x0) ioctl$UI_DEV_DESTROY(r0, 0x5502) 09:38:45 executing program 2: keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000a80)={0x0, 0xc, 0xae}, &(0x7f0000000ac0)={'enc=', 'raw', ' hash=', {'sha384-avx2\x00'}}, &(0x7f0000000b40)="058f6a5fe2db85fa52baca0c", &(0x7f0000000c00)=""/174) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xff}, 0x0) getpid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x62e, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1104}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x10, 0x800000000000803, 0x0) sendto(r1, &(0x7f0000000000)="120000001600e70d017b00000000008e1584", 0x12, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(r0, r2, 0x0, 0x1) 09:38:45 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xff}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(r0, r2, 0x0, 0x1) 09:38:45 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r0 = getpid() tkill(r0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x4000000000000004) writev(r1, &(0x7f0000000140)=[{&(0x7f0000000180)="580000001400192340834b80040d8c5602067fffffff81000000000000dca87086a5c000004f6400940005891550f4a8000000006700008000f0fffeffff09000080fff5dd00000010000100000c0900fcff0000040e05a5", 0x58}], 0x1) 09:38:45 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(r0, r2, 0x0, 0x1) 09:38:46 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000]}, 0x45c) r1 = syz_open_dev$sndtimer(0x0, 0x0, 0x100) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000040)={{0x1}}) gettid() r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[], 0x0) inotify_add_watch(r2, &(0x7f0000000180)='./file1\x00', 0x80000020) r3 = geteuid() getresgid(&(0x7f0000000140), 0x0, 0x0) fchown(r2, r3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r2) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={r1, 0x28, &(0x7f0000000240)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000002c0)={r4, 0xffffffff, 0xe6d3be648ff4b41c}, 0xc) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x3, 0x0) ioctl$UI_DEV_DESTROY(r0, 0x5502) [ 955.980717] input: syz1 as /devices/virtual/input/input363 09:38:46 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r0 = getpid() tkill(r0, 0x0) writev(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000180)="580000001400192340834b80040d8c5602067fffffff81000000000000dca87086a5c000004f6400940005891550f4a8000000006700008000f0fffeffff09000080fff5dd00000010000100000c0900fcff0000040e05a5", 0x58}], 0x1) 09:38:46 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xff}, 0x0) getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(r0, r1, 0x0, 0x1) 09:38:46 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r0 = getpid() tkill(r0, 0x0) writev(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000180)="580000001400192340834b80040d8c5602067fffffff81000000000000dca87086a5c000004f6400940005891550f4a8000000006700008000f0fffeffff09000080fff5dd00000010000100000c0900fcff0000040e05a5", 0x58}], 0x1) [ 956.109236] input: syz1 as /devices/virtual/input/input364 09:38:48 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x70, 0x70, 0x8, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x5, 0x100, 0xfe3a}}, @restrict={0x5, 0x0, 0x0, 0xb, 0x3}, @func, @int, @int, @fwd, @enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x0, 0x9}]}]}, {0x0, [0x0, 0x61, 0x0, 0xa3, 0x2e, 0x0]}}, &(0x7f0000000140)=""/26, 0x90, 0x1a}, 0x20) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000240)=ANY=[@ANYBLOB="cd80"], 0x2}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x39) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) ptrace$cont(0x1f, r0, 0x5, 0x800000000000) 09:38:48 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xff}, 0x0) getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(r0, r1, 0x0, 0x1) 09:38:48 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r0 = getpid() tkill(r0, 0x0) writev(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000180)="580000001400192340834b80040d8c5602067fffffff81000000000000dca87086a5c000004f6400940005891550f4a8000000006700008000f0fffeffff09000080fff5dd00000010000100000c0900fcff0000040e05a5", 0x58}], 0x1) 09:38:48 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000]}, 0x45c) r1 = syz_open_dev$sndtimer(0x0, 0x0, 0x100) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000040)={{0x1}}) gettid() r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[], 0x0) inotify_add_watch(r2, &(0x7f0000000180)='./file1\x00', 0x80000020) r3 = geteuid() getresgid(&(0x7f0000000140), 0x0, 0x0) fchown(r2, r3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r2) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={r1, 0x28, &(0x7f0000000240)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000002c0)={r4, 0xffffffff, 0xe6d3be648ff4b41c}, 0xc) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x3, 0x0) ioctl$UI_DEV_DESTROY(r0, 0x5502) 09:38:48 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xff}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(r0, r2, 0x0, 0x1) 09:38:48 executing program 2: keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000a80)={0x0, 0xc, 0xae}, &(0x7f0000000ac0)={'enc=', 'raw', ' hash=', {'sha384-avx2\x00'}}, &(0x7f0000000b40)="058f6a5fe2db85fa52baca0c", &(0x7f0000000c00)=""/174) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xff}, 0x0) getpid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x62e, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1104}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKSECTGET(r0, 0x1267, &(0x7f0000000580)) sendto(0xffffffffffffffff, &(0x7f0000000000)="120000001600e70d017b00000000008e1584", 0x12, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(r0, r1, 0x0, 0x1) 09:38:48 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) getpid() r0 = socket$netlink(0x10, 0x3, 0x4000000000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000180)="580000001400192340834b80040d8c5602067fffffff81000000000000dca87086a5c000004f6400940005891550f4a8000000006700008000f0fffeffff09000080fff5dd00000010000100000c0900fcff0000040e05a5", 0x58}], 0x1) 09:38:49 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xff}, 0x0) getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(r0, r1, 0x0, 0x1) 09:38:49 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4000000000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000180)="580000001400192340834b80040d8c5602067fffffff81000000000000dca87086a5c000004f6400940005891550f4a8000000006700008000f0fffeffff09000080fff5dd00000010000100000c0900fcff0000040e05a5", 0x58}], 0x1) 09:38:49 executing program 3: keyctl$KEYCTL_PKEY_DECRYPT(0x1a, 0x0, &(0x7f0000000ac0)={'enc=', 'raw', ' hash=', {'sha384-avx2\x00'}}, &(0x7f0000000b40)="058f6a5fe2db85fa52baca0c", &(0x7f0000000c00)=""/174) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xff}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(r0, r2, 0x0, 0x1) [ 959.072381] input: syz1 as /devices/virtual/input/input365 09:38:49 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xff}, 0x0) r1 = getpid() sched_setattr(r1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(r0, r2, 0x0, 0x1) 09:38:49 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$netlink(0x10, 0x3, 0x4000000000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000180)="580000001400192340834b80040d8c5602067fffffff81000000000000dca87086a5c000004f6400940005891550f4a8000000006700008000f0fffeffff09000080fff5dd00000010000100000c0900fcff0000040e05a5", 0x58}], 0x1) 09:38:51 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x4000000000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000180)="580000001400192340834b80040d8c5602067fffffff81000000000000dca87086a5c000004f6400940005891550f4a8000000006700008000f0fffeffff09000080fff5dd00000010000100000c0900fcff0000040e05a5", 0x58}], 0x1) 09:38:51 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000]}, 0x45c) r1 = syz_open_dev$sndtimer(0x0, 0x0, 0x100) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000040)={{0x1}}) gettid() r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[], 0x0) inotify_add_watch(r2, &(0x7f0000000180)='./file1\x00', 0x80000020) r3 = geteuid() getresgid(&(0x7f0000000140), 0x0, 0x0) fchown(r2, r3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r2) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={r1, 0x28, &(0x7f0000000240)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000002c0)={r4, 0xffffffff, 0xe6d3be648ff4b41c}, 0xc) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x3, 0x0) ioctl$UI_DEV_DESTROY(r0, 0x5502) 09:38:51 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x70, 0x70, 0x8, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x5, 0x100, 0xfe3a}}, @restrict={0x5, 0x0, 0x0, 0xb, 0x3}, @func, @int, @int, @fwd, @enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x0, 0x9}]}]}, {0x0, [0x0, 0x61, 0x0, 0xa3, 0x2e, 0x0]}}, &(0x7f0000000140)=""/26, 0x90, 0x1a}, 0x20) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000240)=ANY=[@ANYBLOB="cd80"], 0x2}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x39) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) ptrace$cont(0x1f, r0, 0x5, 0x800000000000) 09:38:51 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xff}, 0x0) r1 = getpid() sched_setattr(r1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(r0, r2, 0x0, 0x1) 09:38:51 executing program 2: keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000a80)={0x0, 0xc, 0xae}, &(0x7f0000000ac0)={'enc=', 'raw', ' hash=', {'sha384-avx2\x00'}}, &(0x7f0000000b40)="058f6a5fe2db85fa52baca0c", &(0x7f0000000c00)=""/174) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xff}, 0x0) getpid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x62e, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1104}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKSECTGET(r0, 0x1267, &(0x7f0000000580)) sendto(0xffffffffffffffff, &(0x7f0000000000)="120000001600e70d017b00000000008e1584", 0x12, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(r0, r1, 0x0, 0x1) 09:38:51 executing program 3: keyctl$KEYCTL_PKEY_DECRYPT(0x1a, 0x0, &(0x7f0000000ac0)={'enc=', 'raw', ' hash=', {'sha384-avx2\x00'}}, &(0x7f0000000b40)="058f6a5fe2db85fa52baca0c", &(0x7f0000000c00)=""/174) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xff}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(r0, r2, 0x0, 0x1) 09:38:52 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000180)="580000001400192340834b80040d8c5602067fffffff81000000000000dca87086a5c000004f6400940005891550f4a8000000006700008000f0fffeffff09000080fff5dd00000010000100000c0900fcff0000040e05a5", 0x58}], 0x1) 09:38:52 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xff}, 0x0) r1 = getpid() sched_setattr(r1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(r0, r2, 0x0, 0x1) [ 962.037006] input: syz1 as /devices/virtual/input/input366 09:38:52 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000]}, 0x45c) r1 = syz_open_dev$sndtimer(0x0, 0x0, 0x100) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000040)={{0x1}}) gettid() r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[@ANYBLOB], 0x0) inotify_add_watch(r2, &(0x7f0000000180)='./file1\x00', 0x80000020) r3 = geteuid() getresgid(&(0x7f0000000140), 0x0, 0x0) fchown(r2, r3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r2) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={r1, 0x28, &(0x7f0000000240)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000002c0)={r4, 0xffffffff, 0xe6d3be648ff4b41c}, 0xc) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x3, 0x0) ioctl$UI_DEV_DESTROY(r0, 0x5502) 09:38:52 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000180)="580000001400192340834b80040d8c5602067fffffff81000000000000dca87086a5c000004f6400940005891550f4a8000000006700008000f0fffeffff09000080fff5dd00000010000100000c0900fcff0000040e05a5", 0x58}], 0x1) [ 962.087389] netlink: 64 bytes leftover after parsing attributes in process `syz-executor.1'. 09:38:52 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xff}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(r0, r2, 0x0, 0x1) 09:38:52 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000]}, 0x45c) r1 = syz_open_dev$sndtimer(0x0, 0x0, 0x100) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000040)={{0x1}}) gettid() r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[@ANYBLOB], 0x0) inotify_add_watch(r2, &(0x7f0000000180)='./file1\x00', 0x80000020) r3 = geteuid() getresgid(&(0x7f0000000140), 0x0, 0x0) fchown(r2, r3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r2) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={r1, 0x28, &(0x7f0000000240)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000002c0)={r4, 0xffffffff, 0xe6d3be648ff4b41c}, 0xc) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x3, 0x0) ioctl$UI_DEV_DESTROY(r0, 0x5502) 09:38:52 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xff}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(r0, r2, 0x0, 0x1) [ 962.171979] input: syz1 as /devices/virtual/input/input367 [ 962.187126] netlink: 64 bytes leftover after parsing attributes in process `syz-executor.1'. 09:38:52 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000180)="580000001400192340834b80040d8c5602067fffffff81000000000000dca87086a5c000004f6400940005891550f4a8000000006700008000f0fffeffff09000080fff5dd00000010000100000c0900fcff0000040e05a5", 0x58}], 0x1) [ 962.283069] netlink: 64 bytes leftover after parsing attributes in process `syz-executor.1'. [ 962.293107] input: syz1 as /devices/virtual/input/input368 09:38:55 executing program 2: keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000a80)={0x0, 0xc, 0xae}, &(0x7f0000000ac0)={'enc=', 'raw', ' hash=', {'sha384-avx2\x00'}}, &(0x7f0000000b40)="058f6a5fe2db85fa52baca0c", &(0x7f0000000c00)=""/174) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xff}, 0x0) getpid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x62e, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1104}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKSECTGET(r0, 0x1267, &(0x7f0000000580)) sendto(0xffffffffffffffff, &(0x7f0000000000)="120000001600e70d017b00000000008e1584", 0x12, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(r0, r1, 0x0, 0x1) 09:38:55 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xff}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(r0, r2, 0x0, 0x1) 09:38:55 executing program 1: socket$netlink(0x10, 0x3, 0x4000000000000004) writev(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000180)="580000001400192340834b80040d8c5602067fffffff81000000000000dca87086a5c000004f6400940005891550f4a8000000006700008000f0fffeffff09000080fff5dd00000010000100000c0900fcff0000040e05a5", 0x58}], 0x1) 09:38:55 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000]}, 0x45c) r1 = syz_open_dev$sndtimer(0x0, 0x0, 0x100) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000040)={{0x1}}) gettid() r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[@ANYBLOB], 0x0) inotify_add_watch(r2, &(0x7f0000000180)='./file1\x00', 0x80000020) r3 = geteuid() getresgid(&(0x7f0000000140), 0x0, 0x0) fchown(r2, r3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r2) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={r1, 0x28, &(0x7f0000000240)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000002c0)={r4, 0xffffffff, 0xe6d3be648ff4b41c}, 0xc) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x3, 0x0) ioctl$UI_DEV_DESTROY(r0, 0x5502) 09:38:55 executing program 3: keyctl$KEYCTL_PKEY_DECRYPT(0x1a, 0x0, &(0x7f0000000ac0)={'enc=', 'raw', ' hash=', {'sha384-avx2\x00'}}, &(0x7f0000000b40)="058f6a5fe2db85fa52baca0c", &(0x7f0000000c00)=""/174) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xff}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(r0, r2, 0x0, 0x1) 09:38:55 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x7c, 0x7c, 0x8, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x5, 0x100, 0xfe3a}}, @restrict={0x5, 0x0, 0x0, 0xb, 0x3}, @ptr={0x0, 0x0, 0x0, 0x2, 0x1}, @func, @int, @int, @fwd, @enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x0, 0x9}]}]}, {0x0, [0x0, 0x61, 0x0, 0xa3, 0x2e, 0x0]}}, &(0x7f0000000140)=""/26, 0x9c, 0x1a}, 0x20) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000240)=ANY=[@ANYBLOB="cd80"], 0x2}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x39) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) ptrace$cont(0x1f, r0, 0x5, 0x800000000000) 09:38:55 executing program 1: socket$netlink(0x10, 0x3, 0x4000000000000004) writev(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000180)="580000001400192340834b80040d8c5602067fffffff81000000000000dca87086a5c000004f6400940005891550f4a8000000006700008000f0fffeffff09000080fff5dd00000010000100000c0900fcff0000040e05a5", 0x58}], 0x1) 09:38:55 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xff}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2}, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(r0, r2, 0x0, 0x1) [ 965.112796] input: syz1 as /devices/virtual/input/input369 09:38:55 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000]}, 0x45c) r1 = syz_open_dev$sndtimer(0x0, 0x0, 0x100) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000040)={{0x1}}) gettid() r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[@ANYBLOB="f75f9bf747594d0a1851415d989b48270bb03c9ef00b305cba0432a36b9310552b2e4de8c9de57a65146ad9194a585247c8d2a48e1311d4dd0e973234ea0a1a238326753d3da28e216683f91691b"], 0x4e) inotify_add_watch(r2, &(0x7f0000000180)='./file1\x00', 0x80000020) r3 = geteuid() getresgid(&(0x7f0000000140), 0x0, 