, 0x0, {0x8000000}, 0x0, 0x0, 0x0, 0x0, 0x0, {r3}}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 14:10:16 executing program 2: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = fork() ptrace$setopts(0x4200, r0, 0x0, 0x0) r1 = fork() tkill(r1, 0xb) kcmp(r0, r1, 0x6, 0xffffffffffffffff, 0xffffffffffffffff) r2 = openat2(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)={0x80, 0x18, 0x8}, 0x18) r3 = request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) ftruncate(r2, 0x8000) request_key(&(0x7f0000000200)='cifs.idmap\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280)='-\x00', r3) 14:10:16 executing program 7: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$TIOCPKT(r2, 0x5409, &(0x7f0000000040)) 14:10:16 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000040)='.\x00', 0x2000003) r2 = inotify_init1(0x0) inotify_add_watch(r2, &(0x7f0000000000)='./file0\x00', 0xa4000004) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r3 = dup2(r0, r0) close_range(r3, 0xffffffffffffffff, 0x8) 14:10:16 executing program 6: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$TIOCPKT(r2, 0x5420, &(0x7f0000000040)) getsockopt$ARPT_SO_GET_REVISION_TARGET(r2, 0x0, 0x63, &(0x7f0000000000)={'TPROXY\x00'}, &(0x7f0000000040)=0x1e) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) dup3(r4, r3, 0x0) 14:10:16 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000040)='.\x00', 0x2000003) r2 = inotify_init1(0x0) inotify_add_watch(r2, &(0x7f0000000000)='./file0\x00', 0xa4000004) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r3 = dup2(r0, r0) close_range(r3, 0xffffffffffffffff, 0x3e) 14:10:16 executing program 2: clone3(&(0x7f0000000200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffb9}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 14:10:16 executing program 4: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$TIOCPKT(r2, 0x5420, &(0x7f0000000040)) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r2, 0xc0189375, &(0x7f0000000040)={{0x1, 0x1, 0x18}, './file0\x00'}) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 14:10:16 executing program 5: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x11002, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = dup3(r1, r0, 0x0) r3 = syz_open_dev$mouse(&(0x7f0000000000), 0x80, 0x100) ioctl$TIOCPKT(r3, 0x5420, &(0x7f0000000080)=0x2) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r3, {0x4}}, './file0\x00'}) mkdirat(r4, &(0x7f0000000100)='./file0\x00', 0x4) ioctl$TIOCPKT(r2, 0x5420, &(0x7f0000000040)) 14:10:16 executing program 0: clone3(&(0x7f0000000200)={0x88118d00, 0x0, 0x0, 0x0, {0x800000}, 0x0, 0x0, 0x0, 0x0, 0xfffffe23}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 14:10:16 executing program 7: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$TIOCPKT(r2, 0x540b, &(0x7f0000000040)) 14:10:16 executing program 1: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.2\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 14:10:16 executing program 2: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x1, 0x7, &(0x7f00000005c0)=[{&(0x7f0000000200)="9d08a8939fcdcb34d30915e726ed144d0b39f8c40fae1758668e21921a547b132130245bfce223f9752e790e1c0aaf20e934edc202d5a289bada1f8c5c850c0b946076a5e32e818c5042e9375a954e026dd7c0b866359edebb48c709c65fa9fc435cbe40ecdff8aa05772b321efb3cdb16603e107127dba29f5c76bec1ff24", 0x7f, 0x8}, {&(0x7f0000000280)="66f2f14ea9457026f6623eb27909c3117f0ba43d28f2d8bf4fcd8f60f39883a52fa9112bc18a9483fa98fc92e01a893e077419aca4028b735dd881738307a5e14a4d032b29f26a0275920961a9dc988dafa3e810e631cd2731b84dad9c689c57360cfd5d528abbd2e365f2743bb6fa05e99ab66a710826f48a6c2fb13fbc8480cb91faebe80e6fede1faaef3cc53d68ed1e17846a050ebcc2ee1e86d9e4703d938", 0xa1, 0xfffffffffffffff9}, {&(0x7f0000000340)="09e0c58e6a247fb40c6a7e99f5855dcd989ec88bd0a5f2d6a35948b5c64198e179090cbf058488af5d70b903405e3f388edac772bc1291bc97f9f3cab93afeac", 0x40, 0x6}, {&(0x7f0000001280)="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", 0x1000, 0x80000001}, {&(0x7f0000000380)="4793e2fd5b2788fc0bb8728310b5c372f44b30eff263c26d88c9a7749c3ea9964ae3b2bd575683dbc96beb5e67a33ac1bb2545b1d4fb4d2392262a9817ff4cab4ae7f697ae1018386e1e9ca0fba2b671655e8bd4293ef1467c040f254d6da64706aa167bb33acae7b8a5365ac3558f1fbace547cdd8866879c56325f98438dbf8cee51ab3654653fb0371ce73fb86cb32535551ce1bca376ddb849c43c5601a333de44e1704c5687f90d2384e5e55f8534aaf9e0", 0xb4, 0x3}, {&(0x7f0000000440)="77fd73ed330260b659b9d3eb6726bec92534d206cc52ea5a8e4f296352eecd485ad90db38ac30763e848004427ae6a94e181438fdc63533df0201d9abfde435d99740bcd11c0cd0ea5218e93f6490dc63be743466b4d0673c07b777285fad2378967b59706", 0x65, 0x5}, {&(0x7f00000004c0)="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", 0xfb, 0x4}], 0x80, &(0x7f00000007c0)=ANY=[@ANYBLOB="696f636861727365743d6b6f69382d72752c686964652c696f636861727365743d6b6f69382d722c636865636b5d3d72656c617865642c636865636b3d7774726963742c7569643d2c0702f215e2dd557365b718779c8cbf384728ee075ecfd97a10d09866d85f", @ANYRESHEX=0x0, @ANYBLOB=',norock,map=acorn,check=strict,check=relaxed,uid<', @ANYRESDEC, @ANYBLOB=',dont_measure,pcr=00000000000000000056,fowner<', @ANYRESDEC=0xee00, @ANYBLOB=',\x00']) r1 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$FICLONE(r0, 0x40049409, r1) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 14:10:16 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000040)='.\x00', 0x2000003) r2 = inotify_init1(0x0) inotify_add_watch(r2, &(0x7f0000000000)='./file0\x00', 0xa4000004) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r3 = dup2(r0, r0) close_range(r3, 0xffffffffffffffff, 0xbf) 14:10:16 executing program 0: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) ioctl$DVD_READ_STRUCT(0xffffffffffffffff, 0x5390, &(0x7f0000000200)=@disckey={0x2, 0x0, "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"}) 14:10:16 executing program 1: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x02Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 14:10:16 executing program 7: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$TIOCPKT(r2, 0x540c, &(0x7f0000000040)) 14:10:16 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) dup3(r1, r0, 0x0) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r2, 0x4b63, 0x0) ioctl$TIOCPKT(r2, 0x5420, &(0x7f0000000240)=0x4) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r5 = dup3(r4, r3, 0x0) ioctl$TIOCPKT(r5, 0x5420, &(0x7f0000000040)) clone3(&(0x7f0000000080)={0x88118d00, 0x0, 0x0, 0x0, {0x35}, 0x0, 0x0, 0x0, 0x0, 0x47, {r5}}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffc) r6 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r6, 0x4b63, 0x0) ioctl$FAT_IOCTL_GET_ATTRIBUTES(r6, 0x80047210, &(0x7f0000000200)) 14:10:16 executing program 5: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ftruncate(r0, 0xc3) r2 = dup3(r1, r0, 0x0) r3 = fork() ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f0000000100)) tkill(r3, 0xb) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000000)={0x6, 0x2, 0x669a, 0x2, 0x4}) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r6 = dup3(r5, r4, 0x0) ioctl$TIOCPKT(r6, 0x5420, &(0x7f0000000040)) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x2, 0xf9, 0x4, 0xff, 0x0, 0x9, 0x4004, 0x5, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x800, 0x0, @perf_config_ext={0x9, 0x4}, 0x90008, 0x5, 0x0, 0x3ef07e83d671e40a, 0x0, 0x9, 0x7, 0x0, 0xb49, 0x0, 0x2}, r3, 0x0, r6, 0x3) ioctl$TIOCPKT(r2, 0x5420, &(0x7f0000000040)) 14:10:16 executing program 2: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r1, 0x4b63, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r1, 0x40286608, &(0x7f0000000040)={0x9, 0x5, 0x7ff, 0x400, 0x4, 0x5}) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000200)={'syz', 0x3}, 0x0, 0x0, r0) [ 2763.305064] kmemleak: 5 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 14:10:36 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000040)='.\x00', 0x2000003) r2 = inotify_init1(0x0) inotify_add_watch(r2, &(0x7f0000000000)='./file0\x00', 0xa4000004) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r3 = dup2(r0, r0) close_range(r3, 0xffffffffffffffff, 0x1f00) 14:10:36 executing program 6: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc39}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) dup3(r1, r0, 0x0) 14:10:36 executing program 0: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000200)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x5, 0x7f}}, './file0\x00'}) stat(&(0x7f0000000e80)='./file0/file0\x00', &(0x7f0000000ec0)) stat(&(0x7f0000000900)='.\x00', &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r1, 0x0) recvmmsg$unix(0xffffffffffffffff, &(0x7f0000000c80)=[{{&(0x7f0000000240), 0x6e, &(0x7f0000000680)=[{&(0x7f00000002c0)=""/122, 0x7a}, {&(0x7f0000001280)=""/4096, 0x1000}, {&(0x7f0000000340)=""/84, 0x54}, {&(0x7f00000003c0)=""/182, 0xb6}, {&(0x7f0000000480)=""/215, 0xd7}, {&(0x7f0000000580)=""/154, 0x9a}, {&(0x7f0000000640)=""/28, 0x1c}], 0x7, &(0x7f0000000700)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}], 0x20}}, {{0x0, 0x0, &(0x7f0000000b00)=[{&(0x7f0000000740)=""/171, 0xab}, {&(0x7f0000000800)=""/86, 0x56}, {&(0x7f0000000880)=""/122, 0x7a}, {&(0x7f0000000900)=""/178, 0xb2}, {&(0x7f00000009c0)=""/2, 0x2}, {&(0x7f0000000a00)=""/244, 0xf4}], 0x6, &(0x7f0000000b80)=[@cred={{0x1c}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xd8}}], 0x2, 0x0, &(0x7f0000000d00)={0x77359400}) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), 0x20006, &(0x7f0000000d40)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {}, 0x2c, {[{@msize={'msize', 0x3d, 0xa49}}, {@dfltuid={'dfltuid', 0x3d, r1}}, {@cache_loose}, {@version_u}, {@afid={'afid', 0x3d, 0x4}}, {@noextend}, {@loose}, {@version_L}, {@version_L}], [{@uid_lt={'uid<', r2}}, {@smackfsdef={'smackfsdef', 0x3d, '+-'}}, {@smackfsroot={'smackfsroot', 0x3d, 'dns_resolver\x00'}}, {@dont_appraise}]}}) 14:10:36 executing program 7: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$TIOCPKT(r2, 0x540d, &(0x7f0000000040)) 14:10:36 executing program 5: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r1, 0x4b63, 0x0) ioctl$FITRIM(r1, 0xc0185879, &(0x7f0000000000)={0x1, 0x7}) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r3 = dup3(r2, r0, 0x0) ioctl$TIOCPKT(r3, 0x5420, &(0x7f0000000040)) 14:10:36 executing program 4: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = add_key$keyring(&(0x7f0000000000), &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f00000021c0), &(0x7f0000002200)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$setperm(0x5, r1, 0x8001400) r2 = add_key$keyring(&(0x7f00000021c0), &(0x7f0000002200)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$setperm(0x5, r2, 0x8001400) keyctl$chown(0xb, r2, 0x0, 0x0) keyctl$get_keyring_id(0x0, r2, 0x0) keyctl$chown(0xb, r1, 0x0, 0x0) r3 = add_key$keyring(&(0x7f00000021c0), &(0x7f0000002200)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$setperm(0x5, r3, 0x8001400) keyctl$chown(0xb, r3, 0x0, 0x0) add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc1}, &(0x7f0000000300)={0x0, "06830bcefa6472be1e8e12b5a246d557811f97746b59166e1e9ce2e809c25f0394c5d83a8d1f742d3ad7a8901dc28c61036b6f7983b8a1c40e3196a4e313d135", 0x2d}, 0x48, r3) r4 = request_key(&(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000200)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', r1) request_key(&(0x7f0000000400)='blacklist\x00', &(0x7f0000000500)={'syz', 0x2}, &(0x7f0000000540)='/$\x00', r0) add_key$keyring(&(0x7f0000000580), &(0x7f00000005c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) r5 = request_key(&(0x7f0000000600)='rxrpc_s\x00', &(0x7f0000000440)={'syz', 0x2}, &(0x7f0000000480)='\x06\x00\x00\x00\xadI~\xee\xa8\xb3\xd3e!\xa9\xa8\xe5zh(D\xaa\xdf\x1d\xa0\x05\xae\xf0\xd2\xbaA\x92\x1adwx\xf5\xce\'\xc8P\xa4\x15E\xeeK\x00n\x06\x85P\xe9\xc8w\xa5\x8c\xf2x\xfe\xedm\xe2\x90F\"\xc0\xd8\x1bs[s\xd5\x194[\xa4\xeb\x8c\xb7\xa1\f\x18gx\xb1W\x84\x00\x00&R\x87F\xe0*\b\x99\xa6\xdc\xcb+\x90\xbf\xae\xc1t\xe0\xdcWQ\x94\x1d\x0eJ\xe4\xfc\\0R', 0x0) add_key$keyring(&(0x7f0000000380), &(0x7f00000003c0)={'syz', 0x0}, 0x0, 0x0, r5) r6 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, r4) keyctl$get_keyring_id(0x0, r6, 0xaa) 14:10:36 executing program 1: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x04Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 14:10:36 executing program 2: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) r0 = socket$inet_udp(0x2, 0x2, 0x0) pwritev(r0, &(0x7f00000000c0)=[{&(0x7f0000000200)="264926688424f397e4faafd86e676f8f43fdd4b083497aa7d042b661b2d07c738bb8b0d585f42541e30d0939291adc49d30c09527fa5b93c0fccd81e85317b4bbfe6b8e8c6a4460f268331eea9a083564dce239e8fe6630a4ac6a51e095d71175b856ea0e590d4854797196affcd79eb8f4b2fbda9273dc67a7f2718b0d3823ffbb6192b365a14566252b01a3355488e7f40514af0415643eb61b25c5072c0f43bcd23386147526a56d69a165ded6a98f5afb5b288fed38d655227a321d5bb9befafbdbeba", 0xc5}, {&(0x7f0000000300)="2e0dd6bb76f22252f5df5c40444df2337e02a202f61ea7ecfeb89e1f56514cfb81fc1c6cea5614c7f7b046f195c4df7e5bf9d1fe77e127b504e494b58b9685bea5d0d43e73e92f4f339a3ea6005344c2f9453a0b7c61737a469d05bc5bc966f8ac74051dc7f43f0d67b1cc7890a3eed67089b8104cd90f6d9a58f913594d14a99529626f3caec972f74b7220085fa68816fb62109028e19a7d7d22f93f1dd0b1f8eb4b31a549510c20175070ec62a76945133cef1a744d20", 0xb8}, {&(0x7f0000000040)="82d985d81c4cc453abc008c68db57a1edf", 0x11}, {&(0x7f00000003c0)="0e224421d075c7f55ad5cf8cdfe839ffde2ee2aa8b5a5562fe2f87aca361adf8427baa2cebb9b86129bdbe38a5b4471e35b60b80f94ee077be0cd280113f5606d8f7369ed7291bcaad65d990b8f7271702515f863e77f74a344c8fd3f37a6bbf6efc6090da6f84bab5d1bfeeb59505e70bc7d6cf10da4c9a45e8", 0x7a}], 0x4, 0x71fd, 0x380000) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000000500)=ANY=[@ANYBLOB="01009eb554a0f4af4dfd0121bcdcc5af2dde298a0000", @ANYRES32=r0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) splice(r1, &(0x7f0000000480)=0x100000001, r0, &(0x7f00000004c0)=0xffffffff, 0xffffffffffffff22, 0x8) 14:10:37 executing program 1: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x05Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 14:10:37 executing program 5: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x2, 0x0, 0x0, 0x280, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$TIOCPKT(r2, 0x5420, &(0x7f0000000040)) 14:10:37 executing program 7: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$TIOCPKT(r2, 0x540e, &(0x7f0000000040)) 14:10:37 executing program 4: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 2783.550070] kmemleak: 4 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 14:10:58 executing program 7: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$TIOCPKT(r2, 0x540f, &(0x7f0000000040)) 14:10:58 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000040)='.\x00', 0x2000003) r2 = inotify_init1(0x0) inotify_add_watch(r2, &(0x7f0000000000)='./file0\x00', 0xa4000004) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r3 = dup2(r0, r0) close_range(r3, 0xffffffffffffffff, 0x2000) 14:10:58 executing program 1: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x06Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 14:10:58 executing program 4: r0 = clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000580)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0x0) r1 = add_key$keyring(&(0x7f00000021c0), &(0x7f0000002200)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$setperm(0x5, r1, 0x8001400) r2 = open_tree(0xffffffffffffffff, &(0x7f00000004c0)='./file0\x00', 0x1) clone3(&(0x7f0000000500)={0x60008000, &(0x7f0000000240), &(0x7f0000000280), &(0x7f00000002c0), {0x33}, &(0x7f0000000300)=""/239, 0xef, &(0x7f0000000400)=""/109, &(0x7f0000000480)=[r0, r0], 0x2, {r2}}, 0x58) keyctl$chown(0xb, r1, 0x0, 0x0) request_key(&(0x7f0000000040)='syzkaller\x00', &(0x7f00000000c0)={'syz', 0x0}, &(0x7f0000000200)='dns_resolver\x00', r1) 14:10:58 executing program 2: r0 = clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0xfffffffffffffe24, 0x0, 0x0}, 0x58) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000400)={0x0, 0x0}) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000480)=0x0) r3 = fork() tkill(r3, 0xb) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000004c0)=0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000540)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x6}}, './file0\x00'}) clone3(&(0x7f0000000580)={0xa02c0200, &(0x7f0000000040), &(0x7f00000000c0), &(0x7f0000000200), {0x3f}, &(0x7f0000000240)=""/203, 0xcb, &(0x7f0000000340)=""/132, &(0x7f0000000500)=[r1, r0, r0, r0, r0, r2, r3, r0, r4], 0x9, {r5}}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000880)={0x0}, &(0x7f00000008c0)=0xc) recvmmsg$unix(r5, &(0x7f0000003600)=[{{0x0, 0x0, &(0x7f0000000a00)=[{&(0x7f0000000900)=""/250, 0xfa}], 0x1, &(0x7f0000000a40)=[@cred={{0x1c, 0x1, 0x2, {0x0}}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x78}}, {{&(0x7f0000000ac0)=@abs, 0x6e, &(0x7f0000000c40)=[{&(0x7f0000001280)=""/4096, 0x1000}, {&(0x7f0000000b40)=""/66, 0x42}, {&(0x7f0000000bc0)=""/86, 0x56}], 0x3, &(0x7f0000000c80)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{&(0x7f0000000cc0), 0x6e, &(0x7f0000003300)=[{&(0x7f0000000d40)=""/57, 0x39}, {&(0x7f0000000d80)=""/218, 0xda}, {&(0x7f0000000e80)=""/179, 0xb3}, {&(0x7f0000000f40)=""/199, 0xc7}, {&(0x7f0000001040)=""/224, 0xe0}, {&(0x7f0000001140)=""/174, 0xae}, {&(0x7f0000002280)=""/77, 0x4d}, {&(0x7f0000002300)=""/4096, 0x1000}], 0x8, &(0x7f0000003380)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x48}}, {{&(0x7f0000003400), 0x6e, &(0x7f00000035c0)=[{&(0x7f0000003480)=""/68, 0x44}, {&(0x7f0000003500)=""/32, 0x20}, {&(0x7f0000003540)=""/41, 0x29}, {&(0x7f0000003580)=""/29, 0x1d}], 0x4}}], 0x4, 0x40000001, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r5, 0xc0502100, &(0x7f0000003700)={0x0, 0x0}) r9 = fork() tkill(r9, 0xb) clone3(&(0x7f00000037c0)={0x8210000, &(0x7f0000000600), &(0x7f0000000640), &(0x7f0000000680), {0x3b}, &(0x7f0000003840)=""/262, 0x106, &(0x7f00000007c0)=""/173, &(0x7f0000003780)=[r6, r7, r8, r2, r3, r9], 0x6, {r5}}, 0x58) 14:10:58 executing program 6: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000000)={{0x1, 0x1, 0x18, r1, {0xfffff0ef}}, './file0\x00'}) ioctl$TIOCVHANGUP(r2, 0x5437, 0x0) dup3(r1, r0, 0x0) 14:10:58 executing program 0: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000200)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0x0) r0 = add_key$keyring(&(0x7f00000021c0), &(0x7f0000002200)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$setperm(0x5, r0, 0x8001400) keyctl$chown(0xb, r0, 0x0, 0x0) request_key(&(0x7f0000000040)='syzkaller\x00', &(0x7f00000000c0)={'syz', 0x1}, &(0x7f0000000100)='+[\x97+#!\x00', r0) 14:10:58 executing program 5: ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, &(0x7f0000000000)={0xffffffffffffffff, 0x5, 0x0, 0x2}) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x1, 0x60000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0x20000000003, r0, 0xc) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r3 = dup3(r2, r1, 0x0) ioctl$TIOCPKT(r3, 0x5420, &(0x7f0000000040)) syz_open_pts(r3, 0xe0a80) 14:10:58 executing program 7: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$TIOCPKT(r2, 0x5412, &(0x7f0000000040)) 14:10:58 executing program 5: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TIOCGPTPEER(r0, 0x5441, 0x2) ioctl$KDFONTOP_SET_DEF(r0, 0x4b72, &(0x7f0000000000)={0x2, 0x1, 0x1e, 0x1, 0x12d, &(0x7f0000000180)="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"}) r2 = dup3(r1, r0, 0x0) ioctl$TIOCPKT(r2, 0x5420, &(0x7f0000000040)) 14:10:58 executing program 0: r0 = request_key(&(0x7f0000000000)='cifs.idmap\x00', &(0x7f0000000380)={'syz', 0x2}, &(0x7f00000003c0)='%$)\x00', 0x0) r1 = request_key(&(0x7f0000000340)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x3}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x04\x00\x00\x00\x00\x00\x00\x00\xc3T\xcc\x83\x16', r0) r2 = add_key$fscrypt_v1(&(0x7f0000000240), &(0x7f0000000280)={'fscrypt:', @desc3}, &(0x7f00000002c0)={0x0, "8ef6913ae8ff0b7fee63da1c739b5d55e59529cdc01d505121df50054cc2c2f8f19e133932956a90cfcbe790698a2388c165373d6515b448ca5a96fa554822f3", 0x23}, 0x48, r1) request_key(&(0x7f0000000040)='rxrpc\x00', &(0x7f00000000c0)={'syz', 0x3}, &(0x7f0000000200)='\x00', r2) 14:10:58 executing program 6: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x2) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TIOCSPTLCK(r1, 0x40045431, &(0x7f0000000000)) socket$packet(0x11, 0x2, 0x300) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r3 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r3, &(0x7f0000000600)={0xa, 0x0, 0x0, @mcast2, 0x3}, 0x1c) fcntl$getownex(r3, 0x10, &(0x7f0000000040)={0x0, 0x0}) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r6 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r7 = dup3(r6, r5, 0x0) ioctl$TIOCPKT(r7, 0x5420, &(0x7f0000000040)) openat(r7, &(0x7f0000000180)='./file0\x00', 0x0, 0xe4) fcntl$lock(0xffffffffffffffff, 0x26, &(0x7f0000000000)={0x0, 0x1, 0x4, 0x4000009, r4}) perf_event_open(&(0x7f00000000c0)={0x3, 0x80, 0x7f, 0x0, 0x8, 0x1, 0x0, 0x196, 0x48080, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x151, 0x0, @perf_config_ext={0x4000000000, 0xff}, 0x110, 0x0, 0x66e25916, 0x2, 0x0, 0x6, 0x1, 0x0, 0x8, 0x0, 0x1000}, r4, 0xe, r0, 0x8) dup3(r2, r1, 0x0) 14:10:58 executing program 1: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\aBp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 14:10:58 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000040)='.\x00', 0x2000003) r2 = inotify_init1(0x0) inotify_add_watch(r2, &(0x7f0000000000)='./file0\x00', 0xa4000004) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r3 = dup2(r0, r0) close_range(r3, 0xffffffffffffffff, 0x3e00) 14:10:58 executing program 4: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) r1 = ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x3) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000280)=0x0) mount$9p_fd(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x20000, &(0x7f00000002c0)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@mmap}], [{@euid_lt={'euid<', r2}}]}}) add_key$keyring(&(0x7f0000000040), &(0x7f0000000380)={'syz', 0x3}, 0x0, 0x0, r0) ioctl$F2FS_IOC_MOVE_RANGE(r1, 0xc020f509, &(0x7f00000000c0)={r1, 0x4, 0x4, 0x8}) ioctl$TCXONC(r3, 0x540a, 0x1) r4 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r4, 0x4b63, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r4, 0x40286608, &(0x7f0000000340)={0x6, 0x7, 0x9, 0xfffffffffffffff8, 0xfffffff9, 0x1}) 14:10:58 executing program 5: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1000000000}}, 0x0, 0xb, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$TIOCPKT(r2, 0x5420, &(0x7f0000000040)) 14:10:58 executing program 0: r0 = clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000340)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xff\a\x00\x00E\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@/\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16\x00\x00\x00\x00\x00', 0xfffffffffffffffb) clone3(&(0x7f00000004c0)={0x104000, &(0x7f0000000080), &(0x7f0000000380), &(0x7f00000003c0), {0x1}, &(0x7f0000003240)=""/4096, 0x1000, &(0x7f0000000400)=""/124, &(0x7f0000000480)=[r0], 0x1}, 0x58) r1 = add_key$keyring(&(0x7f00000021c0), &(0x7f0000002200)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$setperm(0x5, r1, 0x8001400) keyctl$chown(0xb, r1, 0x0, 0x0) add_key(&(0x7f0000000040)='trusted\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000002240)="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", 0x1000, 0xfffffffffffffffe) add_key(&(0x7f00000002c0)='syzkaller\x00', &(0x7f00000000c0)={'syz', 0x2}, &(0x7f0000000200)="dcdc8254edae3e1c0244753037eed3c6357ea54ff03f4b3185a64cb137d8152553b33489b5263f2db4bafc025f67c3350ec360be891015f4b64200bdb51875191724202ffdcbb848c9943e5719025b41c76eda9fb05300805515320ac49932f87348c08f0255eaed72820149a4666b8c359ac14c8ea7a0fe5ef03ad8073bfded13ff93afe5207fa4388dfa023c88e6063894cc2f39cb6b5b95618bc5842fbf13a80b9016c9", 0xa5, r1) 14:10:58 executing program 7: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$TIOCPKT(r2, 0x5413, &(0x7f0000000040)) 14:10:58 executing program 1: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\nBp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 14:10:58 executing program 4: clone3(&(0x7f0000000200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f0000000040)) pipe(&(0x7f00000000c0)={0xffffffffffffffff}) mkdirat$cgroup(r0, &(0x7f0000000100)='syz0\x00', 0x1ff) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x1}, &(0x7f0000000280)='\x00\x00\x00\x14*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j{\xf7U\x1b\x95&\xa4\xf7\x93\x9b\xda\x1b#l,j\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xf3\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\x01\x9c\xff\x1f\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\x89\xa6\xec\xca\x91B\xc9\xde\x03\xef\xac1\x97\x8d\xe3\xad\x18f\xf3\xcb\x0f*D_\xc78', 0xfffffffffffffffb) [ 2804.466070] kmemleak: 1 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 14:11:18 executing program 0: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, r0) 14:11:18 executing program 2: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = request_key(&(0x7f0000000000)='blacklist\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f00000000c0)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcD+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\xfb\xff\xff\xff\xff\xff\xff\xffA\xabE\x13\xf5\xa3b\x1c\x89q\x91P\xc0\x01\xdd\xfdj.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbd\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) request_key(&(0x7f0000000040)='encrypted\x00', &(0x7f0000000180)={'syz', 0x3}, &(0x7f00000001c0)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcD+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\xfb\xff\xff\xff\xff\xff\xff\xffA\xabE\x13\xf5\xa3b\x1c\x89q\x91P\xc0\x01\xdd\xfdj.