0x0) fchown(r2, r3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r2) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={r1, 0x28, &(0x7f0000000240)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000002c0)={r4, 0xffffffff, 0xe6d3be648ff4b41c}, 0xc) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x3, 0x0) ioctl$UI_DEV_DESTROY(r0, 0x5502) 09:38:55 executing program 1: socket$netlink(0x10, 0x3, 0x4000000000000004) writev(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000180)="580000001400192340834b80040d8c5602067fffffff81000000000000dca87086a5c000004f6400940005891550f4a8000000006700008000f0fffeffff09000080fff5dd00000010000100000c0900fcff0000040e05a5", 0x58}], 0x1) 09:38:55 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xff}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2}, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(r0, r2, 0x0, 0x1) 09:38:55 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x4000000000000004) writev(r0, 0x0, 0x0) [ 965.276727] input: syz1 as /devices/virtual/input/input370 09:38:55 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x4000000000000004) writev(r0, 0x0, 0x0) 09:38:55 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xff}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2}, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(r0, r2, 0x0, 0x1) 09:38:55 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000]}, 0x45c) r1 = syz_open_dev$sndtimer(0x0, 0x0, 0x100) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000040)={{0x1}}) gettid() r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[@ANYBLOB="f75f9bf747594d0a1851415d989b48270bb03c9ef00b305cba0432a36b9310552b2e4de8c9de57a65146ad9194a585247c8d2a48e1311d4dd0e973234ea0a1a238326753d3da28e216683f91691b"], 0x4e) inotify_add_watch(r2, &(0x7f0000000180)='./file1\x00', 0x80000020) r3 = geteuid() getresgid(&(0x7f0000000140), 0x0, 0x0) fchown(r2, r3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r2) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={r1, 0x28, &(0x7f0000000240)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000002c0)={r4, 0xffffffff, 0xe6d3be648ff4b41c}, 0xc) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x3, 0x0) ioctl$UI_DEV_DESTROY(r0, 0x5502) 09:38:55 executing program 2: keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000a80)={0x0, 0xc, 0xae}, &(0x7f0000000ac0)={'enc=', 'raw', ' hash=', {'sha384-avx2\x00'}}, &(0x7f0000000b40)="058f6a5fe2db85fa52baca0c", &(0x7f0000000c00)=""/174) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xff}, 0x0) getpid() r1 = socket(0x10, 0x800000000000803, 0x0) ioctl$BLKSECTGET(r0, 0x1267, &(0x7f0000000580)) sendto(r1, &(0x7f0000000000)="120000001600e70d017b00000000008e1584", 0x12, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(r0, r2, 0x0, 0x1) 09:38:55 executing program 3: keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000a80)={0x0, 0xc, 0xae}, 0x0, &(0x7f0000000b40)="058f6a5fe2db85fa52baca0c", &(0x7f0000000c00)=""/174) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xff}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(r0, r2, 0x0, 0x1) [ 965.648006] input: syz1 as /devices/virtual/input/input371 09:38:58 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x7c, 0x7c, 0x8, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x5, 0x100, 0xfe3a}}, @restrict={0x5, 0x0, 0x0, 0xb, 0x3}, @ptr, @func, @int, @int, @fwd, @enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x0, 0x9}]}]}, {0x0, [0x0, 0x61, 0x0, 0xa3, 0x2e, 0x0]}}, &(0x7f0000000140)=""/26, 0x9c, 0x1a}, 0x20) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000240)=ANY=[@ANYBLOB="cd80"], 0x2}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x39) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) ptrace$cont(0x1f, r0, 0x5, 0x800000000000) 09:38:58 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x4000000000000004) writev(r0, 0x0, 0x0) 09:38:58 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xff}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = syz_open_procfs(0x0, 0x0) sendfile(r0, r2, 0x0, 0x1) 09:38:58 executing program 3: keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000a80)={0x0, 0xc, 0xae}, 0x0, &(0x7f0000000b40)="058f6a5fe2db85fa52baca0c", &(0x7f0000000c00)=""/174) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xff}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(r0, r2, 0x0, 0x1) 09:38:58 executing program 2: keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000a80)={0x0, 0xc, 0xae}, &(0x7f0000000ac0)={'enc=', 'raw', ' hash=', {'sha384-avx2\x00'}}, &(0x7f0000000b40)="058f6a5fe2db85fa52baca0c", &(0x7f0000000c00)=""/174) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xff}, 0x0) getpid() r1 = socket(0x10, 0x800000000000803, 0x0) ioctl$BLKSECTGET(r0, 0x1267, &(0x7f0000000580)) sendto(r1, &(0x7f0000000000)="120000001600e70d017b00000000008e1584", 0x12, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(r0, r2, 0x0, 0x1) 09:38:58 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000]}, 0x45c) r1 = syz_open_dev$sndtimer(0x0, 0x0, 0x100) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000040)={{0x1}}) gettid() r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[@ANYBLOB="f75f9bf747594d0a1851415d989b48270bb03c9ef00b305cba0432a36b9310552b2e4de8c9de57a65146ad9194a585247c8d2a48e1311d4dd0e973234ea0a1a238326753d3da28e216683f91691b"], 0x4e) inotify_add_watch(r2, &(0x7f0000000180)='./file1\x00', 0x80000020) r3 = geteuid() getresgid(&(0x7f0000000140), 0x0, 0x0) fchown(r2, r3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r2) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={r1, 0x28, &(0x7f0000000240)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000002c0)={r4, 0xffffffff, 0xe6d3be648ff4b41c}, 0xc) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x3, 0x0) ioctl$UI_DEV_DESTROY(r0, 0x5502) 09:38:58 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x4000000000000004) writev(r0, &(0x7f0000000140), 0x0) 09:38:58 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xff}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = syz_open_procfs(0x0, 0x0) sendfile(r0, r2, 0x0, 0x1) 09:38:58 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xff}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = syz_open_procfs(0x0, 0x0) sendfile(r0, r2, 0x0, 0x1) [ 968.155241] input: syz1 as /devices/virtual/input/input372 09:38:58 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x4000000000000004) writev(r0, &(0x7f0000000140), 0x0) 09:38:58 executing program 4: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xff}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(0xffffffffffffffff, r1, 0x0, 0x1) 09:38:58 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000]}, 0x45c) r1 = syz_open_dev$sndtimer(0x0, 0x0, 0x100) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000040)={{0x1}}) gettid() r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[@ANYBLOB="f75f9bf747594d0a1851415d989b48270bb03c9ef00b305cba0432a36b9310552b2e4de8c9de57a65146ad9194a585247c8d2a48e1311d4dd0e973234ea0a1a238326753d3da28e216683f91691b54351036cf18886cd3e555df4a1b907696264440c2e8407ed7160e8250e81157496310f16407a5"], 0x75) inotify_add_watch(r2, &(0x7f0000000180)='./file1\x00', 0x80000020) r3 = geteuid() getresgid(&(0x7f0000000140), 0x0, 0x0) fchown(r2, r3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r2) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={r1, 0x28, &(0x7f0000000240)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000002c0)={r4, 0xffffffff, 0xe6d3be648ff4b41c}, 0xc) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x3, 0x0) ioctl$UI_DEV_DESTROY(r0, 0x5502) [ 968.326094] input: syz1 as /devices/virtual/input/input373 09:39:01 executing program 3: keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000a80)={0x0, 0xc, 0xae}, 0x0, &(0x7f0000000b40)="058f6a5fe2db85fa52baca0c", &(0x7f0000000c00)=""/174) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xff}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(r0, r2, 0x0, 0x1) 09:39:01 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x4000000000000004) writev(r0, &(0x7f0000000140), 0x0) 09:39:01 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x7c, 0x7c, 0x8, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x5, 0x100, 0xfe3a}}, @restrict={0x5, 0x0, 0x0, 0xb, 0x3}, @ptr, @func, @int, @int, @fwd, @enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x0, 0x9}]}]}, {0x0, [0x0, 0x61, 0x0, 0xa3, 0x2e, 0x0]}}, &(0x7f0000000140)=""/26, 0x9c, 0x1a}, 0x20) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000240)=ANY=[@ANYBLOB="cd80"], 0x2}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x39) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) ptrace$cont(0x1f, r0, 0x5, 0x800000000000) 09:39:01 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000]}, 0x45c) r1 = syz_open_dev$sndtimer(0x0, 0x0, 0x100) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000040)={{0x1}}) gettid() r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[@ANYBLOB="f75f9bf747594d0a1851415d989b48270bb03c9ef00b305cba0432a36b9310552b2e4de8c9de57a65146ad9194a585247c8d2a48e1311d4dd0e973234ea0a1a238326753d3da28e216683f91691b54351036cf18886cd3e555df4a1b907696264440c2e8407ed7160e8250e81157496310f16407a5"], 0x75) inotify_add_watch(r2, &(0x7f0000000180)='./file1\x00', 0x80000020) r3 = geteuid() getresgid(&(0x7f0000000140), 0x0, 0x0) fchown(r2, r3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r2) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={r1, 0x28, &(0x7f0000000240)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000002c0)={r4, 0xffffffff, 0xe6d3be648ff4b41c}, 0xc) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x3, 0x0) ioctl$UI_DEV_DESTROY(r0, 0x5502) 09:39:01 executing program 4: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xff}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(0xffffffffffffffff, r1, 0x0, 0x1) 09:39:01 executing program 2: keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000a80)={0x0, 0xc, 0xae}, &(0x7f0000000ac0)={'enc=', 'raw', ' hash=', {'sha384-avx2\x00'}}, &(0x7f0000000b40)="058f6a5fe2db85fa52baca0c", &(0x7f0000000c00)=""/174) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xff}, 0x0) getpid() r1 = socket(0x10, 0x800000000000803, 0x0) ioctl$BLKSECTGET(r0, 0x1267, &(0x7f0000000580)) sendto(r1, &(0x7f0000000000)="120000001600e70d017b00000000008e1584", 0x12, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(r0, r2, 0x0, 0x1) 09:39:01 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x4000000000000004) writev(r0, &(0x7f0000000140)=[{0x0}], 0x1) 09:39:01 executing program 4: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xff}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(0xffffffffffffffff, r1, 0x0, 0x1) 09:39:01 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000]}, 0x45c) r1 = syz_open_dev$sndtimer(0x0, 0x0, 0x100) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000040)={{0x1}}) gettid() r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[@ANYBLOB="f75f9bf747594d0a1851415d989b48270bb03c9ef00b305cba0432a36b9310552b2e4de8c9de57a65146ad9194a585247c8d2a48e1311d4dd0e973234ea0a1a238326753d3da28e216683f91691b54351036cf18886cd3e555df4a1b907696264440c2e8407ed7160e8250e81157496310f16407a5"], 0x75) inotify_add_watch(r2, &(0x7f0000000180)='./file1\x00', 0x80000020) r3 = geteuid() getresgid(&(0x7f0000000140), 0x0, 0x0) fchown(r2, r3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r2) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={r1, 0x28, &(0x7f0000000240)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000002c0)={r4, 0xffffffff, 0xe6d3be648ff4b41c}, 0xc) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x3, 0x0) ioctl$UI_DEV_DESTROY(r0, 0x5502) [ 971.137904] input: syz1 as /devices/virtual/input/input374 09:39:01 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xff}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(r0, 0xffffffffffffffff, 0x0, 0x1) 09:39:01 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x4000000000000004) writev(r0, &(0x7f0000000140)=[{0x0}], 0x1) 09:39:01 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x4000000000000004) writev(r0, &(0x7f0000000140)=[{0x0}], 0x1) [ 971.256779] input: syz1 as /devices/virtual/input/input375 09:39:01 executing program 3: keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000a80)={0x0, 0x0, 0xae}, &(0x7f0000000ac0)={'enc=', 'raw', ' hash=', {'sha384-avx2\x00'}}, 0x0, &(0x7f0000000c00)=""/174) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xff}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(r0, r2, 0x0, 0x1) 09:39:04 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x7c, 0x7c, 0x8, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x5, 0x100, 0xfe3a}}, @restrict={0x5, 0x0, 0x0, 0xb, 0x3}, @ptr, @func, @int, @int, @fwd, @enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x0, 0x9}]}]}, {0x0, [0x0, 0x61, 0x0, 0xa3, 0x2e, 0x0]}}, &(0x7f0000000140)=""/26, 0x9c, 0x1a}, 0x20) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000240)=ANY=[@ANYBLOB="cd80"], 0x2}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x39) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) ptrace$cont(0x1f, r0, 0x5, 0x800000000000) 09:39:04 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xff}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(r0, 0xffffffffffffffff, 0x0, 0x1) 09:39:04 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000]}, 0x45c) r1 = syz_open_dev$sndtimer(0x0, 0x0, 0x100) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000040)={{0x1}}) gettid() r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[@ANYBLOB="f75f9bf747594d0a1851415d989b48270bb03c9ef00b305cba0432a36b9310552b2e4de8c9de57a65146ad9194a585247c8d2a48e1311d4dd0e973234ea0a1a238326753d3da28e216683f91691b54351036cf18886cd3e555df4a1b907696264440c2e8407ed7160e8250e81157496310f16407a59d7e892d7ea55b9215d7eb723ff1b873c6af16ac"], 0x89) inotify_add_watch(r2, &(0x7f0000000180)='./file1\x00', 0x80000020) r3 = geteuid() getresgid(&(0x7f0000000140), 0x0, 0x0) fchown(r2, r3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r2) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={r1, 0x28, &(0x7f0000000240)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000002c0)={r4, 0xffffffff, 0xe6d3be648ff4b41c}, 0xc) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x3, 0x0) ioctl$UI_DEV_DESTROY(r0, 0x5502) 09:39:04 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x4000000000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000180)}], 0x1) 09:39:04 executing program 2: keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000a80)={0x0, 0xc, 0xae}, &(0x7f0000000ac0)={'enc=', 'raw', ' hash=', {'sha384-avx2\x00'}}, &(0x7f0000000b40)="058f6a5fe2db85fa52baca0c", &(0x7f0000000c00)=""/174) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xff}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x62e, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1104}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x10, 0x800000000000803, 0x0) ioctl$BLKSECTGET(r0, 0x1267, &(0x7f0000000580)) sendto(r1, &(0x7f0000000000)="120000001600e70d017b00000000008e1584", 0x12, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(r0, r2, 0x0, 0x1) 09:39:04 executing program 3: keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000a80)={0x0, 0x0, 0xae}, &(0x7f0000000ac0)={'enc=', 'raw', ' hash=', {'sha384-avx2\x00'}}, 0x0, &(0x7f0000000c00)=""/174) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xff}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(r0, r2, 0x0, 0x1) 09:39:04 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xff}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(r0, 0xffffffffffffffff, 0x0, 0x1) 09:39:04 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x4000000000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000180)}], 0x1) 09:39:04 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xff}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(r0, r2, 0x0, 0x0) [ 974.195031] input: syz1 as /devices/virtual/input/input376 09:39:04 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000]}, 0x45c) r1 = syz_open_dev$sndtimer(0x0, 0x0, 0x100) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000040)={{0x1}}) gettid() r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[@ANYBLOB="f75f9bf747594d0a1851415d989b48270bb03c9ef00b305cba0432a36b9310552b2e4de8c9de57a65146ad9194a585247c8d2a48e1311d4dd0e973234ea0a1a238326753d3da28e216683f91691b54351036cf18886cd3e555df4a1b907696264440c2e8407ed7160e8250e81157496310f16407a59d7e892d7ea55b9215d7eb723ff1b873c6af16ac"], 0x89) inotify_add_watch(r2, &(0x7f0000000180)='./file1\x00', 0x80000020) r3 = geteuid() getresgid(&(0x7f0000000140), 0x0, 0x0) fchown(r2, r3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r2) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={r1, 0x28, &(0x7f0000000240)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000002c0)={r4, 0xffffffff, 0xe6d3be648ff4b41c}, 0xc) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x3, 0x0) ioctl$UI_DEV_DESTROY(r0, 0x5502) 09:39:04 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x4000000000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000180)}], 0x1) 09:39:04 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x4000000000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000180)="580000001400192340834b80040d8c5602067fffffff81000000000000dca87086a5c000004f640094000589", 0x2c}], 0x1) [ 974.329412] input: syz1 as /devices/virtual/input/input377 09:39:07 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x70, 0x70, 0x8, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x5, 0x100, 0xfe3a}}, @ptr, @func, @int, @int, @fwd, @enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x0, 0x9}]}]}, {0x0, [0x0, 0x61, 0x0, 0xa3, 0x2e, 0x0]}}, &(0x7f0000000140)=""/26, 0x90, 0x1a}, 0x20) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000240)=ANY=[@ANYBLOB="cd80"], 0x2}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x39) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) ptrace$cont(0x1f, r0, 0x5, 0x800000000000) 09:39:07 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xff}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(r0, r2, 0x0, 0x0) 09:39:07 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x4000000000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000180)="580000001400192340834b80040d8c5602067fffffff81000000000000dca87086a5c000004f640094000589", 0x2c}], 0x1) 09:39:07 executing program 2: keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000a80)={0x0, 0xc, 0xae}, &(0x7f0000000ac0)={'enc=', 'raw', ' hash=', {'sha384-avx2\x00'}}, &(0x7f0000000b40)="058f6a5fe2db85fa52baca0c", &(0x7f0000000c00)=""/174) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xff}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x62e, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1104}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x10, 0x800000000000803, 0x0) ioctl$BLKSECTGET(r0, 0x1267, &(0x7f0000000580)) sendto(r1, &(0x7f0000000000)="120000001600e70d017b00000000008e1584", 0x12, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(r0, r2, 0x0, 0x1) 09:39:07 executing program 3: keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000a80)={0x0, 0x0, 0xae}, &(0x7f0000000ac0)={'enc=', 'raw', ' hash=', {'sha384-avx2\x00'}}, 0x0, &(0x7f0000000c00)=""/174) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xff}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(r0, r2, 0x0, 0x1) 09:39:07 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000]}, 0x45c) r1 = syz_open_dev$sndtimer(0x0, 0x0, 0x100) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000040)={{0x1}}) gettid() r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[@ANYBLOB="f75f9bf747594d0a1851415d989b48270bb03c9ef00b305cba0432a36b9310552b2e4de8c9de57a65146ad9194a585247c8d2a48e1311d4dd0e973234ea0a1a238326753d3da28e216683f91691b54351036cf18886cd3e555df4a1b907696264440c2e8407ed7160e8250e81157496310f16407a59d7e892d7ea55b9215d7eb723ff1b873c6af16ac"], 0x89) inotify_add_watch(r2, &(0x7f0000000180)='./file1\x00', 0x80000020) r3 = geteuid() getresgid(&(0x7f0000000140), 0x0, 0x0) fchown(r2, r3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r2) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={r1, 0x28, &(0x7f0000000240)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000002c0)={r4, 0xffffffff, 0xe6d3be648ff4b41c}, 0xc) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x3, 0x0) ioctl$UI_DEV_DESTROY(r0, 0x5502) 09:39:07 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xff}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(r0, r2, 0x0, 0x0) 09:39:07 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x4000000000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000180)="580000001400192340834b80040d8c5602067fffffff81000000000000dca87086a5c000004f640094000589", 0x2c}], 0x1) [ 977.214295] input: syz1 as /devices/virtual/input/input378 09:39:07 executing program 4: gettid() mkdir(&(0x7f0000000340)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000400)='ramfs\x00\x9b\x95\x84\x10D\xfb\x9b\x81R#\x10O\xd3\xb4\xe8\xa3\x1f\x00\r\xf6\xd9\xbbt\x95f\x9e\x02\x06\xf946\\{(\xc8\xa7s\xd2>\x81\x88l\x0e\xc5%\x99\x00\x02\x9d\x85\xfc\xa9\\\x99:\xe4\x9c\xf9z>w\xe7\xa9\xa8=\xe9o\x9f\xfbKE\xd7\x9a\x1b\xf8\x86@\x8e\xe6\x9em\x89\xab\x19\xea1\x8e\xa1\xb5\xd7\xc6\xc62\x05\xc7\xe5\xd2m\xeczV\x1d\x84\xcd\xc0\xdf', 0x0, 0x0) chdir(&(0x7f00000003c0)='./file0\x00') symlink(&(0x7f0000000140)='..', &(0x7f00000000c0)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 09:39:07 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x4000000000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000180)="580000001400192340834b80040d8c5602067fffffff81000000000000dca87086a5c000004f6400940005891550f4a8000000006700008000f0fffeffff09000080", 0x42}], 0x1) 09:39:07 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000]}, 0x45c) r1 = syz_open_dev$sndtimer(0x0, 0x0, 0x100) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000040)={{0x1}}) gettid() r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[@ANYBLOB="f75f9bf747594d0a1851415d989b48270bb03c9ef00b305cba0432a36b9310552b2e4de8c9de57a65146ad9194a585247c8d2a48e1311d4dd0e973234ea0a1a238326753d3da28e216683f91691b54351036cf18886cd3e555df4a1b907696264440c2e8407ed7160e8250e81157496310f16407a59d7e892d7ea55b9215d7eb723ff1b873c6af16ac27c40d2c4fe0c2689840"], 0x93) inotify_add_watch(r2, &(0x7f0000000180)='./file1\x00', 0x80000020) r3 = geteuid() getresgid(&(0x7f0000000140), 0x0, 0x0) fchown(r2, r3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r2) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={r1, 0x28, &(0x7f0000000240)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000002c0)={r4, 0xffffffff, 0xe6d3be648ff4b41c}, 0xc) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x3, 0x0) ioctl$UI_DEV_DESTROY(r0, 0x5502) 09:39:07 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x4000000000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000180)="580000001400192340834b80040d8c5602067fffffff81000000000000dca87086a5c000004f6400940005891550f4a8000000006700008000f0fffeffff09000080", 0x42}], 0x1) [ 977.372046] input: syz1 as /devices/virtual/input/input379 09:39:10 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x4000000000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000180)="580000001400192340834b80040d8c5602067fffffff81000000000000dca87086a5c000004f6400940005891550f4a8000000006700008000f0fffeffff09000080", 0x42}], 0x1) 09:39:10 executing program 4: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x4c400) 09:39:10 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x70, 0x70, 0x8, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x5, 0x100, 0xfe3a}}, @ptr, @func, @int, @int, @fwd, @enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x0, 0x9}]}]}, {0x0, [0x0, 0x61, 0x0, 0xa3, 0x2e, 0x0]}}, &(0x7f0000000140)=""/26, 0x90, 0x1a}, 0x20) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000240)=ANY=[@ANYBLOB="cd80"], 0x2}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x39) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) ptrace$cont(0x1f, r0, 0x5, 0x800000000000) 09:39:10 executing program 3: keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000a80)={0x0, 0x0, 0xae}, &(0x7f0000000ac0)={'enc=', 'raw', ' hash=', {'sha384-avx2\x00'}}, &(0x7f0000000b40), &(0x7f0000000c00)=""/174) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xff}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(r0, r2, 0x0, 0x1) 09:39:10 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000]}, 0x45c) r1 = syz_open_dev$sndtimer(0x0, 0x0, 0x100) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000040)={{0x1}}) gettid() r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[@ANYBLOB="f75f9bf747594d0a1851415d989b48270bb03c9ef00b305cba0432a36b9310552b2e4de8c9de57a65146ad9194a585247c8d2a48e1311d4dd0e973234ea0a1a238326753d3da28e216683f91691b54351036cf18886cd3e555df4a1b907696264440c2e8407ed7160e8250e81157496310f16407a59d7e892d7ea55b9215d7eb723ff1b873c6af16ac27c40d2c4fe0c2689840"], 0x93) inotify_add_watch(r2, &(0x7f0000000180)='./file1\x00', 0x80000020) r3 = geteuid() getresgid(&(0x7f0000000140), 0x0, 0x0) fchown(r2, r3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r2) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={r1, 0x28, &(0x7f0000000240)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000002c0)={r4, 0xffffffff, 0xe6d3be648ff4b41c}, 0xc) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x3, 0x0) ioctl$UI_DEV_DESTROY(r0, 0x5502) 09:39:10 executing program 2: keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000a80)={0x0, 0xc, 0xae}, &(0x7f0000000ac0)={'enc=', 'raw', ' hash=', {'sha384-avx2\x00'}}, &(0x7f0000000b40)="058f6a5fe2db85fa52baca0c", &(0x7f0000000c00)=""/174) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xff}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x62e, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1104}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x10, 0x800000000000803, 0x0) ioctl$BLKSECTGET(r0, 0x1267, &(0x7f0000000580)) sendto(r1, &(0x7f0000000000)="120000001600e70d017b00000000008e1584", 0x12, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(r0, r2, 0x0, 0x1) 09:39:10 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x4000000000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000180)="580000001400192340834b80040d8c5602067fffffff81000000000000dca87086a5c000004f6400940005891550f4a8000000006700008000f0fffeffff09000080fff5dd0000001000010000", 0x4d}], 0x1) 09:39:10 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x70, 0x70, 0x8, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x5, 0x100, 0xfe3a}}, @ptr, @func, @int, @int, @fwd, @enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x0, 0x9}]}]}, {0x0, [0x0, 0x61, 0x0, 0xa3, 0x2e, 0x0]}}, &(0x7f0000000140)=""/26, 0x90, 0x1a}, 0x20) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000240)=ANY=[@ANYBLOB="cd80"], 0x2}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x39) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) ptrace$cont(0x1f, r0, 0x5, 0x800000000000) 09:39:10 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000]}, 0x45c) r1 = syz_open_dev$sndtimer(0x0, 0x0, 0x100) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000040)={{0x1}}) gettid() r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[@ANYBLOB="f75f9bf747594d0a1851415d989b48270bb03c9ef00b305cba0432a36b9310552b2e4de8c9de57a65146ad9194a585247c8d2a48e1311d4dd0e973234ea0a1a238326753d3da28e216683f91691b54351036cf18886cd3e555df4a1b907696264440c2e8407ed7160e8250e81157496310f16407a59d7e892d7ea55b9215d7eb723ff1b873c6af16ac27c40d2c4fe0c2689840"], 0x93) inotify_add_watch(r2, &(0x7f0000000180)='./file1\x00', 0x80000020) r3 = geteuid() getresgid(&(0x7f0000000140), 0x0, 0x0) fchown(r2, r3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r2) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={r1, 0x28, &(0x7f0000000240)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000002c0)={r4, 0xffffffff, 0xe6d3be648ff4b41c}, 0xc) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x3, 0x0) ioctl$UI_DEV_DESTROY(r0, 0x5502) 09:39:10 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x4000000000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000180)="580000001400192340834b80040d8c5602067fffffff81000000000000dca87086a5c000004f6400940005891550f4a8000000006700008000f0fffeffff09000080fff5dd0000001000010000", 0x4d}], 0x1) [ 980.267236] input: syz1 as /devices/virtual/input/input380 09:39:10 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x4000000000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000180)="580000001400192340834b80040d8c5602067fffffff81000000000000dca87086a5c000004f6400940005891550f4a8000000006700008000f0fffeffff09000080fff5dd0000001000010000", 0x4d}], 0x1) 09:39:10 executing program 4: syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@shortname_mixed='shortname=mixed'}, {@fat=@dos1xfloppy='dos1xfloppy'}]}) [ 980.364481] input: syz1 as /devices/virtual/input/input381 09:39:10 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x4000000000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000180)="580000001400192340834b80040d8c5602067fffffff81000000000000dca87086a5c000004f6400940005891550f4a8000000006700008000f0fffeffff09000080fff5dd00000010000100000c0900fcff00", 0x53}], 0x1) 09:39:10 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000]}, 0x45c) r1 = syz_open_dev$sndtimer(0x0, 0x0, 0x100) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000040)={{0x1}}) gettid() r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[@ANYBLOB="f75f9bf747594d0a1851415d989b48270bb03c9ef00b305cba0432a36b9310552b2e4de8c9de57a65146ad9194a585247c8d2a48e1311d4dd0e973234ea0a1a238326753d3da28e216683f91691b54351036cf18886cd3e555df4a1b907696264440c2e8407ed7160e8250e81157496310f16407a59d7e892d7ea55b9215d7eb723ff1b873c6af16ac27c40d2c4fe0c268984029a5c1adb5"], 0x98) inotify_add_watch(r2, &(0x7f0000000180)='./file1\x00', 0x80000020) r3 = geteuid() getresgid(&(0x7f0000000140), 0x0, 0x0) fchown(r2, r3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r2) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={r1, 0x28, &(0x7f0000000240)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000002c0)={r4, 0xffffffff, 0xe6d3be648ff4b41c}, 0xc) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x3, 0x0) ioctl$UI_DEV_DESTROY(r0, 0x5502) 09:39:10 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x4000000000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000180)="580000001400192340834b80040d8c5602067fffffff81000000000000dca87086a5c000004f6400940005891550f4a8000000006700008000f0fffeffff09000080fff5dd00000010000100000c0900fcff00", 0x53}], 0x1) [ 980.450385] FAT-fs (loop4): bogus number of reserved sectors [ 980.457034] FAT-fs (loop4): This doesn't look like a DOS 1.x volume; no bootstrapping code [ 980.471995] FAT-fs (loop4): Can't find a valid FAT filesystem 09:39:10 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x4000000000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000180)="580000001400192340834b80040d8c5602067fffffff81000000000000dca87086a5c000004f6400940005891550f4a8000000006700008000f0fffeffff09000080fff5dd00000010000100000c0900fcff00", 0x53}], 0x1) [ 980.530218] FAT-fs (loop4): bogus number of reserved sectors [ 980.536204] FAT-fs (loop4): This doesn't look like a DOS 1.x volume; no bootstrapping code [ 980.552129] FAT-fs (loop4): Can't find a valid FAT filesystem [ 980.573355] input: syz1 as /devices/virtual/input/input382 09:39:10 executing program 3: keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000a80)={0x0, 0x0, 0xae}, &(0x7f0000000ac0)={'enc=', 'raw', ' hash=', {'sha384-avx2\x00'}}, &(0x7f0000000b40), &(0x7f0000000c00)=""/174) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xff}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(r0, r2, 0x0, 0x1) 09:39:10 executing program 2: keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000a80)={0x0, 0xc, 0xae}, &(0x7f0000000ac0)={'enc=', 'raw', ' hash=', {'sha384-avx2\x00'}}, &(0x7f0000000b40)="058f6a5fe2db85fa52baca0c", &(0x7f0000000c00)=""/174) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') getpid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x62e, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1104}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x10, 0x800000000000803, 0x0) ioctl$BLKSECTGET(r0, 0x1267, &(0x7f0000000580)) sendto(r1, &(0x7f0000000000)="120000001600e70d017b00000000008e1584", 0x12, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(r0, r2, 0x0, 0x1) 09:39:10 executing program 4: syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@shortname_mixed='shortname=mixed'}, {@fat=@dos1xfloppy='dos1xfloppy'}]}) [ 980.724207] FAT-fs (loop4): bogus number of reserved sectors [ 980.734013] FAT-fs (loop4): This doesn't look like a DOS 1.x volume; no bootstrapping code [ 980.753810] FAT-fs (loop4): Can't find a valid FAT filesystem 09:39:13 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x7c, 0x7c, 0x8, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x5, 0x100, 0xfe3a}}, @restrict={0x0, 0x0, 0x0, 0xb, 0x3}, @ptr, @func, @int, @int, @fwd, @enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x0, 0x9}]}]}, {0x0, [0x0, 0x61, 0x0, 0xa3, 0x2e, 0x0]}}, &(0x7f0000000140)=""/26, 0x9c, 0x1a}, 0x20) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000240)=ANY=[@ANYBLOB="cd80"], 0x2}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x39) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) ptrace$cont(0x1f, r0, 0x5, 0x800000000000) 09:39:13 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x4000000000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000180)="580000001400192340834b80040d8c5602067fffffff81000000000000dca87086a5c000004f6400940005891550f4a8000000006700008000f0fffeffff09000080fff5dd00000010000100000c0900fcff0000040e", 0x56}], 0x1) 09:39:13 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000]}, 0x45c) r1 = syz_open_dev$sndtimer(0x0, 0x0, 0x100) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000040)={{0x1}}) gettid() r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[@ANYBLOB="f75f9bf747594d0a1851415d989b48270bb03c9ef00b305cba0432a36b9310552b2e4de8c9de57a65146ad9194a585247c8d2a48e1311d4dd0e973234ea0a1a238326753d3da28e216683f91691b54351036cf18886cd3e555df4a1b907696264440c2e8407ed7160e8250e81157496310f16407a59d7e892d7ea55b9215d7eb723ff1b873c6af16ac27c40d2c4fe0c268984029a5c1adb5"], 0x98) inotify_add_watch(r2, &(0x7f0000000180)='./file1\x00', 0x80000020) r3 = geteuid() getresgid(&(0x7f0000000140), 0x0, 0x0) fchown(r2, r3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r2) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={r1, 0x28, &(0x7f0000000240)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000002c0)={r4, 0xffffffff, 0xe6d3be648ff4b41c}, 0xc) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x3, 0x0) ioctl$UI_DEV_DESTROY(r0, 0x5502) 09:39:13 executing program 2: keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000a80)={0x0, 0xc, 0xae}, &(0x7f0000000ac0)={'enc=', 