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbd\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', r0) 14:11:18 executing program 5: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r2, 0x4b63, 0x0) ioctl$TCSETSF(r2, 0x5404, &(0x7f0000000100)={0xffff, 0x9, 0x6, 0x10001, 0x4, "8b1f4c89586b70aba4e70577919e0cdb6450e1"}) r3 = dup3(r1, r0, 0x0) ioctl$TIOCPKT(r3, 0x5420, &(0x7f0000000040)) r4 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x0, 0x5, 0x3, 0x80, 0x0, 0x40, 0x40311, 0xf, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0xb9c, 0x0, @perf_config_ext={0x13, 0x2}, 0x1, 0x2702, 0x9, 0x4, 0x2, 0x80000000, 0xfff8, 0x0, 0x7, 0x0, 0x20}, 0x0, 0x0, r3, 0x2) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000000)=0xd937) 14:11:18 executing program 1: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x0fBp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 14:11:18 executing program 7: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$TIOCPKT(r2, 0x5414, &(0x7f0000000040)) 14:11:18 executing program 4: r0 = clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r1 = getpgrp(r0) r2 = fork() r3 = fork() tkill(r3, 0xb) r4 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f0000000600)={0xa, 0x0, 0x0, @mcast2, 0x3}, 0x1c) fcntl$getownex(r4, 0x10, &(0x7f0000000040)={0x0, 0x0}) fcntl$lock(0xffffffffffffffff, 0x26, &(0x7f0000000000)={0x0, 0x1, 0x4, 0x4000009, r5}) r6 = fcntl$getown(0xffffffffffffffff, 0x9) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000006c0)={0x0, 0x0}) fork() clone3(&(0x7f0000000780)={0x10000000, &(0x7f0000000400), &(0x7f0000000440), &(0x7f0000000480), {0x3c}, &(0x7f00000004c0)=""/231, 0xe7, &(0x7f00000005c0)=""/237, &(0x7f0000000740)=[r3, r5, r6, r2, r1, r7], 0x6}, 0x58) ptrace$setopts(0x4200, r2, 0x0, 0x0) r8 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000340), 0x160c02, 0x0) clone3(&(0x7f0000000380)={0x8100100, &(0x7f0000000040), &(0x7f00000000c0), &(0x7f0000000200), {0xd}, &(0x7f0000001280)=""/4096, 0x1000, &(0x7f0000000240)=""/179, &(0x7f0000000300)=[r0, r1, r0, r2, r0], 0x5, {r8}}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 14:11:18 executing program 6: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x4e21, @rand_addr=0x64010101}, 0x10) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x40, 0x0) dup3(r1, r0, 0x0) 14:11:18 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000040)='.\x00', 0x2000003) r2 = inotify_init1(0x0) inotify_add_watch(r2, &(0x7f0000000000)='./file0\x00', 0xa4000004) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r3 = dup2(r0, r0) close_range(r3, 0xffffffffffffffff, 0x4000) 14:11:18 executing program 1: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x10Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 14:11:18 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000040)='.\x00', 0x2000003) r2 = inotify_init1(0x0) inotify_add_watch(r2, &(0x7f0000000000)='./file0\x00', 0xa4000004) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r3 = dup2(r0, r0) close_range(r3, 0xffffffffffffffff, 0xbf00) 14:11:18 executing program 7: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$TIOCPKT(r2, 0x5415, &(0x7f0000000040)) 14:11:18 executing program 5: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = open_tree(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x800) ioctl$TIOCVHANGUP(r1, 0x5437, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r3 = dup3(r2, r0, 0x0) ioctl$TIOCPKT(r3, 0x5420, &(0x7f0000000040)) [ 2824.836643] kmemleak: 1 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 14:11:41 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000040)='.\x00', 0x2000003) r2 = inotify_init1(0x0) inotify_add_watch(r2, &(0x7f0000000000)='./file0\x00', 0xa4000004) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r3 = dup2(r0, r0) close_range(r3, 0xffffffffffffffff, 0x20000) 14:11:41 executing program 7: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$TIOCPKT(r2, 0x5416, &(0x7f0000000040)) 14:11:41 executing program 1: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x02D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 14:11:41 executing program 6: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$TIOCPKT(r2, 0x5420, &(0x7f0000000040)) r3 = fsmount(0xffffffffffffffff, 0x0, 0x2) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0x200400, &(0x7f0000000080)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r3}, 0x2c, {[{@mmap}, {@afid={'afid', 0x3d, 0x100}}], [{@obj_type={'obj_type', 0x3d, '/dev/ptmx\x00'}}]}}) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) dup3(r5, r4, 0x0) 14:11:41 executing program 0: r0 = clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) recvmmsg$unix(0xffffffffffffffff, &(0x7f00000085c0)=[{{&(0x7f0000000380)=@abs, 0x6e, &(0x7f0000000600)=[{&(0x7f0000000400)=""/112, 0x70}, {&(0x7f0000000480)=""/203, 0xcb}, {&(0x7f0000000580)=""/75, 0x4b}], 0x3, &(0x7f0000000640)=[@cred={{0x1c}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0xe0}}, {{&(0x7f0000000740), 0x6e, &(0x7f00000009c0)=[{&(0x7f00000007c0)=""/209, 0xd1}, {&(0x7f00000008c0)=""/187, 0xbb}, {&(0x7f0000000980)=""/36, 0x24}], 0x3, &(0x7f0000000a00)=[@cred={{0x1c}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xe0}}, {{&(0x7f0000000b00), 0x6e, &(0x7f0000000e00)=[{&(0x7f0000000b80)=""/223, 0xdf}, {&(0x7f0000001280)=""/4096, 0x1000}, {&(0x7f0000002280)=""/4096, 0x1000}, {&(0x7f0000003280)=""/4096, 0x1000}, {&(0x7f0000000c80)=""/103, 0x67}, {&(0x7f0000000d00)=""/238, 0xee}], 0x6, &(0x7f0000000e80)=[@cred={{0x1c}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x60}}, {{0x0, 0x0, &(0x7f0000005480)=[{&(0x7f0000000f00)=""/95, 0x5f}, {&(0x7f0000000f80)=""/242, 0xf2}, {&(0x7f0000001080)=""/31, 0x1f}, {&(0x7f00000010c0)=""/230, 0xe6}, {&(0x7f00000011c0)=""/13, 0xd}, {&(0x7f0000004280)=""/4096, 0x1000}, {&(0x7f0000005280)=""/158, 0x9e}, {&(0x7f0000005340)=""/67, 0x43}, {&(0x7f00000053c0)=""/107, 0x6b}, {&(0x7f0000005440)=""/28, 0x1c}], 0xa, &(0x7f0000005540)=[@cred={{0x1c}}], 0x20}}, {{&(0x7f0000005580)=@abs, 0x6e, &(0x7f0000005640)=[{&(0x7f0000005600)=""/56, 0x38}], 0x1, &(0x7f0000005680)=[@rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0}}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x98}}, {{&(0x7f0000005740), 0x6e, &(0x7f0000006a40)=[{&(0x7f00000057c0)=""/205, 0xcd}, {&(0x7f00000058c0)=""/17, 0x11}, {&(0x7f0000005900)=""/139, 0x8b}, {&(0x7f00000059c0)=""/4096, 0x1000}, {&(0x7f00000069c0)=""/119, 0x77}], 0x5}}, {{&(0x7f0000006ac0)=@abs, 0x6e, &(0x7f0000006d00)=[{&(0x7f0000006b40)=""/71, 0x47}, {&(0x7f0000006bc0)=""/171, 0xab}, {&(0x7f0000006c80)=""/29, 0x1d}, {&(0x7f0000006cc0)=""/24, 0x18}], 0x4}}, {{0x0, 0x0, &(0x7f0000008100)=[{&(0x7f0000006d40)=""/129, 0x81}, {&(0x7f0000006e00)=""/179, 0xb3}, {&(0x7f0000006ec0)=""/12, 0xc}, {&(0x7f0000006f00)=""/61, 0x3d}, {&(0x7f0000006f40)=""/112, 0x70}, {&(0x7f0000006fc0)=""/80, 0x50}, {&(0x7f0000007040)=""/4096, 0x1000}, {&(0x7f0000008040)=""/49, 0x31}, {&(0x7f0000008080)=""/67, 0x43}], 0x9, &(0x7f00000081c0)=[@cred={{0x1c}}], 0x20}}, {{&(0x7f0000008200)=@abs, 0x6e, &(0x7f0000008440)=[{&(0x7f0000008280)=""/35, 0x23}, {&(0x7f00000082c0)=""/14, 0xe}, {&(0x7f0000008300)=""/66, 0x42}, {&(0x7f0000008380)=""/148, 0x94}], 0x4}}, {{&(0x7f0000008480), 0x6e, &(0x7f0000008540)=[{&(0x7f0000008500)=""/13, 0xd}], 0x1, &(0x7f0000008580)=[@cred={{0x1c}}], 0x20}}], 0xa, 0x2020, &(0x7f0000008840)={0x0, 0x3938700}) r2 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000088c0)={0x50800500, &(0x7f0000000040), &(0x7f00000000c0), &(0x7f0000000200), {0x3e}, &(0x7f0000000240)=""/173, 0xad, &(0x7f0000000300)=""/114, &(0x7f0000008880)=[r0, r1, r0, r0], 0x4, {r2}}, 0x58) 14:11:41 executing program 2: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r0, 0x4b63, 0x0) stat(&(0x7f0000000900)='.\x00', &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r1, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), 0x4000, &(0x7f0000000200)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@aname}, {@mmap}], [{@smackfsfloor}, {@smackfshat={'smackfshat', 0x3d, '\\^+'}}, {@appraise_type}, {@dont_measure}, {@pcr={'pcr', 0x3d, 0x2c}}, {@fscontext={'fscontext', 0x3d, 'staff_u'}}, {@uid_lt={'uid<', 0xffffffffffffffff}}, {@euid_eq={'euid', 0x3d, r1}}, {@context={'context', 0x3d, 'sysadm_u'}}, {@euid_lt={'euid<', 0xee01}}]}}) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 14:11:41 executing program 4: getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000680)={{{@in6=@mcast2, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in6=@ipv4={""/10, ""/2, @private}}}, &(0x7f00000003c0)=0x6b1118923f66c54b) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0xf, 0x2, &(0x7f0000000340)=[{&(0x7f0000000200)="1d794b10ca0aaa948f3e9ecebe52048c15caeb76cf2acefb573ee56c54334e9a19f18e8dfdd449474d6f043a014b3d1f70f503bd62a21b49d899aa04e6e6d4f13cc2a7b4ba4c2c497d819a400dd303e0e7212abc", 0x54, 0xffffffffffffff1e}, {&(0x7f0000000280)="8e39b92d2be9b997c843267910c0beaaf5487cd0022ee4097a153b0a62546e6a0ec08d09815b9397eb1e8a47b98d27d07b24c3418eef5845af95b34df827555d86c2e1189158b3bffd916bf7608fd85b2482f8ccc706dbff9030440cc4d9582165bb638d1ba4dc734faee5d1261bab9cac3fb7c9ce1414a8af1bc29b44585f444f292eee3036f4730e469f1a", 0x8c, 0x9}], 0x82082, &(0x7f00000004c0)={[{@noquota}, {@quota}, {@init_itable}, {@barrier_val={'barrier', 0x3d, 0x3ff}}], [{@measure}, {@pcr={'pcr', 0x3d, 0x8}}, {@fowner_lt={'fowner<', r1}}]}) mknod$loop(&(0x7f0000000640)='./file0\x00', 0xc000, 0x0) clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f00000005c0)={'ip6gre0\x00', &(0x7f0000000540)={'syztnl1\x00', r0, 0x4, 0x7, 0x40, 0x2, 0x40, @mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x1, 0x80, 0x40, 0x81}}) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 14:11:41 executing program 5: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$TIOCPKT(r2, 0x5420, &(0x7f0000000040)) openat(r2, &(0x7f0000000180)='./file0\x00', 0x41a101, 0x116) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r3, 0x4b63, 0x0) ioctl$TIOCSPTLCK(0xffffffffffffffff, 0x40045431, &(0x7f00000001c0)=0x1) ioctl$TIOCPKT(r3, 0x5420, &(0x7f0000000100)=0x1f5) r4 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000), 0x400, 0x0) r5 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r5, 0x4b63, 0x0) ioctl$VT_OPENQRY(r5, 0x5600, &(0x7f0000000200)) r6 = open_tree(r2, &(0x7f0000000080)='./file0\x00', 0x80000) ioctl$FAT_IOCTL_SET_ATTRIBUTES(0xffffffffffffffff, 0x40047211, &(0x7f00000002c0)=0x20) sendfile(r4, r6, &(0x7f00000000c0)=0x2, 0x6) r7 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r7, 0x4b63, 0x0) ioctl$TIOCVHANGUP(r7, 0x5437, 0x0) 14:11:41 executing program 1: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x03D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 14:11:41 executing program 7: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$TIOCPKT(r2, 0x5418, &(0x7f0000000040)) 14:11:41 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000040)='.\x00', 0x2000003) r2 = inotify_init1(0x0) inotify_add_watch(r2, &(0x7f0000000000)='./file0\x00', 0xa4000004) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r3 = dup2(r0, r0) close_range(r3, 0xffffffffffffffff, 0x200000) 14:11:41 executing program 5: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$AUTOFS_IOC_EXPIRE(r0, 0x810c9365, &(0x7f0000000180)={{0x719d28, 0x7f}, 0x100, './file0\x00'}) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r3 = dup3(r2, r1, 0x0) ioctl$TIOCPKT(r3, 0x5420, &(0x7f0000000040)) 14:11:41 executing program 6: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x45e081, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) dup3(r1, r0, 0x0) [ 2850.238807] kmemleak: 1 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 14:12:05 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$TIOCPKT(r2, 0x5420, &(0x7f0000000040)) perf_event_open(&(0x7f0000001d80)={0x4, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000000), 0x1}, 0x482b4, 0x0, 0x3, 0x5, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}, 0xffffffffffffffff, 0x4000000, r2, 0xb) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r5 = dup3(r4, r3, 0x0) ioctl$TIOCPKT(r5, 0x5420, &(0x7f0000000040)) 14:12:05 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x800, 0x4) clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 14:12:05 executing program 7: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$TIOCPKT(r2, 0x541b, &(0x7f0000000040)) 14:12:05 executing program 4: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, &(0x7f00000005c0)=ANY=[@ANYBLOB="0000559f22ec95000010000000000000000000"]) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) r0 = request_key(&(0x7f0000000280)='encrypted\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000500)='dns7yS\x8e\xab\x8e\x92\x8b9\x15>4\x1b,\xef\xba\x86!\x1d\xbf\xa0\xb7,\xdd\xd8\xf1\x81\xed\xbb\x94s\rQZ\xa75\xf4\xa6\xb7\xa2\x01\xe1\x19\xd3\xc4\xaf\x8b\xf6\x1d\xd9\x83\'\xe5lX\x058i\xd3wr~\xdc\xbe\xc5\x01\xbf\x01\x0f\xd5\x00u1\xe2', 0xfffffffffffffffd) r1 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000200)={'syz', 0x1}, &(0x7f0000000240)='-%.\x00', r0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r4 = dup3(r3, r2, 0x0) ioctl$TIOCPKT(r4, 0x5420, &(0x7f0000000040)) openat$incfs(r4, &(0x7f0000000480)='.pending_reads\x00', 0x80001, 0x50) r5 = add_key$keyring(&(0x7f00000021c0), &(0x7f0000002200)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$setperm(0x5, r5, 0x8001400) keyctl$chown(0xb, r5, 0x0, 0x0) add_key(&(0x7f00000004c0)='.request_key_auth\x00', &(0x7f0000000380)={'syz', 0x2}, 0x0, 0x0, r5) request_key(&(0x7f00000003c0)='.request_key_auth\x00', &(0x7f0000000400)={'syz', 0x1}, &(0x7f0000000440)='\x00', r1) request_key(&(0x7f0000000300)='asymmetric\x00', &(0x7f0000000340)={'syz', 0x3}, &(0x7f0000000580)='dns_resolver\x00', r5) 14:12:05 executing program 1: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x04D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 14:12:05 executing program 6: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x80000000000}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x200000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) dup3(r1, r0, 0x0) 14:12:06 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000040)='.\x00', 0x2000003) r2 = inotify_init1(0x0) inotify_add_watch(r2, &(0x7f0000000000)='./file0\x00', 0xa4000004) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r3 = dup2(r0, r0) close_range(r3, 0xffffffffffffffff, 0x400000) 14:12:06 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='autogroup\x00') r1 = clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {0xfffffffe}, 0x0, 0x0, 0x0, 0x0, 0xcd83d6b58bbd87c2}, 0x58) request_key(&(0x7f0000000000)='blacklist\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000200)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) r4 = syz_open_dev$ptys(0xc, 0x3, 0x1) r5 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r5, 0x4b63, 0x0) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000600)=0x0) stat(&(0x7f0000000900)='.\x00', &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r7, 0x0) r8 = getegid() setxattr$system_posix_acl(0x0, &(0x7f0000000300)='system.posix_acl_default\x00', &(0x7f0000000400)={{}, {0x1, 0x4}, [{0x2, 0x4, 0xffffffffffffffff}, {}], {0x4, 0x2}, [{0x8, 0x0, r8}]}, 0x3c, 0x0) r9 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r9, &(0x7f0000000600)={0xa, 0x0, 0x0, @mcast2, 0x3}, 0x1c) fcntl$getownex(r9, 0x10, &(0x7f0000000040)={0x0, 0x0}) fcntl$lock(0xffffffffffffffff, 0x26, &(0x7f0000000000)={0x0, 0x1, 0x4, 0x4000009, r10}) lstat(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$netlink(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000300)={0x2b4, 0x1d, 0x4, 0x70bd2c, 0x25dfdbfe, "", [@generic="8b0e6e3f85f863ab35732970ef4d5fbd6677c4caa88643ac4a910dc138e437245323b1f4abe8545d4669a1cbc6651369fa007fcebdd88e78353d085c6c0408ba1f7e01363d121c1f4cf5390ecaecd51128a7c690153e2d9766bb4fc533ddac3670c3cabd43ff9a7f8c913d6a335cc9df653d5c38a1b53579aec905a8b1dcdeadec8cbfcd7431b97f59317be1ec5cec630ce14dd223d68e01", @typed={0x7, 0x5b, 0x0, 0x0, @str='syz'}, @nested={0x203, 0x93, 0x0, 0x1, [@typed={0x14, 0x1c, 0x0, 0x0, @ipv6=@remote}, @typed={0x8, 0x12, 0x0, 0x0, @u32=0x2}, @typed={0x8, 0x12, 0x0, 0x0, @ipv4=@multicast2}, @typed={0xc, 0x8a, 0x0, 0x0, @u64=0x8000}, @generic="c09312a23af2a1ef9bd34d65f0bc919d1484fa8467f717becfd5d063c823465396855233a058767ece86787fe0e5e4c8bcbc31b5752d70557bed98fe56a51a81a50f9912c9b470421bffdc2ec1631d6bd78e1b289c1486a7ed57808ab9d48cd00c7e0c51d0ed3e58485eb7bacbf3672e943939c1b08ed52a4a4c9fe7762c14b1743ed32ea51f6fa8e54b88d6397fa4e97634b9592e2387e540d7d1242c94a9493f22a43661cef8f139ff395622f8cc7b396e59db64ff288f02782e255c2f0ee1de84331cfa822cbcec7d1d41f30abc930cd7c6d343c37556d336106b82a8b74b308b03", @typed={0xc, 0x15, 0x0, 0x0, @u64=0xfd}, @typed={0x8, 0x49, 0x0, 0x0, @ipv4=@broadcast}, @generic="193cc19f9563d657c8b2428ac157153325f96ba10993de9226f33232767de54f192d039af7ccca6ba1a2fcdd3d7bb86effc80a369dbb6ac68b63628b90666fbdf6f98aa3240d199a0abf3588a36acd631575e0bdc39562e5e9fdea4bb2cb6c0e2adf053585ea772f52609b3e4b0405b47b23b282b94d041a8959def25fe2c0045dd867380b84841e9a80386268eabb830265d84ab111eee9a37aa46944f292e7a758c5ee9c43d62ce7b3284b765fb752811aed2b48c926", @generic="7442c9839709fc66e4dec8ac0bd2929fd1ab9cc832b6790fbefa57b17a0ad26ffa"]}]}, 0x2b4}, {&(0x7f00000000c0)={0x24, 0x1c, 0x400, 0x70bd25, 0x25dfdbfc, "", [@generic="91ff5aff9de99b63523ee86c6cf083e9ff10"]}, 0x24}, {&(0x7f0000000100)={0xc4, 0x2e, 0x2, 0x70bd29, 0x25dfdbfe, "", [@typed={0x8, 0x18, 0x0, 0x0, @fd=r2}, @typed={0x8, 0x25, 0x0, 0x0, @ipv4=@initdev={0xac, 0x1e, 0x1, 0x0}}, @typed={0x8, 0x66, 0x0, 0x0, @pid=0xffffffffffffffff}, @typed={0x8, 0x65, 0x0, 0x0, @ipv4=@remote}, @generic="7ea45e2af9f238fa382eeafe52159b241458ed75b25454d10adb2a391c2547fc7bb370f34581d827dfd351070e5133846c8ea76e4f461d6f27fdabb8b7c0a757c72fa591da634ce203951a9462b5ad7c8a3425de27b0317eb02238e74414107fca6d522622f509832eeaf9afbce52fa99ea89f90a2b2152da01481f479d465b0346103b90405ca1b6e6fbf1383237e0fd8"]}, 0xc4}], 0x3, &(0x7f0000000700)=[@rights={{0x14, 0x1, 0x1, [r0]}}, @rights={{0x30, 0x1, 0x1, [r3, r0, r0, r4, r5, r0, r0, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {r6, r7, r8}}}, @cred={{0x1c, 0x1, 0x2, {r1, 0x0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r10, r11, 0xffffffffffffffff}}}], 0xa8, 0x4000}, 0x41) fallocate(r0, 0x58, 0x5, 0xb63c) 14:12:06 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x109200, 0x0) r1 = dup3(r0, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x0, {r1}}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 14:12:06 executing program 7: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$TIOCPKT(r2, 0x541d, &(0x7f0000000040)) 14:12:19 executing program 4: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = add_key(&(0x7f0000000040)='trusted\x00', &(0x7f00000000c0)={'syz', 0x2}, &(0x7f0000001280)="ee8a1883c4187da8aa0a2d93cc9182c4a076c065f3d36b0a9bb76a6d4f654ab4fb8df233ed76c4050a42a15a79ca20ce6c200d0ed699ff6a9851d65340339555fb1e63914ab94c4f4e75515ad4967825712a1e2d4d1d262f054c50c14e292a74f16f7351d3c196040741c2ce173a0e659156e6632ff37bd125cd3dead63b33555e1daf85ca60977ce099ea570c8d8a8288aa4ee9c26d88587bba54beeca8a425a6d9eb2ac01e036acea0aeaefa209d988e71c52ee35ced8161db77719096135be2ec7f471597cb8ce7c0709cea2533924355bc8af0da7612d77a60e08f4994d2bfcf5cf90bd54a6f9950b34d957d38f5a5eeb4f7f5eff6b44bec2e8479e66ed5a36002005199b26eefadc72561fb9b29d98e8af366e04f709eb3b619164f0914065f1c81032635ca44b1e31c6b700cdbe73012ee712191f0f5c4c9c278396ad8fb4af9fe8fc45493dea6a230fb76283b0d9d2044aa1e7efcdb45932bddfb7ce47d76638801c48fa40cc31252805039ff7467a056443ec722aaf5e0d6706a8d5358274adc3d98005b20740875203e8d187badf4398c7d40c9f7de1acb2edb6aad14d4817326180dab441003c970f65d83abdef2cd4a267ce1c2716ccb6f396c14425a252defe309add148a8b9a4488bb400b2ecdf395d9c619e169a3b8d9339ccbc5ca02475d9fc1c8be2b9f49254aef01bb7aad5ef6d843183c39966623a0a942d9e54eaee4f08ad134a18220f60792c09a92bb8eea798cd8f2624dfa4ffdca63d5ee21b93cbc4aa0eaa926c40f68a2b4e6c19ccca3e8d77f9f62177944ede323db371103e4ed47433c4d243ab16a19b3ddf68ee83a5173f0db1400976ea4616c62620e55d28c6280609d860bc5fbf1c5b3ddc565c6ccf2a5b763161b8cb04358d679b8ecd0943d1644c5059a09039fa73653521753c0299acf6c749a9b5948937df3e3ef2d8cd8f3f4938ef62a601dbd83201cf904c4812f795d151f39a6b4ff31f2fc68ee12b8422853f84067d9efd6a28bd55206ab42e7a0f337ef5d89ee9d1b038b63fd0d97cfa886ea6c81715c2770a466392fd3177d6dfa1a59c367954ca07e26bf3f3d853d23272938700d39905f2cc3746dbd16a888abba9b823bb5c1988f0414fba337f8d00c20e04d79120fcf9e9d3f60ade9b246f8a22b6d5c949fbaa6624a215ad27c8ac44b6f4cd438320f1aa67003502206061494b2a19ec44fb3fdfba88351307ecd4d6a104121420a5501987c5ac9865dcbd22efafc674c67c77bfe07d913614dc3f939cd2c4a6ec659f560db05ef938952d0ec8920a6834446d64c5e5cad0e13f4f27c3bfd1f0a1265723e85c71d4a8d4d27415ebde8a7e523bbb02941ff154d60ae752a22c9ae0b6947674045503d679025bb0ef93d1f725b505faed21c6d4a3828454bc82f01a97c6e9c433809ad05a15549c8232c42996f97d6c7b9fa87688d9a9119cf9ba2532bdd42c9170d49bc43efde1ccf41415f32b20bc1b4f88a2b2314460f244d8bc0e0567299eeb1bd196283b4fa23ea34d7d9c1e5eacf326697edd631d7665c5e501a57f5691264731eb6113a7f1ff61702275db99b609e3166a798458aca446f5ee27f7ce612003a32d10b37aa1e1b9517e876cad528956a70f6e2a62e63af1c3339543891f0b092f0bfdb728ebb0f6e49fd6af945b84d32dfd6771bade34a6a514ad5ce86bfd0add9280599ead06e8b7c8473c8111239adbb1ad323075aafae6bc2e91176f644a4ccb076b9f1da66227475222437d48266822ca5cfb40288e445d5bd67b37f0bb72cb6acb2e09500c27f9d505dc9c000fd91a9205b642830e9d5c97c90eb8c3b1a00b592b9cac0748ad456283630dbdf4f62104c3045f6bf27e3eb1804027cf7e03b2e6b03938902eaa6c47bba7fa7768165a05ce0467b7001b58c300b05cde6bfc491f830053f0b990ece31173496a7a19635df59aa7c4996763efac227487736ca126233d7c68005f7ede68478994a091a4f01fb8513202b54b685a62b731257b169a90e138b084ec6d99bae69fcc32d1dc4fb4abf52e3417d64a3db0ca5ea4348f46b39cd4cb79a1e5f367e41d7e05f6b269215eb0c2278d07e2ce022eaa887699d49de2f6ea71775d7b0f0fa9a579268c5fa43e64c492c7c69d5fd2a27781bc963193ef06a95dd3b1c121bb4507d1fbc2f22d8bfffaf2327f1cbd624d70a9e4ac8ea8f094cd0160d8179a5e2daa1887aaf2abcdc947e8ff41bbd788b911936ef97db4b2973063173343ab6d62eda42186373a6dbc29aac570550bee289448c32caea151372be09614d62f7b4f0454f3d6f2311ff90e15ec4dc110a3e31d053f58613ec28fbbda8c9283abc871fd2a269de587158254240f64e6080632a56637b9df3fc1f6f5807f5269c60755de9aa3587ab70746fd958592edef4c0de7fe1d33f0f6a5ab579f568cb1e3f4baae750fad149f5f401ac067c8dcc2c9052122320766e3c33f6913a514738f218c845197e5c337831de8ada40ca1052e1ab2d5842443878fef5ba8329e7632bb5775a57e2307ec7223ac4f71810daa8cb950e5647b1b91db92e7b1bb7abc9ecf85e74c5a91dfbf1e9b8fb4be8f6a2f09c277f6e38f1692c9732b6e2f5264fe54d0df79b5385579f5db2675c0730abee35e1d606f8c516544bec851a39b7531a8ef376e62553165e4d445c83d2edee4e83e00a55f4c018edd2742bb5a4ed0251e60d71427431b659e2e813a183d12c4d297f001dd0d4e1ec0a5b1fe90561f8e027e9abbc13c87e4a779f711d943521922e5c1dae3c3db7a0bf7ff8e8169a36039b68700627a288b9d6a44be034639d4577c2d1a1635d1511bc8417a3f4530234b5ea6b2c623271f35f6421e5e0d6fd64752b100683175a46f33a1d41b3ec688a4fb4c84b2d3d8ef7dbe23727e7cdc27fd1afca934c5d7a3c03d9d4e3465e8f2c80bbe4697cd9d79419eb975b99d48becc790d5ee52f2ec1b5080c0612399e79d8af3c9e83423355f68d06f335cdb137a0cc529c0fe6cb457f9e39f9268295c504ea30182262badd653fb1fbd0c059d77e18981c1af1fe21fab2d6a6a154c93c129357885052f8ce58240f42fd162558de2ff3460da4f7cefdce91996e5ce98027c03c11871448bbdae950776fe5620eb697c65de76fded81bd3598d25b073cd682739b4b1d5f4fb74190debdb4379464456bcc659c3b9ea1a5944d15087f2024655a654b8fcbce6d470ec51de254e3756f0c4de6ba663e8152b76c171c8d4762c25ed5458e2e97dea6dc82767082e12958cf969b7a2ca7e9ad45e7aff305fd0e1ab8f0b57486536e4dbfd04171128b2f8e92df14efeb160b9aab25f892d2c6a4a51caa543a866b2df9db6b113b43fcc938a85c0c2c6cac34451363991acff6d8e1671d0bf17d33d692ceeaa7a342c217f54d094943ef395704cf16c758d5f285d6665f3adf9b01cbc896694350b83d2fe89893a1766e5c14284933f9461147a29bea8a97f631deda92343510c781acddf4520ac9dd97a8c7aa23bf412e5170afdee0529b318d5c2ad619b96bb03945c0c69cd9901b264d223b6d4673aac6897a71b6be309742957189b945c0f634cc49936568361061a7c8c856f7da8feb350b5f1ac851af38a0a610d3c5004c3e1f75bed00d018345cf474eafb4a910b6968c91c8c5be4e02d68e8de9261c03905b74d0fc5a641289a80ff26553c4a483573109e9bf414751de756fbc9116df90374bcfb5132d7b94dd6e58072d1f0da3ce3c8e00e37949ab5478267c4b5b56ed4fd878bbfa59696ba937b067b23106327f42c3e9b686131b835332ac1aa09be4b2ba16ac54a22dcbb6525c99078ced3855b823a280d7d4abbdc4e4978c90c4698b5467b5ab88f4ba89d8ce21c6ad3a13e1fb80f5d430f57b6dfcc2b9e0cb46bbd9623950a201bb239cf7484073deb843fa6ef63f11decf981bdf733f8d17e600447c79a62788701432725aa3402b8f8e47384d647dd98a9c2f566dcfcde620a0c6ae87c4f93f5f8cca6ddbb9a620077914a1e95a1b1a60c30d10d81d6d68e0b52adbe85e2e61f9dca47c12cafe3e9b23b4b0df3637ea2fd0e6ef1eb773362987f8c64d47c079a775e3312cdbd3ad9426f3099a950aa15c0363843aea8dada1fedd16fc24ac5d95e18501ce0e2c4e6153fb6a8179716eefbcd9f6e780a9235381520dd5a2fe966129271e0e6894bd73628957c6b1008f3898e9a03db7aa42c0da019e607fbead4480e002d858209760cb327cbb84c19cf628911ca7a8d979f00c3bd7488a3f28103ed272cbd97139913931afd8888b819cbcff659db193d496f573e30799e0984d1bac4428b728d3393db2e056f43e1dba5eeec4a69fb417ad3c6c3b8a582e5b612363c98a1d10fc47a140a59eea603accabb79077952566695d49eb4eb2ea2640bde5387e1e91183f7a2f9c92969ec5b49f5e3e25588be473577d5816377c584bd7a9bf460681f3116e9347d105a97fa2481c0404f1dc2feba39cb1d997a68de72b4ab223ef939e54387b7eefc1e2ea606c7012eaf42a3fdebcc8cc56ebdd83f887cccc6c3b555da6aac25be794e435f83f9e96daaf7f745dbaae491ce9ee7c1405f741b76ad6b7e69f169f9f43e908589909068f23a38784a093bb28b5de2b08af60418459e9dfac7f4f0fb0ff0042439382151ee67a1d1e43f3585c2d3ab95d531f5bfe954e711cecbd97959861c543fad090dba547fd3cb4822a95f28d32c84427ace67d3cfe3b9f37ed216e8913d6df1026836ad867a811037a0640ec1b6e69a30fd0fb63edba63bc301a6091a9ce5c9d58780b36771883e6a932ba2f1ee9e701b8d175841b72ca8fcabc9410f6e47b3e077f13fcb293e81d2b0cda44f90c6cb5e7bdab21e3a8f055860bf4b21750e43c22cf815874437f1463cd0e33ecc704e892dde922b563936d98029ed60d64df66db83df718ee59f611fa3b80e9bbbdb60cb62ae4d039b50b438ee178b3a8f878a222c350878a6c3a612b43ba18ef9edaac704ab7204db701b25249a24cde7e2a647d23d8d3d60fe7d24a2bf95616b6ab1807da393fd7f979bca095cac634236f35d13a8e80f5b2e8b1e075435a646240db8e90c4cb8b87f314daf678f736b5950cf55cfe73cfa6766706750869942b941dbfff4a469a0e9c0dc0291d288c85ddf30c174dffad33e56c3ca0af8dec56aa0b60f90ee6fa4cb643dad70c7e96dc8abb848959d3157def61a12eaff822a5834b82490003453e49dac056d0511a4c40d3d7ce3118b30e2db9448f62b02c5462caa31609987ee730ba70a6bd3e87c25431dfb69dda60cd0eb83df7ee711d50e8eacd205d292ed88e742254d37b0e3d7df75bd4ece38b728029dd084a56255da39be11cfc35cb1123285e4972601eb69f095bb3eeb40c1944c6211022e1d45a4bf0283278b23d8335a64b996f58da10a019c3fed27f1a82dd0a8a3f7d8c0793978bab7ea50de9e71be1a61f05c9e4f4f3a8cdc9c83c1695c3a5a038d929812cb9ad5193faf93ac4967277f77a2ca3cd4ce50b27a11b2ad94321cf93d4b2fdbe7a9cdd60fe5ece790c5ec5c2bc03cd995fb8c5b578e1b2436e60a202ab3802d857592358593c8c08fbc2778abfec6513a7eb822fcf7b845576e93ece188637b47c3de28e0c0cbfefd12f604daafe95f529e94b577e7b21bc51c4e51298abdcf8dde24837f8540609caba827e075db9d03160db0cec8767afaa3f41c6a46441d99bf9d20ef2277390cae1e92929bf65691fd094f7a3416dbc5760f941873fd16d3fcde7eede44ee", 0x1000, 0xfffffffffffffffa) request_key(&(0x7f0000000000)='logon\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000200)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12&\xe0:!9e\xb9\xb0I:gB.\xb1p\x93D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\xfe\x1fe\x91\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xe6\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16>\x93\xb1\xc4d[H\xf7\xdby\xf5b\xae\xe7\x14*H\xb3\x15\xa4\x8d[8\xf9f6\xf6Y\x18\xb6_\xfe,\xf4\x8b\xe6\x93\xbe3\x05\xcb\xb5\xedU\xfe\x1b!6v\x18~\x9e\xe1\v\x13\x84', r0) 14:12:19 executing program 7: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$TIOCPKT(r2, 0x541e, &(0x7f0000000040)) 14:12:19 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000040)='.\x00', 0x2000003) r2 = inotify_init1(0x0) inotify_add_watch(r2, &(0x7f0000000000)='./file0\x00', 0xa4000004) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r3 = dup2(r0, r0) close_range(r3, 0xffffffffffffffff, 0xc9ffff) 14:12:19 executing program 5: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, &(0x7f0000000000)={0x1f, 0xffffffffffffffff, 0x3}, 0x65) write$bt_hci(r0, &(0x7f0000000080)=ANY=[@ANYRES64=r0], 0x6) listen(r0, 0xffffffa4) r1 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TIOCSPTLCK(r3, 0x40045431, &(0x7f0000000000)) r4 = dup3(r1, r2, 0x0) r5 = syz_open_dev$vcsa(&(0x7f0000000080), 0xfff, 0x4000) setsockopt$IP_VS_SO_SET_DEL(r5, 0x0, 0x484, &(0x7f00000000c0)={0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x4e23, 0x1, 'lblcr\x00', 0x34, 0x9, 0x40}, 0x2c) ioctl$VT_RELDISP(r3, 0x5605) ioctl$TIOCPKT(r4, 0x5420, &(0x7f0000000040)) 14:12:19 executing program 1: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x05D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 14:12:19 executing program 0: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 14:12:19 executing program 6: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r2, 0x4b63, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000180)) r3 = dup3(r1, r0, 0x0) r4 = syz_open_dev$tty1(0xc, 0x4, 0x1) stat(&(0x7f0000000900)='.\x00', &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r5, 0x0) r6 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r6, 0x4b63, 0x0) stat(&(0x7f0000000900)='.\x00', &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r7, 0x0) r8 = fork() ptrace$setopts(0x4200, r8, 0x0, 0x0) sendmsg$nl_generic(r3, &(0x7f00000000c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000080)={&(0x7f0000000380)={0x3d0, 0x24, 0x4, 0x70bd25, 0x25dfdbfe, {0x1e}, [@nested={0x1a0, 0x43, 0x0, 0x1, [@generic="701feb75371b4da0b24df380495f0985ae260d312d68e2b33c73c6f98ab218f2e367f0e627c076fe8c48d213f0280f444ceb52ea4c58c613b13af9eecbe81fec12567f420590d8aeb5d8934db6f8a0b74fbf6660809e9286f8ff021ae634d14e0bb4c2110e29c3c1f4bae01708f52aad0b99a4320597a4190a58b8b9409c496702ab7138c524f689aef64cf79f69c383", @generic="bcc132a0cf760934ac31fdbc0ea0208e49bac09897946db220761b0d0d8f26c5863fe44ed45cf20c3d2d670bd356144c8426ef8666a406d01c3ee820200a669920d75dea7a0a1a0b386a6ff5ecdceadc3876f4c1ac039c5166ff4c9fd4ff7829aaf0aa5426106858c169100cc9fc35fcb2d084fbbc261daa", @generic="d87e1296ab", @generic="df5d1656122d4503133f1968352eb5183dbb6491d3000900b397b3175b54eebf4e2b64fa43e684628f258aa9dee9f514f7bee8a37af43b674f1ec808fa243584dbd7f1a4b7a2f84fd0dc271d5a65532991fea85c6e95f9547436b76a3a5005", @typed={0x8, 0x7f, 0x0, 0x0, @uid=r5}, @typed={0x14, 0x8a, 0x0, 0x0, @ipv6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @typed={0x8, 0x3, 0x0, 0x0, @u32=0x3}, @typed={0x8, 0x23, 0x0, 0x0, @fd=r6}, @typed={0x4, 0x46}]}, @generic="7a66df62d7338e7d1823e50246444f7434bb05ad49ad91f7cfcdb2fe06d1c5c2ae937dbef3c8d4982534958cc66ad514506eff0b2711b30b21f7f9493e77764a9e92f23db5db7b1e83fd69fbee5da489918dd70eee454d6ffbd23b8d57fcfad82ca9c9235d637b8ffccdc574eaf61407b217d93dc4a78f82830112f1cd432398f7ba903aa62f6899d168206e7c5af9d2036a049a65", @typed={0x8, 0x7f, 0x0, 0x0, @ipv4=@empty}, @generic="018aef240e35059900ef57996ea17b0a2c94f8d4e97a17046cde10808c0773a39d2bde95f4fe0bfc288e8d6b6a3ac3711ccde197fd055ba990cf379dfd0d67e82d4dbc5db7bb849724c86a41b4d0f0a00fb80a6624147533e2d82d542a9bf1cd560770b4887b851f4349c050e1caa8cc52a276277e8508b800192c0fdfced84f99e07bd4f7f676ba4d751ddf11ac348643d68b97d87e49fc0ebd3ffac4bc227c47a8432023bc3dc22fbc5f3a8b4d289e19ae", @nested={0xab, 0x30, 0x0, 0x1, [@generic="00ea3019af301c681ea535c4ff854dacd52f5569350c306bc97bf8bd670ca2cc3f23087ab439f9edff89d4d5cfbfbb8ffaeb9ed3e485d0e52acd5d180d5b08b39d1cae34a4a4370886d0684a2ef7a9203116fbf9edab4ada7171ae6872734ad66c2b1e0a9d6451048b30a44b248c0d713e3b01f7cb7bc4c8ef1cc2", @typed={0x14, 0x5a, 0x0, 0x0, @ipv6=@empty}, @typed={0x8, 0x4c, 0x0, 0x0, @pid}, @typed={0x8, 0x74, 0x0, 0x0, @uid=r7}, @typed={0x8, 0x7c, 0x0, 0x0, @pid=r8}]}, @typed={0xe, 0x8d, 0x0, 0x0, @str='/dev/ptmx\x00'}, @typed={0xe, 0x2e, 0x0, 0x0, @str='/dev/ptmx\x00'}]}, 0x3d0}, 0x1, 0x0, 0x0, 0x10000}, 0x20000) ioctl$VT_RESIZE(r4, 0x4b63, 0x0) ioctl$TIOCSPTLCK(r4, 0x40045431, &(0x7f0000000000)=0x1) 14:12:19 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000140), r0) sendmsg$NLBL_MGMT_C_ADDDEF(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000200)={0x24, r1, 0x1, 0x0, 0x0, {}, [@NLBL_MGMT_A_IPV4ADDR={0x8}, @NLBL_MGMT_A_PROTOCOL={0x8}]}, 0x24}}, 0x0) r2 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$IEEE802154_LLSEC_DEL_DEVKEY(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x38, r2, 0x200, 0x70bd26, 0x25dfdbfd, {}, [@IEEE802154_ATTR_DEV_INDEX={0x8}, @IEEE802154_ATTR_LLSEC_KEY_SOURCE_SHORT={0x8, 0x2c, 0x3}, @IEEE802154_ATTR_HW_ADDR={0xc, 0x5, {0xaaaaaaaaaaaa0002}}, @IEEE802154_ATTR_SHORT_ADDR={0x6, 0x4, 0xaaa3}]}, 0x38}, 0x1, 0x0, 0x0, 0x10}, 0x8005) r3 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r4 = socket(0x1a, 0x6, 0x5) getsockopt$IP_VS_SO_GET_INFO(r4, 0x0, 0x481, &(0x7f00000000c0), &(0x7f0000000200)=0xc) bind$bt_hci(r3, &(0x7f0000000000)={0x1f, 0xffffffffffffffff, 0x3}, 0x65) write$bt_hci(r3, &(0x7f0000000080)=ANY=[@ANYRES64=r3], 0x6) stat(&(0x7f0000000900)='.\x00', &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r5, 0x0) setsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000040)={0xffffffffffffffff, r5, 0xee01}, 0xc) clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 14:12:19 executing program 0: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000040)='rxrpc_s\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f0000000300)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1hN\x91\xbb\xa2\x17\x0e\x97%\xbf\x1f\x98z\x01\x00\x00\x00\x00\x00\x00\x00`\x05\xf4\x86l5\x94\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8ckc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x87D\xb8$\xac\\\x03Bp\x10D\x85J\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xe0\xfa\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dM0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\x03\x10\x00\x01\x80\x00\x00\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf2\x83T\x05\\B\x7fP\x9a\x84\x96J\xdd(\x80\xd3\xef\x9e\n\x10\xe7\x85\x1dL\xdd=\xa8\xc0\x95\x1f\x1c\x96\t(\x05\xbb\xbf\x03yH8\xdd\x99\xd3\x8dZu\xc8\xf6\x82\x10\xa9@6\x95\x9d\xe1\xa4mW\xdf;\xd5(S\xc5\xce\x95\xb3Zn\xdb\x11`\xf9\xee\x0f\x9b%;`\xe9\x935}\xa77 N\x03i\xb3\f\x8f\xa3\xb8=_\x10~\xa4hP\ru\xa7\x88\xe2\xa7d\xde4\x01\xb3\xd6\xfeJ\xd8\x9ao/\xe9x\xb1\x8dKON\n\x06\x00\x00\x00\x00\x00\x00\x00\x00', 0xfffffffffffffff8) 14:12:19 executing program 6: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000000)=ANY=[@ANYBLOB, @ANYRES32=r2, @ANYBLOB="8d000000000000002e2f66696c653000"]) ioctl$TIOCGPTLCK(r3, 0x80045439, &(0x7f0000000040)) dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x8) 14:12:19 executing program 4: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$TIOCPKT(r2, 0x5420, &(0x7f0000000040)) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000000c0), 0x200640, 0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r3, &(0x7f0000000200)={0x90002000}) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) pipe(&(0x7f0000000040)) 14:12:19 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000040)='.\x00', 0x2000003) r2 = inotify_init1(0x0) inotify_add_watch(r2, &(0x7f0000000000)='./file0\x00', 0xa4000004) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r3 = dup2(r0, r0) close_range(r3, 0xffffffffffffffff, 0x1000000) 14:12:19 executing program 1: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x06D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 14:12:19 executing program 7: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$TIOCPKT(r2, 0x541e, &(0x7f0000000040)) 14:12:19 executing program 5: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$TIOCPKT(r2, 0x5420, &(0x7f0000000040)) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r3, 0x4b63, 0x0) ioctl$TIOCGPTPEER(r3, 0x5441, 0x81) r4 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x42000, 0x0) ioctl$TIOCSTI(r4, 0x5412, &(0x7f0000000080)) 14:12:19 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000040)='.\x00', 0x2000003) r2 = inotify_init1(0x0) inotify_add_watch(r2, &(0x7f0000000000)='./file0\x00', 0xa4000004) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r3 = dup2(r0, r0) close_range(r3, 0xffffffffffffffff, 0x2000000) 14:12:19 executing program 5: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TCSBRK(r1, 0x5409, 0x9) r2 = dup3(r1, r0, 0x0) ioctl$TIOCPKT(r2, 0x5420, &(0x7f0000000040)) 14:12:19 executing program 2: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$TIOCPKT(r2, 0x5420, &(0x7f0000000040)) openat$cgroup_ro(r2, &(0x7f00000000c0)='hugetlb.1GB.rsvd.usage_in_bytes\x00', 0x0, 0x0) 14:12:19 executing program 6: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) dup3(r1, r0, 0x0) r2 = syz_open_dev$vcsu(&(0x7f0000000000), 0x4dff, 0x1000) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x5) 14:12:19 executing program 4: clone3(&(0x7f0000001200)={0x98118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 14:12:19 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000040)='.\x00', 0x2000003) r2 = inotify_init1(0x0) inotify_add_watch(r2, &(0x7f0000000000)='./file0\x00', 0xa4000004) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r3 = dup2(r0, r0) close_range(r3, 0xffffffffffffffff, 0x4000000) 14:12:19 executing program 1: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\aD\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) [ 2885.168474] kmemleak: 3 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 14:12:40 executing program 7: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$TIOCPKT(r2, 0x5421, &(0x7f0000000040)) 14:12:40 executing program 6: perf_event_open(&(0x7f0000001d80)={0x5, 0x80, 0x70, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, @out_args}, './file0\x00'}) ioctl$TIOCGWINSZ(r2, 0x5413, &(0x7f0000000040)) dup3(r1, r0, 0x0) 14:12:40 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000040)='.\x00', 0x2000003) r2 = inotify_init1(0x0) inotify_add_watch(r2, &(0x7f0000000000)='./file0\x00', 0xa4000004) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r3 = dup2(r0, r0) close_range(r3, 0xffffffffffffffff, 0x8000000) 14:12:40 executing program 5: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r4 = dup3(r3, r2, 0x0) ioctl$TIOCPKT(r4, 0x5420, &(0x7f0000000040)) recvmmsg$unix(r4, &(0x7f0000002e40), 0x0, 0x20, 0x0) r5 = fork() tkill(r5, 0xb) r6 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, r5, 0x7, r0, &(0x7f0000002f40)={0xffffffffffffffff, r6, 0x7f}) r7 = dup3(r1, r0, 0x0) ioctl$TIOCPKT(r7, 0x5420, &(0x7f0000000040)=0xffff6b9b) 14:12:40 executing program 1: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\bD\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 14:12:40 executing program 2: r0 = clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r1 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000600)={0xa, 0x0, 0x0, @mcast2, 0x3}, 0x1c) fcntl$getownex(r1, 0x10, &(0x7f0000000040)={0x0, 0x0}) fcntl$lock(0xffffffffffffffff, 0x26, &(0x7f0000000000)={0x0, 0x1, 0x4, 0x4000009, r2}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000280)=0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f00000002c0), 0x6e, &(0x7f0000000600)=[{&(0x7f0000000340)=""/219, 0xdb}, {&(0x7f0000000440)=""/213, 0xd5}, {&(0x7f0000000540)=""/149, 0x95}], 0x3, &(0x7f0000000640)=[@cred={{0x1c, 0x1, 0x2, {0x0}}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x70}, 0x40000002) r5 = fcntl$getown(0xffffffffffffffff, 0x9) r6 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r6, &(0x7f0000000600)={0xa, 0x0, 0x0, @mcast2, 0x3}, 0x1c) fcntl$getownex(r6, 0x10, &(0x7f0000000040)={0x0, 0x0}) fcntl$lock(0xffffffffffffffff, 0x26, &(0x7f0000000000)={0x0, 0x1, 0x4, 0x4000009, r7}) clone3(&(0x7f0000000740)={0x80000, &(0x7f0000000040), &(0x7f00000000c0), &(0x7f0000000200), {0x1}, &(0x7f0000001280)=""/4096, 0x1000, &(0x7f0000000240), &(0x7f0000000700)=[r2, r3, r4, r0, r0, r5, r7, 0x0, r0], 0x9}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 14:12:40 executing program 4: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r0, 0x4b63, 0x0) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, &(0x7f0000000000)={0x0, 0x0, 0x1, 0x0, '\x00', [{0x32, 0x101, 0x7, 0x3, 0x3f, 0x8e8}, {0x3, 0x2, 0xa9, 0x5, 0x0, 0x3}], ['\x00']}) 14:12:40 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000004c0), 0xffffffffffffffff) sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000000980)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000940)={&(0x7f0000000500)={0x42c, r1, 0x26, 0x70bd2c, 0x25dfdbfd, {}, [@TIPC_NLA_NET={0x3c, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_NODEID={0xc, 0x3, 0x2}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x532}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x3f}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x100}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x7}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0xda5}]}, @TIPC_NLA_LINK={0x78, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_PROP={0x24, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xb}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6a7}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xf5}]}, @TIPC_NLA_LINK_PROP={0x1c, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x14}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x7}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x3}]}, @TIPC_NLA_LINK_PROP={0x34, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xd}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7f}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x100}]}]}, @TIPC_NLA_MEDIA={0x4}, @TIPC_NLA_MON={0x2c, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x78b}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x5}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x1}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x101}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x4}]}, @TIPC_NLA_LINK={0x88, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0x2c, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x844}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1e}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}]}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz1\x00'}]}, @TIPC_NLA_PUBL={0x44, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x10001}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x13}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x4e}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x7f}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x3ff}, @TIPC_NLA_PUBL_UPPER={0x8}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x80}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x7}]}, @TIPC_NLA_NODE={0x1ac, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x1}, @TIPC_NLA_NODE_ID={0x44, 0x3, "1711d0c1965513f38229a6f2fd45c2b7bfe52a3bac31529156227a852ad05a78dbdda673d264e17d268cabdcf379268bc0c4925de58732eb814ba2be26cf4f94"}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x400}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x96}, @TIPC_NLA_NODE_ID={0xe9, 0x3, "2d40725f5e8b9740667dabf9324c816054e949be29209f5e0369a169274a21e25456ce748b456d90f67031058dac7c0e23160b506ccae24b94e3443a383c271ce09c96de9303968fa22b28c246466dd7f2cdd708abe61466820b3d43bc7ede8e48ddc136f8f6cd9a527a8c2e8642891fffcebd2fadf1b498697c32f4d55a33979a95e5a154fdfe95de76b6443315ced9d042e23b3c9a8b856be15c2f59bb62953e1204c9981a126e18af8d65eb3445245f3010399572f693c9d89ccaae7b86a5a7d64970ddc47dcb7f14cf4ae6e3d9239704664c502e957cda7210a2a48ab22d436d79832b"}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x7}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_KEY={0x4a, 0x4, {'gcm(aes)\x00', 0x22, "df07e160dbf87cd5cc6a7a7b621020ad291c95fd7ad1065d583231010c1f19f63efe"}}]}, @TIPC_NLA_LINK={0x24, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_PROP={0x14, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x6}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x81}]}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz1\x00'}]}, @TIPC_NLA_SOCK={0x98, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0xd5b}, @TIPC_NLA_SOCK_CON={0x54, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_NODE={0x8, 0x2, 0x2}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x9}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x5}, @TIPC_NLA_CON_NODE={0x8}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x7fffffff}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x1}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x2}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x5}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x3215}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x3}]}, @TIPC_NLA_SOCK_CON={0x24, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_FLAG={0x8, 0x1, 0x1000}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x7fffffff}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x2}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x3ff}]}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x7}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x1ff}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}]}, 0x42c}, 0x1, 0x0, 0x0, 0x4000000}, 0x2048810) clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000340)={0x138, 0x19, 0x1, 0x0, 0x0, {0xa}, [@nested={0x47, 0xd, 0x0, 0x1, [@typed={0x8, 0x58, 0x0, 0x0, @ipv4=@private=0xa010100}, @generic="eff13bc700c9d352f819f2dc76d084c1e8ed15d38752ba689c1797ca917d67c4e65e9fee86b852c6f78ec112a34dd3adcdbc9a", @typed={0x8, 0x2f, 0x0, 0x0, @fd=r2}]}, @typed={0xdb, 0x17, 0x0, 0x0, @str='\x01\x01\x0ef\xc9\x8f\xdd\xaej~t\xc3\fr\x0f\x0eI\xb9\x1cz\xaf\x82>\xe6\xd0\xd7Y\x8e\xaf\xf42\xb6L~F\x9f\xd0i\xd2l\x8e\x13\xc0/\x86\xe4\b\xdf\xd1Z\xd0\xb0\xc8\x12\x9e.\xe0\x8d\x98\xae\xfeh\xe4\x05ey\xdaIS\xe4\x82\xb1\xd1\xdf:S\xa2em]x\xab\x9a\xe1\xa24\x11w\xd4Al\xa8\x8f\x05\x017/=\x12Tj\xc2\xc7\x13\xc6\xa4\xfaqP\"\xa2\xa2\xafV\x88\xffD\x86\xe2\x1do\xc2\x86\x9a\x03\xdd\x00l\xb1\xfc\xe1(\xa8I\xdc\x92\xb6\x9e|\xe2\xedkG\x9d\'\xb1\xfa.HF\x1a\x9e7G\xde\xf6\xdf\xf4\x16x\x1a\x8a\xd2\x9euW6p2\xa8W\x97\xee>o\x90x\x84\x89\xca\x1eP\x86\x1f-T\xf4X\xd9A\xb1O#w\xd3B\xca:\xc1\xe1\v4sj\x1f\xc3a\xc0\x1bDe\xe5\xfb\xbd\xfd'}]}, 0x138}}, 0x0) sendmsg$nl_generic(r2, &(0x7f00000002c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000200)={0xb0, 0x33, 0x1, 0x70bd2a, 0x25dfdbfe, {0x1c}, [@generic="301a65bea9d6720cf34a245787f727ab35b2c136de75f74386a855b0ba7f2efdf84083dd8a866c3523a39ea4ce00387d4059e5e05d20ca91d6a753639050d5793463ad24be62aba3ca2f46fa98f89126aada87b920ea830c0104a0a6170ec4509872170a16d085485a030b9b6ae239837ffea7075d9ea544774be9c12a81cd907fec18e9f2a41d5d8dc90896aae756d5803efe9863a7e611f9"]}, 0xb0}, 0x1, 0x0, 0x0, 0x10}, 0x820) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 14:12:40 executing program 6: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xfffffffffffffffe, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @empty}, 0x1}, 0x1c) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000180)={{0x7f, 0x45, 0x4c, 0x46, 0x2, 0x20, 0x2, 0xc3, 0x5, 0x2, 0x3b, 0x800, 0x316, 0x40, 0x3e1, 0x7ff, 0x4, 0x38, 0x2, 0x9, 0x693c, 0x7}, [{0x5, 0x401, 0x101, 0x9, 0x1, 0x7f, 0x8, 0x1}, {0x60000004, 0x4c, 0x8, 0x3, 0x800, 0x9, 0x8000, 0x8}], "8b1820fe86baeeb8f2749e9b", ['\x00', '\x00', '\x00']}, 0x3bc) r4 = dup3(r3, r2, 0x0) ioctl$TIOCPKT(r4, 0x5420, &(0x7f0000000040)) perf_event_open$cgroup(&(0x7f0000000000)={0x4, 0x80, 0x1, 0x2, 0x80, 0xfd, 0x0, 0x8, 0x2, 0xd5be212ddddacd3b, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, @perf_config_ext={0x5, 0x81}, 0x1, 0x8, 0x2b0, 0x1, 0x7ff, 0xfc83e02, 0x9, 0x0, 0x7f, 0x0, 0x7}, 0xffffffffffffffff, 0x2, r4, 0x8) dup3(r1, r0, 0x0) [ 2894.340376] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2894.341917] selinux_netlink_send: 24 callbacks suppressed [ 2894.341928] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=51 sclass=netlink_route_socket pid=15230 comm=syz-executor.0 14:12:41 executing program 7: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$TIOCPKT(r2, 0x5422, &(0x7f0000000040)) 14:12:55 executing program 5: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TCGETA(r1, 0x5405, &(0x7f0000000000)) r2 = dup3(r1, r0, 0x0) ioctl$TIOCPKT(r2, 0x5420, &(0x7f0000000040)) 14:12:55 executing program 0: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) r1 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, r0) keyctl$restrict_keyring(0x1d, r1, &(0x7f0000000200)='rxrpc_s\x00', &(0x7f0000000240)='dns_resolver\x00') 14:12:55 executing program 7: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$TIOCPKT(r2, 0x5423, &(0x7f0000000040)) 14:12:55 executing program 1: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\tD\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 14:12:55 executing program 4: r0 = clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) clone3(&(0x7f00000005c0)={0xa00800, &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)=0x0, {0x2d}, &(0x7f0000001280)=""/4096, 0x1000, &(0x7f0000000480)=""/253, &(0x7f0000000580)=[r0, r0, r0, r0, r0, r0, r0], 0x7}, 0x58) r2 = fork() tkill(r2, 0xb) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000640)=0x0) r4 = gettid() clone3(&(0x7f00000006c0)={0x8840000, &(0x7f0000000040), &(0x7f00000000c0), &(0x7f0000000200), {0x4}, &(0x7f0000000240)=""/190, 0xbe, &(0x7f0000000300)=""/191, &(0x7f0000000680)=[r0, r1, r2, r0, r3, r4], 0x6}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 14:12:55 executing program 6: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r2, 0xc018937c, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) ioctl$EVIOCGKEYCODE(r3, 0x80084504, &(0x7f0000000040)=""/160) 14:12:55 executing program 2: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = request_key(&(0x7f0000000380)='rxrpc_s\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) r1 = fork() r2 = add_key$keyring(&(0x7f00000021c0), &(0x7f0000002200)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$setperm(0x5, r2, 0x8001400) keyctl$chown(0xb, r2, 0x0, 0x0) keyctl$KEYCTL_MOVE(0x1e, r2, r0, r0, 0x0) ptrace$setopts(0x4200, r1, 0x0, 0x0) clone3(&(0x7f00000003c0)={0x2000d680, &(0x7f0000000040), &(0x7f00000000c0), &(0x7f0000000200), {0x32}, &(0x7f0000000240)=""/76, 0x4c, &(0x7f00000002c0)=""/133, &(0x7f0000000380)}, 0x58) 14:12:55 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000040)='.\x00', 0x2000003) r2 = inotify_init1(0x0) inotify_add_watch(r2, &(0x7f0000000000)='./file0\x00', 0xa4000004) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r3 = dup2(r0, r0) close_range(r3, 0xffffffffffffffff, 0x1f000000) 14:12:55 executing program 1: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\nD\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 14:12:55 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000040)='.\x00', 0x2000003) r2 = inotify_init1(0x0) inotify_add_watch(r2, &(0x7f0000000000)='./file0\x00', 0xa4000004) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r3 = dup2(r0, r0) close_range(r3, 0xffffffffffffffff, 0x3e000000) 14:12:55 executing program 7: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$TIOCPKT(r2, 0x5424, &(0x7f0000000040)) 14:12:55 executing program 5: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200), 0x4a0080, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0x2}}, './file0\x00'}) perf_event_open$cgroup(&(0x7f0000000080)={0x1, 0x80, 0x40, 0x80, 0x7, 0x1, 0x0, 0xfffffffffffffffa, 0xf23c343ea1b400af, 0xc, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x8000, 0x1, @perf_bp, 0x4800, 0x5, 0x0, 0x4, 0xfffffffffffeffff, 0x7, 0x8, 0x0, 0x4, 0x0, 0x2}, 0xffffffffffffffff, 0x8, r3, 0x5) r4 = dup3(r2, r1, 0x0) ioctl$TIOCPKT(r4, 0x5420, &(0x7f0000000040)) umount2(&(0x7f0000000180)='./file0\x00', 0x4) 14:12:55 executing program 4: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = pidfd_open(0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_SNAP_DESTROY(0xffffffffffffffff, 0x5000940f, &(0x7f0000000200)={{r0}, "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"}) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 14:12:55 executing program 2: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = dup(0xffffffffffffffff) openat(r0, &(0x7f0000000040)='./file0\x00', 0x10040, 0x8) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 14:12:55 executing program 1: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\vD\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 14:12:55 executing program 0: clone3(&(0x7f0000001200)={0xc1158d80, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 14:12:55 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000040)='.