'raw', ' hash=', {'sha384-avx2\x00'}}, &(0x7f0000000b40)="058f6a5fe2db85fa52baca0c", &(0x7f0000000c00)=""/174) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') getpid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x62e, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1104}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x10, 0x800000000000803, 0x0) ioctl$BLKSECTGET(r0, 0x1267, &(0x7f0000000580)) sendto(r1, &(0x7f0000000000)="120000001600e70d017b00000000008e1584", 0x12, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(r0, r2, 0x0, 0x1) 09:39:13 executing program 3: keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000a80)={0x0, 0x0, 0xae}, &(0x7f0000000ac0)={'enc=', 'raw', ' hash=', {'sha384-avx2\x00'}}, &(0x7f0000000b40), &(0x7f0000000c00)=""/174) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xff}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(r0, r2, 0x0, 0x1) 09:39:13 executing program 4: syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@shortname_mixed='shortname=mixed'}, {@fat=@dos1xfloppy='dos1xfloppy'}]}) 09:39:13 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x4000000000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000180)="580000001400192340834b80040d8c5602067fffffff81000000000000dca87086a5c000004f6400940005891550f4a8000000006700008000f0fffeffff09000080fff5dd00000010000100000c0900fcff0000040e", 0x56}], 0x1) 09:39:13 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x4000000000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000180)="580000001400192340834b80040d8c5602067fffffff81000000000000dca87086a5c000004f6400940005891550f4a8000000006700008000f0fffeffff09000080fff5dd00000010000100000c0900fcff0000040e", 0x56}], 0x1) [ 983.325402] FAT-fs (loop4): bogus number of reserved sectors [ 983.337288] input: syz1 as /devices/virtual/input/input383 [ 983.343999] FAT-fs (loop4): This doesn't look like a DOS 1.x volume; no bootstrapping code [ 983.365186] FAT-fs (loop4): Can't find a valid FAT filesystem 09:39:13 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x4000000000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000180)="580000001400192340834b80040d8c5602067fffffff81000000000000dca87086a5c000004f6400940005891550f4a8000000006700008000f0fffeffff09000080fff5dd00000010000100000c0900fcff0000040e05", 0x57}], 0x1) 09:39:13 executing program 4: syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@shortname_mixed='shortname=mixed'}, {@fat=@dos1xfloppy='dos1xfloppy'}]}) 09:39:13 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x4000000000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000180)="580000001400192340834b80040d8c5602067fffffff81000000000000dca87086a5c000004f6400940005891550f4a8000000006700008000f0fffeffff09000080fff5dd00000010000100000c0900fcff0000040e05", 0x57}], 0x1) 09:39:13 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000]}, 0x45c) r1 = syz_open_dev$sndtimer(0x0, 0x0, 0x100) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000040)={{0x1}}) gettid() r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[@ANYBLOB="f75f9bf747594d0a1851415d989b48270bb03c9ef00b305cba0432a36b9310552b2e4de8c9de57a65146ad9194a585247c8d2a48e1311d4dd0e973234ea0a1a238326753d3da28e216683f91691b54351036cf18886cd3e555df4a1b907696264440c2e8407ed7160e8250e81157496310f16407a59d7e892d7ea55b9215d7eb723ff1b873c6af16ac27c40d2c4fe0c268984029a5c1adb5"], 0x98) inotify_add_watch(r2, &(0x7f0000000180)='./file1\x00', 0x80000020) r3 = geteuid() getresgid(&(0x7f0000000140), 0x0, 0x0) fchown(r2, r3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r2) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={r1, 0x28, &(0x7f0000000240)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000002c0)={r4, 0xffffffff, 0xe6d3be648ff4b41c}, 0xc) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x3, 0x0) ioctl$UI_DEV_DESTROY(r0, 0x5502) [ 983.518549] FAT-fs (loop4): bogus number of reserved sectors [ 983.525654] FAT-fs (loop4): This doesn't look like a DOS 1.x volume; no bootstrapping code [ 983.550933] FAT-fs (loop4): Can't find a valid FAT filesystem [ 983.563474] input: syz1 as /devices/virtual/input/input384 09:39:16 executing program 3: keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000a80)={0x0, 0x6, 0xae}, &(0x7f0000000ac0)={'enc=', 'raw', ' hash=', {'sha384-avx2\x00'}}, &(0x7f0000000b40)="058f6a5fe2db", &(0x7f0000000c00)=""/174) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xff}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(r0, r2, 0x0, 0x1) 09:39:16 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x4000000000000004) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000180)="580000001400192340834b80040d8c5602067fffffff81000000000000dca87086a5c000004f6400940005891550f4a8000000006700008000f0fffeffff09000080fff5dd00000010000100000c0900fcff0000040e05", 0x57}], 0x1) 09:39:16 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x7c, 0x7c, 0x8, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x5, 0x100, 0xfe3a}}, @restrict, @ptr, @func, @int, @int, @fwd, @enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x0, 0x9}]}]}, {0x0, [0x0, 0x61, 0x0, 0xa3, 0x2e, 0x0]}}, &(0x7f0000000140)=""/26, 0x9c, 0x1a}, 0x20) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000240)=ANY=[@ANYBLOB="cd80"], 0x2}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x39) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) ptrace$cont(0x1f, r0, 0x5, 0x800000000000) 09:39:16 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000]}, 0x45c) r1 = syz_open_dev$sndtimer(0x0, 0x0, 0x100) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000040)={{0x1}}) gettid() r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[@ANYBLOB="f75f9bf747594d0a1851415d989b48270bb03c9ef00b305cba0432a36b9310552b2e4de8c9de57a65146ad9194a585247c8d2a48e1311d4dd0e973234ea0a1a238326753d3da28e216683f91691b54351036cf18886cd3e555df4a1b907696264440c2e8407ed7160e8250e81157496310f16407a59d7e892d7ea55b9215d7eb723ff1b873c6af16ac27c40d2c4fe0c268984029a5c1adb5df4f"], 0x9a) inotify_add_watch(r2, &(0x7f0000000180)='./file1\x00', 0x80000020) r3 = geteuid() getresgid(&(0x7f0000000140), 0x0, 0x0) fchown(r2, r3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r2) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={r1, 0x28, &(0x7f0000000240)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000002c0)={r4, 0xffffffff, 0xe6d3be648ff4b41c}, 0xc) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x3, 0x0) ioctl$UI_DEV_DESTROY(r0, 0x5502) 09:39:16 executing program 4: syz_mount_image$vfat(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@shortname_mixed='shortname=mixed'}, {@fat=@dos1xfloppy='dos1xfloppy'}]}) 09:39:16 executing program 2: keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000a80)={0x0, 0xc, 0xae}, &(0x7f0000000ac0)={'enc=', 'raw', ' hash=', {'sha384-avx2\x00'}}, &(0x7f0000000b40)="058f6a5fe2db85fa52baca0c", &(0x7f0000000c00)=""/174) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') getpid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x62e, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1104}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x10, 0x800000000000803, 0x0) ioctl$BLKSECTGET(r0, 0x1267, &(0x7f0000000580)) sendto(r1, &(0x7f0000000000)="120000001600e70d017b00000000008e1584", 0x12, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(r0, r2, 0x0, 0x1) 09:39:16 executing program 1: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCSCLOCKID(r0, 0x400445a0, &(0x7f0000000000)=0x274) 09:39:16 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000]}, 0x45c) r1 = syz_open_dev$sndtimer(0x0, 0x0, 0x100) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000040)={{0x1}}) gettid() r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[@ANYBLOB="f75f9bf747594d0a1851415d989b48270bb03c9ef00b305cba0432a36b9310552b2e4de8c9de57a65146ad9194a585247c8d2a48e1311d4dd0e973234ea0a1a238326753d3da28e216683f91691b54351036cf18886cd3e555df4a1b907696264440c2e8407ed7160e8250e81157496310f16407a59d7e892d7ea55b9215d7eb723ff1b873c6af16ac27c40d2c4fe0c268984029a5c1adb5df4f"], 0x9a) inotify_add_watch(r2, &(0x7f0000000180)='./file1\x00', 0x80000020) r3 = geteuid() getresgid(&(0x7f0000000140), 0x0, 0x0) fchown(r2, r3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r2) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={r1, 0x28, &(0x7f0000000240)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000002c0)={r4, 0xffffffff, 0xe6d3be648ff4b41c}, 0xc) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x3, 0x0) ioctl$UI_DEV_DESTROY(r0, 0x5502) 09:39:16 executing program 1: munmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000) socketpair$unix(0x1, 0x80005, 0x0, &(0x7f0000000880)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mremap(&(0x7f0000ff8000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000ffd000/0x3000)=nil) 09:39:16 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$cgroup_ro(r0, &(0x7f00000003c0)='G^uacct.\xfbq\xa5\xdeq\xb8\xc8\x8b0\x00fRr\"\xef\x9fi\xe5\xa2.KeB\xae)\x91\xc7Y\x96\xe7\xaco\xdc\\mm=\x95\xb4\x1d\x02\xd1B\xde\x0f\x17\x1a\xc9\x01a\xfd\xd56f\x8aVwyW\x16\x1ew)\x97\xb7\xc6\xad\xd5Y\x19\x91\x8aG\x8e\xb6\xcf/\x95Xh\xa3\xcf\xc0\x1cn_*1+X\xa9\x10\x11^\x05B\xd7vGL\t\xa3\xd7\xfe!T\xd1\x11\\\xbf\x11\x1b+\xf6\xbf\xa9\xe1/%\x98\xfb\x17\xb3\xbf\\\xe7\xe5wv\xb7\v', 0x26e1, 0x0) 09:39:16 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000]}, 0x45c) r1 = syz_open_dev$sndtimer(0x0, 0x0, 0x100) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000040)={{0x1}}) gettid() r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[@ANYBLOB="f75f9bf747594d0a1851415d989b48270bb03c9ef00b305cba0432a36b9310552b2e4de8c9de57a65146ad9194a585247c8d2a48e1311d4dd0e973234ea0a1a238326753d3da28e216683f91691b54351036cf18886cd3e555df4a1b907696264440c2e8407ed7160e8250e81157496310f16407a59d7e892d7ea55b9215d7eb723ff1b873c6af16ac27c40d2c4fe0c268984029a5c1adb5df4f"], 0x9a) inotify_add_watch(r2, &(0x7f0000000180)='./file1\x00', 0x80000020) r3 = geteuid() getresgid(&(0x7f0000000140), 0x0, 0x0) fchown(r2, r3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r2) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={r1, 0x28, &(0x7f0000000240)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000002c0)={r4, 0xffffffff, 0xe6d3be648ff4b41c}, 0xc) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x3, 0x0) ioctl$UI_DEV_DESTROY(r0, 0x5502) [ 986.417465] input: syz1 as /devices/virtual/input/input386 09:39:16 executing program 4: syz_mount_image$vfat(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@shortname_mixed='shortname=mixed'}, {@fat=@dos1xfloppy='dos1xfloppy'}]}) [ 986.518489] input: syz1 as /devices/virtual/input/input387 09:39:16 executing program 3: keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000a80)={0x0, 0x6, 0xae}, &(0x7f0000000ac0)={'enc=', 'raw', ' hash=', {'sha384-avx2\x00'}}, &(0x7f0000000b40)="058f6a5fe2db", &(0x7f0000000c00)=""/174) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xff}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(r0, r2, 0x0, 0x1) 09:39:16 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0xc06855c8, &(0x7f00000000c0)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}}) 09:39:19 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x64, 0x64, 0x8, [@restrict, @ptr, @func, @int, @int, @fwd, @enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x0, 0x9}]}]}, {0x0, [0x0, 0x61, 0x0, 0xa3, 0x2e, 0x0]}}, &(0x7f0000000140)=""/26, 0x84, 0x1a}, 0x20) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000240)=ANY=[@ANYBLOB="cd80"], 0x2}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x39) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) ptrace$cont(0x1f, r0, 0x5, 0x800000000000) 09:39:19 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000]}, 0x45c) r1 = syz_open_dev$sndtimer(0x0, 0x0, 0x100) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000040)={{0x1}}) gettid() r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[@ANYBLOB="f75f9bf747594d0a1851415d989b48270bb03c9ef00b305cba0432a36b9310552b2e4de8c9de57a65146ad9194a585247c8d2a48e1311d4dd0e973234ea0a1a238326753d3da28e216683f91691b54351036cf18886cd3e555df4a1b907696264440c2e8407ed7160e8250e81157496310f16407a59d7e892d7ea55b9215d7eb723ff1b873c6af16ac27c40d2c4fe0c268984029a5c1adb5df4f4d"], 0x9b) inotify_add_watch(r2, &(0x7f0000000180)='./file1\x00', 0x80000020) r3 = geteuid() getresgid(&(0x7f0000000140), 0x0, 0x0) fchown(r2, r3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r2) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={r1, 0x28, &(0x7f0000000240)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000002c0)={r4, 0xffffffff, 0xe6d3be648ff4b41c}, 0xc) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x3, 0x0) ioctl$UI_DEV_DESTROY(r0, 0x5502) 09:39:19 executing program 4: syz_mount_image$vfat(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@shortname_mixed='shortname=mixed'}, {@fat=@dos1xfloppy='dos1xfloppy'}]}) 09:39:19 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000040)='westwood\x00', 0x9) 09:39:19 executing program 2: keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000a80)={0x0, 0xc, 0xae}, &(0x7f0000000ac0)={'enc=', 'raw', ' hash=', {'sha384-avx2\x00'}}, &(0x7f0000000b40)="058f6a5fe2db85fa52baca0c", &(0x7f0000000c00)=""/174) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xff}, 0x0) getpid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x62e, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1104}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x800000000000803, 0x0) ioctl$BLKSECTGET(0xffffffffffffffff, 0x1267, &(0x7f0000000580)) sendto(r0, &(0x7f0000000000)="120000001600e70d017b00000000008e1584", 0x12, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(0xffffffffffffffff, r1, 0x0, 0x1) 09:39:19 executing program 3: keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000a80)={0x0, 0x6, 0xae}, &(0x7f0000000ac0)={'enc=', 'raw', ' hash=', {'sha384-avx2\x00'}}, &(0x7f0000000b40)="058f6a5fe2db", &(0x7f0000000c00)=""/174) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xff}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(r0, r2, 0x0, 0x1) 09:39:19 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000]}, 0x45c) r1 = syz_open_dev$sndtimer(0x0, 0x0, 0x100) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000040)={{0x1}}) gettid() r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[@ANYBLOB="f75f9bf747594d0a1851415d989b48270bb03c9ef00b305cba0432a36b9310552b2e4de8c9de57a65146ad9194a585247c8d2a48e1311d4dd0e973234ea0a1a238326753d3da28e216683f91691b54351036cf18886cd3e555df4a1b907696264440c2e8407ed7160e8250e81157496310f16407a59d7e892d7ea55b9215d7eb723ff1b873c6af16ac27c40d2c4fe0c268984029a5c1adb5df4f4d"], 0x9b) inotify_add_watch(r2, &(0x7f0000000180)='./file1\x00', 0x80000020) r3 = geteuid() getresgid(&(0x7f0000000140), 0x0, 0x0) fchown(r2, r3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r2) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={r1, 0x28, &(0x7f0000000240)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000002c0)={r4, 0xffffffff, 0xe6d3be648ff4b41c}, 0xc) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x3, 0x0) ioctl$UI_DEV_DESTROY(r0, 0x5502) 09:39:19 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffff7fffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000780)=ANY=[@ANYBLOB="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"/523], 0x48}}, 0x0) [ 989.389760] input: syz1 as /devices/virtual/input/input388 09:39:19 executing program 4: syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@shortname_mixed='shortname=mixed'}, {@fat=@dos1xfloppy='dos1xfloppy'}]}) 09:39:19 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000]}, 0x45c) r1 = syz_open_dev$sndtimer(0x0, 0x0, 0x100) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000040)={{0x1}}) gettid() r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[@ANYBLOB="f75f9bf747594d0a1851415d989b48270bb03c9ef00b305cba0432a36b9310552b2e4de8c9de57a65146ad9194a585247c8d2a48e1311d4dd0e973234ea0a1a238326753d3da28e216683f91691b54351036cf18886cd3e555df4a1b907696264440c2e8407ed7160e8250e81157496310f16407a59d7e892d7ea55b9215d7eb723ff1b873c6af16ac27c40d2c4fe0c268984029a5c1adb5df4f4d"], 0x9b) inotify_add_watch(r2, &(0x7f0000000180)='./file1\x00', 0x80000020) r3 = geteuid() getresgid(&(0x7f0000000140), 0x0, 0x0) fchown(r2, r3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r2) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={r1, 0x28, &(0x7f0000000240)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000002c0)={r4, 0xffffffff, 0xe6d3be648ff4b41c}, 0xc) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x3, 0x0) ioctl$UI_DEV_DESTROY(r0, 0x5502) [ 989.491454] input: syz1 as /devices/virtual/input/input389 09:39:19 executing program 1: creat(0x0, 0x0) 09:39:19 executing program 4: syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@shortname_mixed='shortname=mixed'}, {@fat=@dos1xfloppy='dos1xfloppy'}]}) [ 989.595748] input: syz1 as /devices/virtual/input/input390 09:39:22 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000]}, 0x45c) r1 = syz_open_dev$sndtimer(0x0, 0x0, 0x100) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000040)={{0x1}}) gettid() r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[@ANYBLOB="f75f9bf747594d0a1851415d989b48270bb03c9ef00b305cba0432a36b9310552b2e4de8c9de57a65146ad9194a585247c8d2a48e1311d4dd0e973234ea0a1a238326753d3da28e216683f91691b54351036cf18886cd3e555df4a1b907696264440c2e8407ed7160e8250e81157496310f16407a59d7e892d7ea55b9215d7eb723ff1b873c6af16ac27c40d2c4fe0c268984029a5c1adb5df4f"], 0x9a) inotify_add_watch(r2, &(0x7f0000000180)='./file1\x00', 0x80000020) r3 = geteuid() getresgid(&(0x7f0000000140), 0x0, 0x0) fchown(r2, r3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r2) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={r1, 0x28, &(0x7f0000000240)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000002c0)={r4, 0xffffffff, 0xe6d3be648ff4b41c}, 0xc) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x3, 0x0) ioctl$UI_DEV_DESTROY(r0, 0x5502) 09:39:22 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x64, 0x64, 0x8, [@restrict, @ptr, @func, @int, @int, @fwd, @enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x0, 0x9}]}]}, {0x0, [0x0, 0x61, 0x0, 0xa3, 0x2e, 0x0]}}, &(0x7f0000000140)=""/26, 0x84, 0x1a}, 0x20) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000240)=ANY=[@ANYBLOB="cd80"], 0x2}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x39) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) ptrace$cont(0x1f, r0, 0x5, 0x800000000000) 09:39:22 executing program 4: syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@shortname_mixed='shortname=mixed'}, {@fat=@dos1xfloppy='dos1xfloppy'}]}) 09:39:22 executing program 2: keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000a80)={0x0, 0xc, 0xae}, &(0x7f0000000ac0)={'enc=', 'raw', ' hash=', {'sha384-avx2\x00'}}, &(0x7f0000000b40)="058f6a5fe2db85fa52baca0c", &(0x7f0000000c00)=""/174) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xff}, 0x0) getpid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x62e, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1104}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x800000000000803, 0x0) ioctl$BLKSECTGET(0xffffffffffffffff, 0x1267, &(0x7f0000000580)) sendto(r0, &(0x7f0000000000)="120000001600e70d017b00000000008e1584", 0x12, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(0xffffffffffffffff, r1, 0x0, 0x1) 09:39:22 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000]}, 0x45c) r1 = syz_open_dev$sndtimer(0x0, 0x0, 0x100) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000040)={{0x1}}) gettid() r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[@ANYBLOB="f75f9bf747594d0a1851415d989b48270bb03c9ef00b305cba0432a36b9310552b2e4de8c9de57a65146ad9194a585247c8d2a48e1311d4dd0e973234ea0a1a238326753d3da28e216683f91691b54351036cf18886cd3e555df4a1b907696264440c2e8407ed7160e8250e81157496310f16407a59d7e892d7ea55b9215d7eb723ff1b873c6af16ac27c40d2c4fe0c268984029a5c1adb5df4f4dd2"], 0xb) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000180)='./file1\x00', 0x80000020) r3 = geteuid() getresgid(&(0x7f0000000140), 0x0, 0x0) fchown(r2, r3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r2) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={r1, 0x28, &(0x7f0000000240)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000002c0)={r4, 0xffffffff, 0xe6d3be648ff4b41c}, 0xc) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x3, 0x0) ioctl$UI_DEV_DESTROY(r0, 0x5502) 09:39:22 executing program 3: keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000a80)={0x0, 0x9, 0xae}, &(0x7f0000000ac0)={'enc=', 'raw', ' hash=', {'sha384-avx2\x00'}}, &(0x7f0000000b40)="058f6a5fe2db85fa52", &(0x7f0000000c00)=""/174) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xff}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(r0, r2, 0x0, 0x1) 09:39:22 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000]}, 0x45c) r1 = syz_open_dev$sndtimer(0x0, 0x0, 0x100) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000040)={{0x1}}) gettid() r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[@ANYBLOB="f75f9bf747594d0a1851415d989b48270bb03c9ef00b305cba0432a36b9310552b2e4de8c9de57a65146ad9194a585247c8d2a48e1311d4dd0e973234ea0a1a238326753d3da28e216683f91691b54351036cf18886cd3e555df4a1b907696264440c2e8407ed7160e8250e81157496310f16407a59d7e892d7ea55b9215d7eb723ff1b873c6af16ac27c40d2c4fe0c268984029a5c1adb5df4f4dd2"], 0xb) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000180)='./file1\x00', 0x80000020) r3 = geteuid() getresgid(&(0x7f0000000140), 0x0, 0x0) fchown(r2, r3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r2) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={r1, 0x28, &(0x7f0000000240)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000002c0)={r4, 0xffffffff, 0xe6d3be648ff4b41c}, 0xc) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x3, 0x0) ioctl$UI_DEV_DESTROY(r0, 0x5502) [ 992.418443] input: syz1 as /devices/virtual/input/input391 09:39:22 executing program 4: syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 09:39:22 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000]}, 0x45c) r1 = syz_open_dev$sndtimer(0x0, 0x0, 0x100) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000040)={{0x1}}) gettid() r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[@ANYBLOB="f75f9bf747594d0a1851415d989b48270bb03c9ef00b305cba0432a36b9310552b2e4de8c9de57a65146ad9194a585247c8d2a48e1311d4dd0e973234ea0a1a238326753d3da28e216683f91691b54351036cf18886cd3e555df4a1b907696264440c2e8407ed7160e8250e81157496310f16407a59d7e892d7ea55b9215d7eb723ff1b873c6af16ac27c40d2c4fe0c268984029a5c1adb5df4f4dd2"], 0xb) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000180)='./file1\x00', 0x80000020) r3 = geteuid() getresgid(&(0x7f0000000140), 0x0, 0x0) fchown(r2, r3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r2) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={r1, 0x28, &(0x7f0000000240)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000002c0)={r4, 0xffffffff, 0xe6d3be648ff4b41c}, 0xc) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x3, 0x0) ioctl$UI_DEV_DESTROY(r0, 0x5502) 09:39:22 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000]}, 0x45c) r1 = syz_open_dev$sndtimer(0x0, 0x0, 0x100) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000040)={{0x1}}) gettid() r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[@ANYBLOB="f75f9bf747594d0a1851415d989b48270bb03c9ef00b305cba0432a36b9310552b2e4de8c9de57a65146ad9194a585247c8d2a48e1311d4dd0e973234ea0a1a238326753d3da28e216683f91691b54351036cf18886cd3e555df4a1b907696264440c2e8407ed7160e8250e81157496310f16407a59d7e892d7ea55b9215d7eb723ff1b873c6af16ac27c40d2c4fe0c268984029a5c1adb5df4f4dd2"], 0xb) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000180)='./file1\x00', 0x80000020) r3 = geteuid() getresgid(&(0x7f0000000140), 0x0, 0x0) fchown(r2, r3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r2) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={r1, 0x28, &(0x7f0000000240)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000002c0)={r4, 0xffffffff, 0xe6d3be648ff4b41c}, 0xc) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x3, 0x0) ioctl$UI_DEV_DESTROY(r0, 0x5502) [ 992.515654] input: syz1 as /devices/virtual/input/input392 [ 992.525360] FAT-fs (loop4): bogus number of reserved sectors [ 992.533750] FAT-fs (loop4): Can't find a valid FAT filesystem 09:39:22 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000]}, 0x45c) r1 = syz_open_dev$sndtimer(0x0, 0x0, 0x100) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000040)={{0x1}}) gettid() r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[@ANYBLOB="f75f9bf747594d0a1851415d989b48270bb03c9ef00b305cba0432a36b9310552b2e4de8c9de57a65146ad9194a585247c8d2a48e1311d4dd0e973234ea0a1a238326753d3da28e216683f91691b54351036cf18886cd3e555df4a1b907696264440c2e8407ed7160e8250e81157496310f16407a59d7e892d7ea55b9215d7eb723ff1b873c6af16ac27c40d2c4fe0c268984029a5c1adb5df4f"], 0x9a) inotify_add_watch(r2, &(0x7f0000000180)='./file1\x00', 0x80000020) r3 = geteuid() getresgid(&(0x7f0000000140), 0x0, 0x0) fchown(r2, r3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r2) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={r1, 0x28, &(0x7f0000000240)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000002c0)={r4, 0xffffffff, 0xe6d3be648ff4b41c}, 0xc) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x3, 0x0) ioctl$UI_DEV_DESTROY(r0, 0x5502) 09:39:22 executing program 4: syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 992.624396] input: syz1 as /devices/virtual/input/input393 09:39:22 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000]}, 0x45c) r1 = syz_open_dev$sndtimer(0x0, 0x0, 0x100) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000040)={{0x1}}) gettid() r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[@ANYBLOB="f75f9bf747594d0a1851415d989b48270bb03c9ef00b305cba0432a36b9310552b2e4de8c9de57a65146ad9194a585247c8d2a48e1311d4dd0e973234ea0a1a238326753d3da28e216683f91691b54351036cf18886cd3e555df4a1b907696264440c2e8407ed7160e8250e81157496310f16407a59d7e892d7ea55b9215d7eb723ff1b873c6af16ac27c40d2c4fe0c268984029a5c1adb5df4f"], 0x9a) inotify_add_watch(r2, &(0x7f0000000180)='./file1\x00', 0x80000020) r3 = geteuid() getresgid(&(0x7f0000000140), 0x0, 0x0) fchown(r2, r3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r2) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={r1, 0x28, &(0x7f0000000240)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000002c0)={r4, 0xffffffff, 0xe6d3be648ff4b41c}, 0xc) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x3, 0x0) ioctl$UI_DEV_DESTROY(r0, 0x5502) [ 992.701462] FAT-fs (loop4): bogus number of reserved sectors [ 992.708996] FAT-fs (loop4): Can't find a valid FAT filesystem 09:39:25 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000]}, 0x45c) r1 = syz_open_dev$sndtimer(0x0, 0x0, 0x100) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000040)={{0x1}}) gettid() r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[@ANYBLOB="f75f9bf747594d0a1851415d989b48270bb03c9ef00b305cba0432a36b9310552b2e4de8c9de57a65146ad9194a585247c8d2a48e1311d4dd0e973234ea0a1a238326753d3da28e216683f91691b54351036cf18886cd3e555df4a1b907696264440c2e8407ed7160e8250e81157496310f16407a59d7e892d7ea55b9215d7eb723ff1b873c6af16ac27c40d2c4fe0c268984029a5c1adb5df4f4dd2"], 0xb) inotify_add_watch(r2, 0x0, 0x80000020) r3 = geteuid() getresgid(&(0x7f0000000140), 0x0, 0x0) fchown(r2, r3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r2) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={r1, 0x28, &(0x7f0000000240)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000002c0)={r4, 0xffffffff, 0xe6d3be648ff4b41c}, 0xc) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x3, 0x0) ioctl$UI_DEV_DESTROY(r0, 0x5502) 09:39:25 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x64, 0x64, 0x8, [@restrict, @ptr, @func, @int, @int, @fwd, @enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x0, 0x9}]}]}, {0x0, [0x0, 0x61, 0x0, 0xa3, 0x2e, 0x0]}}, &(0x7f0000000140)=""/26, 0x84, 0x1a}, 0x20) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000240)=ANY=[@ANYBLOB="cd80"], 0x2}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x39) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) ptrace$cont(0x1f, r0, 0x5, 0x800000000000) 09:39:25 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000]}, 0x45c) r1 = syz_open_dev$sndtimer(0x0, 0x0, 0x100) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000040)={{0x1}}) gettid() r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[@ANYBLOB="f75f9bf747594d0a1851415d989b48270bb03c9ef00b305cba0432a36b9310552b2e4de8c9de57a65146ad9194a585247c8d2a48e1311d4dd0e973234ea0a1a238326753d3da28e216683f91691b54351036cf18886cd3e555df4a1b907696264440c2e8407ed7160e8250e81157496310f16407a59d7e892d7ea55b9215d7eb723ff1b873c6af16ac27c40d2c4fe0c268984029a5c1adb5df4f"], 0x9a) inotify_add_watch(r2, &(0x7f0000000180)='./file1\x00', 0x80000020) r3 = geteuid() getresgid(&(0x7f0000000140), 0x0, 0x0) fchown(r2, r3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r2) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={r1, 0x28, &(0x7f0000000240)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000002c0)={r4, 0xffffffff, 0xe6d3be648ff4b41c}, 0xc) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x3, 0x0) ioctl$UI_DEV_DESTROY(r0, 0x5502) 09:39:25 executing program 3: keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000a80)={0x0, 0x9, 0xae}, &(0x7f0000000ac0)={'enc=', 'raw', ' hash=', {'sha384-avx2\x00'}}, &(0x7f0000000b40)="058f6a5fe2db85fa52", &(0x7f0000000c00)=""/174) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xff}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(r0, r2, 0x0, 0x1) 09:39:25 executing program 4: syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 09:39:25 executing program 2: keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000a80)={0x0, 0xc, 0xae}, &(0x7f0000000ac0)={'enc=', 'raw', ' hash=', {'sha384-avx2\x00'}}, &(0x7f0000000b40)="058f6a5fe2db85fa52baca0c", &(0x7f0000000c00)=""/174) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xff}, 0x0) getpid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x62e, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1104}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x800000000000803, 0x0) ioctl$BLKSECTGET(0xffffffffffffffff, 0x1267, &(0x7f0000000580)) sendto(r0, &(0x7f0000000000)="120000001600e70d017b00000000008e1584", 0x12, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(0xffffffffffffffff, r1, 0x0, 0x1) 09:39:25 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000]}, 0x45c) r1 = syz_open_dev$sndtimer(0x0, 0x0, 0x100) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000040)={{0x1}}) gettid() r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[@ANYBLOB="f75f9bf747594d0a1851415d989b48270bb03c9ef00b305cba0432a36b9310552b2e4de8c9de57a65146ad9194a585247c8d2a48e1311d4dd0e973234ea0a1a238326753d3da28e216683f91691b54351036cf18886cd3e555df4a1b907696264440c2e8407ed7160e8250e81157496310f16407a59d7e892d7ea55b9215d7eb723ff1b873c6af16ac27c40d2c4fe0c268984029a5c1adb5df4f4dd2"], 0xb) inotify_add_watch(r2, 0x0, 0x80000020) r3 = geteuid() getresgid(&(0x7f0000000140), 0x0, 0x0) fchown(r2, r3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r2) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={r1, 0x28, &(0x7f0000000240)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000002c0)={r4, 0xffffffff, 0xe6d3be648ff4b41c}, 0xc) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x3, 0x0) ioctl$UI_DEV_DESTROY(r0, 0x5502) 09:39:25 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000]}, 0x45c) r1 = syz_open_dev$sndtimer(0x0, 0x0, 0x100) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000040)={{0x1}}) gettid() r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[@ANYBLOB="f75f9bf747594d0a1851415d989b48270bb03c9ef00b305cba0432a36b9310552b2e4de8c9de57a65146ad9194a585247c8d2a48e1311d4dd0e973234ea0a1a238326753d3da28e216683f91691b54351036cf18886cd3e555df4a1b907696264440c2e8407ed7160e8250e81157496310f16407a59d7e892d7ea55b9215d7eb723ff1b873c6af16ac27c40d2c4fe0c268984029a5c1adb5df4f4dd2"], 0xb) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000180)='./file1\x00', 0x80000020) r3 = geteuid() getresgid(&(0x7f0000000140), 0x0, 0x0) fchown(r2, r3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r2) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={r1, 0x28, &(0x7f0000000240)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000002c0)={r4, 0xffffffff, 0xe6d3be648ff4b41c}, 0xc) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x3, 0x0) ioctl$UI_DEV_DESTROY(r0, 0x5502) [ 995.452457] input: syz1 as /devices/virtual/input/input394 [ 995.460693] FAT-fs (loop4): bogus number of reserved sectors [ 995.482903] FAT-fs (loop4): Can't find a valid FAT filesystem 09:39:25 executing program 4: syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@shortname_mixed='shortname=mixed'}]}) 09:39:25 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000]}, 0x45c) r1 = syz_open_dev$sndtimer(0x0, 0x0, 0x100) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000040)={{0x1}}) gettid() r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[@ANYBLOB="f75f9bf747594d0a1851415d989b48270bb03c9ef00b305cba0432a36b9310552b2e4de8c9de57a65146ad9194a585247c8d2a48e1311d4dd0e973234ea0a1a238326753d3da28e216683f91691b54351036cf18886cd3e555df4a1b907696264440c2e8407ed7160e8250e81157496310f16407a59d7e892d7ea55b9215d7eb723ff1b873c6af16ac27c40d2c4fe0c268984029a5c1adb5df4f4dd2"], 0xb) inotify_add_watch(r2, 0x0, 0x80000020) r3 = geteuid() getresgid(&(0x7f0000000140), 0x0, 0x0) fchown(r2, r3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r2) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={r1, 0x28, &(0x7f0000000240)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000002c0)={r4, 0xffffffff, 0xe6d3be648ff4b41c}, 0xc) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x3, 0x0) ioctl$UI_DEV_DESTROY(r0, 0x5502) [ 995.550516] input: syz1 as /devices/virtual/input/input395 09:39:25 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000]}, 0x45c) r1 = syz_open_dev$sndtimer(0x0, 0x0, 0x100) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000040)={{0x1}}) gettid() r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[@ANYBLOB="f75f9bf747594d0a1851415d989b48270bb03c9ef00b305cba0432a36b9310552b2e4de8c9de57a65146ad9194a585247c8d2a48e1311d4dd0e973234ea0a1a238326753d3da28e216683f91691b54351036cf18886cd3e555df4a1b907696264440c2e8407ed7160e8250e81157496310f16407a59d7e892d7ea55b9215d7eb723ff1b873c6af16ac27c40d2c4fe0c268984029a5c1adb5df4f4dd2"], 0xb) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000180)='./file1\x00', 0x80000020) r3 = geteuid() getresgid(&(0x7f0000000140), 0x0, 0x0) fchown(r2, r3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r2) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={r1, 0x28, &(0x7f0000000240)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000002c0)={r4, 0xffffffff, 0xe6d3be648ff4b41c}, 0xc) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x3, 