\x00', 0x2000003) r2 = inotify_init1(0x0) inotify_add_watch(r2, &(0x7f0000000000)='./file0\x00', 0xa4000004) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r3 = dup2(r0, r0) close_range(r3, 0xffffffffffffffff, 0xbf000000) 14:12:55 executing program 6: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r3 = perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x2, 0x2, 0x1, 0x7f, 0x0, 0x8, 0x10080, 0xd, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x3, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd1, 0x2, @perf_bp={&(0x7f00000000c0)}, 0x140, 0x7fff, 0x8000, 0x3, 0x28, 0xff, 0x3, 0x0, 0xffff, 0x0, 0x7}, 0xffffffffffffffff, 0xa, r0, 0x0) perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x1, 0x7, 0x1, 0x3, 0x0, 0xb0, 0x80000, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, @perf_bp={&(0x7f0000000000), 0x1}, 0x4080, 0x19f8, 0x0, 0x9, 0xfffffffffffffffd, 0x5, 0x1, 0x0, 0xb5, 0x0, 0x8}, 0x0, 0x7, r3, 0x1) dup3(r2, r1, 0x0) r4 = fork() ptrace$setopts(0x4200, r4, 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x0, 0x80, 0xa4, 0x0, 0x2, 0x7, 0x0, 0x9, 0x40006, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0xfffffffb, 0x4, @perf_config_ext={0x0, 0x6}, 0x18040, 0x7, 0x8, 0x4, 0x10000, 0xa, 0x0, 0x0, 0x3, 0x0, 0x1}, r4, 0x3, r0, 0x8) 14:12:55 executing program 5: sendmsg$NLBL_MGMT_C_LISTDEF(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080), 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x34, 0x0, 0x10, 0x70bd29, 0x25dfdbff, {}, [@NLBL_MGMT_A_IPV4ADDR={0x8, 0x7, @private=0xa010100}, @NLBL_MGMT_A_DOMAIN={0xe, 0x1, '/dev/ptmx\x00'}, @NLBL_MGMT_A_FAMILY={0x6, 0xb, 0xa}]}, 0x34}, 0x1, 0x0, 0x0, 0x810}, 0x80) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x200, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r4 = dup3(r3, r2, 0x0) ioctl$TIOCPKT(r4, 0x5420, &(0x7f0000000040)) r5 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, r5) close(r1) r6 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r7 = dup3(r6, r0, 0x0) ioctl$TIOCPKT(r7, 0x5420, &(0x7f0000000040)) ioctl$TIOCVHANGUP(r4, 0x5437, 0x0) 14:12:55 executing program 4: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {0x2c}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = syz_io_uring_complete(0x0) write$tcp_mem(r0, &(0x7f0000000200)={0xff, 0x20, 0x7f, 0x20, 0xff}, 0x48) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 14:12:55 executing program 1: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\fD\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) [ 2924.286324] kmemleak: 8 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 14:13:18 executing program 1: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\rD\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 14:13:18 executing program 4: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = request_key(&(0x7f0000000000)='big_key\x00', &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\x10\r\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\x06\xa5,\x1cE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\xd6\xb2\x9ew\x8e\x06\xda\xb8\x8f\x02\xe0\xa8$/\x05\x83\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc', 0xfffffffffffffffb) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = request_key(&(0x7f0000000240)='.dead\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\x10\r\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\x06\xa5,\x1cE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\xd6\xb2\x9ew\x8e\x06\xda\xb8\x8f\x02\xe0\xa8$/\x05\x83\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc', r0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000200)={'syz', 0x1}, 0x0, 0x0, r2) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r4 = dup3(r3, r1, 0x0) ioctl$TIOCPKT(r4, 0x5420, &(0x7f0000000040)) openat$cgroup(r4, &(0x7f0000000080)='syz1\x00', 0x200002, 0x0) 14:13:18 executing program 7: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$TIOCPKT(r2, 0x5425, &(0x7f0000000040)) 14:13:18 executing program 2: r0 = clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f00000008c0)='\x00\x00\x00\x00*\x10\xea\xa3\x92\xc4_\xf5\xdf\x8c;FkF\x1b\xb2\xa6\x12D+\xc0\x02\x00\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9ba\xf9\xf0\xc07\xa7\'m\xd4\x9bW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83\x83\x16\x00'/212, 0xfffffffffffffffe) r1 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000600)={0xa, 0x0, 0x0, @mcast2, 0x3}, 0x1c) fcntl$getownex(r1, 0x10, &(0x7f0000000040)={0x0, 0x0}) fcntl$lock(0xffffffffffffffff, 0x26, &(0x7f0000000000)={0x0, 0x1, 0x4, 0x4000009, r2}) r3 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r3, &(0x7f0000000600)={0xa, 0x0, 0x0, @mcast2, 0x3}, 0x1c) fcntl$getownex(r3, 0x10, &(0x7f0000000040)={0x0, 0x0}) fcntl$lock(0xffffffffffffffff, 0x26, &(0x7f0000000000)={0x0, 0x1, 0x4, 0x4000009, r4}) clone3(&(0x7f0000000680)={0x6408c100, &(0x7f0000000440), &(0x7f0000000480), &(0x7f00000004c0), {0x1d}, &(0x7f0000000500)=""/116, 0x74, &(0x7f0000000580)=""/150, &(0x7f0000000640)=[r2, 0x0, r0, r0, 0xffffffffffffffff, r0, 0xffffffffffffffff, r2, r0, r0], 0xa}, 0x58) r5 = fork() getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f00000007c0)={0x0}, &(0x7f0000000800)=0xc) r7 = gettid() clone3(&(0x7f0000000840)={0x2808080, &(0x7f0000000140), &(0x7f00000001c0), &(0x7f0000000180), {0x33}, &(0x7f00000009c0)=""/186, 0xba, &(0x7f0000000340)=""/211, &(0x7f0000000100)=[r4, r4, r0, r7, r6, r5, r4], 0x7}, 0x58) 14:13:18 executing program 0: clone3(&(0x7f0000000200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000040)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=0xffffffffffffffff, @ANYBLOB='\x00\x00\x00\x00 \x00\x00\x00,/file0\x00']) r1 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f00000000c0), 0x2, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r1) fcntl$dupfd(r1, 0x406, 0xffffffffffffffff) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 14:13:18 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000040)='.\x00', 0x2000003) r2 = inotify_init1(0x0) inotify_add_watch(r2, &(0x7f0000000000)='./file0\x00', 0xa4000004) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r3 = dup2(r0, r0) close_range(r3, 0xffffffffffffffff, 0xfeffffff) 14:13:18 executing program 6: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000000)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r1, @ANYBLOB='/file0\x00'/16]) r3 = open(&(0x7f0000000080)='./file0\x00', 0x1, 0x100) ioctl$TCFLSH(r3, 0x540b, 0x2) ioctl$TCSETSF(r2, 0x5404, &(0x7f0000000040)={0x3, 0xfffffffd, 0x9, 0x4, 0xc, "53751014380e0f6a8b48a72ba49ac3cf53caba"}) dup3(r1, r0, 0x0) 14:13:18 executing program 5: set_thread_area(&(0x7f0000000100)={0xff, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1}) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x5, 0x80, 0x2, 0x71, 0x1, 0x1f, 0x0, 0x4, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, @perf_config_ext={0x8, 0x930}, 0x4, 0x7, 0x80000001, 0x9, 0x0, 0x1, 0x8, 0x0, 0x6, 0x0, 0x101}, 0x0, 0x8, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r2, 0x4b63, 0x0) syncfs(r2) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r4 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f0000000600)={0xa, 0x0, 0x0, @mcast2, 0x3}, 0x1c) fcntl$getownex(r4, 0x10, &(0x7f0000000040)={0x0, 0x0}) fcntl$lock(0xffffffffffffffff, 0x26, &(0x7f0000000000)={0x0, 0x1, 0x4, 0x4000009, r5}) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xff, 0x21, 0x3, 0x3f, 0x0, 0x9, 0x80084, 0x9, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x6, 0x0, @perf_config_ext={0x2, 0x7f}, 0x2160, 0x9, 0x7ff, 0x6, 0x100000001, 0xfff, 0x1, 0x0, 0x2, 0x0, 0x9}, r5, 0x4, r0, 0x0) r6 = dup3(r3, r1, 0x0) ioctl$TIOCPKT(r6, 0x5420, &(0x7f0000000040)) 14:13:18 executing program 0: clone3(&(0x7f0000001200)={0xb619a900, 0x0, 0x0, 0x0, {0x40}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, &(0x7f0000000200)='id_resolver\x00', &(0x7f0000000240)) r1 = add_key$keyring(&(0x7f00000021c0), &(0x7f0000002200)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$setperm(0x5, r1, 0x8001400) keyctl$chown(0xb, r1, 0x0, 0x0) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000000280)={r1, 0x50, 0x30}, 0x0, &(0x7f00000004c0)="df9ba7f0a2fc1bf0f3f7ba4788e6e85acc40590778723de700f41664323fb0e4899ced0d2529ba6906bbed962b2aac677545532b14fe2ef1afa82d28f94f1c1e71ffa40cfdca49d145e1898ccbd176bd2c5cd2bca75658693a2b009cba4497d8ab2889a6d23bd0ea94cc0532c964af2fa863797992909d240bb70d947d7e18e76e2db8a6a3d5d89dc67c76acf669618cf362ea8410c20eb683ea9a99d26e1ab0aad9ece221b9a80bbcd1a42aae0282f1a9365c7011524d0bf563b6b8c689db27892332cbd4ce6c3384d6286a7968d7d04245aa4e61cb68ee59c0fdcca5fb3ba604aedf3680c4fb5f669d2e8e757b4950484d002f9eeeb878058c99af195868c16f1fc859f517785d1fe551b095778e74e672433e9c7fd6a4a9d5a646d6efbc15743259f2dd25ad86b440ed935c00"/312, &(0x7f00000002c0)="0abbd20b204556821d820cc0eb772b90fbfbffab1544d015767ba8a31eade52f6fa680000000000000001f5e5d63bf8b8ce3f6e8e93659b40877b69676d915c6bb254400"/80) 14:13:18 executing program 1: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x0eD\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 14:13:18 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000040)='.\x00', 0x2000003) r2 = inotify_init1(0x0) inotify_add_watch(r2, &(0x7f0000000000)='./file0\x00', 0xa4000004) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r3 = dup2(r0, r0) close_range(r3, 0xffffffffffffffff, 0xfffffffe) 14:13:18 executing program 5: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = dup3(r1, r0, 0x0) pread64(r2, &(0x7f0000000080)=""/97, 0x61, 0x8977) ioctl$TIOCPKT(r2, 0x5420, &(0x7f0000000040)) 14:13:18 executing program 6: connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e24, 0x8001, @private0, 0xca}, 0x1c) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x40500, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x140, 0x0, 0x0, 0x56cfd8705c475294, 0x0, 0x0, 0xfffe, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x105100, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) dup3(r1, r0, 0x0) 14:13:18 executing program 7: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$TIOCPKT(r2, 0x5427, &(0x7f0000000040)) 14:13:18 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = dup3(r1, r0, 0x0) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r3, 0x4b63, 0x0) r4 = syz_open_dev$vcsn(&(0x7f00000000c0), 0x3, 0x100002) ioctl$TIOCPKT(r4, 0x5420, &(0x7f0000000040)) r5 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r5, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000000)={0xf8, 0x19, 0xc21, 0x0, 0x0, {0xa}, [@typed={0x8, 0x0, 0x0, 0x0, @fd}, @typed={0xdb, 0x17, 0x0, 0x0, @str='\x01\x01\x0ef\xc9\x8f\xdd\xaej~t\xc3\fr\x0f\x0eI\xb9\x1cz\xaf\x82>\xe6\xd0\xd7Y\x8e\xaf\xf42\xb6L~F\x9f\xd0i\xd2l\x8e\x13\xc0/\x86\xe4\b\xdf\xd1Z\xd0\xb0\xc8\x12\x9e.\xe0\x8d\x98\xae\xfeh\xe4\x05ey\xdaIS\xe4\x82\xb1\xd1\xdf:S\xa2em]x\xab\x9a\xe1\xa24\x11w\xd4Al\xa8\x8f\x05\x017/=\x12Tj\xc2\xc7\x13\xc6\xa4\xfaqP\"\xa2\xa2\xafV\x88\xffD\x86\xe2\x1do\xc2\x86\x9a\x03\xdd\x00l\xb1\xfc\xe1(\xa8I\xdc\x92\xb6\x9e|\xe2\xedkG\x9d\'\xb1\xfa.HF\x1a\x9e7G\xde\xf6\xdf\xf4\x16x\x1a\x8a\xd2\x9euW6p2\xa8W\x97\xee>o\x90x\x84\x89\xca\x1eP\x86\x1f-T\xf4X\xd9A\xb1O#w\xd3B\xca:\xc1\xe1\v4sj\x1f\xc3a\xc0\x1bDe\xe5\xfb\xbd\xfd'}]}, 0xf8}}, 0x0) sendmsg$IPSET_CMD_GET_BYINDEX(r5, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x2c, 0xf, 0x6, 0x801, 0x0, 0x0, {0x0, 0x0, 0x2}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_INDEX={0x6, 0xb, 0x1}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4040000}, 0x80) fsmount(r2, 0x0, 0x1) clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) [ 2931.923511] netlink: 'syz-executor.2': attribute type 23 has an invalid length. 14:13:18 executing program 1: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x0fD\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) [ 2931.937555] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1551 sclass=netlink_route_socket pid=15387 comm=syz-executor.2 14:13:18 executing program 4: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) r1 = request_key(&(0x7f0000000000)='logon\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f00000002c0)='\x00\x00\x00\x00\xaa\x10\xea\xa3\x92|\xbd\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xb5 \xf4\x86l5\xb7\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\x87\xa4\x8b\x96\xd5mb\x8cjc\xb1\xda\xc8\xa5\xc3\xb4\xfaP\xf9\xc3\x15zBW\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xc6\x17yK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\x01\x80\x00\x00\x00\x00\x00\x00\xc4\x94\xc8{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\xc8\xbd\xf3\x03\xb9\xca\xe8|\x0f\xbf\x0f\xb7\x16zl\xed\x00\x0f\xbe\xc4\xef\x01\x91\xc3k\x19\x19\xa1\xaf\xda\xe4w\xb3\v\xc9\x1a\x1a:\xe1)\xffw\x00\x00\x00\x00\xdat\f{I\xc9\r\xcax\xc9\xf0\x84z:p\xf2\xe5\xc7]Y\xf4\xe8d7\xa1\xc9\t\xca*<\xd4\xbaY=~.$\xf3\x98y\xbe\x80\xce*\x98\xc6\xb8\xbe\x9bo\xe7\r=\t\xfcc\x05\x15\xb1:\x85\xc6ahb\xbd\x00\x00\x00\x00\x00\x00~4\xf0\x99\x80\x8b&\xc4\x04\a\x02Ym\x8d1\xb0\xae+\xdbI\xf5\x84\xddE\xf2\x7f+\xab\xc9\xf2\xaaS\xe1\xe8\x1b\x83\xed\xe9`\xb5\x18\x00\x00\x00\x00\x00\x00\x00\x00\x00', r0) r2 = add_key$keyring(&(0x7f00000021c0), &(0x7f0000002200)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$setperm(0x5, r2, 0x8001400) keyctl$chown(0xb, r2, 0x0, 0x0) r3 = request_key(&(0x7f0000000180)='.request_key_auth\x00', &(0x7f00000001c0)={'syz', 0x0}, &(0x7f0000000440)='\x00\x00\x00\x00\xaa\x10\xea\xa3\x92|\xbd\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xb5 \xf4\x86l5\xb7\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\x87\xa4\x8b\x96\xd5mb\x8cjc\xb1\xda\xc8\xa5\xc3\xb4\xfaP\xf9\xc3\x15zBW\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xc6\x17yK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\x01\x80\x00\x00\x00\x00\x00\x00\xc4\x94\xc8{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\xc8\xbd\xf3\x03\xb9\xca\xe8|\x0f\xbf\x0f\xb7\x16zl\xed\x00\x0f\xbe\xc4\xef\x01\x91\xc3k\x19\x19\xa1\xaf\xda\xe4w\xb3\v\xc9\x1a\x1a:\xe1)\xffw\x00\x00\x00\x00\xdat\f{I\xc9\r\xcax\xc9\xf0\x84z:p\xf2\xe5\xc7]Y\xf4\xe8d7\xa1\xc9\t\xca*<\xd4\xbaY=~.$\xf3\x98y\xbe\x80\xce*\x98\xc6\xb8\xbe\x9bo\xe7\r=\t\xfcc\x05\x15\xb1:\x85\xc6ahb\xbd\x00\x00\x00\x00\x00\x00~4\xf0\x99\x80\x8b&\xc4\x04\a\x02Ym\x8d1\xb0\xae+\xdbI\xf5\x84\xddE\xf2\x7f+\xab\xc9\xf2\xaaS\xe1\xe8\x1b\x83\xed\xe9`\xb5\x18\x00', r0) r4 = add_key$keyring(&(0x7f0000000280), &(0x7f00000005c0)={'syz', 0x0}, 0x0, 0x0, r1) keyctl$search(0xa, r3, &(0x7f0000000200)='rxrpc_s\x00', &(0x7f0000000240)={'syz', 0x2}, r4) add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, r2) 14:13:33 executing program 4: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='cifs.idmap\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 14:13:33 executing program 2: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000200)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffe) r0 = fork() ptrace$setopts(0x4200, r0, 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000040)=0x0) kcmp(r0, r1, 0x6, 0xffffffffffffffff, 0xffffffffffffffff) ptrace(0x8, r1) 14:13:33 executing program 6: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x40, 0x0) write$binfmt_elf64(r2, &(0x7f0000000180)={{0x7f, 0x45, 0x4c, 0x46, 0x1, 0x1, 0x8, 0x81, 0x2dd, 0x2, 0x3, 0x3, 0xe, 0x40, 0xcf, 0x4, 0x2, 0x38, 0x1, 0x1, 0x2, 0x6}, [{0x60000000, 0x0, 0xdd55, 0x25, 0x66, 0x5, 0x0, 0x3}, {0x6474e551, 0x1, 0x0, 0xad83, 0x80000000, 0x0, 0x401, 0x6}], "18c768dab1474bb77123dc48cec5cd212860c25e71ce71c94cdb00d6034a010345de63d2baa9de08df4c3832ea2d5b857d737037b9949b766ced7fecc6ddf5620cc0075889895fa53f652cb57cd7d624b2644f16814d84d0e900560a81e2ed8f579c74b11e65984ac5087783a48b20bf857075fceaa4d34f4e91edd5aee926156a09ac9b6de6d075d2125fe3e043a566e879a2caf078db4b25001196e2881aa47ba1268c2f8050d8525816cb0548a3e22ffc546a4f1db3e4479270640dda48bef901c428a217f7352b4a49c5", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x97c) dup3(r1, r0, 0x0) 14:13:33 executing program 1: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x11D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 14:13:33 executing program 5: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = dup3(r1, r0, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0xc) ioctl$TIOCPKT(r2, 0x5420, &(0x7f0000000040)) 14:13:33 executing program 7: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$TIOCPKT(r2, 0x5428, &(0x7f0000000040)) 14:13:33 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000040)='.\x00', 0x2000003) r2 = inotify_init1(0x0) inotify_add_watch(r2, &(0x7f0000000000)='./file0\x00', 0xa4000004) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r3 = dup2(r0, r0) close_range(r3, 0xffffffffffffffff, 0x1000000000000) 14:13:33 executing program 0: ioctl$BTRFS_IOC_RM_DEV_V2(0xffffffffffffffff, 0x5000943a, &(0x7f000000a100)={{}, 0x0, 0x2, @unused=[0x1, 0x3f8000, 0xc4, 0x8000], @subvolid=0x8001}) r0 = clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) r1 = add_key$keyring(&(0x7f00000021c0), &(0x7f0000002200)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$setperm(0x5, r1, 0x8001400) r2 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000600)={0xa, 0x0, 0x0, @mcast2, 0x3}, 0x1c) fcntl$getownex(r2, 0x10, &(0x7f0000000040)={0x0, 0x0}) fcntl$lock(0xffffffffffffffff, 0x26, &(0x7f0000000000)={0x0, 0x1, 0x4, 0x4000009, r3}) r4 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f0000000600)={0xa, 0x0, 0x0, @mcast2, 0x3}, 0x1c) fcntl$getownex(r4, 0x10, &(0x7f0000000040)={0x0, 0x0}) fcntl$lock(0xffffffffffffffff, 0x26, &(0x7f0000000000)={0x0, 0x1, 0x4, 0x4000009, r5}) recvmmsg$unix(0xffffffffffffffff, &(0x7f0000001940)=[{{&(0x7f0000000540)=@abs, 0x6e, &(0x7f0000000600)=[{&(0x7f00000005c0)=""/12, 0xc}, {&(0x7f0000002240)=""/4096, 0x1000}], 0x2, &(0x7f0000000640)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c, 0x1, 0x2, {0x0}}}, @cred={{0x1c}}], 0x80}}, {{&(0x7f00000006c0)=@abs, 0x6e, &(0x7f0000000b80)=[{&(0x7f0000000740)=""/228, 0xe4}, {&(0x7f0000000840)=""/103, 0x67}, {&(0x7f0000003240)=""/4096, 0x1000}, {&(0x7f0000004240)=""/4096, 0x1000}, {&(0x7f00000008c0)=""/169, 0xa9}, {&(0x7f0000000980)=""/102, 0x66}, {&(0x7f0000000a00)=""/246, 0xf6}, {&(0x7f0000000b00)=""/32, 0x20}, {&(0x7f0000000b40)=""/50, 0x32}], 0x9}}, {{0x0, 0x0, &(0x7f0000000e80)=[{&(0x7f0000000c40)=""/111, 0x6f}, {&(0x7f0000000cc0)=""/244, 0xf4}, {&(0x7f0000000dc0)=""/109, 0x6d}, {&(0x7f0000000e40)=""/15, 0xf}], 0x4, &(0x7f0000000ec0)=[@rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x58}}, {{0x0, 0x0, &(0x7f0000001000)=[{&(0x7f0000000f40)=""/156, 0x9c}], 0x1}}, {{&(0x7f0000001040)=@abs, 0x6e, &(0x7f0000001400)=[{&(0x7f00000010c0)=""/179, 0xb3}, {&(0x7f0000001180)=""/67, 0x43}, {&(0x7f0000001280)=""/143, 0x8f}, {&(0x7f0000001340)=""/181, 0xb5}], 0x4, &(0x7f0000001440)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x38, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x118}}, {{&(0x7f0000001580)=@abs, 0x6e, &(0x7f0000001680)=[{&(0x7f0000001600)=""/77, 0x4d}], 0x1, &(0x7f00000016c0)=[@rights={{0x38, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x58}}, {{&(0x7f0000001740), 0x6e, &(0x7f0000001900)=[{&(0x7f00000017c0)=""/187, 0xbb}, {&(0x7f0000001880)=""/2, 0x2}, {&(0x7f00000018c0)=""/3, 0x3}], 0x3}}], 0x7, 0x40000000, &(0x7f0000001b00)={0x0, 0x989680}) recvmsg$unix(0xffffffffffffffff, &(0x7f0000001d00)={0x0, 0x0, &(0x7f0000001c40)=[{&(0x7f0000001b40)=""/152, 0x98}, {&(0x7f0000001c00)=""/21, 0x15}], 0x2, &(0x7f0000001c80)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c, 0x1, 0x2, {0x0}}}, @cred={{0x1c}}], 0x78}, 0x0) recvmmsg$unix(0xffffffffffffffff, &(0x7f0000008d00)=[{{&(0x7f0000001d80), 0x6e, &(0x7f0000005240)=[{&(0x7f0000001e00)=""/41, 0x29}, {&(0x7f0000001e40)=""/150, 0x96}, {&(0x7f0000001f00)=""/40, 0x28}, {&(0x7f0000001f40)=""/117, 0x75}, {&(0x7f0000001fc0)=""/238, 0xfffffdb6}, {&(0x7f00000020c0)=""/245, 0xf5}], 0x6, &(0x7f00000052c0)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f0000005300), 0x6e, &(0x7f0000005400)=[{&(0x7f0000005380)=""/115, 0x73}], 0x1}}, {{&(0x7f0000005440), 0x6e, &(0x7f0000005580)=[{&(0x7f00000054c0)=""/183, 0xb7}], 0x1, &(0x7f00000055c0)=[@rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xa8}}, {{&(0x7f0000005680)=@abs, 0x6e, &(0x7f0000005700)=[{&(0x7f0000009100)=""/4096}, {&(0x7f0000005880)=""/126}], 0x0, &(0x7f0000005740)=[@cred={{0x1c}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}], 0x90}}, {{&(0x7f0000005800)=@abs, 0x6e, &(0x7f0000005b00)=[{&(0x7f0000009040)=""/185, 0xb9}, {&(0x7f0000005940)=""/47, 0x2f}, {&(0x7f0000005980)=""/10, 0xa}, {&(0x7f00000059c0)=""/83, 0x53}, {&(0x7f0000005a40)=""/6, 0x6}, {&(0x7f0000005a80)=""/77, 0x4d}], 0x6, &(0x7f0000005b80)=[@cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0x80}}, {{&(0x7f0000005c00), 0x6e, &(0x7f0000008080)=[{&(0x7f0000005c80)=""/217, 0xd9}, {&(0x7f0000005d80)=""/83, 0x53}, {&(0x7f0000005e00)=""/4096, 0x1000}, {&(0x7f0000006e00)=""/191, 0xbf}, {&(0x7f0000006ec0)=""/4096, 0x1000}, {&(0x7f0000007ec0)=""/147, 0x93}, {&(0x7f0000007f80)=""/151, 0x97}, {&(0x7f0000008040)=""/50, 0x32}], 0x8, &(0x7f0000008100)=[@rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x48}}, {{&(0x7f0000008180)=@abs, 0x6e, &(0x7f00000082c0)=[{&(0x7f0000008200)=""/159, 0x9f}], 0x1, &(0x7f0000008300)=[@cred={{0x1c}}], 0x20}}, {{&(0x7f0000008340), 0x6e, &(0x7f0000008480)=[{&(0x7f00000083c0)=""/140, 0x8c}], 0x1}}, {{&(0x7f00000084c0)=@abs, 0x6e, &(0x7f00000088c0)=[{&(0x7f0000008540)=""/17, 0x11}, {&(0x7f0000008580)=""/223, 0xea}, {&(0x7f0000008680)=""/99, 0x63}, {&(0x7f0000008700)=""/225, 0xe1}, {&(0x7f0000008800)=""/138, 0x8a}], 0x5, &(0x7f0000008940)=[@cred={{0x1c}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0xd8}}, {{&(0x7f0000008a40), 0x6e, &(0x7f0000008c80)=[{&(0x7f0000008ac0)=""/207, 0xcf}, {&(0x7f0000008bc0)=""/19, 0x13}, {&(0x7f0000008c00)=""/90, 0x5a}], 0x3, &(0x7f0000008cc0)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x30}}], 0xa, 0x10020, &(0x7f0000008f80)={0x0, 0x3938700}) clone3(&(0x7f0000008fc0)={0x2b4880180, &(0x7f0000000380), &(0x7f00000003c0), &(0x7f0000000400), {0x22}, &(0x7f000000b100)=""/92, 0x5c, &(0x7f00000004c0)=""/88, &(0x7f0000000440)=[r3, r0, r5, r6, r6, r7], 0x6, {r8}}, 0x76) keyctl$chown(0xb, r1, 0x0, 0x0) request_key(&(0x7f0000000200)='keyring\x00', &(0x7f0000000240)={'syz', 0x2}, &(0x7f0000000280)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', r1) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f0000000040)='keyring\x00', &(0x7f00000000c0)=@secondary) 14:13:33 executing program 4: clone3(&(0x7f0000000200)={0x88119d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000400)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xf6\xce\xcf w\xc6\ne+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\"\x01\x00\x00\x00\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16Wfj\xd7\xd5^1ys\x8c!\xb1\x83\xab~\r\xc1\xadZ]\xe2:\aY\x8d=\xd8>\x1b\xc8=\xb3\x89\xdcoB%\xbd\xb1\x9e\xe3\xce\xfa\xb0\xe3\xac\x15\x12\xceC\xe4=t1\xd0\xc4\xa7%\xe1\x00\x8f3\xc0Zu\xddh-\xa8W\x8a\xc3\x9c4\xb4zsY\xe5\x93\xf2\xd2\x9c\xa6\xf8\xac\x96~\x0e\x0e\xa3\xb5Tu\xf6\x89\x1f\xbe\xd0\xdfvV\xbc\x8bx9\xfb\x17\x96\xe4\xdbr\x8b\xecP\x9d\f\xdfD\x1a\x7f\x16\x98\x1a\x84\x81\xa8\xe6\x06\xabr\x02\x15!\x12D\x96N\x86\xdf\xc9G\xa8\xa2\xe0\xca8V\xc0+\xec\x02\x1b\xf2Z\x9a\xad\xfeK\xee\xbf\xd2i\xd4\x84:{\xcdz81X\x19\n\b\x19/|a\x9b\x14\xbe.\xfchHw^\x17av\r\xb3\xc8T\x05=P\x96\x11!oU\t\xefhG\x8c\x9di\xa5\x97\x7f\b\x9a\xdd|\xb0\x06\x98\xe9\xf0\x84\xf3\xe5\xcf\xb2)G\xf3\xf3\xf8\x11\x1c\xbd\xdc\xa5\x8f\xea\xbd\xec\xca\x98\xcc\xc9\xf8?&\x8b\x9b \xf1z&\xca\x18\x84%\x91~K\xb3W\xdd\x92\x82\xe3<\f\xed\x80\bm{\xbd\x1bq\xf2\x88\v\xb3Q\xcb\x9e>\xfaVG\xa2iW\x9c\xf8\f\xc2\xe5`\x8c\x19U*\\c\x9c$I\xa9d\xd3\xae=+\xf1{~-3\xc9\xbd\xd7\x1c\x85U\x94)\x01\xa5\x9a\xb5\xc5\"\xc1\xdaB\xd1$M\xfb\xff\x80\xaa\x97\xf9\xd5\xf6\x13\x85\xdeF,:\xea\xed\xaa\xd9S;|\x9e', 0xfffffffffffffffb) 14:13:33 executing program 1: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x12D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 14:13:34 executing program 7: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$TIOCPKT(r2, 0x5429, &(0x7f0000000040)) 14:13:34 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r0, 0x4b63, 0x0) write$binfmt_script(r0, &(0x7f0000000200)={'#! ', './file0', [{0x20, '\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16'}, {0x20, 'batadv_slave_1\x00'}, {0x20, 'dns_resolver\x00'}, {0x20, '(\xd6#\x98!(}'}, {0x20, '--/'}, {0x20, '/dev/ptmx\x00'}, {0x20, '/dev/ptmx\x00'}], 0xa, "94f6f3e31b43a262cd07eaa3937ef1516456f94eb4877dd0543991c6d7894e82ff3bc03b8e66219632b67f6d7fc2ee479d64684ca1d7cdea2c717b23a07035a0ee07c39d3e6b87f7f067891ef12416c33d4b31fd622196d58a9e1ff92af4628f701120da0cc9ce13675dda2140d56e6f4038135c24175b0cb1a3f92383a38ccb58c9722907c0775a85658259203d5aac82ff13ab816d1eba8a4bb01a802bcf9b9e4d7ad47cec1750559c5821157125497b3e2886e59949c721a3211ed898b175582c66005dbc09c4a5a31314cf59aa69a3691c4232eb3560633c0c5a31"}, 0x1f4) clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) socket$inet6_udplite(0xa, 0x2, 0x88) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r4 = dup3(r3, r2, 0x0) ioctl$TIOCPKT(r4, 0x5420, &(0x7f0000000040)) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r4, 0xc018937e, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, @in_args={0x4}}, './file0\x00'}) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f0000000040)={'batadv_slave_1\x00'}) 14:13:34 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000040)='.\x00', 0x2000003) r2 = inotify_init1(0x0) inotify_add_watch(r2, &(0x7f0000000000)='./file0\x00', 0xa4000004) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r3 = dup2(r0, r0) close_range(r3, 0xffffffffffffffff, 0x2000000000000) 14:13:34 executing program 5: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080)={0x0}, &(0x7f00000000c0)=0xc) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) fallocate(r1, 0x50, 0x7, 0x5) ioctl$VT_RESIZE(r2, 0x4b63, 0x0) ioctl$TIOCSTI(r2, 0x5412, &(0x7f0000000000)=0x6) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r4 = dup3(r3, r1, 0x0) ioctl$TIOCPKT(r4, 0x5420, &(0x7f0000000040)) [ 2960.967388] kmemleak: 3 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 14:13:54 executing program 2: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = syz_io_uring_setup(0x2, &(0x7f0000000500), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000040)=0x0, &(0x7f0000000140)=0x0) r3 = io_uring_setup(0x3de1, &(0x7f0000000200)) r4 = eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(r0, 0x4, &(0x7f0000000000)=r4, 0x1) syz_io_uring_setup(0x3ad, &(0x7f0000000180), &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x0, 0x0) r5 = dup2(r3, r4) r6 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r7 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r8 = dup3(r7, r6, 0x0) ioctl$TIOCPKT(r8, 0x5420, &(0x7f0000000040)) openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) r9 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x6) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x2, 0x1f012, r9, 0x0) r10 = io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f00000001c0)=@IORING_OP_WRITE_FIXED={0x5, 0x3, 0x4007, @fd=r9, 0x9, 0x7, 0x3ff, 0x1e, 0x0, {0x3, r10}}, 0x0) syz_io_uring_submit(r1, r2, &(0x7f00000000c0)=@IORING_OP_SYNC_FILE_RANGE={0x8, 0x5, 0x0, @fd, 0x6, 0x0, 0x2, 0x2, 0x1, {0x0, r10}}, 0x0) r11 = dup2(r0, r5) io_uring_enter(r11, 0x1739, 0x0, 0x0, 0x0, 0x0) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 14:13:54 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000040)='.