0x0) ioctl$UI_DEV_DESTROY(r0, 0x5502) 09:39:25 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000]}, 0x45c) r1 = syz_open_dev$sndtimer(0x0, 0x0, 0x100) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000040)={{0x1}}) gettid() r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[@ANYBLOB="f75f9bf747594d0a1851415d989b48270bb03c9ef00b305cba0432a36b9310552b2e4de8c9de57a65146ad9194a585247c8d2a48e1311d4dd0e973234ea0a1a238326753d3da28e216683f91691b54351036cf18886cd3e555df4a1b907696264440c2e8407ed7160e8250e81157496310f16407a59d7e892d7ea55b9215d7eb723ff1b873c6af16ac27c40d2c4fe0c268984029a5c1adb5df4f4dd2"], 0xb) inotify_add_watch(r2, &(0x7f0000000180)='./file1\x00', 0x0) r3 = geteuid() getresgid(&(0x7f0000000140), 0x0, 0x0) fchown(r2, r3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r2) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={r1, 0x28, &(0x7f0000000240)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000002c0)={r4, 0xffffffff, 0xe6d3be648ff4b41c}, 0xc) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x3, 0x0) ioctl$UI_DEV_DESTROY(r0, 0x5502) [ 995.635214] input: syz1 as /devices/virtual/input/input396 [ 995.646428] FAT-fs (loop4): bogus number of reserved sectors [ 995.665852] FAT-fs (loop4): Can't find a valid FAT filesystem 09:39:25 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000]}, 0x45c) r1 = syz_open_dev$sndtimer(0x0, 0x0, 0x100) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000040)={{0x1}}) gettid() r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[@ANYBLOB="f75f9bf747594d0a1851415d989b48270bb03c9ef00b305cba0432a36b9310552b2e4de8c9de57a65146ad9194a585247c8d2a48e1311d4dd0e973234ea0a1a238326753d3da28e216683f91691b54351036cf18886cd3e555df4a1b907696264440c2e8407ed7160e8250e81157496310f16407a59d7e892d7ea55b9215d7eb723ff1b873c6af16ac27c40d2c4fe0c268984029a5c1adb5df4f4dd2"], 0xb) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000180)='./file1\x00', 0x80000020) r3 = geteuid() getresgid(&(0x7f0000000140), 0x0, 0x0) fchown(r2, r3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r2) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={r1, 0x28, &(0x7f0000000240)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000002c0)={r4, 0xffffffff, 0xe6d3be648ff4b41c}, 0xc) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x3, 0x0) ioctl$UI_DEV_DESTROY(r0, 0x5502) [ 995.775159] input: syz1 as /devices/virtual/input/input397 09:39:28 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x7c, 0x7c, 0x8, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x0, 0x100, 0xfe3a}}, @restrict, @ptr, @func, @int, @int, @fwd, @enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x0, 0x9}]}]}, {0x0, [0x0, 0x61, 0x0, 0xa3, 0x2e, 0x0]}}, &(0x7f0000000140)=""/26, 0x9c, 0x1a}, 0x20) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000240)=ANY=[@ANYBLOB="cd80"], 0x2}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x39) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) ptrace$cont(0x1f, r0, 0x5, 0x800000000000) 09:39:28 executing program 4: syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@shortname_mixed='shortname=mixed'}]}) 09:39:28 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000]}, 0x45c) r1 = syz_open_dev$sndtimer(0x0, 0x0, 0x100) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000040)={{0x1}}) gettid() r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[@ANYBLOB="f75f9bf747594d0a1851415d989b48270bb03c9ef00b305cba0432a36b9310552b2e4de8c9de57a65146ad9194a585247c8d2a48e1311d4dd0e973234ea0a1a238326753d3da28e216683f91691b54351036cf18886cd3e555df4a1b907696264440c2e8407ed7160e8250e81157496310f16407a59d7e892d7ea55b9215d7eb723ff1b873c6af16ac27c40d2c4fe0c268984029a5c1adb5df4f4dd2"], 0xb) inotify_add_watch(r2, 0x0, 0x80000020) r3 = geteuid() getresgid(&(0x7f0000000140), 0x0, 0x0) fchown(r2, r3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r2) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={r1, 0x28, &(0x7f0000000240)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000002c0)={r4, 0xffffffff, 0xe6d3be648ff4b41c}, 0xc) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x3, 0x0) ioctl$UI_DEV_DESTROY(r0, 0x5502) 09:39:28 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000]}, 0x45c) r1 = syz_open_dev$sndtimer(0x0, 0x0, 0x100) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000040)={{0x1}}) gettid() r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[@ANYBLOB="f75f9bf747594d0a1851415d989b48270bb03c9ef00b305cba0432a36b9310552b2e4de8c9de57a65146ad9194a585247c8d2a48e1311d4dd0e973234ea0a1a238326753d3da28e216683f91691b54351036cf18886cd3e555df4a1b907696264440c2e8407ed7160e8250e81157496310f16407a59d7e892d7ea55b9215d7eb723ff1b873c6af16ac27c40d2c4fe0c268984029a5c1adb5df4f4dd2"], 0xb) inotify_add_watch(r2, &(0x7f0000000180)='./file1\x00', 0x0) r3 = geteuid() getresgid(&(0x7f0000000140), 0x0, 0x0) fchown(r2, r3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r2) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={r1, 0x28, &(0x7f0000000240)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000002c0)={r4, 0xffffffff, 0xe6d3be648ff4b41c}, 0xc) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x3, 0x0) ioctl$UI_DEV_DESTROY(r0, 0x5502) 09:39:28 executing program 3: keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000a80)={0x0, 0x9, 0xae}, &(0x7f0000000ac0)={'enc=', 'raw', ' hash=', {'sha384-avx2\x00'}}, &(0x7f0000000b40)="058f6a5fe2db85fa52", &(0x7f0000000c00)=""/174) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xff}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(r0, r2, 0x0, 0x1) 09:39:28 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xff}, 0x0) getpid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x62e, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1104}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x10, 0x800000000000803, 0x0) ioctl$BLKSECTGET(r0, 0x1267, &(0x7f0000000580)) sendto(r1, &(0x7f0000000000)="120000001600e70d017b00000000008e1584", 0x12, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(r0, r2, 0x0, 0x1) 09:39:28 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000]}, 0x45c) r1 = syz_open_dev$sndtimer(0x0, 0x0, 0x100) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000040)={{0x1}}) gettid() r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[@ANYBLOB="f75f9bf747594d0a1851415d989b48270bb03c9ef00b305cba0432a36b9310552b2e4de8c9de57a65146ad9194a585247c8d2a48e1311d4dd0e973234ea0a1a238326753d3da28e216683f91691b54351036cf18886cd3e555df4a1b907696264440c2e8407ed7160e8250e81157496310f16407a59d7e892d7ea55b9215d7eb723ff1b873c6af16ac27c40d2c4fe0c268984029a5c1adb5"], 0x98) inotify_add_watch(r2, &(0x7f0000000180)='./file1\x00', 0x80000020) r3 = geteuid() getresgid(&(0x7f0000000140), 0x0, 0x0) fchown(r2, r3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r2) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={r1, 0x28, &(0x7f0000000240)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000002c0)={r4, 0xffffffff, 0xe6d3be648ff4b41c}, 0xc) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x3, 0x0) ioctl$UI_DEV_DESTROY(r0, 0x5502) 09:39:28 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000]}, 0x45c) r1 = syz_open_dev$sndtimer(0x0, 0x0, 0x100) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000040)={{0x1}}) gettid() r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[@ANYBLOB="f75f9bf747594d0a1851415d989b48270bb03c9ef00b305cba0432a36b9310552b2e4de8c9de57a65146ad9194a585247c8d2a48e1311d4dd0e973234ea0a1a238326753d3da28e216683f91691b54351036cf18886cd3e555df4a1b907696264440c2e8407ed7160e8250e81157496310f16407a59d7e892d7ea55b9215d7eb723ff1b873c6af16ac27c40d2c4fe0c268984029a5c1adb5df4f4dd2"], 0xb) inotify_add_watch(r2, &(0x7f0000000180)='./file1\x00', 0x0) r3 = geteuid() getresgid(&(0x7f0000000140), 0x0, 0x0) fchown(r2, r3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r2) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={r1, 0x28, &(0x7f0000000240)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000002c0)={r4, 0xffffffff, 0xe6d3be648ff4b41c}, 0xc) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x3, 0x0) ioctl$UI_DEV_DESTROY(r0, 0x5502) [ 998.477996] FAT-fs (loop4): bogus number of reserved sectors [ 998.487528] FAT-fs (loop4): Can't find a valid FAT filesystem [ 998.498094] input: syz1 as /devices/virtual/input/input398 09:39:28 executing program 4: syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@shortname_mixed='shortname=mixed'}]}) 09:39:28 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000]}, 0x45c) r1 = syz_open_dev$sndtimer(0x0, 0x0, 0x100) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000040)={{0x1}}) gettid() r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[@ANYBLOB="f75f9bf747594d0a1851415d989b48270bb03c9ef00b305cba0432a36b9310552b2e4de8c9de57a65146ad9194a585247c8d2a48e1311d4dd0e973234ea0a1a238326753d3da28e216683f91691b54351036cf18886cd3e555df4a1b907696264440c2e8407ed7160e8250e81157496310f16407a59d7e892d7ea55b9215d7eb723ff1b873c6af16ac27c40d2c4fe0c268984029a5c1adb5df4f4dd2"], 0xb) inotify_add_watch(r2, &(0x7f0000000180)='./file1\x00', 0x80000020) r3 = geteuid() getresgid(0x0, 0x0, 0x0) fchown(r2, r3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r2) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={r1, 0x28, &(0x7f0000000240)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000002c0)={r4, 0xffffffff, 0xe6d3be648ff4b41c}, 0xc) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x3, 0x0) ioctl$UI_DEV_DESTROY(r0, 0x5502) [ 998.612462] input: syz1 as /devices/virtual/input/input399 09:39:28 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000]}, 0x45c) r1 = syz_open_dev$sndtimer(0x0, 0x0, 0x100) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000040)={{0x1}}) gettid() r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[@ANYBLOB="f75f9bf747594d0a1851415d989b48270bb03c9ef00b305cba0432a36b9310552b2e4de8c9de57a65146ad9194a585247c8d2a48e1311d4dd0e973234ea0a1a238326753d3da28e216683f91691b54351036cf18886cd3e555df4a1b907696264440c2e8407ed7160e8250e81157496310f16407a59d7e892d7ea55b9215d7eb723ff1b873c6af16ac27c40d2c4fe0c268984029a5c1adb5"], 0x98) inotify_add_watch(r2, &(0x7f0000000180)='./file1\x00', 0x80000020) r3 = geteuid() getresgid(&(0x7f0000000140), 0x0, 0x0) fchown(r2, r3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r2) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={r1, 0x28, &(0x7f0000000240)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000002c0)={r4, 0xffffffff, 0xe6d3be648ff4b41c}, 0xc) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x3, 0x0) ioctl$UI_DEV_DESTROY(r0, 0x5502) [ 998.689487] FAT-fs (loop4): bogus number of reserved sectors [ 998.703620] FAT-fs (loop4): Can't find a valid FAT filesystem 09:39:28 executing program 4: syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@fat=@dos1xfloppy='dos1xfloppy'}]}) [ 998.767682] input: syz1 as /devices/virtual/input/input400 [ 998.828729] FAT-fs (loop4): bogus number of reserved sectors [ 998.835261] FAT-fs (loop4): This doesn't look like a DOS 1.x volume; no bootstrapping code [ 998.846181] FAT-fs (loop4): Can't find a valid FAT filesystem 09:39:31 executing program 3: keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000a80)={0x0, 0xb, 0xae}, &(0x7f0000000ac0)={'enc=', 'raw', ' hash=', {'sha384-avx2\x00'}}, &(0x7f0000000b40)="058f6a5fe2db85fa52baca", &(0x7f0000000c00)=""/174) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xff}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(r0, r2, 0x0, 0x1) 09:39:31 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000]}, 0x45c) r1 = syz_open_dev$sndtimer(0x0, 0x0, 0x100) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000040)={{0x1}}) gettid() r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[@ANYBLOB="f75f9bf747594d0a1851415d989b48270bb03c9ef00b305cba0432a36b9310552b2e4de8c9de57a65146ad9194a585247c8d2a48e1311d4dd0e973234ea0a1a238326753d3da28e216683f91691b54351036cf18886cd3e555df4a1b907696264440c2e8407ed7160e8250e81157496310f16407a59d7e892d7ea55b9215d7eb723ff1b873c6af16ac27c40d2c4fe0c268984029a5c1adb5"], 0x98) inotify_add_watch(r2, &(0x7f0000000180)='./file1\x00', 0x80000020) r3 = geteuid() getresgid(&(0x7f0000000140), 0x0, 0x0) fchown(r2, r3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r2) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={r1, 0x28, &(0x7f0000000240)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000002c0)={r4, 0xffffffff, 0xe6d3be648ff4b41c}, 0xc) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x3, 0x0) ioctl$UI_DEV_DESTROY(r0, 0x5502) 09:39:31 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xff}, 0x0) getpid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x62e, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1104}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x10, 0x800000000000803, 0x0) ioctl$BLKSECTGET(r0, 0x1267, &(0x7f0000000580)) sendto(r1, &(0x7f0000000000)="120000001600e70d017b00000000008e1584", 0x12, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(r0, r2, 0x0, 0x1) 09:39:31 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000]}, 0x45c) r1 = syz_open_dev$sndtimer(0x0, 0x0, 0x100) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000040)={{0x1}}) gettid() r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[@ANYBLOB="f75f9bf747594d0a1851415d989b48270bb03c9ef00b305cba0432a36b9310552b2e4de8c9de57a65146ad9194a585247c8d2a48e1311d4dd0e973234ea0a1a238326753d3da28e216683f91691b54351036cf18886cd3e555df4a1b907696264440c2e8407ed7160e8250e81157496310f16407a59d7e892d7ea55b9215d7eb723ff1b873c6af16ac27c40d2c4fe0c268984029a5c1adb5df4f4dd2"], 0xb) inotify_add_watch(r2, &(0x7f0000000180)='./file1\x00', 0x80000020) r3 = geteuid() getresgid(0x0, 0x0, 0x0) fchown(r2, r3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r2) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={r1, 0x28, &(0x7f0000000240)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000002c0)={r4, 0xffffffff, 0xe6d3be648ff4b41c}, 0xc) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x3, 0x0) ioctl$UI_DEV_DESTROY(r0, 0x5502) 09:39:31 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xff}, 0x0) getpid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x62e, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1104}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x10, 0x800000000000803, 0x0) ioctl$BLKSECTGET(r0, 0x1267, &(0x7f0000000580)) sendto(r1, &(0x7f0000000000)="120000001600e70d017b00000000008e1584", 0x12, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(r0, r2, 0x0, 0x1) 09:39:31 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x7c, 0x7c, 0x8, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x0, 0x0, 0xfe3a}}, @restrict, @ptr, @func, @int, @int, @fwd, @enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x0, 0x9}]}]}, {0x0, [0x0, 0x61, 0x0, 0xa3, 0x2e, 0x0]}}, &(0x7f0000000140)=""/26, 0x9c, 0x1a}, 0x20) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000240)=ANY=[@ANYBLOB="cd80"], 0x2}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x39) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) ptrace$cont(0x1f, r0, 0x5, 0x800000000000) 09:39:31 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000]}, 0x45c) r1 = syz_open_dev$sndtimer(0x0, 0x0, 0x100) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000040)={{0x1}}) gettid() r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[@ANYBLOB="f75f9bf747594d0a1851415d989b48270bb03c9ef00b305cba0432a36b9310552b2e4de8c9de57a65146ad9194a585247c8d2a48e1311d4dd0e973234ea0a1a238326753d3da28e216683f91691b54351036cf18886cd3e555df4a1b907696264440c2e8407ed7160e8250e81157496310f16407a59d7e892d7ea55b9215d7eb723ff1b873c6af16ac27c40d2c4fe0c2689840"], 0x93) inotify_add_watch(r2, &(0x7f0000000180)='./file1\x00', 0x80000020) r3 = geteuid() getresgid(&(0x7f0000000140), 0x0, 0x0) fchown(r2, r3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r2) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={r1, 0x28, &(0x7f0000000240)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000002c0)={r4, 0xffffffff, 0xe6d3be648ff4b41c}, 0xc) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x3, 0x0) ioctl$UI_DEV_DESTROY(r0, 0x5502) [ 1001.536394] input: syz1 as /devices/virtual/input/input401 09:39:31 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000]}, 0x45c) r1 = syz_open_dev$sndtimer(0x0, 0x0, 0x100) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000040)={{0x1}}) gettid() r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[@ANYBLOB="f75f9bf747594d0a1851415d989b48270bb03c9ef00b305cba0432a36b9310552b2e4de8c9de57a65146ad9194a585247c8d2a48e1311d4dd0e973234ea0a1a238326753d3da28e216683f91691b54351036cf18886cd3e555df4a1b907696264440c2e8407ed7160e8250e81157496310f16407a59d7e892d7ea55b9215d7eb723ff1b873c6af16ac27c40d2c4fe0c2689840"], 0x93) inotify_add_watch(r2, &(0x7f0000000180)='./file1\x00', 0x80000020) r3 = geteuid() getresgid(&(0x7f0000000140), 0x0, 0x0) fchown(r2, r3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r2) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={r1, 0x28, &(0x7f0000000240)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000002c0)={r4, 0xffffffff, 0xe6d3be648ff4b41c}, 0xc) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x3, 0x0) ioctl$UI_DEV_DESTROY(r0, 0x5502) 09:39:31 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000]}, 0x45c) r1 = syz_open_dev$sndtimer(0x0, 0x0, 0x100) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000040)={{0x1}}) gettid() r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[@ANYBLOB="f75f9bf747594d0a1851415d989b48270bb03c9ef00b305cba0432a36b9310552b2e4de8c9de57a65146ad9194a585247c8d2a48e1311d4dd0e973234ea0a1a238326753d3da28e216683f91691b54351036cf18886cd3e555df4a1b907696264440c2e8407ed7160e8250e81157496310f16407a59d7e892d7ea55b9215d7eb723ff1b873c6af16ac27c40d2c4fe0c268984029a5c1adb5df4f4dd2"], 0xb) inotify_add_watch(r2, &(0x7f0000000180)='./file1\x00', 0x80000020) r3 = geteuid() getresgid(0x0, 0x0, 0x0) fchown(r2, r3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r2) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={r1, 0x28, &(0x7f0000000240)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000002c0)={r4, 0xffffffff, 0xe6d3be648ff4b41c}, 0xc) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x3, 0x0) ioctl$UI_DEV_DESTROY(r0, 0x5502) 09:39:31 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000]}, 0x45c) r1 = syz_open_dev$sndtimer(0x0, 0x0, 0x100) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000040)={{0x1}}) gettid() r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[@ANYBLOB="f75f9bf747594d0a1851415d989b48270bb03c9ef00b305cba0432a36b9310552b2e4de8c9de57a65146ad9194a585247c8d2a48e1311d4dd0e973234ea0a1a238326753d3da28e216683f91691b54351036cf18886cd3e555df4a1b907696264440c2e8407ed7160e8250e81157496310f16407a59d7e892d7ea55b9215d7eb723ff1b873c6af16ac27c40d2c4fe0c2689840"], 0x93) inotify_add_watch(r2, &(0x7f0000000180)='./file1\x00', 0x80000020) r3 = geteuid() getresgid(&(0x7f0000000140), 0x0, 0x0) fchown(r2, r3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r2) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={r1, 0x28, &(0x7f0000000240)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000002c0)={r4, 0xffffffff, 0xe6d3be648ff4b41c}, 0xc) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x3, 0x0) ioctl$UI_DEV_DESTROY(r0, 0x5502) 09:39:31 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xff}, 0x0) getpid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x62e, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1104}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x10, 0x800000000000803, 0x0) ioctl$BLKSECTGET(r0, 0x1267, &(0x7f0000000580)) sendto(r1, &(0x7f0000000000)="120000001600e70d017b00000000008e1584", 0x12, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(r0, r2, 0x0, 0x1) [ 1001.689286] input: syz1 as /devices/virtual/input/input402 09:39:31 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000]}, 0x45c) r1 = syz_open_dev$sndtimer(0x0, 0x0, 0x100) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000040)={{0x1}}) gettid() r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[@ANYBLOB], 0x0) inotify_add_watch(r2, &(0x7f0000000180)='./file1\x00', 0x80000020) r3 = geteuid() getresgid(&(0x7f0000000140), 0x0, 0x0) fchown(r2, r3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r2) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={r1, 0x28, &(0x7f0000000240)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000002c0)={r4, 0xffffffff, 0xe6d3be648ff4b41c}, 0xc) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x3, 0x0) ioctl$UI_DEV_DESTROY(r0, 0x5502) 09:39:31 executing program 3: keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000a80)={0x0, 0xb, 0xae}, &(0x7f0000000ac0)={'enc=', 'raw', ' hash=', {'sha384-avx2\x00'}}, &(0x7f0000000b40)="058f6a5fe2db85fa52baca", &(0x7f0000000c00)=""/174) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xff}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(r0, r2, 0x0, 0x1) 09:39:31 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000]}, 0x45c) r1 = syz_open_dev$sndtimer(0x0, 0x0, 0x100) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000040)={{0x1}}) gettid() r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[@ANYBLOB="f75f9bf747594d0a1851415d989b48270bb03c9ef00b305cba0432a36b9310552b2e4de8c9de57a65146ad9194a585247c8d2a48e1311d4dd0e973234ea0a1a238326753d3da28e216683f91691b54351036cf18886cd3e555df4a1b907696264440c2e8407ed7160e8250e81157496310f16407a59d7e892d7ea55b9215d7eb723ff1b873c6af16ac27c40d2c4fe0c268984029a5c1adb5df4f4dd2"], 0xb) inotify_add_watch(r2, &(0x7f0000000180)='./file1\x00', 0x80000020) r3 = geteuid() getresgid(&(0x7f0000000140), 0x0, 0x0) fchown(0xffffffffffffffff, r3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r2) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={r1, 0x28, &(0x7f0000000240)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000002c0)={r4, 0xffffffff, 0xe6d3be648ff4b41c}, 0xc) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x3, 0x0) ioctl$UI_DEV_DESTROY(r0, 0x5502) 09:39:31 executing program 1: keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000a80)={0x0, 0xc, 0xae}, &(0x7f0000000ac0)={'enc=', 'raw', ' hash=', {'sha384-avx2\x00'}}, &(0x7f0000000b40)="058f6a5fe2db85fa52baca0c", &(0x7f0000000c00)=""/174) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xff}, 0x0) getpid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x62e, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1104}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKSECTGET(r0, 0x1267, &(0x7f0000000580)) sendto(0xffffffffffffffff, &(0x7f0000000000)="120000001600e70d017b00000000008e1584", 0x12, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(r0, r1, 0x0, 0x1) 09:39:31 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xff}, 0x0) getpid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x62e, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1104}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x10, 0x800000000000803, 0x0) ioctl$BLKSECTGET(r0, 0x1267, &(0x7f0000000580)) sendto(r1, &(0x7f0000000000)="120000001600e70d017b00000000008e1584", 0x12, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(r0, r2, 0x0, 0x1) 09:39:31 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xff}, 0x0) getpid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x62e, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1104}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x10, 0x800000000000803, 0x0) ioctl$BLKSECTGET(r0, 0x1267, &(0x7f0000000580)) sendto(r1, &(0x7f0000000000)="120000001600e70d017b00000000008e1584", 0x12, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(r0, r2, 0x0, 0x1) [ 1001.918511] input: syz1 as /devices/virtual/input/input403 09:39:34 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x7c, 0x7c, 0x8, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x0, 0x0, 0xfe3a}}, @restrict, @ptr, @func, @int, @int, @fwd, @enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x0, 0x9}]}]}, {0x0, [0x0, 0x61, 0x0, 0xa3, 0x2e, 0x0]}}, &(0x7f0000000140)=""/26, 0x9c, 0x1a}, 0x20) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000240)=ANY=[@ANYBLOB="cd80"], 0x2}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x39) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) ptrace$cont(0x1f, r0, 0x5, 0x800000000000) 09:39:34 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000]}, 0x45c) r1 = syz_open_dev$sndtimer(0x0, 0x0, 0x100) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000040)={{0x1}}) gettid() r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[@ANYBLOB="f75f9bf747594d0a1851415d989b48270bb03c9ef00b305cba0432a36b9310552b2e4de8c9de57a65146ad9194a585247c8d2a48e1311d4dd0e973234ea0a1a238326753d3da28e216683f91691b54351036cf18886cd3e555df4a1b907696264440c2e8407ed7160e8250e81157496310f16407a59d7e892d7ea55b9215d7eb723ff1b873c6af16ac27c40d2c4fe0c268984029a5c1adb5df4f4dd2"], 0xb) inotify_add_watch(r2, &(0x7f0000000180)='./file1\x00', 0x80000020) r3 = geteuid() getresgid(&(0x7f0000000140), 0x0, 0x0) fchown(0xffffffffffffffff, r3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r2) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={r1, 0x28, &(0x7f0000000240)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000002c0)={r4, 0xffffffff, 0xe6d3be648ff4b41c}, 0xc) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x3, 0x0) ioctl$UI_DEV_DESTROY(r0, 0x5502) 09:39:34 executing program 1: keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000a80)={0x0, 0xc, 0xae}, &(0x7f0000000ac0)={'enc=', 'raw', ' hash=', {'sha384-avx2\x00'}}, &(0x7f0000000b40)="058f6a5fe2db85fa52baca0c", &(0x7f0000000c00)=""/174) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xff}, 0x0) getpid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x62e, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1104}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKSECTGET(r0, 0x1267, &(0x7f0000000580)) sendto(0xffffffffffffffff, &(0x7f0000000000)="120000001600e70d017b00000000008e1584", 0x12, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(r0, r1, 0x0, 0x1) 09:39:34 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xff}, 0x0) getpid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x62e, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1104}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x10, 0x800000000000803, 0x0) ioctl$BLKSECTGET(r0, 0x1267, &(0x7f0000000580)) sendto(r1, &(0x7f0000000000)="120000001600e70d017b00000000008e1584", 0x12, 0x0, 0x0, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x1) 09:39:34 executing program 3: keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000a80)={0x0, 0xb, 0xae}, &(0x7f0000000ac0)={'enc=', 'raw', ' hash=', {'sha384-avx2\x00'}}, &(0x7f0000000b40)="058f6a5fe2db85fa52baca", &(0x7f0000000c00)=""/174) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xff}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(r0, r2, 0x0, 0x1) 09:39:34 executing program 2: keyctl$KEYCTL_PKEY_DECRYPT(0x1a, 0x0, &(0x7f0000000ac0)={'enc=', 'raw', ' hash=', {'sha384-avx2\x00'}}, &(0x7f0000000b40)="058f6a5fe2db85fa52baca0c", &(0x7f0000000c00)=""/174) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xff}, 0x0) getpid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x62e, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1104}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x10, 0x800000000000803, 0x0) ioctl$BLKSECTGET(r0, 0x1267, &(0x7f0000000580)) sendto(r1, &(0x7f0000000000)="120000001600e70d017b00000000008e1584", 0x12, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(r0, r2, 0x0, 0x1) 09:39:34 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xff}, 0x0) getpid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x62e, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1104}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x10, 0x800000000000803, 0x0) ioctl$BLKSECTGET(r0, 0x1267, &(0x7f0000000580)) sendto(r1, &(0x7f0000000000)="120000001600e70d017b00000000008e1584", 0x12, 0x0, 0x0, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x1) 09:39:34 executing program 1: keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000a80)={0x0, 0xc, 0xae}, &(0x7f0000000ac0)={'enc=', 'raw', ' hash=', {'sha384-avx2\x00'}}, &(0x7f0000000b40)="058f6a5fe2db85fa52baca0c", &(0x7f0000000c00)=""/174) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xff}, 0x0) getpid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x62e, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1104}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKSECTGET(r0, 0x1267, &(0x7f0000000580)) sendto(0xffffffffffffffff, &(0x7f0000000000)="120000001600e70d017b00000000008e1584", 0x12, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(r0, r1, 0x0, 0x1) [ 1004.548257] input: syz1 as /devices/virtual/input/input404 09:39:34 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000]}, 0x45c) r1 = syz_open_dev$sndtimer(0x0, 0x0, 0x100) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000040)={{0x1}}) gettid() r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[@ANYBLOB="f75f9bf747594d0a1851415d989b48270bb03c9ef00b305cba0432a36b9310552b2e4de8c9de57a65146ad9194a585247c8d2a48e1311d4dd0e973234ea0a1a238326753d3da28e216683f91691b54351036cf18886cd3e555df4a1b907696264440c2e8407ed7160e8250e81157496310f16407a59d7e892d7ea55b9215d7eb723ff1b873c6af16ac27c40d2c4fe0c268984029a5c1adb5df4f4dd2"], 0xb) inotify_add_watch(r2, &(0x7f0000000180)='./file1\x00', 0x80000020) r3 = geteuid() getresgid(&(0x7f0000000140), 0x0, 0x0) fchown(0xffffffffffffffff, r3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r2) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={r1, 0x28, &(0x7f0000000240)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000002c0)={r4, 0xffffffff, 0xe6d3be648ff4b41c}, 0xc) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x3, 0x0) ioctl$UI_DEV_DESTROY(r0, 0x5502) 09:39:34 executing program 1: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x7c, 0x7c, 0x8, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x0, 0x0, 0xfe3a}}, @restrict, @ptr, @func, @int, @int, @fwd, @enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x0, 0x9}]}]}, {0x0, [0x0, 0x61, 0x0, 0xa3, 0x2e, 0x0]}}, &(0x7f0000000140)=""/26, 0x9c, 0x1a}, 0x20) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000240)=ANY=[@ANYBLOB="cd80"], 0x2}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x39) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) ptrace$cont(0x1f, r0, 0x5, 0x800000000000) 09:39:34 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xff}, 0x0) getpid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x62e, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1104}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x10, 0x800000000000803, 0x0) ioctl$BLKSECTGET(r0, 0x1267, &(0x7f0000000580)) sendto(r1, &(0x7f0000000000)="120000001600e70d017b00000000008e1584", 0x12, 0x0, 0x0, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x1) 09:39:34 executing program 3: keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000a80)={0x0, 0xc}, &(0x7f0000000ac0)={'enc=', 'raw', ' hash=', {'sha384-avx2\x00'}}, &(0x7f0000000b40)="058f6a5fe2db85fa52baca0c", 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xff}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(r0, r2, 0x0, 0x1) [ 1004.718258] input: syz1 as /devices/virtual/input/input405 09:39:37 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000]}, 0x45c) r1 = syz_open_dev$sndtimer(0x0, 0x0, 0x100) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000040)={{0x1}}) gettid() r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[@ANYBLOB="f75f9bf747594d0a1851415d989b48270bb03c9ef00b305cba0432a36b9310552b2e4de8c9de57a65146ad9194a585247c8d2a48e1311d4dd0e973234ea0a1a238326753d3da28e216683f91691b54351036cf18886cd3e555df4a1b907696264440c2e8407ed7160e8250e81157496310f16407a59d7e892d7ea55b9215d7eb723ff1b873c6af16ac27c40d2c4fe0c268984029a5c1adb5df4f4dd2"], 0xb) inotify_add_watch(r2, &(0x7f0000000180)='./file1\x00', 0x80000020) geteuid() getresgid(&(0x7f0000000140), 0x0, 0x0) fchown(r2, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r2) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={r1, 0x28, &(0x7f0000000240)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000002c0)={r3, 0xffffffff, 0xe6d3be648ff4b41c}, 0xc) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x3, 0x0) ioctl$UI_DEV_DESTROY(r0, 0x5502) 09:39:37 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x7c, 0x7c, 0x8, [@array, @restrict, @ptr, @func, @int, @int, @fwd, @enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x0, 0x9}]}]}, {0x0, [0x0, 0x61, 0x0, 0xa3, 0x2e, 0x0]}}, &(0x7f0000000140)=""/26, 0x9c, 0x1a}, 0x20) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000240)=ANY=[@ANYBLOB="cd80"], 0x2}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x39) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) ptrace$cont(0x1f, r0, 0x5, 0x800000000000) 09:39:37 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xff}, 0x0) getpid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x62e, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1104}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket(0x10, 0x800000000000803, 0x0) ioctl$BLKSECTGET(r0, 0x1267, &(0x7f0000000580)) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(r0, r1, 0x0, 0x1) 09:39:37 executing program 2: keyctl$KEYCTL_PKEY_DECRYPT(0x1a, 0x0, &(0x7f0000000ac0)={'enc=', 'raw', ' hash=', {'sha384-avx2\x00'}}, &(0x7f0000000b40)="058f6a5fe2db85fa52baca0c", &(0x7f0000000c00)=""/174) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xff}, 0x0) getpid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x62e, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1104}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x10, 0x800000000000803, 0x0) ioctl$BLKSECTGET(r0, 0x1267, &(0x7f0000000580)) sendto(r1, &(0x7f0000000000)="120000001600e70d017b00000000008e1584", 0x12, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(r0, r2, 0x0, 0x1) 09:39:37 executing program 3: keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000a80)={0x0, 0xc}, &(0x7f0000000ac0)={'enc=', 'raw', ' hash=', {'sha384-avx2\x00'}}, &(0x7f0000000b40)="058f6a5fe2db85fa52baca0c", 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xff}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(r0, r2, 0x0, 0x1) 09:39:37 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000]}, 0x45c) r1 = syz_open_dev$sndtimer(0x0, 0x0, 0x100) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000040)={{0x1}}) gettid() r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[@ANYBLOB="f75f9bf747594d0a1851415d989b48270bb03c9ef00b305cba0432a36b9310552b2e4de8c9de57a65146ad9194a585247c8d2a48e1311d4dd0e973234ea0a1a238326753d3da28e216683f91691b54351036cf18886cd3e555df4a1b907696264440c2e8407ed7160e8250e81157496310f16407a59d7e892d7ea55b9215d7eb723ff1b873c6af16ac27c40d2c4fe0c268984029a5c1adb5df4f4dd2"], 0xb) inotify_add_watch(r2, &(0x7f0000000180)='./file1\x00', 0x80000020) geteuid() getresgid(&(0x7f0000000140), 0x0, 