\x00', 0x2000003) r2 = inotify_init1(0x0) inotify_add_watch(r2, &(0x7f0000000000)='./file0\x00', 0xa4000004) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r3 = dup2(r0, r0) close_range(r3, 0xffffffffffffffff, 0x20000000000000) 14:13:54 executing program 4: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = accept4(0xffffffffffffffff, &(0x7f0000000200)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000000040)=0x80, 0xc00) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r0, &(0x7f00000000c0)={0x10000000}) fcntl$setsig(r0, 0xa, 0x16) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 14:13:54 executing program 1: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x14D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 14:13:54 executing program 7: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$TIOCPKT(r2, 0x5437, &(0x7f0000000040)) 14:13:54 executing program 5: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$TIOCPKT(r2, 0x5420, &(0x7f0000000040)) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) ioctl$BTRFS_IOC_START_SYNC(r3, 0x80089418, &(0x7f0000000000)) 14:13:54 executing program 6: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r1, 0x4b63, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f0000000180)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000009640)={0x0, ""/256, 0x0}) mq_timedsend(0xffffffffffffffff, &(0x7f0000001200), 0x0, 0x3, &(0x7f00000012c0)) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, &(0x7f000000aa40)={0x0, 0x0, "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", "7374bf600a2dbb0a10a4446998c60bc654676f080ecee8672b9b990319e9f34b4c45be9b1cbb8fbe1f4541599e2a8deeedad6067575d671432b4ba4028542704ab850b2cd326bd5a16431e3e06cbefba068d34f999e863befaed31fe2f898bdfe4043148f4d1cc27af274cc202dd9cd92b1891ba85c4048baa5cf0aa7a3d5dbef19adb89a7123a5c5cf1f42650df4c63aa25c0c5f606a072b8c1910206999409a39439cacd824f129adb4177e14f533050e77cfd6b9e760c12899b047feb4c8e5b746e5570db48fc8fafeccf98bad6d99a585091b403666ded97ce43cdf6dd1791052bc149861ea2585dfb28b538cc9fe6ffc5e07182615951fd668085ed124af574a07e3495491f19b1aa2a3b69028ccacd78524d988b224ab17ed905da0b840b4a9939e2af6efdf4221126075a8964d904883db014031e0924681a4ef3795071b256b75002a7df298c87c565b1d8a331e7d0c1000e1d707100917dfe107f87ebea9dca1b708b01cacf1c9f348c0d0fd64aa64193637c7169264d06f613c41be60f39b0cc9d813ae5fca2222832f86f2ae87e883efd48df36d16e6c1ca5c378f6ff0fbace91eb3099d744b16171fcc1ab7d5456392f0878ecf27e8caad7386663de490c3044eed7e7cb83e675716eda0cc09f219aadddd814c88048a7c6cefe69a79f2f7a234cfffbf19ac7a9f6ef59faf2776ac3d636904ec1bda09b1c9d8caeafa918983215d866f5cb6f1088e7e99a43425913d258a3dc8550fcbca3e0bec47503e24d709dd1fd1bb3cd92837d10387a0eebb98aab27950a2a66dc0b9bad3e4ef6393036d64949931ffe6479073790b3b885ac8563d4018e9227d644864c17f048daefbb192d15b56a2a440ad6d4ef5af2ac9904d8b69c64d2368928d7595594e6c3fd23229cb6aa80ec308301b1c94777900d34b1b3eea03dca765036a3f5351551affb585f22541074380b60ca062bf8a8a2324fe61ecad5733aec51e0c5ddc648280556b8a038b5816947b1637ef598cfd134cf9833d875fd23d22f5f74e74a4634d50a3ac908eed128f4297924296d95361b9504c08df4a0603eff93ee34bd45ed12e8d06b8f399fefef4ced732aad15b70f3e276101fa4b5a5c17435d0999b3345ccfe853c955e8b7927c7a171506b8e5b4de8a68cb5e80c3709a0e15643b5772d82d04859133e09fa8ab81ac042e67bc918f2847af14a4eb77c3fcac3132ec1af5a57d85acb9ce91d9d15019904396737ade63df938e6f054f8ee21e8994d45b0801ccd8ae8bda90128cb05eddd297d800412bc01fc5cfdfa9d473641fffc793b513da3f7565a27c4ff3678ac6f71560cc6cc95fb4d20f85b7934cb4a4f614182d331ab53b6a09ff47fc272b6c1f5aaca477bfdfed3fac942d639773b7a5656c526eb595d6fa9d301c425947f37088447cb4400c37750b76eb6c1f7933e43b27224c2fdc053e55125d00ab11428af674f58bd5c3ea1ce4762856afccbd37dd59a5e726f2e5e770bcc8372304fc2a33611234e3b0d411fcae8691e621b64581dc32b3d97c02920877b2c995018dcfff2da8687bc64332cffc3d355931561dc799d169f61d121f242dd3605e3fef8a46bf73998202d6a87671719896c61d729006104bdb7e926020f28260c75c2c754e5f073097d7031567e62cbfcbff541702cdaf498bbfe01e2948e6e164271ca4ab4df68a1569d29d3ce7029c0b58d2a1e6d179fa817ec9df17195c8b83a7a7508f18f0e3d07e8871f331d7a151bc11301c7dce402e6a5fda6f3096df2ddfeb48b3991e055c55d2a071ed66bf378e5c451f849cdbd7951cacad16d6b5734b71db866e77086bfab1797942633ec688d78bb2fccaae2b0e796b852b278bd4a4648d0811293e1bfe68e30b42eb27ac0a4e435e086b4cfeeb9fa539f0d800b6108e4c7b9d7237746770a3f3477646b7c9bfd2bc111679d40bffe221be492ba984df6cd4d7d8f9cbf7185e79804416be68d8a2bfa28e5bec4b57bf5f08eeecafabccd55744e49bb4a7dd1324908d91762b9884e7268d0bb6290be3b51091ae6ccf2ebbd4945dd7913bd38509a00ce38d955909bfa1f3740fc123a12e15b853b59b9b691460afdcda150d39e566a83eaa0c3b7bac9819bdbc7e0a620206be87ff2f8ea8091dbffa014d2f2eb919040a434cdeb3db68adf845d2ba751dc0e1ce4afd8672a5ecf0653b8c672c3265aa236a174185f4b4a291bda664bb79c13f8b6932a831385773898d194d2500b38fbfff8c4acafa5a80dfd3f1f906132885446f9f7ad787dbbdab593661ab1c255df879eaf4ca739deaa11379a5c6b650472257fa54b646b29ceb3dbe27e3584914f9f766bbbcc67abeffebb0df881a42b8671bba930b04d1d7710cc15d546ee69ad40e66f04eb28af8bd17b739e68ad75a239303fb97b18f8f08d2f95bdae0f245ebdfc3ecf555a6fd53f5a35af8b2dd016b227d209fc8323a7576e66a9913a0ad4f19d30d2b6f25ac8b5b6c762e2c68c76f9bd7818adbb3c9b194c09471482ec6898754469076b8674ab9e26b5977a0fa693160f18a01d2f2c362186ff75c205cec261d9e6c431ee672e4056b7e458ef02dca1167d09de5977210461758ed506290477a63c5af0698a1f4edf3bc569692bc9febd5fd641860dd34a6926af47ae7bdd3cce59a5b24b6944075e30ec2f2dbd043ebc57a39eaa5559bc4f21f08198e0daa2e8506b21160c8f9b629ad0e80d5e99e5cf4c4ceefb8d9fe5493ebcb066a647269fef2146f1ed55dac66974446e650e49db26ceb24c16c24885a2d2d011d11ec52d5b7a9c8096314d1dc7c992a1dee70be2fc0cc2d9fc94b0d02d479f6f4bfd3fa20df42568e27c0cea6caa1028d5dfbe6a9657053c06132387f9abfbaf93d9b335b69b168bf7fdaa0a44981dadc3358b50f1b24d390f8858d6775fa838388ff8a69b02bf446028485ba9e0c15731288c186b3cdf2fbc088f13f50e5eecc9b3a058d1369b7a254f11aa81a5fabd862bfd5226ce26e0199ef241badd55ba0d6087e9eb1661111a6afef1caf2bd54832bb5a3e8b864c8af220a8a115746c1646e78471ba2edb7c63fcff7f6be047a5f740525fbe5e259beee146dc2a609d3fd576e826ee1e4fce8ccbf75aa713514bda04ed4086cdd11a770cbe5782bca23f5f3ad8682609d5c5d4e5ca4e117d7423740b41081c6945b446223bb435c6ae2314552b7bf53a8b2c8a7a2a961d17315e0f7a660624b119c89ae81d2214b03cd79bc3eb355bf06811d7186b1f0a7219dd8d4096cb0df940719279357b853bc7c5bcf645aa65c12227859ce0851953fcefa6051f2a31e3666abde9ef1ece3eba658de696edf5d87a7d562dfe1f6bb9ac5e6773bc9069c732683715868cf14825345fb60665982549b9bb7c5b7d934ed0c4d136fa089f8459d473bf1ee678cf88c26f4f5ac681aa6dbe6ef78c26e7a3649ae0574f550f9fc64e8caa14586cbc43d8ec72a3170fc4f6c78fdbd40332c1f35adfc04be68a067f2c03325d624e21fa0e1fa6ea879caa84665bedefcd19759872824a0053a110af2b6099d8ea572b0c81cea39147bb2dca0eaefd4be8c3b59b98c27049f04ae5f3652ade0e1561238296d17979581b93d0ee26464fb5675b968cbc397558207fb1d5365f73994c0c8f2bcae0164e74d602a4856355b214af58b6357b2505779260ec73929eb4fe1047bbc2a125ff6c88718d2b8b8fb9c0d1cb1760748ffc5e4998dbaf8fad99df26b2eaf99bce2541d287b243d7b9cf0ecb25588d14c6228a6cb5413f48e3d07817d258c45ca0ab3494ca5b59f87abdf38e439b4a31d60d9474a52e465f36dd0cd56f00d4e5e563bfc6421b40a7522eb71894a698c19510fa7dc690b6b3f782d88e61ca635d5efd4c9c1725dbf24e0c8e246a2dc979e4750de8347687038f0441858bdf5a06bcba827d8d1327601943ca9fd004c121034fa6e1c8b9eff5da764961f5700eab97380e99b37f302239b528b36f5c9bbebaff25edae48fbe59dd272099af5c695a19b62f64485ba01ae8416c02f04360be933b8ba8a49c6c1188a78c3d36d0c61f61b4002bfeb669e29bbcb306f573528a749b085500c7649aea469fca867da4ca9eaecc75a70f41baeb80bf803402a9066dc1e8243192b78533e0ad590e14fd2bf2ce3ac943ade1fcefd247406785ee387d18e9afe8845481748fbadf4d081e01ecce50ef1fc5b457fa296b833d77390764e2af12f7930c6334476dc4cf45d9f272e364336810c11318bd0a95233005d66fe81a5708ae5fad8c7db17e6d97d2340651f7aa7a36e132a77a7a6206b36a95ccb5a48cb19bd3bb886ff0e77bc76653912149ca85895c4f80c373cbbd4305a91213e8ec5b7b18d8587d723c18f02854556aaaa540935eab2b7470a7c1c40c7e843ac1221a51e92eb05af2342fea7c853a46182c8384612aadb40145b95de565140003468eaca74b38bdf4dc640d0af80c3dd81747652c5fe15ffff8965a150a4ca6a9d9c91d067b4fac49b23cd2041dfdab22126c97d812b67ed638cc65d75d836bf439807cd7cd3cd0e6b30c81983e3f45a00282a14d401d81ac7c5544510dc7d157eeaa18b09df5ec949a22d7342b5b720b2a47251e995410f9b35d90824c1b19beb8575c9efe2aaa2a2011790a1099a924c01ca835fb7cc561eb2310a5331d4d9c4a9ee03a5f1364c17a7f4511c0c1b929c630cc110696f9e94b4107d0b75338fda2c5e0b8d46d19b98071e328f57debd56b4a0a9009913ac41518a08e6fa533edf20db0dc5eff43cd3ead623fc826ac03925490537d6b6a47f27031faa17f9852a3cb72d2088f33d35846a40758e60dab4b3980d032adc3e4faa61ff8aaea6b08bc9705cf097701e9af550fa43ec06c0ae2257927eebcbbbf4a05ad8097597943d6aed8a950ba32bc0d19827539019397e2fffa5f7379ffd7ec266f0c1cd947aab0c9e73c2796bd4c32fa0a0effbc84570efdebd3ac1eb57cc89cdbed91ed43a64cccfeba427a017a07d84acc850a45e2f26639598ed061ea81b60fb1873983591d446129ba8b27a4aef3311292017e3cbc00533824888ef80ef1a85c86a370dc11694d2f455e04ceb8811afa53aac77c65b38703d18167aedcc077c988dd9832ee1999a82c8752b921bceae484c19cee6828eef373c979b5c3f208080c8dcb38c53e384bebed6c41c3b9d6958bd2b952d82d17b262dbf30f90ab5c5d197ccee9f6b6525928b0100ffdeace644e159500495ff5a0ea7df7b9ab63617e3879818e25341e97d839beefdf248222cadd61a5d76b1ff34704bb78656afef7994904da269f973598217edc3be93157185aa15ef225f6471d7786a5e28d0f145b96566e101bf46723486867b9aa90f9eb4d1f5612d4950160c1504a367daf984"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000007d440)={0x9, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r5}, {}, {}, {}, {}, {r6}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r7}], 0x0, "46dacd8396fe92"}) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, &(0x7f0000000100)={r5, 0x1000}) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, &(0x7f0000000200)={0x0, r5, "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", "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"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000007640)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x4, "9755154351ac9a"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000009640)={0x0, ""/256, 0x0}) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, &(0x7f000000aa40)={0x0, 0x0, "c009b39830e4109622d7a29d0bd42e6d365c8384f665a2104b6faaa5427626b93311e77f0de4211e1217bc355a5246327eb7ba126bf7e4adb45535a4d9757c77f555e42c9254e9f9089be590271f821f5f6b632da2dabf1d6e618629da57a34a33f5e913338e628f32d84f60dbb9f94b70f1828e7d652bb2443c02901738d15cd72d14288f0d47dfe96e49988d0402f96628f97be361723e018daf71ab695fa4726664c00ec9aa53b8c092760da4cd088f03fad6504eceb8949dc35abc6c9f51916777bc38aa3669fb220546dbd1024eb87da205b46ec35180a8fcb898160855b5044023da75f2b1f285c1462a8afa95492a14be3f42052ff535612d226506a0", "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"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000007d440)={0x9, [{}, {}, {0x0, r10}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r9}, {}, {}, {}, {r11}, {}, {}, {}, {}, {r12}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r13}], 0x0, "46dacd8396fe92"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000049c40)={0x80000001, [{r3}, {}, {}, {0x0, r4}, {r3}, {r3}, {r2, r4}, {0x0, r4}, {r3}, {}, {}, {0x0, r4}, {r2, r4}, {}, {r2}, {}, {r3, r4}, {r3}, {r3}, {r3}, {0x0, r4}, {}, {r2}, {r3, r4}, {}, {0x0, r4}, {0x0, r4}, {r3, r4}, {r3, r4}, {}, {0x0, r4}, {0x0, r4}, {r2, r4}, {}, {}, {r3, r4}, {r2}, {0x0, r4}, {r2, r4}, {0x0, r4}, {}, {r2, r4}, {r3, r4}, {}, {0x0, r4}, {}, {0x0, r4}, {r3}, {}, {0x0, r4}, {r2}, {0x0, r4}, {r3}, {}, {0x0, r4}, {r3, r4}, {r2}, {r2}, {}, {r3, r4}, {r2}, {r2}, {r3}, {r2}, {}, {}, {}, {0x0, r4}, {0x0, r4}, {0x0, r4}, {r2}, {r2}, {0x0, r4}, {0x0, r4}, {}, {r3}, {0x0, r4}, {r3, r4}, {r3}, {r2, r4}, {r2, r4}, {0x0, r4}, {0x0, r4}, {}, {0x0, r4}, {}, {0x0, r4}, {}, {r3, r4}, {0x0, r4}, {r3, r4}, {}, {0x0, r4}, {r3, r4}, {}, {r3, r4}, {0x0, r4}, {}, {}, {0x0, r4}, {}, {0x0, r4}, {r3}, {}, {0x0, r4}, {0x0, r4}, {r2, r4}, {0x0, r4}, {0x0, r4}, {}, {}, {0x0, r4}, {}, {}, {r3, r4}, {0x0, r4}, {0x0, r4}, {r3}, {0x0, r4}, {r2}, {}, {}, {r3, r4}, {r2}, {0x0, r4}, {r2, r4}, {r3, r4}, {r2}, {}, {r3}, {}, {r2, r4}, {}, {}, {0x0, r4}, {r2}, {r2, r4}, {0x0, r4}, {}, {r2}, {}, {0x0, r4}, {0x0, r4}, {0x0, r4}, {r3}, {r2, r4}, {r2}, {r2}, {}, {r3}, {}, {0x0, r4}, {r2}, {r2}, {r3, r4}, {r3}, {r3}, {r2}, {r3, r4}, {r3}, {0x0, r4}, {r2}, {r3, r4}, {r3}, {r3, r4}, {}, {}, {0x0, r4}, {r2, r4}, {0x0, r4}, {0x0, r4}, {}, {r3}, {r2, r4}, {}, {r2, r4}, {}, {r2, r4}, {r3}, {}, {0x0, r4}, {0x0, r4}, {0x0, r4}, {r2}, {0x0, r4}, {0x0, r4}, {r2}, {r2}, {}, {r3, r4}, {r3, r4}, {0x0, r4}, {0x0, r4}, {0x0, r4}, {}, {}, {}, {}, {r2}, {}, {0x0, r4}, {r2, r4}, {}, {0x0, r4}, {0x0, r4}, {}, {}, {r2, r4}, {}, {r2}, {}, {r3, r4}, {r2, r4}, {r2}, {0x0, r4}, {0x0, r4}, {}, {r3, r4}, {}, {}, {}, {r3}, {}, {0x0, r4}, {}, {0x0, r4}, {0x0, r4}, {r3, r4}, {}, {0x0, r4}, {}, {}, {}, {0x0, r4}, {r3}, {r3}, {r3}, {r2}, {0x0, r4}, {}, {0x0, r4}, {}, {0x0, r4}, {}, {0x0, r4}, {r3}, {}, {}, {r2, r4}, {r2}, {}, {}, {r3, r4}, {}, {r11, r4}], 0xb4, "143add4f5e2ac1"}) r14 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) dup3(r14, r0, 0x0) 14:13:54 executing program 0: io_uring_enter(0xffffffffffffffff, 0x36f1, 0xbaff, 0x2, &(0x7f0000000240)={[0x8]}, 0x8) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280), 0x101000, 0x0) r1 = dup3(0xffffffffffffffff, r0, 0x0) ioctl$TIOCSPTLCK(r1, 0x40045431, &(0x7f00000002c0)=0x1) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000040)) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x2, 0x20010, r1, 0x0) io_uring_enter(r1, 0x5069, 0x40e7, 0x0, &(0x7f00000000c0)={[0x80e]}, 0x8) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r4 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCPKT(r4, 0x5420, &(0x7f0000000040)) mmap$IORING_OFF_SQES(&(0x7f0000ffa000/0x2000)=nil, 0x2000, 0x8, 0x4000010, r4, 0x10000000) r5 = dup3(r3, r2, 0x0) ioctl$TIOCPKT(r5, 0x5420, &(0x7f0000000040)) clone3(&(0x7f0000001200)={0x20008000, 0x0, 0x0, 0x0, {0x24}, 0x0, 0x0, 0x0, 0x0, 0x0, {r5}}, 0xad) ioctl$TCXONC(r1, 0x540a, 0x3) r6 = openat$cgroup_ro(r1, &(0x7f0000000300)='memory.current\x00', 0x0, 0x0) openat$cgroup_subtree(r6, &(0x7f0000000340), 0x2, 0x0) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) ioctl$sock_SIOCDELDLCI(0xffffffffffffffff, 0x8981, &(0x7f0000000200)={'macvlan0\x00', 0x3}) 14:13:54 executing program 2: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffff9) r1 = request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', r0) request_key(&(0x7f0000000040)='rxrpc\x00', &(0x7f00000000c0)={'syz', 0x2}, &(0x7f0000000200)='\x00', r1) 14:13:54 executing program 1: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp/D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 14:13:54 executing program 5: syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000000), 0xffffffffffffffff) r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x8, 0x1f, 0x20, 0x6, 0x0, 0x8, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x1, @perf_config_ext={0x5, 0x6036}, 0x4e2, 0xffffffffffffff00, 0x3f, 0x6, 0x6da, 0x400, 0x1, 0x0, 0x3, 0x0, 0x1}, 0x0, 0x10, r0, 0x1) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x3335c1, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r3 = dup3(r2, r1, 0x0) ioctl$TIOCPKT(r3, 0x5420, &(0x7f0000000040)) 14:13:54 executing program 4: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x2000001, 0x10010, 0xffffffffffffffff, 0x8000000) r1 = mmap$IORING_OFF_SQES(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x30, 0xffffffffffffffff, 0x10000000) syz_io_uring_submit(r0, r1, &(0x7f0000000100)=@IORING_OP_TIMEOUT_REMOVE={0xc, 0x5, 0x0, 0x0, 0x0, 0x12345, 0x0, 0x0, 0x1}, 0x9) request_key(&(0x7f0000000000)='.dead\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000300)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa\x9cyK\x98\x96\a\xdd\x1dF0\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16\x00\x00\x00\x00\x00\x00\x00\xadq\x86:\x84\xb0\xa5%\xcb\xd2]\xb2\xcc\xb3\xc8\xf9\x14\x98\x17L\xaf\x98+\xdd\xe8 zL1\xf1\x96\xfa\xa1[\xa4C\xacZu\xb7.^l\x8f]\x14Iy\xa93\x1f\xf8*\x9a\xb5\xa0VU\x8f`\xcb\xb1\xe8\xeb1\xdac\xdd\x9dP\x95\x87\xee\xd0\x95PSH\x8c\xea\xed\xa9\xab\x84\x17\xfcA\xf8\x0e\xb6\x9d\xcf\xb6\xe4\xa0\x183\\\xa3r\xb5=\"\xea|\xf8G\x9dq\x85\xf9\x88\x03I_\xf4\xd3/\xf9\x8c?A\x85\xc8N`\xef\xe0\xeb\x8fl|o\x14\xf7\x9b4gd\x82\xa8\xf9z\fAX\xf2W\xb80\x1b\xdek\x84\x05x\x05\xb5\xe8\x8c\xdd\x18\xeb\xe0\x108Y\b\xe4\xddg\x117+l\t\x1db\x00\xf3\xe1>\xc0\xb7\x97F\"\xc0\xa3\xf57\x16i\xacxA\x1dBV\xc9B\xc2\xfb\x86\x00\x00', 0xfffffffffffffffb) add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffff8) r2 = syz_open_dev$vcsa(&(0x7f0000000140), 0x4, 0xe5d33ef387d23ce1) r3 = socket$inet(0x2, 0x3, 0xff) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) sendmsg$inet(r3, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000280)="b683ae7d0000000000000000000000000000000200000000", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r5, @broadcast}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @multicast1}}}], 0x40}, 0x0) connect$packet(r2, &(0x7f0000000180)={0x11, 0x5, r5, 0x1, 0x0, 0x6, @random="a16f6c79c2fe"}, 0x14) 14:13:54 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000040)='.\x00', 0x2000003) r2 = inotify_init1(0x0) inotify_add_watch(r2, &(0x7f0000000000)='./file0\x00', 0xa4000004) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r3 = dup2(r0, r0) close_range(r3, 0xffffffffffffffff, 0x40000000000000) 14:13:54 executing program 7: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$TIOCPKT(r2, 0x5441, &(0x7f0000000040)) 14:13:54 executing program 6: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) dup3(r1, r0, 0x0) 14:13:54 executing program 0: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) r0 = add_key$keyring(&(0x7f00000021c0), &(0x7f0000002200)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$setperm(0x5, r0, 0x8001400) keyctl$chown(0xb, r0, 0x0, 0x0) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000040)={r0, 0x6f, 0x25}, &(0x7f0000000200)={'enc=', 'pkcs1', ' hash=', {'sha1-ce\x00'}}, &(0x7f0000000280)="b1a170a8c3092e6c14fbc30e5e66f8b13a4b02ef5cf9ba9c0f26c5baf91aabff6064de2135d6be74387c77f91922b2506f354a93231c0e05afaf04469bb653ea3cf53af5eea3cf662b2829add7e7754100c4b2baca9b4307d2266170aee98c2f23bc7a5a2b92e25a11c3860dff05b0", &(0x7f00000000c0)=""/37) 14:13:54 executing program 2: clone3(&(0x7f0000001200)={0x1e0000, 0x0, 0x0, 0x0, {0xa}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 14:13:54 executing program 5: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x3}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$TCSETSF(r1, 0x5404, &(0x7f00000000c0)={0x81, 0x7, 0x3ff, 0x4, 0x7, "df95c8067088d83b5c221c685e22fa5144f81e"}) ioctl$BTRFS_IOC_SET_FEATURES(r1, 0x40309439, &(0x7f0000000000)={0x1, 0x2, 0x3}) ioctl$TIOCPKT(r2, 0x5420, &(0x7f0000000040)) 14:13:54 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000040)='.\x00', 0x2000003) r2 = inotify_init1(0x0) inotify_add_watch(r2, &(0x7f0000000000)='./file0\x00', 0xa4000004) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r3 = dup2(r0, r0) close_range(r3, 0xffffffffffffffff, 0x100000000000000) [ 2982.390047] kmemleak: 4 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 14:14:16 executing program 2: r0 = clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) r1 = getpgrp(r0) clone3(&(0x7f0000000340)={0x30018480, &(0x7f0000000040), &(0x7f00000000c0), &(0x7f0000000200), {0x9}, &(0x7f0000001280)=""/4096, 0x1000, &(0x7f0000000240)=""/187, &(0x7f0000000300)=[r0, r1], 0x2}, 0x58) 14:14:16 executing program 1: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp2D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 14:14:16 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000040)='.\x00', 0x2000003) r2 = inotify_init1(0x0) inotify_add_watch(r2, &(0x7f0000000000)='./file0\x00', 0xa4000004) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r3 = dup2(r0, r0) close_range(r3, 0xffffffffffffffff, 0x200000000000000) 14:14:16 executing program 6: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000000)=0x1) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) open_by_handle_at(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="280000004e000000ac02000000000000050000000000000020000000070000000000006f46dc0e000000000000000000"], 0x4165c3) ioctl$TIOCGPTPEER(r2, 0x5441, 0x7) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) dup3(r0, r0, 0x0) dup3(r2, r1, 0x0) 14:14:16 executing program 4: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f00000000c0)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\x11IN\\\xafYX\x05M\xa1\xaa$F0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xffffffffffffffff) r0 = mmap$IORING_OFF_SQES(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x1000000, 0x4000110, 0xffffffffffffffff, 0x10000000) r1 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x6) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x2, 0x1f012, r1, 0x0) r2 = io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f00000001c0)=@IORING_OP_WRITE_FIXED={0x5, 0x3, 0x4007, @fd=r1, 0x9, 0x7, 0x23ff, 0x1e, 0x0, {0x3, r2}}, 0x0) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r3, 0x4b63, 0x0) syz_io_uring_submit(0x0, r0, &(0x7f0000000040)=@IORING_OP_TEE={0x21, 0x2, 0x0, @fd, 0x0, 0x0, 0x5, 0x4, 0x1, {0x0, r2, r3}}, 0x8) 14:14:16 executing program 0: fchmod(0xffffffffffffffff, 0x0) clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 14:14:16 executing program 5: r0 = fsmount(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x976, 0x0, @perf_config_ext, 0x8000, 0x0, 0x0, 0x0, 0xbb9}, 0x0, 0xc, r0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r3 = dup3(r2, r1, 0x0) ioctl$TIOCPKT(r3, 0x5420, &(0x7f0000000040)) 14:14:16 executing program 7: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$TIOCPKT(r2, 0x5450, &(0x7f0000000040)) 14:14:17 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000040)='.\x00', 0x2000003) r2 = inotify_init1(0x0) inotify_add_watch(r2, &(0x7f0000000000)='./file0\x00', 0xa4000004) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r3 = dup2(r0, r0) close_range(r3, 0xffffffffffffffff, 0x400000000000000) 14:14:29 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000040)='.\x00', 0x2000003) r2 = inotify_init1(0x0) inotify_add_watch(r2, &(0x7f0000000000)='./file0\x00', 0xa4000004) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r3 = dup2(r0, r0) close_range(r3, 0xffffffffffffffff, 0x800000000000000) 14:14:29 executing program 4: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {0x40000f}, 0x0, 0x0, 0x0, 0x0}, 0xffffffffffffff6d) r0 = add_key$keyring(&(0x7f00000021c0), &(0x7f0000002200)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$setperm(0x5, r0, 0x8001400) keyctl$chown(0xb, r0, 0x0, 0x0) r1 = request_key(&(0x7f0000000080)='ceph\x00', &(0x7f0000000000)={'syz', 0x1}, &(0x7f00000004c0)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\x04\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{;7\x0eJ\xb4H\x89\xc9\x19\v4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\x00\x00\x00\x00', r0) r2 = add_key$fscrypt_v1(&(0x7f0000000040), &(0x7f00000000c0)={'fscrypt:', @desc1}, &(0x7f0000000440)={0x0, "36ed03429290b964bd0371537d626ceb8b5e9230570d059847e44e01f1799bbda8ba23003827d2ec39571290dc44668ac35707ea3121fc61a0f3d1b54799e0a1", 0x10}, 0x48, r1) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x0}, 0x0, 0x0, r0) r3 = add_key$keyring(&(0x7f00000021c0), &(0x7f0000002200)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$setperm(0x5, r3, 0x8001400) keyctl$chown(0xb, r3, 0x0, 0x0) keyctl$unlink(0x9, r2, r3) r4 = add_key$fscrypt_v1(&(0x7f0000000280), &(0x7f0000000400)={'fscrypt:', @desc4}, &(0x7f0000000300)={0x0, "2bbe384edff6066da4b80cc245fc2d3fd3005b48ae9b3052bf8dd752c55a4bfcd23cb450f3d2942dd87c04dbf5db5e1f6f3651732189252203aa116e3a43d68b", 0x38}, 0x48, 0xfffffffffffffffd) r5 = add_key$keyring(&(0x7f0000000380), &(0x7f00000003c0)={'syz', 0x3}, 0x0, 0x0, r1) keyctl$KEYCTL_MOVE(0x1e, r1, r4, r5, 0x1) 14:14:29 executing program 5: perf_event_open(&(0x7f0000001d80)={0x2, 0xac, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x100, 0x0) r1 = fork() ptrace$setopts(0x4200, r1, 0x0, 0x0) ioctl$TIOCSPGRP(0xffffffffffffffff, 0x5410, &(0x7f0000000080)=r1) r2 = fork() ptrace$setopts(0x4200, r2, 0x0, 0x0) tkill(r2, 0x2a) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) syz_open_dev$tty1(0xc, 0x4, 0x3) ioctl$VT_RESIZE(r3, 0x4b63, 0x0) r4 = dup3(r3, r0, 0x0) ioctl$TIOCL_PASTESEL(r3, 0x541c, &(0x7f0000000000)) ioctl$TIOCPKT(r4, 0x5420, &(0x7f0000000040)) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r6 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r7 = dup3(r6, r5, 0x0) ioctl$TIOCPKT(r7, 0x5420, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r7, 0x2405, r4) 14:14:29 executing program 2: r0 = clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000300)=0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000340)={0x0, 0x0}) r3 = getpgid(r0) r4 = getpid() r5 = accept4$inet(0xffffffffffffffff, &(0x7f00000004c0)={0x2, 0x0, @dev}, &(0x7f0000000500)=0x10, 0x800) ftruncate(r5, 0x3) r6 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) ioctl$TCSETA(r6, 0x5406, &(0x7f0000000480)={0x80, 0x8, 0x40, 0x3, 0x1a, "c8417fa1410bfc94"}) clone3(&(0x7f0000000400)={0x48040000, &(0x7f0000000000), &(0x7f00000000c0), &(0x7f0000000200), {0x13}, &(0x7f0000000240)=""/11, 0xb, &(0x7f0000000280)=""/85, &(0x7f00000003c0)=[r1, r2, r3, r4], 0x4, {r6}}, 0x58) request_key(&(0x7f0000000080)='dns_resolver\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 14:14:29 executing program 1: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\x05\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 14:14:29 executing program 0: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0xffff, 0x3, &(0x7f0000000480)=[{&(0x7f0000000200)="fbbb1360732b4de341cc5252c73ea96a9c9f17079e1ab6d739058788f939593f8a0606e3d5720b504cf95afbd45565646cac978f852d0d9b6482c6d2273071278f737482680550de7e744456b4f01827e842fa8e33fdebea269a8b5f1b1b1e62f3b1fadb25aff8af3be25b40f45a5bf4974008c25dbd4d17afbaedfa97698c1c2906e6443283045c4a21ec657be0f32233a9e925033e5bebc6581adfa2bb012fa6d42bb874fad54cff8b73e07017afd487d283eb970d3e3646426a11c0ea7ab6330376baeb0e8bf4cf935e3d91e9476e4472cf0f8f5d8ad776c8fc00866c3325528bbb0881da006c5f03135acd", 0xed, 0x10001}, {&(0x7f0000000300)="b880b6c13d2f499287371d5ca065e9898e9e9bf65cd1c67c99356aad98d1529fb456c3adf35ff58c51805dfbb8ead1e645862ff79274ae5fd44fbe9d15c076111a3b4fab4c7a2365907089134f4575fc1c1dd3ca348ea706af833e0c7c47286c715ebc5a557b468eb0dee3489de4a32330399aad99da400b20a1e8cf05c53c6a72c54458bab7eccbc4fc39008f7af0c938036cc29b10a79c3480678077084ba33126b973459424ddd7f67163262598d31fb086a63da1ffda9459491e450f0b41d802804d5fc0c50df04ef1fd1ff29d387ee7f94f70d726bcad88159afc27f536117b51c84efa4db8ae02675f1ece70f43bac0c", 0xf3, 0x400}, {&(0x7f0000000400)="3d0c77b624948f7c1118097cb0516635235c975b2dad6e5a91a35b72bb350e04d1e166ad3c4869363a63a3edde0ae45439c8f40f1a0e82558f4e70b8135e7f62acae82f776fac77ca5f7cfd4d44562efd57c0fa918f3b22018431a9df700862b0e36a2a626c49eca9d46bb3ef4aa3f526def727550", 0x75, 0x1c06000}], 0x6a, &(0x7f0000000500)={[{@huge_within_size}, {@huge_always}], [{@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@uid_gt={'uid>', 0xffffffffffffffff}}, {@appraise}, {@subj_role}, {@func={'func', 0x3d, 'FIRMWARE_CHECK'}}, {@obj_type={'obj_type', 0x3d, '\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16'}}]}) execveat(r0, &(0x7f0000000680)='./file0\x00', &(0x7f00000009c0)=[&(0x7f00000006c0)='\x05][{\x00', &(0x7f0000000700)='dns_resolver\x00', &(0x7f0000000740)='dns_resolver\x00', &(0x7f0000000780)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', &(0x7f0000000880)='\x00', &(0x7f00000008c0)='dns_resolver\x00', &(0x7f0000000900)='dns_resolver\x00', &(0x7f0000000940)=':[--/#]\x00', &(0x7f0000000980)='syz'], &(0x7f0000000b00)=[&(0x7f0000000a40)='syz', &(0x7f0000000a80)='+@\x00', &(0x7f0000000ac0)='-}!#-\x00'], 0x800) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) fchmodat(r0, &(0x7f0000000b40)='./file0\x00', 0x21) r1 = syz_mount_image$vfat(&(0x7f0000000b80), &(0x7f0000000bc0)='./file0\x00', 0xfffffffffffffff9, 0x3, &(0x7f0000000d40)=[{&(0x7f0000000c00)="898363d5fddbd672a3da9f5315d44a3b6fc729cfb5ef4f62d5a1d4145c2691f8c03044c1bbfa9c63c355745f57", 0x2d, 0x5}, {&(0x7f0000000c40)="5f1e6ea2aa0b70564837e5212244df2a60d195", 0x13, 0x1}, {&(0x7f0000000c80)="b029ec52820a6b0c1a77f59ec2ba45f8160412c41b3867bac13dcaef9c02d070222a4c7ef93d0af1791088351be808d64f957d54be57f4e4ec4663ddbf2558100a37d532c9356d9f937a20df1d3b891f75b046e8edbcf03df7f1a474334057060429d1dc214ccfe2d251a7b1374c44d2771ef42c7b66a742c82b03c0927ca9467a39f3df4f83717fc3218f2108423543dbbdf3e8bd8bc461af920e3a5e3e8935abb4f3016df4d32bc1c184fbeec3829b81d4bd602cf3dc5eee8e199f", 0xbc}], 0x8, &(0x7f0000000f00)=ANY=[@ANYBLOB="757466383d302c756e695f786c6174653d302c61756469742c7065726d69745f646972656374696f2c726f6f74636f6e746578743d73746166665f752c7569643d4051a16058b391a018cea9364e69ef6ddf5abd6aefb9f5e56718993ea7a706c965b9c72d4cf81d39bfd30445342a844f3415ec9e49e6532eb8aa3989ba0304017d7cbe9adb553d5f95a09d31244cb80e3300818299e358124eee79bdfd782a7800e0ae8866150ceb427e90f189d4c12ea0cc5111c60c18351daeab8573ef8500380a6837271b59e611c5538cbc4b99db568dac7170b8362c9aa2b273c779ad9a854940499dc1a3b1393ce4f4335e", @ANYRESDEC, @ANYBLOB=',\x00']) fchmodat(r1, &(0x7f0000000e40)='./file0\x00', 0x0) 14:14:29 executing program 7: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$TIOCPKT(r2, 0x5451, &(0x7f0000000040)) 14:14:29 executing program 6: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r2, 0x4b63, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) fcntl$dupfd(r2, 0x0, r3) dup3(r1, r0, 0x0) 14:14:29 executing program 4: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) newfstatat(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x1000) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), 0x10, &(0x7f00000002c0)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@debug={'debug', 0x3d, 0xb6}}, {@dfltuid={'dfltuid', 0x3d, 0xee00}}], [{@subj_role={'subj_role', 0x3d, '!!-+$'}}, {@mask={'mask', 0x3d, '^MAY_EXEC'}}, {@dont_measure}, {@euid_gt={'euid>', r0}}, {@subj_type={'subj_type', 0x3d, 'dns_resolver\x00'}}, {@hash}]}}) 14:14:29 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000040)='.\x00', 0x2000003) r2 = inotify_init1(0x0) inotify_add_watch(r2, &(0x7f0000000000)='./file0\x00', 0xa4000004) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r3 = dup2(r0, r0) close_range(r3, 0xffffffffffffffff, 0x1f00000000000000) 14:14:29 executing program 1: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\a\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 14:14:29 executing program 7: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$TIOCPKT(r2, 0x5452, &(0x7f0000000040)) 14:14:29 executing program 0: clone3(&(0x7f0000001200)={0x88118d80, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffe09}, 0xff68) execveat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', &(0x7f0000000480)=[&(0x7f00000000c0)='syz', &(0x7f0000000200)='syz', &(0x7f0000000240)='dns_resolver\x00', &(0x7f0000000280)='nxz', &(0x7f0000000700)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', &(0x7f00000003c0)='syz', &(0x7f0000000400)='L\x0e\xe8\x87', &(0x7f0000000440)='syz'], &(0x7f00000006c0), 0x800) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 14:14:29 executing program 2: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='blkio.bfq.io_queued\x00', 0x0, 0x0) fcntl$getownex(r0, 0x10, &(0x7f00000002c0)={0x0, 0x0}) clone3(&(0x7f0000000340)={0x4000200, &(0x7f00000000c0), &(0x7f0000000200), &(0x7f0000000240), {0x2d}, &(0x7f0000001280)=""/4096, 0x1000, &(0x7f0000000280)=""/13, &(0x7f0000000300)=[r1], 0x1, {r0}}, 0x58) 14:14:29 executing program 6: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) socket$netlink(0x10, 0x3, 0xe) ioctl$VT_WAITACTIVE(r0, 0x5607) dup3(r1, r0, 0x0) 14:14:29 executing program 4: ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000000b00)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=0xffffffffffffffff, @ANYRESDEC]) lsetxattr(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)=@known='trusted.overlay.upper\x00', &(0x7f0000000680)='-\x00', 0x2, 0x1) r1 = clone3(&(0x7f00000006c0)={0x8834fd00, 0x0, 0x0, 0x0, {0x20000}, 0x0, 0x0, 0x0, 0x0}, 0x26) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000900)=@abs, 0x6e, &(0x7f0000000ac0)=[{&(0x7f0000000980)=""/10, 0xa}, {&(0x7f00000009c0)=""/69, 0x45}, {&(0x7f0000000a40)=""/67, 0x43}], 0x3, &(0x7f0000000cc0)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000028324281000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0x48}, 0x40000100) r3 = fork() ptrace$setopts(0x4200, r3, 0x0, 0x0) clone3(&(0x7f0000000bc0)={0x80, &(0x7f0000000740), &(0x7f0000000780), &(0x7f00000007c0), {0xb}, &(0x7f0000000800)=""/141, 0x8d, &(0x7f00000008c0)=""/44, &(0x7f0000000b80)=[r2, 0xffffffffffffffff, r1, r1, r3, r1, r1], 0x7}, 0x58) r4 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f00000000c0)={0x15, 0xb, 0x2, 0xb, 0x3, 0x8, 0x2, 0x58, 0x1}) ioctl$VT_RESIZE(r4, 0x4b63, 0x0) writev(r4, &(0x7f0000000580)=[{&(0x7f0000000200)="29d7ab5196f6bb14567903bc8075771979b4ddc178577b647df2719ca0a19ca65437e27f01f394a9e42c87e159259b6c3cba96ccf8656bb13cb506308d4148f628d12eed32d9fc57ebe11773dd80ad2526a46ae1ec7c2c191092dcd17775e19022f17386d69585787e8a9d0370294d04551d5db326f3ce1ca8952b4bafc7f118662f3e21c5ec9674b926096476d142b1c43e85288973c8d52491707f61ee3a182b4f97fff3c56041f3c8fa022bfa2dbe8b2141168305357abe40ea1f3640cba2cf94156a1e23f0", 0xc7}, {&(0x7f0000000300)="c90275dcb5980d062b0610dd5bf2bdea8c94d24d6b5261ba90883b5d97608618870b089ca011afaabcb1d2d9790c0c6546595543acf42123061b8464e35f8058f6da4414953ba51564fbb9671c5fd68d2d76f121267db5bfb177d0", 0x5b}, {&(0x7f0000000380)="35a6183c75b047ce74229549d37d2f4e7afaaed005104c2723a62f32259d34465b8fc506b563bbb9ffab79bf4ca1c98422728da04a856d094ea169f855f880c6a2a1737012a19c66f7e4bf84eb05f0826cc910bf34fc2b75620b5f615628732ca699360465e1cb1778f03617c2ccff598bfdf679eaa19f0f2b2607e4d4cb1e9275fd06143b748e1380411d1325ab4c1fffd65c35", 0x94}, {&(0x7f0000000440)="a55dba36d8c90ebde2d42504b3e89c4773dc48b92ee89f00eb8b8d0caa613d50609b9189d387849fac1fb7b25b1d96efe21026135d82d96fc270b74847b13383eee5fe40ce6d552f25e3a06ddc169e9b7119a7cd93", 0x55}, {&(0x7f00000004c0)="1cbbb69204ea345a79da577b2c4e1e38cc7874f0f08994e4cb84ce765a18bdc65e2478b89131ba3cc565e40bd4e7da1126a14f4de8a53df48e0859fa715f515e5fd458d26a25252ae591aafd0fb608b620fd262f0d16c19fe7bd2b62e150d15dfeb9143e1411af48f19dda64c07880afd5aef3aa6ae5d0696730f9d857c6c2d9b0e2adc9c446add7f3e9a7de69f0be23ea3aa270d4f998c7c5b49608", 0x9c}], 0x5) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 14:14:29 executing program 0: clone3(&(0x7f0000001200)={0x118f00, 0x0, 0x0, 0x0, {0x3}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000300)=0x1) r1 = request_key(&(0x7f0000000240)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)='\x00', r0) request_key(&(0x7f0000000040)='user\x00', &(0x7f00000000c0)={'syz', 0x2}, &(0x7f0000000200)='\x00', r1) 14:14:29 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000040)='.\x00', 0x2000003) r2 = inotify_init1(0x0) inotify_add_watch(r2, &(0x7f0000000000)='./file0\x00', 0xa4000004) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r3 = dup2(r0, r0) close_range(r3, 0xffffffffffffffff, 0x3e00000000000000) 14:14:30 executing program 5: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1004, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x500a0}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$TIOCPKT(r2, 0x5420, &(0x7f0000000040)) 14:14:30 executing program 1: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\t\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 14:14:30 executing program 7: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$TIOCPKT(r2, 0x545d, &(0x7f0000000040)) 14:14:30 executing program 6: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x2, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r2, 0xc018937d, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file0\x00'}) ioctl$TIOCSPTLCK(r3, 0x40045431, &(0x7f0000000040)) 14:14:30 executing program 0: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r1, 0x4b63, 0x0) ioctl$PIO_UNIMAP(r1, 0x4b67, &(0x7f0000000300)={0x7, &(0x7f00000002c0)=[{0x1f, 0x7}, {0x1ff, 0x101}, {0x2, 0x8824}, {0x7fff}, {0xe7, 0x89c}, {0x7}, {0x1, 0x100}]}) ioctl$VT_RESIZE(r0, 0x4b63, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@noextend}, {@version_L}], [{@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@fsuuid={'fsuuid', 0x3d, {[0x0, 0x65, 0x31, 0x61, 0x37, 0x33, 0x35, 0x63], 0x2d, [0x34, 0x38, 0x37, 0x64], 0x2d, [0x33, 0x38, 0x33, 0x35], 0x2d, [0x62, 0x65, 0x30, 0x51], 0x2d, [0x36, 0x34, 0x39, 0x33, 0x66, 0x47, 0x38, 0x66]}}}, {@fsname={'fsname', 0x3d, 'wfdno'}}, {@context={'context', 0x3d, 'sysadm_u'}}]}}) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 14:14:30 executing program 1: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\x0f\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 14:14:30 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000040)='.\x00', 0x2000003) r2 = inotify_init1(0x0) inotify_add_watch(r2, &(0x7f0000000000)='./file0\x00', 0xa4000004) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r3 = dup2(r0, r0) close_range(r3, 0xffffffffffffffff, 0xbf00000000000000) [ 3015.761098] kmemleak: 5 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 14:14:50 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000040)='.\x00', 0x2000003) r2 = inotify_init1(0x0) inotify_add_watch(r2, &(0x7f0000000000)='./file0\x00', 0xa4000004) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r3 = dup2(r0, r0) close_range(r3, 0xffffffffffffffff, 0xfeffffff00000000) 14:14:50 executing program 2: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', r0) add_key$fscrypt_v1(&(0x7f0000000200), &(0x7f0000000240)={'fscrypt:', @desc3}, &(0x7f0000000280)={0x0, "7e29de5637834049a8003ba2b757b6a411bcbf0e200480c593a4bba6ac15a4ddd8890ef01a95db8d855609bf9dfa1a31105667bd153536f97fb0ac6c057dd0f0", 0x3c}, 0x48, 0x0) 14:14:50 executing program 4: r0 = clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r1, 0x4b63, 0x0) fcntl$setown(r1, 0x8, r0) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r2, 0x4b63, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000600)={0xa, 0x0, 0x0, @mcast2, 0x3}, 0x1c) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000040)={0x0, 0x0}) fcntl$lock(0xffffffffffffffff, 0x26, &(0x7f0000000000)={0x0, 0x1, 0x4, 0x4000009, r3}) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r6 = dup3(r5, r4, 0x0) ioctl$TIOCPKT(r6, 0x5420, &(0x7f0000000040)) clone3(&(0x7f0000000400)={0x200000000, &(0x7f0000000040), &(0x7f00000000c0), &(0x7f0000000200), {0x1d}, &(0x7f0000000240)=""/190, 0xbe, &(0x7f0000000300)=""/161, &(0x7f00000003c0)=[0x0, 0xffffffffffffffff, 0x0, r3], 0x4, {r6}}, 0x58) r7 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r7, 0x4b63, 0x0) ftruncate(r7, 0x5) syz_open_pts(r2, 0x0) ioctl$EXT4_IOC_CLEAR_ES_CACHE(r2, 0x6628) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 14:14:50 executing program 1: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\x10\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 14:14:50 executing program 7: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$TIOCPKT(r2, 0x5460, &(0x7f0000000040)) 14:14:50 executing program 6: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r2, 0xc0189378, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {r1}}, './file0\x00'}) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r6 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r7 = dup3(r6, r5, 0x0) ioctl$TIOCPKT(r7, 0x5420, &(0x7f0000000040)) write$P9_RXATTRWALK(r7, &(0x7f0000000080)={0xf, 0x1f, 0x2, 0x1}, 0xf) r8 = openat$cgroup_ro(r3, &(0x7f0000000040)='blkio.throttle.io_serviced\x00', 0x0, 0x0) ioctl$TIOCGPTPEER(r8, 0x5441, 0x5) ioctl$TCXONC(r4, 0x540a, 0x2) 14:14:50 executing program 5: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000280)={{0x1, 0x1, 0x18, r0, {0x4}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000002c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) perf_event_open(&(0x7f0000000080)={0x4, 0x80, 0x80, 0x40, 0x5, 0x1, 0x0, 0x401, 0x20000, 0x8, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1ff, 0x2, @perf_config_ext={0xffffffffffff8000, 0x2}, 0x20, 0x80000001, 0x8, 0x2, 0x9, 0x9, 0x7fff, 0x0, 0x7, 0x0, 0x6}, 0x0, 0x7, r0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000100)={&(0x7f0000000180)={0xb4, 0x17, 0x92e372ca109ba18f, 0x70bd2c, 0x25dfdbff, {0x13}, [@generic="b745157dfa2c45ffe6c806bec222944329757b66c8803ba0b2863e8157c21ca6ed43aa4fada7036946bc961f753387f4", @generic="89b60d4d7b6451b9ea5ad19c217fcecec3705d6dbe6496ec274604b3ca750145cdbf10d8f2912860abc4a1a31f0793917c7eb1e74e4a1b4a82c44197702c581ed8c513fc64161abb729193adc1db1f78a884050d21f3f541254c1ceab468284949b12aede2ac00e092fcdefa107160"]}, 0xb4}, 0x1, 0x0, 0x0, 0x24000845}, 0x80) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r3 = fork() tkill(r3, 0xb) perf_event_open(0xffffffffffffffff, r3, 0x4, r0, 0x18) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r5 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r5, 0x4b63, 0x0) r6 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r6, 0x4b63, 0x0) ioctl$TIOCPKT(r6, 0x5420, &(0x7f0000000300)=0x6) close(r5) r7 = dup3(r4, r2, 0x0) ioctl$TIOCPKT(r7, 0x5420, &(0x7f0000000040)) 14:14:50 executing program 0: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f0000000040)) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) [ 3036.198324] kmemleak: 2 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 14:15:10 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000040)='.\x00', 0x2000003) r2 = inotify_init1(0x0) inotify_add_watch(r2, &(0x7f0000000000)='./file0\x00', 0xa4000004) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r3 = dup2(r0, r0) close_range(r3, 0xffffffffffffffff, 0xffffc90000000000) 14:15:10 executing program 7: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$TIOCPKT(r2, 0x40049409, &(0x7f0000000040)) 14:15:10 executing program 2: r0 = clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r1 = getpid() open(&(0x7f0000000040)='./file0\x00', 0x2, 0x81) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r2, 0x4b63, 0x0) kcmp(r0, r1, 0x4, r2, 0xffffffffffffffff) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 14:15:10 executing program 1: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\x14\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 14:15:10 executing program 4: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) r1 = open(&(0x7f0000000040)='./file0\x00', 0x882, 0x1b0) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f0000000200)={0x8, 0x1, 0x2, 0x0, 0x0, [{{}, 0xf7}, {{}, 0x401}]}) request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f00000002c0)='dns_resolver\x00', r0) 14:15:10 executing program 5: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r2, 0x4b63, 0x0) ioctl$TCXONC(r2, 0x540a, 0x2) r3 = dup3(r1, r0, 0x0) ioctl$TIOCPKT(r3, 0x5420, &(0x7f0000000040)) 14:15:10 executing program 6: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = dup3(r1, r0, 0x0) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(r2, 0xc0189377, &(0x7f0000000040)={{0x1, 0x1, 0x18, r1, {0x0, 0x80}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_READY(r3, 0xc0189376, &(0x7f0000000080)={{0x1, 0x1, 0x18, r4, {0x2}}, './file0\x00'}) 14:15:10 executing program 0: clone3(&(0x7f0000000280)={0x14900e000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0xffffffffffffff83) r0 = add_key$keyring(&(0x7f00000021c0), &(0x7f0000002200)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$setperm(0x5, r0, 0x8001400) keyctl$chown(0xb, r0, 0x0, 0x0) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', r0) 14:15:10 executing program 7: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$TIOCPKT(r2, 0x40086602, &(0x7f0000000040)) 14:15:10 executing program 6: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TIOCSPTLCK(r1, 0x40045431, &(0x7f0000000000)=0x1) dup3(r1, r0, 0x0) 14:15:10 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000040)='.\x00', 0x2000003) r2 = inotify_init1(0x0) inotify_add_watch(r2, &(0x7f0000000000)='./file0\x00', 0xa4000004) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r3 = dup2(r0, r0) close_range(r3, 0xffffffffffffffff, 0xffffffff00000000) 14:15:10 executing program 5: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TIOCGSOFTCAR(r0, 0x5419, &(0x7f0000000000)) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB="b8000000130001002abd7000fddbdf25ffffffff000000000000000000000000ff02000000000000000000000000000100000000000000000a00403c00000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fdffffffffffffff0000000000000000000000000000000000000000000002000000000000000000000000000000000000000000000000000000000000000000b83aa23fad34091a5c54428235e465c018193c2f6a0bba03e50ac5640eed3d5cb9090be7d7e30dd272c2247cfb21cb98c9eb85affb65efe4f30ee2a28c375514b2e1d936e95db2f5374da605b58143071b80ae491b44ae4d87ea777b308beb"], 0xb8}}, 0x0) dup3(r1, r0, 0x0) dup2(r0, 0xffffffffffffffff) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r3, 0x4b63, 0x0) ioctl$TIOCPKT(r3, 0x5420, &(0x7f0000000080)=0xfffffffc) 14:15:10 executing program 0: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0xfffffffffffffebc) syz_genetlink_get_family_id$nl80211(&(0x7f00000004c0), 0xffffffffffffffff) clone3(&(0x7f0000000740)={0x104010200, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580), {0xe}, &(0x7f00000005c0)=""/228, 0xe4, &(0x7f00000006c0)=""/10, &(0x7f0000000700)=[0x0], 0x1}, 0x58) r0 = request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) r1 = add_key$keyring(&(0x7f0000000340), &(0x7f0000000380)={'syz', 0x2}, 0x0, 0x0, r0) add_key(&(0x7f0000000200)='trusted\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280)="3f8a1910be816cd70768f56bed63ad41fc1e07647ff824af7894381a986e016d5273825baf401c23a6fec47c0f21b8b5dedc74bc8dcd4864736e00622a03b06aa5a25b56b4532dc6d677dc023655246984b0b4abfa40aff05d78a75c3b8e19ef4d4642ed4db95f6ce730959aaae86c7d38d019c8ae1f9060f3a5f4cf60b1f20cae1ca5bb4917989f2bf51ad03ad1aa9e537edc5f6288f5ab9009e644d7e0f87cc1b5e53c42babc9708733e1d24ba60", 0xaf, r1) r2 = add_key$keyring(&(0x7f00000003c0), &(0x7f0000000400)={'syz', 0x2}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f0000000440), &(0x7f0000000480)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$KEYCTL_MOVE(0x1e, r2, r0, r3, 0x1) add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) 14:15:10 executing program 2: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {0x200009}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='encrypted\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 14:15:10 executing program 1: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf22\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 14:15:10 executing program 4: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) r1 = add_key$keyring(&(0x7f00000021c0), &(0x7f0000002200)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, r1) keyctl$setperm(0x5, r1, 0x8001400) keyctl$chown(0xb, r1, 0x0, 0x0) r2 = add_key$keyring(&(0x7f00000021c0), &(0x7f0000002200)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$setperm(0x5, r2, 0x8001400) keyctl$chown(0xb, r2, 0x0, 0x0) recvmmsg$unix(0xffffffffffffffff, &(0x7f0000000dc0)=[{{&(0x7f0000000200)=@abs, 0x6e, &(0x7f0000000380)=[{&(0x7f0000000280)=""/178, 0xb2}, {&(0x7f0000000340)=""/23, 0x17}], 0x2, &(0x7f00000003c0)=[@rights={{0x10}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xf0}}, {{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f00000004c0)=""/142, 0x8e}, {&(0x7f0000000580)=""/67, 0x43}, {&(0x7f0000000600)=""/3, 0x3}, {&(0x7f0000000640)=""/172, 0xac}, {&(0x7f0000002240)=""/4085, 0xff5}], 0x5, &(0x7f0000000780)=[@rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x98}}, {{&(0x7f0000000b80)=@abs, 0x6e, &(0x7f0000000cc0)=[{&(0x7f00000008c0)=""/109, 0x6d}, {&(0x7f0000000940)=""/78, 0x4e}, {&(0x7f00000009c0)=""/103, 0x67}, {&(0x7f0000000a40)=""/212, 0xd4}, {&(0x7f0000000840)=""/25, 0x19}, {&(0x7f0000000ec0)=""/160, 0xa0}, {&(0x7f0000000c40)=""/3, 0x3}, {&(0x7f0000000c80)=""/22, 0x16}], 0x8, &(0x7f0000000f80)=[@cred={{0x1c}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0x0}}}], 0x88}}], 0x3, 0x40000000, &(0x7f0000000e80)={0x77359400}) r4 = request_key(&(0x7f0000000880)='dns_resolver\x00', &(0x7f0000000b40)={'syz', 0x1}, &(0x7f0000000c00)='keyring\x00', r2) keyctl$KEYCTL_MOVE(0x1e, 0x0, r1, r4, 0x0) keyctl$chown(0x4, r0, 0xffffffffffffffff, r3) keyctl$KEYCTL_MOVE(0x1e, r1, r0, r2, 0x1) 14:15:10 executing program 5: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x402, 0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r3 = dup3(r2, r1, 0x0) r4 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r4, 0x4b63, 0x0) dup3(r2, r4, 0x80000) ioctl$TIOCPKT(r3, 0x5420, &(0x7f0000000040)) [ 3054.461264] kmemleak: 2 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 14:15:30 executing program 5: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) fcntl$getownex(r1, 0x10, &(0x7f0000000180)={0x0, 0x0}) perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0x3, 0xff, 0x8, 0x6, 0x0, 0x100000001, 0x6c41, 0x2, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x9, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x381, 0xd95, 0xfffffffd, 0x8, 0x80000000, 0x40, 0x1, 0x0, 0x2e7b, 0x0, 0x80}, r2, 0x7, r0, 0xa) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r4 = syz_open_dev$tty1(0xc, 0x4, 0x2) ioctl$TIOCSIG(r4, 0x40045436, 0xd) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r6 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r7 = dup3(r6, r5, 0x0) ioctl$TIOCPKT(r7, 0x5420, &(0x7f0000000040)) openat(r7, &(0x7f0000000000)='./file0\x00', 0x1, 0x1) r8 = dup3(r3, r1, 0x0) ioctl$TIOCPKT(r8, 0x5420, &(0x7f0000000040)) 14:15:30 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xff}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = inotify_init1(0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x482001, 0x0) r6 = dup3(r5, r4, 0x0) ioctl$TIOCPKT(r6, 0x5420, &(0x7f0000000040)) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r6, 0xc08c5332, &(0x7f0000000180)={0x6, 0x6, 0x1, 'queue1\x00', 0x9}) r7 = dup3(r3, r2, 0x0) ioctl$TIOCPKT(r7, 0x5420, &(0x7f0000000040)) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r7, 0x4040534e, &(0x7f0000000080)={0x12, @time={0x3ff, 0x3f3}, 0x6, {0x4, 0x81}, 0x80, 0x1, 0x6}) inotify_add_watch(r1, &(0x7f0000000040)='.\x00', 0x2000003) r8 = inotify_init1(0x0) inotify_add_watch(r8, &(0x7f0000000000)='./file0\x00', 0xa4000004) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r9 = dup2(r0, r0) close_range(r9, 0xffffffffffffffff, 0x0) 14:15:30 executing program 7: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$TIOCPKT(r2, 0x40087602, &(0x7f0000000040)) 14:15:30 executing program 0: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$TIOCPKT(r2, 0x5420, &(0x7f0000000040)) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000200)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xee01, 0xee01}}, './file0\x00'}) ioctl$TCSETSF(r3, 0x5404, &(0x7f00000003c0)={0x101, 0x225e8c56, 0x100, 0x1f, 0x14, "7ebcb16554f713c43ecb3e7c0e1a79594c75ff"}) getresuid(&(0x7f0000000240), &(0x7f0000000280), &(0x7f00000002c0)=0x0) r5 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r5, 0x4b63, 0x0) mount$9p_fd(0x0, &(0x7f0000000340)='./file0\x00', &(0x7f00000000c0), 0x40080, &(0x7f0000000400)=ANY=[@ANYRES16, @ANYRES64=r4, @ANYRES32=r5, @ANYBLOB="24a482d2b0173692781d5125e0b37e8d1be6ad6720df4fdb6c5d350dd4ffeacd0d429136331427e74cf82cabfe8ee0e0592bb2166391b6d97e8bbca3a5001d29cad13c69e55adc5d3b8ec3cfafa634007cdecadc2827ff2c02e81d7822a21c82864ea153d0cf484e8cb56d7df3d71dee5cc7e4e2d7af7f82a269ee17a0afa5ce57febad3938bf03646d7cdf78df27236f97bc7fd635926c270299359ef3cc64e6a443df9e779e8f18559c55848c0a664cce5b4a783b061a5404ee0d28a570c4f091a9a002ca0cac62291a09239a50014b75673cfe792ebfa5177afefc416d854bb4eee7366a3a6fb0db7eafe92f120b9266985bf"]) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 14:15:30 executing program 6: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r1, 0x4b63, 0x0) ioctl$PIO_UNIMAP(r1, 0x4b67, &(0x7f0000000300)={0x7, &(0x7f00000002c0)=[{0x1f, 0x7}, {0x1ff, 0x101}, {0x2, 0x8824}, {0x7fff}, {0xe7, 0x89c}, {0x7}, {0x1, 0x100}]}) ioctl$VT_RESIZE(r0, 0x4b63, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@noextend}, {@version_L}], [{@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@fsuuid={'fsuuid', 0x3d, {[0x0, 0x65, 0x31, 0x61, 0x37, 0x33, 0x35, 0x63], 0x2d, [0x34, 0x38, 0x37, 0x64], 0x2d, [0x33, 0x38, 0x33, 0x35], 0x2d, [0x62, 0x65, 0x30, 0x51], 0x2d, [0x36, 0x34, 0x39, 0x33, 0x66, 0x47, 0x38, 0x66]}}}, {@fsname={'fsname', 0x3d, 'wfdno'}}, {@context={'context', 0x3d, 'sysadm_u'}}]}}) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 14:15:30 executing program 1: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x05\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 14:15:30 executing program 4: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = syz_open_dev$vcsn(&(0x7f0000000380), 0x4, 0x442) getsockopt$inet_mreq(r0, 0x0, 0x23, &(0x7f00000006c0)={@remote, @local}, &(0x7f0000000700)=0x8) clone3(&(0x7f00000003c0)={0x10008000, &(0x7f0000000040)=0xffffffffffffffff, &(0x7f00000000c0)=0x0, &(0x7f0000000200), {0xf}, &(0x7f0000000240)=""/11, 0xb, &(0x7f0000000280)=""/157, &(0x7f0000000340), 0x0, {r0}}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) r3 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r3, &(0x7f0000000600)={0xa, 0x0, 0x0, @mcast2, 0x3}, 0x1c) fcntl$getownex(r3, 0x10, &(0x7f0000000040)={0x0, 0x0}) fcntl$lock(0xffffffffffffffff, 0x26, &(0x7f0000000000)={0x0, 0x1, 0x4, 0x4000009, r4}) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r6 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) fcntl$addseals(r1, 0x409, 0x1) r7 = dup3(r6, r5, 0x0) ioctl$TIOCPKT(r7, 0x5420, &(0x7f0000000040)) clone3(&(0x7f0000000640)={0x1080000, &(0x7f0000000340), &(0x7f0000000440), &(0x7f0000000480), {0x1a}, &(0x7f00000004c0)=""/135, 0x87, &(0x7f0000000580)=""/81, &(0x7f0000000600)=[r2, r4, 0x0], 0x3, {r7}}, 0x58) 14:15:30 executing program 2: recvmmsg$unix(0xffffffffffffffff, &(0x7f0000005580)=[{{&(0x7f0000000340), 0x6e, &(0x7f0000000680)=[{&(0x7f00000003c0)=""/11, 0xb}, {&(0x7f0000001280)=""/4096, 0x1000}, {&(0x7f0000000400)=""/255, 0xff}, {&(0x7f0000000500)=""/53, 0x35}, {&(0x7f0000000540)=""/4, 0x4}, {&(0x7f0000000580)=""/5, 0x5}, {&(0x7f00000005c0)=""/140, 0x8c}], 0x7, &(0x7f0000000700)=[@cred={{0x1c}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x128}}, {{&(0x7f0000000840)=@abs, 0x6e, &(0x7f0000000cc0)=[{&(0x7f00000008c0)=""/193, 0xc1}, {&(0x7f00000009c0)=""/151, 0x97}, {&(0x7f0000000a80)=""/224, 0xe0}, {&(0x7f0000000b80)=""/118, 0x76}, {&(0x7f0000000c00)=""/140, 0x8c}, {&(0x7f0000002280)=""/4096, 0x1000}], 0x6, &(0x7f0000000d40)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x38}}, {{&(0x7f0000000d80), 0x6e, &(0x7f0000000ec0)=[{&(0x7f0000003280)=""/4096, 0x1000}, {&(0x7f0000000e00)=""/175, 0xaf}], 0x2, &(0x7f0000000f00)=[@cred={{0x1c}}], 0x20}}, {{&(0x7f0000000f40), 0x6e, &(0x7f0000001080)=[{&(0x7f0000004280)=""/4096, 0x1000}, {&(0x7f0000000fc0)=""/109, 0x6d}, {&(0x7f0000001040)=""/26, 0x1a}], 0x3, &(0x7f00000010c0)=[@cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0x130}}, {{&(0x7f0000005280)=@abs, 0x6e, &(0x7f0000005440)=[{&(0x7f0000005300)=""/239, 0xef}, {&(0x7f0000005400)=""/5, 0x5}], 0x2, &(0x7f0000005480)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0xd0}}], 0x5, 0x0, &(0x7f00000056c0)={0x77359400}) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000000500)={0x0, 0x0, {}, {0x0, @struct, 0x0}, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) ioctl$BTRFS_IOC_SCRUB_PROGRESS(0xffffffffffffffff, 0xc400941d, &(0x7f0000000900)={r1, 0x3ff, 0x20}) ioctl$BTRFS_IOC_SCRUB_PROGRESS(0xffffffffffffffff, 0xc400941d, &(0x7f0000000440)={r1, 0x7, 0x5, 0x1}) ioctl$BTRFS_IOC_DEV_REPLACE(0xffffffffffffffff, 0xca289435, &(0x7f0000000740)={0x0, 0x1, @start={r1, 0x0, "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", "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"}, [0x2, 0x2c8a, 0x62, 0x101, 0x9, 0x401, 0x4, 0xc000000000000000, 0x7, 0x101, 0x1, 0x3, 0x4, 0x0, 0xff, 0x7, 0x3, 0x5, 0x93c, 0xe5, 0x7, 0x0, 0x1b000000000, 0x8000, 0x81, 0xd8bb, 0x4, 0x0, 0x20, 0x200, 0x200, 0x9, 0x401, 0x5, 0x0, 0x6000, 0xa67, 0x20, 0x4, 0x9, 0x1, 0x8, 0x6, 0x8, 0x1ff, 0x1000, 0x6, 0xbb2, 0x7, 0x8, 0x80, 0x5, 0x81, 0x0, 0x3, 0x0, 0x200000, 0xffff, 0x0, 0x8000, 0xce20, 0x1f, 0x790b, 0x9]}) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r2, 0x4b63, 0x0) fsetxattr$security_evm(r2, &(0x7f00000067c0), &(0x7f0000006800)=@ng={0x4, 0x14, "68cb2757ed62bfd3"}, 0xa, 0x1) ioctl$BTRFS_IOC_SNAP_CREATE_V2(0xffffffffffffffff, 0x50009417, &(0x7f00000057c0)={{r0}, 0x0, 0x8, @inherit={0x88, &(0x7f0000005700)={0x1, 0x8, 0x5, 0x80000001, {0x2d, 0x0, 0x3, 0x10001, 0x5}, [0x0, 0x39, 0x101, 0x6, 0xf10, 0x8, 0x7, 0xfffffffffffffe00]}}, @devid=r1}) clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r3 = request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) r4 = add_key$fscrypt_v1(&(0x7f0000000040), &(0x7f00000000c0)={'fscrypt:', @desc1}, &(0x7f00000002c0)={0x0, "fa6e0d317bcecfd9d82937eff91f017a5e445b1a3a52f44592c87ecc700e631ff5da36a6cb65ba18d0d81920c5571f14c287b8d8358bfb79811da12abea89b50", 0x2b}, 0x48, 0xfffffffffffffff9) keyctl$unlink(0x9, r4, r3) ioctl(0xffffffffffffffff, 0x32, &(0x7f0000000200)="8bd6ac04c2a98cfe9164c613d8af55625bd6770637bb2853e2622b9d58a12680659855326cbe381753b30a9f5952941be29701a10c385c0838e1790d61ff840bed8c50a77ebda4579e0195b2430a4dc73a96e6768502630f8c5c873a302751441e8dec45b2f03f35f269cde08778cca27c5932ed6797684d1732374eac7a3d29bf84a9dcf5ad75ffd29ba92d6a795136ecf621620a80315e16a7e3d9a4") 14:15:30 executing program 7: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$TIOCPKT(r2, 0x4020940d, &(0x7f0000000040)) 14:15:30 executing program 6: ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000000b00)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=0xffffffffffffffff, @ANYRESDEC]) lsetxattr(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)=@known='trusted.overlay.upper\x00', &(0x7f0000000680)='-\x00', 0x2, 0x1) r1 = clone3(&(0x7f00000006c0)={0x8834fd00, 0x0, 0x0, 0x0, {0x20000}, 0x0, 0x0, 0x0, 0x0}, 0x26) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000900)=@abs, 0x6e, &(0x7f0000000ac0)=[{&(0x7f0000000980)=""/10, 0xa}, {&(0x7f00000009c0)=""/69, 0x45}, {&(0x7f0000000a40)=""/67, 0x43}], 0x3, &(0x7f0000000cc0)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000028324281000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0x48}, 0x40000100) r3 = fork() ptrace$setopts(0x4200, r3, 0x0, 0x0) clone3(&(0x7f0000000bc0)={0x80, &(0x7f0000000740), &(0x7f0000000780), &(0x7f00000007c0), {0xb}, &(0x7f0000000800)=""/141, 0x8d, &(0x7f00000008c0)=""/44, &(0x7f0000000b80)=[r2, 0xffffffffffffffff, r1, r1, r3, r1, r1], 0x7}, 0x58) r4 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f00000000c0)={0x15, 0xb, 0x2, 0xb, 0x3, 0x8, 0x2, 0x58, 0x1}) ioctl$VT_RESIZE(r4, 0x4b63, 0x0) writev(r4, &(0x7f0000000580)=[{&(0x7f0000000200)="29d7ab5196f6bb14567903bc8075771979b4ddc178577b647df2719ca0a19ca65437e27f01f394a9e42c87e159259b6c3cba96ccf8656bb13cb506308d4148f628d12eed32d9fc57ebe11773dd80ad2526a46ae1ec7c2c191092dcd17775e19022f17386d69585787e8a9d0370294d04551d5db326f3ce1ca8952b4bafc7f118662f3e21c5ec9674b926096476d142b1c43e85288973c8d52491707f61ee3a182b4f97fff3c56041f3c8fa022bfa2dbe8b2141168305357abe40ea1f3640cba2cf94156a1e23f0", 0xc7}, {&(0x7f0000000300)="c90275dcb5980d062b0610dd5bf2bdea8c94d24d6b5261ba90883b5d97608618870b089ca011afaabcb1d2d9790c0c6546595543acf42123061b8464e35f8058f6da4414953ba51564fbb9671c5fd68d2d76f121267db5bfb177d0", 0x5b}, {&(0x7f0000000380)="35a6183c75b047ce74229549d37d2f4e7afaaed005104c2723a62f32259d34465b8fc506b563bbb9ffab79bf4ca1c98422728da04a856d094ea169f855f880c6a2a1737012a19c66f7e4bf84eb05f0826cc910bf34fc2b75620b5f615628732ca699360465e1cb1778f03617c2ccff598bfdf679eaa19f0f2b2607e4d4cb1e9275fd06143b748e1380411d1325ab4c1fffd65c35", 0x94}, {&(0x7f0000000440)="a55dba36d8c90ebde2d42504b3e89c4773dc48b92ee89f00eb8b8d0caa613d50609b9189d387849fac1fb7b25b1d96efe21026135d82d96fc270b74847b13383eee5fe40ce6d552f25e3a06ddc169e9b7119a7cd93", 0x55}, {&(0x7f00000004c0)="1cbbb69204ea345a79da577b2c4e1e38cc7874f0f08994e4cb84ce765a18bdc65e2478b89131ba3cc565e40bd4e7da1126a14f4de8a53df48e0859fa715f515e5fd458d26a25252ae591aafd0fb608b620fd262f0d16c19fe7bd2b62e150d15dfeb9143e1411af48f19dda64c07880afd5aef3aa6ae5d0696730f9d857c6c2d9b0e2adc9c446add7f3e9a7de69f0be23ea3aa270d4f998c7c5b49608", 0x9c}], 0x5) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 14:15:30 executing program 5: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r3 = getpgid(0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x6, 0x40, 0x6, 0x9, 0x0, 0x7fffffff, 0x40802, 0x8, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x7, 0x1, @perf_bp={&(0x7f0000000000), 0x1}, 0x4, 0x2e5e, 0x0, 0x0, 0x3000000000, 0x2, 0x87d, 0x0, 0x4b2, 0x0, 0x20}, r3, 0xffffffffffffffff, r0, 0x1) r4 = dup3(r2, r1, 0x0) ioctl$TIOCPKT(r4, 0x5420, &(0x7f0000000040)) 14:15:30 executing program 0: r0 = clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r3 = dup3(r2, r1, 0x0) ioctl$TIOCPKT(r3, 0x5420, &(0x7f0000000040)) clone3(&(0x7f0000000340)={0x108280, &(0x7f0000000040), &(0x7f00000000c0), &(0x7f0000000200), {0x18}, &(0x7f0000001280)=""/4096, 0x1000, &(0x7f0000000240)=""/187, &(0x7f0000000300)=[r0], 0x1, {r3}}, 0x58) 14:15:30 executing program 4: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) bind$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @multicast2}, 0x10) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000), 0x101001, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) write$rfkill(r1, &(0x7f00000000c0)={0x0, 0x0, 0x3, 0x1}, 0x8) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, r0) keyctl$restrict_keyring(0x1d, r2, &(0x7f0000000200)='trusted\x00', &(0x7f0000000240)='[\x00') 14:15:30 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = inotify_init1(0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r4 = dup3(r3, r2, 0x0) ioctl$TIOCPKT(r4, 0x5420, &(0x7f0000000040)) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r4, 0xc08c5332, &(0x7f0000000080)={0xfffffffb, 0x9, 0x0, 'queue1\x00', 0x7}) inotify_add_watch(r1, &(0x7f0000000040)='.\x00', 0x2000003) r5 = inotify_init1(0x0) inotify_add_watch(r5, &(0x7f0000000000)='./file0\x00', 0xa4000004) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r6 = dup2(r0, r0) close_range(r6, 0xffffffffffffffff, 0x0) 14:15:30 executing program 1: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\t\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 14:15:30 executing program 5: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x8, 0x0, 0x0, 0x12003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000180)={{0x7f, 0x45, 0x4c, 0x46, 0x4, 0x4, 0x7f, 0x9, 0x3, 0x3, 0x3e, 0x8000000, 0xe6, 0x40, 0xe0, 0x10001, 0xfff7, 0x38, 0x2, 0x5, 0x3, 0x3}, [{0x60000000, 0x7fffffff, 0x48000000, 0x10001, 0x5, 0x7, 0x2, 0x9b5}], "2fac8f7659cebc2c1e6fea981ec99eb6e716068b8b582fbbadece96be3e8160f1b0ff8b25bbecda39d69c215e3e37b", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x9a7) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = ioctl$NS_GET_PARENT(0xffffffffffffffff, 0xb702, 0x0) ioctl$BTRFS_IOC_LOGICAL_INO_V2(r2, 0xc038943b, &(0x7f0000000080)={0xfffffffffffffff7, 0x28, '\x00', 0x0, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0, 0x0]}) r3 = dup3(r1, r0, 0x0) ioctl$TIOCPKT(r3, 0x5420, &(0x7f0000000040)) 14:15:30 executing program 2: r0 = clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) r1 = clone3(&(0x7f0000000680)={0x80000, &(0x7f0000000380), &(0x7f00000003c0), &(0x7f0000000400), {0x28}, &(0x7f0000000440)=""/212, 0xd4, &(0x7f0000000540)=""/234, &(0x7f0000000640)=[r0], 0x1}, 0x58) r2 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000600)={0xa, 0x0, 0x0, @mcast2, 0x3}, 0x1c) fcntl$getownex(r2, 0x10, &(0x7f0000000040)={0x0, 0x0}) fcntl$lock(0xffffffffffffffff, 0x26, &(0x7f0000000000)={0x0, 0x1, 0x4, 0x4000009, r3}) r4 = fork() tkill(r4, 0xb) clone3(&(0x7f0000000740)={0x4000000, &(0x7f0000000040), &(0x7f00000000c0), &(0x7f0000000200), {0x17}, &(0x7f0000000240)=""/33, 0x21, &(0x7f0000000280)=""/221, &(0x7f0000000700)=[r0, r1, r0, r3, r0, r0, r0, r4], 0x8}, 0x58) 14:15:30 executing program 6: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xff}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = inotify_init1(0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x482001, 0x0) r6 = dup3(r5, r4, 0x0) ioctl$TIOCPKT(r6, 0x5420, &(0x7f0000000040)) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r6, 0xc08c5332, &(0x7f0000000180)={0x6, 0x6, 0x1, 'queue1\x00', 0x9}) r7 = dup3(r3, r2, 0x0) ioctl$TIOCPKT(r7, 0x5420, &(0x7f0000000040)) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r7, 0x4040534e, &(0x7f0000000080)={0x12, @time={0x3ff, 0x3f3}, 0x6, {0x4, 0x81}, 0x80, 0x1, 0x6}) inotify_add_watch(r1, &(0x7f0000000040)='.\x00', 0x2000003) r8 = inotify_init1(0x0) inotify_add_watch(r8, &(0x7f0000000000)='./file0\x00', 0xa4000004) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r9 = dup2(r0, r0) close_range(r9, 0xffffffffffffffff, 0x0) [ 3063.904044] audit: type=1400 audit(1667830530.579:20): avc: denied { checkpoint_restore } for pid=15886 comm="syz-executor.2" capability=40 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 [ 3077.931739] kmemleak: 5 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 14:15:51 executing program 6: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$TIOCPKT(r2, 0x5420, &(0x7f0000000040)) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000200)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xee01, 0xee01}}, './file0\x00'}) ioctl$TCSETSF(r3, 0x5404, &(0x7f00000003c0)={0x101, 0x225e8c56, 0x100, 0x1f, 0x14, "7ebcb16554f713c43ecb3e7c0e1a79594c75ff"}) getresuid(&(0x7f0000000240), &(0x7f0000000280), &(0x7f00000002c0)=0x0) r5 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r5, 0x4b63, 0x0) mount$9p_fd(0x0, &(0x7f0000000340)='./file0\x00', &(0x7f00000000c0), 0x40080, &(0x7f0000000400)=ANY=[@ANYRES16, @ANYRES64=r4, @ANYRES32=r5, @ANYBLOB="24a482d2b0173692781d5125e0b37e8d1be6ad6720df4fdb6c5d350dd4ffeacd0d429136331427e74cf82cabfe8ee0e0592bb2166391b6d97e8bbca3a5001d29cad13c69e55adc5d3b8ec3cfafa634007cdecadc2827ff2c02e81d7822a21c82864ea153d0cf484e8cb56d7df3d71dee5cc7e4e2d7af7f82a269ee17a0afa5ce57febad3938bf03646d7cdf78df27236f97bc7fd635926c270299359ef3cc64e6a443df9e779e8f18559c55848c0a664cce5b4a783b061a5404ee0d28a570c4f091a9a002ca0cac62291a09239a50014b75673cfe792ebfa5177afefc416d854bb4eee7366a3a6fb0db7eafe92f120b9266985bf"]) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 14:15:51 executing program 7: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$TIOCPKT(r2, 0x80045432, &(0x7f0000000040)) 14:15:51 executing program 0: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000600)={0xa, 0x0, 0x0, @mcast2, 0x3}, 0x1c) fcntl$getownex(r0, 0x10, &(0x7f0000000040)={0x0, 0x0}) fcntl$lock(0xffffffffffffffff, 0x26, &(0x7f0000000000)={0x0, 0x1, 0x4, 0x4000009, r1}) r2 = perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x3, 0x6, 0x5b, 0x7f, 0x0, 0xc9a, 0x10000, 0x3, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3f, 0x0, @perf_config_ext={0x0, 0x1}, 0x0, 0x0, 0x1, 0x2, 0x4e7, 0x13b, 0x7fff, 0x0, 0x6}, r1, 0x6, 0xffffffffffffffff, 0x0) fcntl$dupfd(r0, 0x406, r2) r3 = openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000040)='devices.deny\x00', 0x2, 0x0) fchdir(r3) request_key(&(0x7f0000000000)='rxrpc_s\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 14:15:51 executing program 1: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\n\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 14:15:51 executing program 5: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat2(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)={0x240580, 0x100, 0x2}, 0x18) fcntl$dupfd(r0, 0x406, r1) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0xfc, 0x8, 0xa4, 0x5, 0x0, 0xfff, 0x80104, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, @perf_config_ext={0x80000001, 0x10001}, 0x6000, 0x1f, 0x81, 0x6, 0xfffffffffffffbe7, 0x7307, 0x0, 0x0, 0x89c, 0x0, 0x2}, 0xffffffffffffffff, 0x6, r1, 0x1) r4 = dup3(r3, r2, 0x0) ioctl$TIOCPKT(r4, 0x5420, &(0x7f0000000040)) 14:15:51 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000040)='.\x00', 0x2000003) r2 = inotify_init1(0x0) inotify_add_watch(r2, &(0x7f0000000000)='./file0\x00', 0xa4000004) r3 = signalfd(0xffffffffffffffff, &(0x7f0000000080)={[0x9]}, 0x8) fcntl$dupfd(r3, 0x406, r2) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r4 = dup2(r0, r0) close_range(r4, 0xffffffffffffffff, 0x0) 14:15:51 executing program 4: r0 = clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) openat$vcs(0xffffffffffffff9c, &(0x7f0000000480), 0x10202, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r1, 0x4b63, 0x0) pread64(r1, &(0x7f0000000580)=""/75, 0x4b, 0x401) request_key(&(0x7f0000000000)='ceph\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r4 = dup3(r3, r2, 0x0) ioctl$TIOCPKT(r4, 0x5420, &(0x7f0000000040)) r5 = openat$full(0xffffffffffffff9c, &(0x7f00000004c0), 0x80080, 0x0) epoll_ctl$EPOLL_CTL_MOD(r4, 0x3, r5, &(0x7f0000000500)={0x10000000}) r6 = creat(&(0x7f0000000040)='./file0\x00', 0xc) clone3(&(0x7f0000000400)={0x1000000, &(0x7f00000000c0), &(0x7f0000000200), &(0x7f0000000240), {0x23}, &(0x7f0000000280)=""/140, 0x8c, &(0x7f0000000600)=""/74, &(0x7f0000000380)=[r0, r0, r0, r0], 0x4, {r6}}, 0x58) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r6, 0x6, 0x14, &(0x7f0000000540), 0x4) 14:15:51 executing program 2: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='blkio.bfq.io_queued\x00', 0x0, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r1, 0x4b63, 0x0) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r2, 0x4b63, 0x0) pidfd_getfd(r0, r2, 0x0) 14:15:51 executing program 3: arch_prctl$ARCH_GET_FS(0x1003, &(0x7f0000000080)) arch_prctl$ARCH_GET_FS(0x1003, &(0x7f00000000c0)) perf_event_open(&(0x7f0000001d80)={0x2, 0xffffffffffffffe2, 0x70, 0x7f, 0x2, 0x10, 0x0, 0x0, 0xc8101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, @perf_config_ext={0x800000}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xc, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/asound/seq/timer\x00', 0x0, 0x0) r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = inotify_init1(0x80000) inotify_add_watch(r3, &(0x7f0000000040)='.\x00', 0x2000003) inotify_add_watch(r2, &(0x7f0000000100)='./file0/file0\x00', 0x8000050) r4 = inotify_init1(0x0) inotify_add_watch(r4, &(0x7f0000000000)='./file0\x00', 0xa4000004) r5 = inotify_add_watch(r0, &(0x7f00000001c0)='./file0\x00', 0x20000000) inotify_rm_watch(r0, r5) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r6 = dup2(r1, r1) close_range(r6, 0xffffffffffffffff, 0x0) arch_prctl$ARCH_GET_FS(0x1003, &(0x7f0000000200)) 14:15:51 executing program 1: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x0f\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 14:15:51 executing program 7: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$TIOCPKT(r2, 0x80045440, &(0x7f0000000040)) 14:15:51 executing program 6: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$TIOCPKT(r2, 0x5420, &(0x7f0000000040)) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000200)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xee01, 0xee01}}, './file0\x00'}) ioctl$TCSETSF(r3, 0x5404, &(0x7f00000003c0)={0x101, 0x225e8c56, 0x100, 0x1f, 0x14, "7ebcb16554f713c43ecb3e7c0e1a79594c75ff"}) getresuid(&(0x7f0000000240), &(0x7f0000000280), &(0x7f00000002c0)=0x0) r5 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r5, 0x4b63, 0x0) mount$9p_fd(0x0, &(0x7f0000000340)='./file0\x00', &(0x7f00000000c0), 0x40080, &(0x7f0000000400)=ANY=[@ANYRES16, @ANYRES64=r4, @ANYRES32=r5, @ANYBLOB="24a482d2b0173692781d5125e0b37e8d1be6ad6720df4fdb6c5d350dd4ffeacd0d429136331427e74cf82cabfe8ee0e0592bb2166391b6d97e8bbca3a5001d29cad13c69e55adc5d3b8ec3cfafa634007cdecadc2827ff2c02e81d7822a21c82864ea153d0cf484e8cb56d7df3d71dee5cc7e4e2d7af7f82a269ee17a0afa5ce57febad3938bf03646d7cdf78df27236f97bc7fd635926c270299359ef3cc64e6a443df9e779e8f18559c55848c0a664cce5b4a783b061a5404ee0d28a570c4f091a9a002ca0cac62291a09239a50014b75673cfe792ebfa5177afefc416d854bb4eee7366a3a6fb0db7eafe92f120b9266985bf"]) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 14:15:51 executing program 2: munmap(&(0x7f0000ff2000/0xb000)=nil, 0xb000) r0 = clone3(&(0x7f0000000200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000380)={0x0}, &(0x7f00000003c0)=0xffffff82) r2 = fork() ptrace$setopts(0x4200, r2, 0x0, 0x0) clone3(&(0x7f0000000440)={0x206005240, &(0x7f0000000040), &(0x7f00000000c0), &(0x7f0000000280), {0x26}, &(0x7f00000002c0)=""/41, 0x29, &(0x7f0000000300)=""/90, &(0x7f0000000400)=[r1, r2, r0], 0x3}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) fork() 14:15:52 executing program 5: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x74919d4af830bb10}, 0x0, 0x0, 0xffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0xffffffff, 0x4}}, './file0\x00'}) perf_event_open(&(0x7f0000000080)={0x4, 0x80, 0x7, 0x6, 0x40, 0x20, 0x0, 0x4, 0xa0, 0x6, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0xc2b, 0x0, @perf_config_ext={0x3, 0x8}, 0x0, 0x40, 0x7fff, 0x7, 0x1000, 0x80000001, 0x8d4, 0x0, 0x200, 0x0, 0x76d4}, 0x0, 0x6, r1, 0x8) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r3 = dup3(r2, r0, 0x0) ioctl$TIOCPKT(r3, 0x5420, &(0x7f0000000040)) 14:15:52 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000040)='.\x00', 0x2000003) r2 = inotify_init1(0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r0, 0xc058534b, &(0x7f0000000080)={0x400, 0xc0000, 0x5, 0x2123, 0x100, 0x4}) inotify_add_watch(r2, &(0x7f0000000000)='./file0\x00', 0xa4000004) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r3, 0x4b63, 0x0) ioctl$AUTOFS_IOC_READY(r3, 0x9360, 0x2) r4 = dup2(r0, r0) close_range(r4, 0xffffffffffffffff, 0x0) 14:15:52 executing program 4: r0 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000040), 0x41c280, 0x0) clone3(&(0x7f0000000200)={0x2c4108980, 0x0, 0x0, 0x0, {0x3e}, 0x0, 0x0, 0x0, 0x0, 0x0, {r0}}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 14:15:52 executing program 0: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) open(&(0x7f0000000040)='./file0\x00', 0xd00, 0x10) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 14:15:52 executing program 6: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$TIOCPKT(r2, 0x5420, &(0x7f0000000040)) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000200)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xee01, 0xee01}}, './file0\x00'}) ioctl$TCSETSF(r3, 0x5404, &(0x7f00000003c0)={0x101, 0x225e8c56, 0x100, 0x1f, 0x14, "7ebcb16554f713c43ecb3e7c0e1a79594c75ff"}) getresuid(&(0x7f0000000240), &(0x7f0000000280), &(0x7f00000002c0)=0x0) r5 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r5, 0x4b63, 0x0) mount$9p_fd(0x0, &(0x7f0000000340)='./file0\x00', &(0x7f00000000c0), 0x40080, &(0x7f0000000400)=ANY=[@ANYRES16, @ANYRES64=r4, @ANYRES32=r5, @ANYBLOB="24a482d2b0173692781d5125e0b37e8d1be6ad6720df4fdb6c5d350dd4ffeacd0d429136331427e74cf82cabfe8ee0e0592bb2166391b6d97e8bbca3a5001d29cad13c69e55adc5d3b8ec3cfafa634007cdecadc2827ff2c02e81d7822a21c82864ea153d0cf484e8cb56d7df3d71dee5cc7e4e2d7af7f82a269ee17a0afa5ce57febad3938bf03646d7cdf78df27236f97bc7fd635926c270299359ef3cc64e6a443df9e779e8f18559c55848c0a664cce5b4a783b061a5404ee0d28a570c4f091a9a002ca0cac62291a09239a50014b75673cfe792ebfa5177afefc416d854bb4eee7366a3a6fb0db7eafe92f120b9266985bf"]) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 14:15:52 executing program 5: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = dup3(r1, r0, 0x0) r3 = dup3(r0, r2, 0x80000) ioctl$TIOCSPTLCK(r3, 0x40045431, &(0x7f0000000040)=0x1) ioctl$TIOCSLCKTRMIOS(r1, 0x5457, &(0x7f0000000000)) 14:15:52 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r2 = inotify_init1(0x0) inotify_add_watch(r2, &(0x7f0000000040)='.\x00', 0x2000003) r3 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r3, &(0x7f0000000600)={0xa, 0x0, 0x0, @mcast2, 0x3}, 0x1c) fcntl$getownex(r3, 0x10, &(0x7f0000000040)={0x0, 0x0}) fcntl$lock(0xffffffffffffffff, 0x26, &(0x7f0000000000)={0x0, 0x1, 0x4, 0x4000009, r4}) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x5, 0x5, 0x1, 0x80, 0x0, 0x7f, 0x222, 0xc, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9f2, 0x2, @perf_config_ext={0x69, 0x4fe37884}, 0x40000, 0xebf, 0x8000, 0x5, 0x3f, 0x2, 0xc2, 0x0, 0x0, 0x0, 0x6}, r4, 0x4, 0xffffffffffffffff, 0x1) r5 = inotify_init1(0x0) inotify_add_watch(r5, &(0x7f0000000000)='./file0\x00', 0xa4000004) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x404000, 0x0) r6 = dup2(r0, r0) creat(&(0x7f0000000080)='./file0\x00', 0x4) close_range(r6, 0xffffffffffffffff, 0x0) r7 = signalfd4(r1, &(0x7f0000000180)={[0x1]}, 0x8, 0x80000) r8 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r8, 0x4b63, 0x0) close_range(r7, r8, 0x0) 14:15:52 executing program 2: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x100000, &(0x7f0000000200)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@version_u}, {@fscache}, {@afid={'afid', 0x3d, 0x9}}, {@access_user}], [{@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@seclabel}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@subj_user={'subj_user', 0x3d, '\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16'}}, {@subj_user={'subj_user', 0x3d, '\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16'}}]}}) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000480)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x2}}, './file0\x00'}) sendto$inet(r0, &(0x7f00000004c0)="5a5aef830f", 0x5, 0x0, &(0x7f0000000500)={0x2, 0x4e22, @private=0xa010102}, 0x10) 14:15:52 executing program 7: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$TIOCPKT(r2, 0x80086601, &(0x7f0000000040)) 14:15:52 executing program 6: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000040)='.\x00', 0x2000003) r2 = inotify_init1(0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r0, 0xc058534b, &(0x7f0000000080)={0x400, 0xc0000, 0x5, 0x2123, 0x100, 0x4}) inotify_add_watch(r2, &(0x7f0000000000)='./file0\x00', 0xa4000004) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r3, 0x4b63, 0x0) ioctl$AUTOFS_IOC_READY(r3, 0x9360, 0x2) r4 = dup2(r0, r0) close_range(r4, 0xffffffffffffffff, 0x0) 14:15:52 executing program 0: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc4\x91\xf7\xf0\xc1\x05\xf4\x86l\xf7\x93\x9b\"\xce7\xaa\x16\x9baW!\xcb)K\v\xc7\xa4\xff\x7f\x00\x00b\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x06\x00p\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@\xc7\xd2\x9e\xfc\xff\xe9_-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88\x0e\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\x00\x10\x00\x00\x00\x00\x00\x00\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3', 0xfffffffffffffffb) request_key(&(0x7f0000000040)='blacklist\x00', &(0x7f00000000c0)={'syz', 0x0}, &(0x7f0000000240)='(%\x00\xeb\xca\xb9\xcbo\xbb)\x8c1\x128=\\IT\xfa\x99:\x9d\xb6]?Y\x8eE\xf8!\x03D\xb9;Y\xa2n.\xc08\xd7\x02\x87\x02\xf5\xc5 \x16`\xb3\x14\xdeP\xa0\v\x9bOL\xceH\xfa\xb6\xe2\xc1\xf1\x89\xd7\xd1]sR)=6\xc5\xc2\x81#\xd8\r\xfaS\r](X\xaa\xe3\xe8\x93f\x94\x1e\xcf\xd3\x1b\xabe\x89\xee-\xda\x8b\x84tN\xef\x1a\x8b\x90L\xa1D\xc5\x95X\x9c-\xe6\xa4\x97\x93\xe5\xb4g\xc5Bc2\x98\xacc\x8b\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xfe\xa8\x8d\xe2R\x1a\xa1', r0) [ 3096.414976] kmemleak: 4 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 14:16:12 executing program 2: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r0, 0x4b63, 0x0) ftruncate(r0, 0x6fe) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x3}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 14:16:12 executing program 1: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x10\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 14:16:12 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$TIOCPKT(r2, 0x5420, &(0x7f0000000040)) accept4$unix(r2, &(0x7f0000000080), &(0x7f0000000100)=0x6e, 0x80800) r3 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) r5 = inotify_init1(0x0) inotify_add_watch(r5, &(0x7f0000000040)='.\x00', 0x2000003) r6 = inotify_init1(0x0) inotify_add_watch(r6, &(0x7f0000000000)='./file0\x00', 0xa4000004) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r7 = dup2(r4, r4) close_range(r7, 0xffffffffffffffff, 0x0) fcntl$dupfd(r3, 0x0, r6) 14:16:12 executing program 7: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$TIOCPKT(r2, 0x80087601, &(0x7f0000000040)) 14:16:12 executing program 4: getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000200)=0x14) sendmsg$ETHTOOL_MSG_WOL_SET(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000800)={&(0x7f0000000240)={0x588, 0x0, 0x8, 0x70bd2c, 0x25dfdbfd, {}, [@ETHTOOL_A_WOL_MODES={0x380, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x2a4, 0x3, 0x0, 0x1, [{0x8, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x9, 0x2, '/\xcc]]\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x40}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x6f4}]}, {0xf0, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x11, 0x2, 'dns_resolver\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x2}, @ETHTOOL_A_BITSET_BIT_NAME={0xcf, 0x2, '\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16'}]}, {0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x25}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0xd, 0x2, 'C,@:).,&\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x7}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x2}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xabab}]}, {0x130, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x8000}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x11, 0x2, 'dns_resolver\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x9, 0x2, '!,!-\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0xcf, 0x2, '\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16'}, @ETHTOOL_A_BITSET_BIT_NAME={0x8, 0x2, '^\\#\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x100}, @ETHTOOL_A_BITSET_BIT_NAME={0xe, 0x2, '.&*-$@}{+\x00'}]}, {0x8, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}]}, @ETHTOOL_A_BITSET_MASK={0x70, 0x5, "e2137eb1aae00b1266da4b05f18875b79eedac66dea2979ee744d945459285741398c7b4f8f60031d4ad8a39c4e367956e8dfdf8c477184418f547b387710be960df0723c0b31450bdbcc7dfe588b621fd434916c99079d25604a028de6c83adf00adc156ea9597ad5a8e9c8"}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x7f}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_VALUE={0x56, 0x4, "db6fd86e13375aef24872a73aead41b4133889e473acd5fe187c3e9e2c5be8283e970024fbb8e233dadacc8203ecabf950789b49cd6784976d869feab3d01f7634785003ab3b25e1595e2df650e57941c08b"}, @ETHTOOL_A_BITSET_NOMASK={0x4}]}, @ETHTOOL_A_WOL_SOPASS={0xdc, 0x3, "68d4d5f5142ae430f1833771db14185e4ee51ba4d4d3af3911bd83a9f5a878836d2dc7492e10838ba6231b93dce5504f4b38513248e3dd7cd0a808520095781c16dea9fee9cc9187d817241f2aaa92c55e21e6413d43011b712e74b3d24660c82b06aed83355b04bf1145d57933c6c0de775336e54e1b2f5a6f9c8e7e0434958c8491e142badba51cf8eb66130642190dda94700f9d336817d4c14a7a7018041a57accbe29b9ddefd4cb14755f856213673d567f4f94d6b728b4f4c808cd36a8656dede8a6c5bd30485152de0be8858506160c303986b19d"}, @ETHTOOL_A_WOL_HEADER={0x54, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r0}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_batadv\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}, @ETHTOOL_A_WOL_SOPASS={0xc3, 0x3, "42324624ad53515967b76e91aebd204f80e40802c67ea0ea287e7b5c35cc1d8f00a70ecaf31c23cdea7c875fe2c1d6b2d937a54a83341dee15dadd4ac0db7c380184d331b2bcd1dca95c20b7d86c3494275ef670d645e74d19f9db0dba59d23b6a5d98b5934721ecef663162ee70f34dd743a24e28e45d18900e7df48a339719e912bba2a59fc5f759ea92c205dc404efabd2bf47d82451628b7fa12472e7a5e6e4ab138121e96c72238c4f189cfa32ab3f5425cbb20572fde80ebb51a020e"}]}, 0x588}, 0x1, 0x0, 0x0, 0x20000000}, 0x40848) clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 14:16:12 executing program 0: r0 = clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) clone3(&(0x7f0000000540)={0xc800, &(0x7f0000000340)=0xffffffffffffffff, &(0x7f0000000380), &(0x7f00000003c0)=0x0, {0x2b}, &(0x7f0000000400)=""/152, 0x98, &(0x7f00000004c0)=""/47, &(0x7f0000000500)=[r0, 0x0, r0, r0, r0], 0x5}, 0x58) r3 = ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x7) pidfd_getfd(r1, r3, 0x0) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r6 = dup3(r5, r4, 0x0) ioctl$TIOCPKT(r6, 0x5420, &(0x7f0000000040)) clone3(&(0x7f0000000600)={0x20000000, &(0x7f0000000040), &(0x7f00000000c0), &(0x7f0000000200), {0xf}, &(0x7f0000000240)=""/226, 0xe2, &(0x7f0000001280)=""/4096, &(0x7f00000005c0)=[r0, r0, r2], 0x3, {r6}}, 0x58) 14:16:12 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000000)={0xf8, 0x19, 0xc21, 0x0, 0x0, {0xa}, [@typed={0x8, 0x0, 0x0, 0x0, @fd}, @typed={0xdb, 0x17, 0x0, 0x0, @str='\x01\x01\x0ef\xc9\x8f\xdd\xaej~t\xc3\fr\x0f\x0eI\xb9\x1cz\xaf\x82>\xe6\xd0\xd7Y\x8e\xaf\xf42\xb6L~F\x9f\xd0i\xd2l\x8e\x13\xc0/\x86\xe4\b\xdf\xd1Z\xd0\xb0\xc8\x12\x9e.\xe0\x8d\x98\xae\xfeh\xe4\x05ey\xdaIS\xe4\x82\xb1\xd1\xdf:S\xa2em]x\xab\x9a\xe1\xa24\x11w\xd4Al\xa8\x8f\x05\x017/=\x12Tj\xc2\xc7\x13\xc6\xa4\xfaqP\"\xa2\xa2\xafV\x88\xffD\x86\xe2\x1do\xc2\x86\x9a\x03\xdd\x00l\xb1\xfc\xe1(\xa8I\xdc\x92\xb6\x9e|\xe2\xedkG\x9d\'\xb1\xfa.HF\x1a\x9e7G\xde\xf6\xdf\xf4\x16x\x1a\x8a\xd2\x9euW6p2\xa8W\x97\xee>o\x90x\x84\x89\xca\x1eP\x86\x1f-T\xf4X\xd9A\xb1O#w\xd3B\xca:\xc1\xe1\v4sj\x1f\xc3a\xc0\x1bDe\xe5\xfb\xbd\xfd'}]}, 0xf8}}, 0x0) r1 = syz_genetlink_get_family_id$tipc(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$TIPC_CMD_SHOW_LINK_STATS(r0, &(0x7f00000001c0)={&(0x7f0000000080), 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x30, r1, 0x4, 0x70bd27, 0x25dfdbfb, {{}, {}, {0x14, 0x14, 'broadcast-link\x00'}}, ["", "", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x20040000}, 0x10) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r4 = dup3(r3, r2, 0x0) ioctl$TIOCPKT(r4, 0x5420, &(0x7f0000000040)) ioctl$TCFLSH(r3, 0x540b, 0x2) ioctl$TIOCSSOFTCAR(r4, 0x541a, &(0x7f0000000000)=0x4) 14:16:12 executing program 6: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000040)='.\x00', 0x2000003) r2 = inotify_init1(0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r0, 0xc058534b, &(0x7f0000000080)={0x400, 0xc0000, 0x5, 0x2123, 0x100, 0x4}) inotify_add_watch(r2, &(0x7f0000000000)='./file0\x00', 0xa4000004) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r3, 0x4b63, 0x0) ioctl$AUTOFS_IOC_READY(r3, 0x9360, 0x2) r4 = dup2(r0, r0) close_range(r4, 0xffffffffffffffff, 0x0) [ 3105.830584] netlink: 'syz-executor.5': attribute type 23 has an invalid length. [ 3105.895007] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=16029 comm=syz-executor.5 [ 3105.914062] netlink: 'syz-executor.5': attribute type 23 has an invalid length. [ 3105.941014] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=16013 comm=syz-executor.5 14:16:25 executing program 6: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000040)='.\x00', 0x2000003) r2 = inotify_init1(0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r0, 0xc058534b, &(0x7f0000000080)={0x400, 0xc0000, 0x5, 0x2123, 0x100, 0x4}) inotify_add_watch(r2, &(0x7f0000000000)='./file0\x00', 0xa4000004) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r3, 0x4b63, 0x0) ioctl$AUTOFS_IOC_READY(r3, 0x9360, 0x2) r4 = dup2(r0, r0) close_range(r4, 0xffffffffffffffff, 0x0) 14:16:25 executing program 1: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x14\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 14:16:25 executing program 5: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r3 = dup3(r2, r1, 0x0) r4 = fcntl$dupfd(r0, 0x406, r3) ioctl$TIOCGSID(r4, 0x5429, &(0x7f0000000000)) r5 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r5, 0x4b63, 0x0) ioctl$TIOCPKT(r4, 0x5420, &(0x7f0000000040)=0x4) 14:16:25 executing program 2: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 14:16:25 executing program 7: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$TIOCPKT(r2, 0xc0045878, &(0x7f0000000040)) 14:16:25 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) ioctl$BTRFS_IOC_DEFRAG(r0, 0x50009402, 0x0) clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 14:16:25 executing program 0: r0 = clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0, 0x0}) ioctl$F2FS_IOC_SET_PIN_FILE(0xffffffffffffffff, 0x4004f50d, &(0x7f0000000040)=0x1) r2 = fork() ptrace$setopts(0x4200, r2, 0x0, 0x0) r3 = getpgrp(r1) r4 = fork() r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r6 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r7 = dup3(r6, r5, 0x0) ioctl$TIOCPKT(r7, 0x5420, &(0x7f0000000040)) clone3(&(0x7f0000000480)={0x200, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280), {0x3d}, &(0x7f00000002c0)=""/113, 0x71, &(0x7f0000000340)=""/234, &(0x7f0000000440)=[r0, r0, r2, r3, r4, r0], 0x6, {r7}}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 14:16:25 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xb) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000040)='.\x00', 0x2000003) r2 = inotify_init1(0x0) inotify_add_watch(r2, &(0x7f0000000000)='./file0\x00', 0xa4000004) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r3 = dup2(r0, r0) close_range(r3, 0xffffffffffffffff, 0x0) 14:16:25 executing program 0: ioctl$FIONCLEX(0xffffffffffffffff, 0x5450) clone3(&(0x7f0000001200)={0x18815ad00, 0x0, 0x0, 0x0, {0x40}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 14:16:25 executing program 5: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4}, 0x0, 0x0, 0x0, 0x6, 0x0, 0x20000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r0) r1 = fork() tkill(r1, 0xb) r2 = clone3(&(0x7f0000000700)={0x0, &(0x7f0000000000)=0xffffffffffffffff, &(0x7f0000000080)=0x0, &(0x7f00000000c0)=0x0, {0xc}, &(0x7f0000000180)=""/134, 0x86, &(0x7f0000000240)=""/148, &(0x7f0000000100)=[r1, r1, 0xffffffffffffffff, 0x0], 0x4}, 0x58) r6 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) clone3(&(0x7f0000000600)={0x40102100, &(0x7f00000003c0), &(0x7f0000000400)=0x0, &(0x7f0000000440), {0x35}, &(0x7f0000000480)=""/46, 0x2e, &(0x7f00000004c0)=""/223, &(0x7f00000005c0)=[r5, r2, r5, r1, 0x0], 0x5}, 0x58) r8 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000340), 0x8200, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r8) syz_open_procfs(r7, &(0x7f0000000680)='loginuid\x00') r9 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r10 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r10, 0x4b63, 0x0) r11 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r11, 0x4b63, 0x0) readv(r0, &(0x7f0000001bc0)=[{&(0x7f0000000300)=""/52, 0x34}, {&(0x7f0000000780)=""/105, 0x69}, {&(0x7f0000000800)=""/4096, 0x1000}, {&(0x7f0000001800)=""/155, 0x9b}, {&(0x7f00000018c0)=""/210, 0xd2}, {&(0x7f00000019c0)=""/222, 0xde}, {&(0x7f0000001ac0)=""/217, 0xd9}], 0x7) fcntl$lock(r11, 0x5, &(0x7f00000006c0)={0x1, 0x1, 0x3, 0x800, r5}) kcmp$KCMP_EPOLL_TFD(r1, r4, 0x7, r10, &(0x7f0000000380)={0xffffffffffffffff, r3, 0x46}) r12 = dup3(r9, r6, 0x0) ioctl$TIOCPKT(r12, 0x5420, &(0x7f0000000040)) 14:16:25 executing program 4: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 14:16:25 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = inotify_init1(0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r4 = dup3(r3, r2, 0x0) ioctl$TIOCPKT(r4, 0x5420, &(0x7f0000000040)) r5 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r5, 0x4b63, 0x0) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x409, &(0x7f0000000180)={'trans=fd,', {'rfdno', 0x3d, r4}, 0x2c, {'wfdno', 0x3d, r5}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}, {@uname={'uname', 0x3d, '/dev/snd/seq\x00'}}, {@uname={'uname', 0x3d, '/dev/ptmx\x00'}}, {@cache_none}], [{@mask={'mask', 0x3d, 'MAY_WRITE'}}]}}) inotify_add_watch(r1, &(0x7f0000000040)='.\x00', 0x2000003) r6 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r6, 0x4b63, 0x0) ioctl$TIOCMBIC(r6, 0x5417, &(0x7f0000000100)=0xf22) r7 = inotify_init1(0x0) inotify_add_watch(r7, &(0x7f0000000000)='./file0\x00', 0xa4000004) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r8 = dup2(r0, r0) close_range(r8, 0xffffffffffffffff, 0x0) 14:16:25 executing program 7: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$TIOCPKT(r2, 0xc0045878, &(0x7f0000000040)) 14:16:25 executing program 1: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) syncfs(0xffffffffffffffff) request_key(&(0x7f0000000040)='cifs.idmap\x00', &(0x7f0000000000)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 14:16:25 executing program 6: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000040)='.\x00', 0x2000003) r2 = inotify_init1(0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r0, 0xc058534b, &(0x7f0000000080)={0x400, 0xc0000, 0x5, 0x2123, 0x100, 0x4}) inotify_add_watch(r2, &(0x7f0000000000)='./file0\x00', 0xa4000004) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r3, 0x4b63, 0x0) ioctl$AUTOFS_IOC_READY(r3, 0x9360, 0x2) dup2(r0, r0) 14:16:25 executing program 0: sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="028025bd7000fbdbdf250a00000005002f000100000005002f00010000000500300001000000"], 0x2c}, 0x1, 0x0, 0x0, 0x24040019}, 0x20044000) clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, &(0x7f0000000040)={0x100000001, 0x6}) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r0, 0x4b63, 0x0) fchown(r0, 0xffffffffffffffff, 0xffffffffffffffff) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 14:16:25 executing program 4: fchmodat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x1) clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) 14:16:25 executing program 2: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) r0 = add_key$keyring(&(0x7f00000021c0), &(0x7f0000002200)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$setperm(0x5, r0, 0x8001400) keyctl$chown(0xb, r0, 0x0, 0x0) add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, r0) 14:16:25 executing program 0: clone3(&(0x7f0000000200)={0x229118f00, 0x0, 0x0, 0x0, {0x1b}, 0x0, 0x0, 0x0, 0x0}, 0x58) 14:16:25 executing program 4: ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000040)) clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000200)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xccF\xd1\xe2\xfa \x81H\xf6\xf5\x8c\xa1\xc0q\x9b\x8a\xc7\xf2\xca6', 0xfffffffffffffffb) 14:16:25 executing program 2: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) r0 = accept$inet6(0xffffffffffffffff, &(0x7f0000000200)={0xa, 0x0, 0x0, @ipv4}, &(0x7f0000000240)=0x1c) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000280)={{{@in=@multicast1, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in6=@ipv4={""/10, ""/2, @empty}}}, &(0x7f0000000380)=0xe8) stat(&(0x7f0000000900)='.\x00', &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r2, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), 0x200000, &(0x7f00000003c0)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@mmap}, {@access_user}, {@dfltuid={'dfltuid', 0x3d, 0xffffffffffffffff}}, {@version_u}, {@version_L}, {@mmap}, {@afid={'afid', 0x3d, 0x8}}, {@access_any}], [{@obj_type={'obj_type', 0x3d, '^^)(['}}, {@euid_gt={'euid>', 0xee00}}, {@euid_eq={'euid', 0x3d, r1}}, {@fowner_gt={'fowner>', r2}}, {@smackfstransmute={'smackfstransmute', 0x3d, '{(\xa0$-'}}, {@subj_type={'subj_type', 0x3d, '-\\)^.'}}]}}) 14:16:25 executing program 7: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$TIOCPKT(r2, 0xc0189436, &(0x7f0000000040)) 14:16:25 executing program 6: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000040)='.\x00', 0x2000003) r2 = inotify_init1(0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r0, 0xc058534b, &(0x7f0000000080)={0x400, 0xc0000, 0x5, 0x2123, 0x100, 0x4}) inotify_add_watch(r2, &(0x7f0000000000)='./file0\x00', 0xa4000004) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r3, 0x4b63, 0x0) ioctl$AUTOFS_IOC_READY(r3, 0x9360, 0x2) 14:16:25 executing program 1: clone3(&(0x7f0000001200)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) pread64(r0, &(0x7f0000000840)=""/253, 0xfd, 0x4fcd50c7) mount$9p_fd(0x0, &(0x7f0000000980)='./file0\x00', &(0x7f0000000800), 0x1400, &(0x7f0000000b80)=ANY=[@ANYBLOB="7472616e73b4d337329684e9340862eca2d8b8f75c3d66642c7266646e6fe5b8b3c0a607900d2a6ca1adfda53b3d9df6c4b75e5343f28e1e56fa9f4abb10bc2d80f165a278236025b520d8f972e0617bc88a51acd01da9b9430d00f9fabd6232f99b5838e0367ae41de6047f56e498a0c470e21e4011a2fdbad9a6e974a6eb1337603842bf4e4c3f8bc6e3bcbc07c5b4fb5bccda558d2cedb8a7fc34c1357f7ea6bc4ed32a3b5f19dcbf97efcb09a12dc5c5e87cfad398d66eee12aabb286ab3c5f230c1c63a3a0e9011c35fb3fb2978f107bc0d5b", @ANYRESHEX, @ANYBLOB="2c3d00e7ffffff7f000000", @ANYRESHEX, @ANYBLOB=',dfltgid=', @ANYRESHEX, @ANYBLOB="2c6673636f6e746578743d73797361646d5f752c6673636f6e746578743d73797374656d5f752c6d6561737572652c7063723d30303030303030303030303030303030303031302c636f6e746578743d73746166665f752c7375626a5f757365723d6b657972696e67002c6673757569643d65353235663539392d317f61312d313065302d346131362d30326633613533642c7063723d30303030303030303030303030303030303034382c00"]) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) r1 = add_key$keyring(&(0x7f00000021c0), &(0x7f0000002200)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r3 = dup3(r2, r0, 0x80000) r4 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r4, 0x4b63, 0x0) r5 = openat$sr(0xffffffffffffff9c, &(0x7f0000000ac0), 0x400, 0x0) ioctl$TIOCPKT(r5, 0x5420, &(0x7f0000000040)=0xfffffffe) r6 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r6, 0x4b63, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r3, 0xc0189379, &(0x7f0000000940)=ANY=[@ANYBLOB="0100000094af78ea2f0c1745", @ANYRES32=r6, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) keyctl$setperm(0x5, r1, 0x8001400) keyctl$chown(0xb, r1, 0x0, 0x0) add_key$keyring(&(0x7f0000000040), &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, r1) writev(0xffffffffffffffff, &(0x7f0000000740)=[{&(0x7f0000000200)="144f1977df25e410b1d202cbea3fc65d49c937d653608a7f155a8036c95c63585ceeac2b5b27f84a191aa2f708e03c5066587d116abe3c710cca3e291c233f682ac464710d200ecae170b71598e25e05e8df72e31dc3f8de7f3a41ec64f95093203572df2cdd99f61e0ed7e76cfb3e76da62a367ba45a72d207e9c352837c5601628790adb1c316d181adfc901b7d84cd3398c5263f75dea302c8fa0ce95712490e43cdeb8c027", 0xa7}, {&(0x7f00000002c0)="c3289431f34b2f5c1772dcef2893c29e82ade3a768f466d91dde9a24a057628578f7bba6a8bd301a20fffecc988201e7ff892f1694ec00c26617f906540be2ba69c34ea6b1eb8f541f1866ad6b7078d69415f197ad3bf03390d0710eb6ae0bf56392ed7586aa66a94ea03d247f8569b47d98395e5700decae7761ae409ce06fe43d4c7fa65502c82b6c136defe73036f5f652293613a16a2918c52266e11082b335e7c8f507501ac0e130e2b3ed56e19a739d34c930852b2dd88d1f5e10bde55694eb2405740b312004d8831764802b3961aa4f9d8fb6b", 0xd7}, {&(0x7f00000003c0)="737505875936ece82028c9af6e0fecc183d0f9715ca7e8869bec646ca1aeaa65d9d644fb00d318f5b22aee690a3a05d1f101b39b185f36533418bdecdff6b170630032fe17d2eee398531ace6575b218adf1b421d685850c869bc0c5292e7be1fc2367bf8ab1a388d853f277a21481f765471a22e5539b424e7f6f68efaf83131a5a415d5f5a540175185c51b91db8361d5bbae88945c0771d0750787d9abda485b0b94625a366146829b1b4c6c1c7f78cfd027e491fb2c59d7728145f9138a2355a", 0xc2}, {&(0x7f00000004c0)="d7b4bd82f5a84b2c04728cc0285b796db813745d823665c51b24ed39f33cf0a770e4917999aaddd1898830e85c75f7655f8c32aa1699b32e603e5b74817c8f63a5aa9efae04a", 0x46}, {&(0x7f0000000540)="508081b0e61252985f080b6090f474d281fae1919bdbe114bd8169f9f14d4c1492c728d2b5c43542c07dee02bd0f9f7c1932ae8bf7d2aaf046a24e728f984e825e6bb50a2d537cb408171a5eb331f6df7f8d34de5fcc3bb64e87c45ee794feb580dfd8590e97ec1a51721d4977835cdef23ab88c4f4af9a87b2f7341ca9fc407225f0242ee03fbe10738a8dd0dc32ad7fb525abeb31c6e013d7c1ec6c580929d9abb711e33ba2e242d952bfd15b2762cd9c0fde108e539b3e2006b4e62b7697eaa9e50a1cbcb70dbeda5552f31987fbdd5e49a76d6666ed14a01e9e42c9d0e13bb6112b878a5a425", 0xe8}, {&(0x7f0000000640)="d19a89a8b9ffa314f12b7bf5a833532d1066c535e522753a73f47ffec20acc325c1b60e1e575a3a7efc1ef3e86f7dc985cd592a083e68f251f6709f4884d90cefc0143ff299c63bd0add941a9e9072be454371229fc9a26324d4fa85400aea9c276efad76544d1e1bb91878a689c293fe40d2241e3a0035e2e4fbb73243ce97429cb8943a81a5ab61d540f6b050f049d0cb382bd61afe33b6b2867a930fbaf48312ea99576778560354006d6eac59f8bc3ac7338dcefa8440edf89a1f40ec317de8beeae0e7e96ded9ddbe6bd2ad05e91d75b7c6f8243e071803ed38d4f63080dab65266ec91c4f991ff2a25c5dd62be", 0xf0}], 0x6) 14:16:26 executing program 0: clone3(&(0x7f0000000280)={0x88118d00, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) openat$cgroup(0xffffffffffffffff, &(0x7f0000000300)='syz1\x00', 0x200002, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000040)='syz1\x00', 0x200002, 0x0) r0 = request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000100)='\x00\x00\x00\x00*\x10\xea\xa3\x92|\xad\xe1\xfcbH\xb2\x89F\x1b\xb2\xa6\x12D+\xc0\x91\xf7\xf0\xc1\x05\xf4\x86l5\x9e\xd7j\xb7d:\xec\x95&\xa4\xf7\x93\x9b\"\xce7\xaa\x16\x9baW\v\xc7\xa4\x8b\x96\xd5mb\x8cjc\xb1\xa1\x17\xd9UA\xabE\x13\xf5\xa3b.\x10\xb2R\x86D\xb8$\xac\\\x03Bp\x10D\xf4\xf2\b\x8aO\x06\xca\xa3I\x87\xd3\x1d\xa8i@-\x00i\xc5\xd6\xf8\xfd\x03T4\x10Q8\xe0\x88N\\\xafYX\x05M\xa1\xaa$\xe6\xd0\xda\x16\xb3\xed\x9cyK\x98\x96\a\xdd\x1dF0\xfdA\",\xb3\xb7\x9e\"\t,q<\xbb\xdc)\xb4\xf8\x10\xdf=\xcf1\xb2M\xe1{4\x12\xbfFT\xc8v\xe4\x94\xf94\xbc\xf0\x83T\x92\xa8\xfa\xda\xf2\x92>\xcf\xc3T\xcc\x83\x16', 0xfffffffffffffffb) request_key(&(0x7f00000000c0)='cifs.idmap\x00', &(0x7f0000000200)={'syz', 0x3}, &(0x7f0000000240)='[]&\x00', r0) syz_io_uring_complete(0x0) VM DIAGNOSIS: 14:21:33 Registers: info registers vcpu 0 RAX=ffffffff83e1d800 RBX=ffffffff84e322c0 RCX=ffffffff83e0554c RDX=0000000000000000 RSI=0000000000000000 RDI=ffffffff83e1dbc3 RBP=fffffbfff09c6458 RSP=ffffffff84e07e40 R8 =0000000000000001 R9 =ffff88806ce3c12b R10=ffffed100d9c7825 R11=0000000000000001 R12=0000000000000000 R13=ffffffff85670d48 R14=0000000000000000 R15=dffffc0000000000 RIP=ffffffff83e1d80e RFL=00000202 [-------] CPL=0 II=0 A20=1 SMM=0 HLT=1 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 0000000000000000 00000000 00000000 GS =0000 ffff88806ce00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe0000003000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000001000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=000056438555b9ac CR3=000000000caa6000 CR4=00350ef0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000600 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001fa0 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 XMM00=00000000000000000000000000000000 XMM01=00000000000000000000000000000000 XMM02=000000000000000041764cae80000000 XMM03=0000ff00000000000000000000000000 XMM04=732f6c61636f6c2f7273752f3d485441 XMM05=622f6c61636f6c2f7273752f3a6e6962 XMM06=73752f3a6e6962732f7273752f3a6e69 XMM07=6e69622f3a6e6962732f3a6e69622f72 XMM08=00000000000000000000000000000000 XMM09=00000000000000000000000000000000 XMM10=00000000000000000000000000000000 XMM11=00000000000000000000000000000000 XMM12=00000000000000000000000000000000 XMM13=00000000000000000000000000000000 XMM14=00000000000000000000000000000000 XMM15=00000000000000000000000000000000 info registers vcpu 1 RAX=ffffffff83e1d800 RBX=ffff88800852b300 RCX=ffffffff83e0554c RDX=0000000000000000 RSI=0000000000000000 RDI=ffffffff83e1dbc3 RBP=ffffed10010a5660 RSP=ffff88800856fe78 R8 =0000000000000001 R9 =ffff88806cf3c12b R10=ffffed100d9e7825 R11=0000000000000001 R12=0000000000000001 R13=ffffffff85670d48 R14=0000000000000000 R15=dffffc0000000000 RIP=ffffffff83e1d80e RFL=00000206 [-----P-] CPL=0 II=0 A20=1 SMM=0 HLT=1 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 0000000000000000 00000000 00000000 GS =0000 ffff88806cf00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe000004a000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000048000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00007fdd0458f010 CR3=000000000caa6000 CR4=00350ee0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001fa0 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 XMM00=00000000000000000000000000000000 XMM01=00000000000000000000000000000000 XMM02=00000000000000004104ddc000000000 XMM03=000006060201b4531040fc3eb7459bfc XMM04=6578650a00657a696d696e696d206365 XMM05=6f747563657865110073646565732063 XMM06=63657865080073747261747365722072 XMM07=69646e616320636578650e006e656720 XMM08=7a7566206365786509006c61746f7420 XMM09=657a696d696e696d20636578650d007a XMM10=78651100736465657320636578650a00 XMM11=00737472617473657220726f74756365 XMM12=20636578650e006e6567206365786508 XMM13=20636578650b006574616469646e6163 XMM14=616d7320636578650a00656761697274 XMM15=000073746e696820636578650a006873