0x0) fchown(r2, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r2) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={r1, 0x28, &(0x7f0000000240)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000002c0)={r3, 0xffffffff, 0xe6d3be648ff4b41c}, 0xc) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x3, 0x0) ioctl$UI_DEV_DESTROY(r0, 0x5502) [ 1007.571872] input: syz1 as /devices/virtual/input/input406 09:39:37 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000]}, 0x45c) r1 = syz_open_dev$sndtimer(0x0, 0x0, 0x100) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000040)={{0x1}}) gettid() r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[@ANYBLOB="f75f9bf747594d0a1851415d989b48270bb03c9ef00b305cba0432a36b9310552b2e4de8c9de57a65146ad9194a585247c8d2a48e1311d4dd0e973234ea0a1a238326753d3da28e216683f91691b54351036cf18886cd3e555df4a1b907696264440c2e8407ed7160e8250e81157496310f16407a59d7e892d7ea55b9215d7eb723ff1b873c6af16ac27c40d2c4fe0c268984029a5c1adb5df4f4dd2"], 0xb) inotify_add_watch(r2, &(0x7f0000000180)='./file1\x00', 0x80000020) geteuid() getresgid(&(0x7f0000000140), 0x0, 0x0) fchown(r2, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r2) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={r1, 0x28, &(0x7f0000000240)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000002c0)={r3, 0xffffffff, 0xe6d3be648ff4b41c}, 0xc) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x3, 0x0) ioctl$UI_DEV_DESTROY(r0, 0x5502) 09:39:37 executing program 1: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x7c, 0x7c, 0x8, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x0, 0x0, 0xfe3a}}, @restrict, @ptr, @func, @int, @int, @fwd, @enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x0, 0x9}]}]}, {0x0, [0x0, 0x61, 0x0, 0xa3, 0x2e, 0x0]}}, &(0x7f0000000140)=""/26, 0x9c, 0x1a}, 0x20) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000240)=ANY=[@ANYBLOB="cd80"], 0x2}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x39) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) ptrace$cont(0x1f, r0, 0x5, 0x800000000000) [ 1007.660904] input: syz1 as /devices/virtual/input/input407 09:39:37 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xff}, 0x0) getpid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x62e, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1104}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket(0x10, 0x800000000000803, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(r0, r1, 0x0, 0x1) 09:39:37 executing program 3: keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000a80)={0x0, 0xc}, &(0x7f0000000ac0)={'enc=', 'raw', ' hash=', {'sha384-avx2\x00'}}, &(0x7f0000000b40)="058f6a5fe2db85fa52baca0c", 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xff}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(r0, r2, 0x0, 0x1) [ 1007.743901] input: syz1 as /devices/virtual/input/input408 09:39:37 executing program 2: keyctl$KEYCTL_PKEY_DECRYPT(0x1a, 0x0, &(0x7f0000000ac0)={'enc=', 'raw', ' hash=', {'sha384-avx2\x00'}}, &(0x7f0000000b40)="058f6a5fe2db85fa52baca0c", &(0x7f0000000c00)=""/174) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xff}, 0x0) getpid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x62e, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1104}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x10, 0x800000000000803, 0x0) ioctl$BLKSECTGET(r0, 0x1267, &(0x7f0000000580)) sendto(r1, &(0x7f0000000000)="120000001600e70d017b00000000008e1584", 0x12, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(r0, r2, 0x0, 0x1) 09:39:37 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000]}, 0x45c) r1 = syz_open_dev$sndtimer(0x0, 0x0, 0x100) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000040)={{0x1}}) gettid() r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[@ANYBLOB="f75f9bf747594d0a1851415d989b48270bb03c9ef00b305cba0432a36b9310552b2e4de8c9de57a65146ad9194a585247c8d2a48e1311d4dd0e973234ea0a1a238326753d3da28e216683f91691b54351036cf18886cd3e555df4a1b907696264440c2e8407ed7160e8250e81157496310f16407a59d7e892d7ea55b9215d7eb723ff1b873c6af16ac27c40d2c4fe0c268984029a5c1adb5df4f4dd2"], 0xb) inotify_add_watch(r2, &(0x7f0000000180)='./file1\x00', 0x80000020) r3 = geteuid() getresgid(&(0x7f0000000140), 0x0, 0x0) fchown(r2, r3, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r2) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={r1, 0x28, &(0x7f0000000240)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000002c0)={r4, 0xffffffff, 0xe6d3be648ff4b41c}, 0xc) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x3, 0x0) ioctl$UI_DEV_DESTROY(r0, 0x5502) 09:39:37 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xff}, 0x0) getpid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x62e, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1104}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(r0, r1, 0x0, 0x1) [ 1007.929129] input: syz1 as /devices/virtual/input/input409 09:39:40 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x7c, 0x7c, 0x7, [@array, @restrict, @ptr, @func, @int, @int, @fwd, @enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x0, 0x9}]}]}, {0x0, [0x0, 0x61, 0x0, 0xa3, 0x2e]}}, &(0x7f0000000140)=""/26, 0x9b, 0x1a}, 0x20) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000240)=ANY=[@ANYBLOB="cd80"], 0x2}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x39) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) ptrace$cont(0x1f, r0, 0x5, 0x800000000000) 09:39:40 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000]}, 0x45c) r1 = syz_open_dev$sndtimer(0x0, 0x0, 0x100) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000040)={{0x1}}) gettid() r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[@ANYBLOB="f75f9bf747594d0a1851415d989b48270bb03c9ef00b305cba0432a36b9310552b2e4de8c9de57a65146ad9194a585247c8d2a48e1311d4dd0e973234ea0a1a238326753d3da28e216683f91691b54351036cf18886cd3e555df4a1b907696264440c2e8407ed7160e8250e81157496310f16407a59d7e892d7ea55b9215d7eb723ff1b873c6af16ac27c40d2c4fe0c268984029a5c1adb5df4f4dd2"], 0xb) inotify_add_watch(r2, &(0x7f0000000180)='./file1\x00', 0x80000020) r3 = geteuid() getresgid(&(0x7f0000000140), 0x0, 0x0) fchown(r2, r3, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r2) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={r1, 0x28, &(0x7f0000000240)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000002c0)={r4, 0xffffffff, 0xe6d3be648ff4b41c}, 0xc) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x3, 0x0) ioctl$UI_DEV_DESTROY(r0, 0x5502) 09:39:40 executing program 3: keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000a80)={0x0, 0xc, 0xae}, &(0x7f0000000ac0)={'enc=', 'raw', ' hash=', {'sha384-avx2\x00'}}, &(0x7f0000000b40)="058f6a5fe2db85fa52baca0c", &(0x7f0000000c00)=""/174) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xff}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(r0, r2, 0x0, 0x1) 09:39:40 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xff}, 0x0) getpid() r1 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(r0, r1, 0x0, 0x1) 09:39:40 executing program 2: keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000a80)={0x0, 0xc, 0xae}, 0x0, &(0x7f0000000b40)="058f6a5fe2db85fa52baca0c", &(0x7f0000000c00)=""/174) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xff}, 0x0) getpid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x62e, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1104}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x10, 0x800000000000803, 0x0) ioctl$BLKSECTGET(r0, 0x1267, &(0x7f0000000580)) sendto(r1, &(0x7f0000000000)="120000001600e70d017b00000000008e1584", 0x12, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(r0, r2, 0x0, 0x1) 09:39:40 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000]}, 0x45c) r1 = syz_open_dev$sndtimer(0x0, 0x0, 0x100) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000040)={{0x1}}) gettid() r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[@ANYBLOB="f75f9bf747594d0a1851415d989b48270bb03c9ef00b305cba0432a36b9310552b2e4de8c9de57a65146ad9194a585247c8d2a48e1311d4dd0e973234ea0a1a238326753d3da28e216683f91691b54351036cf18886cd3e555df4a1b907696264440c2e8407ed7160e8250e81157496310f16407a59d7e892d7ea55b9215d7eb723ff1b873c6af16ac27c40d2c4fe0c268984029a5c1adb5df4f4dd2"], 0xb) inotify_add_watch(r2, &(0x7f0000000180)='./file1\x00', 0x80000020) r3 = geteuid() getresgid(&(0x7f0000000140), 0x0, 0x0) fchown(r2, r3, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r2) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={r1, 0x28, &(0x7f0000000240)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000002c0)={r4, 0xffffffff, 0xe6d3be648ff4b41c}, 0xc) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x3, 0x0) ioctl$UI_DEV_DESTROY(r0, 0x5502) [ 1010.589867] input: syz1 as /devices/virtual/input/input410 [ 1010.677826] input: syz1 as /devices/virtual/input/input411 09:39:40 executing program 1: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x7c, 0x7c, 0x8, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x0, 0x0, 0xfe3a}}, @restrict, @ptr, @func, @int, @int, @fwd, @enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x0, 0x9}]}]}, {0x0, [0x0, 0x61, 0x0, 0xa3, 0x2e, 0x0]}}, &(0x7f0000000140)=""/26, 0x9c, 0x1a}, 0x20) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000240)=ANY=[@ANYBLOB="cd80"], 0x2}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x39) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) ptrace$cont(0x1f, r0, 0x5, 0x800000000000) 09:39:40 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xff}, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(r0, r1, 0x0, 0x1) 09:39:40 executing program 3: keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000a80)={0x0, 0xc, 0xae}, &(0x7f0000000ac0)={'enc=', 'raw', ' hash=', {'sha384-avx2\x00'}}, &(0x7f0000000b40)="058f6a5fe2db85fa52baca0c", &(0x7f0000000c00)=""/174) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xff}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(r0, r2, 0x0, 0x1) 09:39:40 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000]}, 0x45c) r1 = syz_open_dev$sndtimer(0x0, 0x0, 0x100) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000040)={{0x1}}) gettid() r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[@ANYBLOB="f75f9bf747594d0a1851415d989b48270bb03c9ef00b305cba0432a36b9310552b2e4de8c9de57a65146ad9194a585247c8d2a48e1311d4dd0e973234ea0a1a238326753d3da28e216683f91691b54351036cf18886cd3e555df4a1b907696264440c2e8407ed7160e8250e81157496310f16407a59d7e892d7ea55b9215d7eb723ff1b873c6af16ac27c40d2c4fe0c268984029a5c1adb5df4f4dd2"], 0xb) inotify_add_watch(r2, &(0x7f0000000180)='./file1\x00', 0x80000020) r3 = geteuid() getresgid(&(0x7f0000000140), 0x0, 0x0) fchown(r2, r3, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r2) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={r1, 0x28, &(0x7f0000000240)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000002c0)={r4, 0xffffffff, 0xe6d3be648ff4b41c}, 0xc) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x3, 0x0) ioctl$UI_DEV_DESTROY(r0, 0x5502) 09:39:40 executing program 2: keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000a80)={0x0, 0xc, 0xae}, 0x0, &(0x7f0000000b40)="058f6a5fe2db85fa52baca0c", &(0x7f0000000c00)=""/174) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xff}, 0x0) getpid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x62e, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1104}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x10, 0x800000000000803, 0x0) ioctl$BLKSECTGET(r0, 0x1267, &(0x7f0000000580)) sendto(r1, &(0x7f0000000000)="120000001600e70d017b00000000008e1584", 0x12, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(r0, r2, 0x0, 0x1) 09:39:40 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(r0, r1, 0x0, 0x1) [ 1010.817063] input: syz1 as /devices/virtual/input/input412 09:39:43 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x7c, 0x7c, 0x6, [@array, @restrict, @ptr, @func, @int, @int, @fwd, @enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x0, 0x9}]}]}, {0x0, [0x0, 0x61, 0x0, 0xa3]}}, &(0x7f0000000140)=""/26, 0x9a, 0x1a}, 0x20) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000240)=ANY=[@ANYBLOB="cd80"], 0x2}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x39) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) ptrace$cont(0x1f, r0, 0x5, 0x800000000000) 09:39:43 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000]}, 0x45c) r1 = syz_open_dev$sndtimer(0x0, 0x0, 0x100) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000040)={{0x1}}) gettid() r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[@ANYBLOB="f75f9bf747594d0a1851415d989b48270bb03c9ef00b305cba0432a36b9310552b2e4de8c9de57a65146ad9194a585247c8d2a48e1311d4dd0e973234ea0a1a238326753d3da28e216683f91691b54351036cf18886cd3e555df4a1b907696264440c2e8407ed7160e8250e81157496310f16407a59d7e892d7ea55b9215d7eb723ff1b873c6af16ac27c40d2c4fe0c268984029a5c1adb5df4f4dd2"], 0xb) inotify_add_watch(r2, &(0x7f0000000180)='./file1\x00', 0x80000020) r3 = geteuid() getresgid(&(0x7f0000000140), 0x0, 0x0) fchown(r2, r3, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r2) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={r1, 0x28, &(0x7f0000000240)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000002c0)={r4, 0xffffffff, 0xe6d3be648ff4b41c}, 0xc) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x3, 0x0) ioctl$UI_DEV_DESTROY(r0, 0x5502) 09:39:43 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(0xffffffffffffffff, r0, 0x0, 0x1) 09:39:43 executing program 3: keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000a80)={0x0, 0xc, 0xae}, &(0x7f0000000ac0)={'enc=', 'raw', ' hash=', {'sha384-avx2\x00'}}, &(0x7f0000000b40)="058f6a5fe2db85fa52baca0c", &(0x7f0000000c00)=""/174) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xff}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(r0, r2, 0x0, 0x1) 09:39:43 executing program 2: keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000a80)={0x0, 0xc, 0xae}, 0x0, &(0x7f0000000b40)="058f6a5fe2db85fa52baca0c", &(0x7f0000000c00)=""/174) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xff}, 0x0) getpid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x62e, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1104}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x10, 0x800000000000803, 0x0) ioctl$BLKSECTGET(r0, 0x1267, &(0x7f0000000580)) sendto(r1, &(0x7f0000000000)="120000001600e70d017b00000000008e1584", 0x12, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(r0, r2, 0x0, 0x1) 09:39:43 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(0xffffffffffffffff, r0, 0x0, 0x1) [ 1013.650491] input: syz1 as /devices/virtual/input/input413 09:39:43 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000]}, 0x45c) r1 = syz_open_dev$sndtimer(0x0, 0x0, 0x100) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000040)={{0x1}}) gettid() r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[@ANYBLOB="f75f9bf747594d0a1851415d989b48270bb03c9ef00b305cba0432a36b9310552b2e4de8c9de57a65146ad9194a585247c8d2a48e1311d4dd0e973234ea0a1a238326753d3da28e216683f91691b54351036cf18886cd3e555df4a1b907696264440c2e8407ed7160e8250e81157496310f16407a59d7e892d7ea55b9215d7eb723ff1b873c6af16ac27c40d2c4fe0c268984029a5c1adb5df4f4dd2"], 0xb) inotify_add_watch(r2, &(0x7f0000000180)='./file1\x00', 0x80000020) r3 = geteuid() getresgid(&(0x7f0000000140), 0x0, 0x0) fchown(0xffffffffffffffff, r3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r2) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={r1, 0x28, &(0x7f0000000240)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000002c0)={r4, 0xffffffff, 0xe6d3be648ff4b41c}, 0xc) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x3, 0x0) ioctl$UI_DEV_DESTROY(r0, 0x5502) 09:39:43 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(0xffffffffffffffff, r0, 0x0, 0x1) 09:39:43 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000]}, 0x45c) r1 = syz_open_dev$sndtimer(0x0, 0x0, 0x100) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000040)={{0x1}}) gettid() r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[@ANYBLOB="f75f9bf747594d0a1851415d989b48270bb03c9ef00b305cba0432a36b9310552b2e4de8c9de57a65146ad9194a585247c8d2a48e1311d4dd0e973234ea0a1a238326753d3da28e216683f91691b54351036cf18886cd3e555df4a1b907696264440c2e8407ed7160e8250e81157496310f16407a59d7e892d7ea55b9215d7eb723ff1b873c6af16ac27c40d2c4fe0c268984029a5c1adb5df4f4dd2"], 0xb) inotify_add_watch(r2, &(0x7f0000000180)='./file1\x00', 0x80000020) r3 = geteuid() getresgid(&(0x7f0000000140), 0x0, 0x0) fchown(r2, r3, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r2) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={r1, 0x28, &(0x7f0000000240)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000002c0)={r4, 0xffffffff, 0xe6d3be648ff4b41c}, 0xc) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x3, 0x0) ioctl$UI_DEV_DESTROY(r0, 0x5502) 09:39:43 executing program 3: keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000a80)={0x0, 0xc, 0xae}, &(0x7f0000000ac0)={'enc=', 'raw', ' hash=', {'sha384-avx2\x00'}}, &(0x7f0000000b40)="058f6a5fe2db85fa52baca0c", &(0x7f0000000c00)=""/174) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') prlimit64(0x0, 0x0, &(0x7f0000000280)={0x9, 0xff}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(r0, r2, 0x0, 0x1) 09:39:43 executing program 2: keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000a80)={0x0, 0x0, 0xae}, &(0x7f0000000ac0)={'enc=', 'raw', ' hash=', {'sha384-avx2\x00'}}, 0x0, &(0x7f0000000c00)=""/174) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xff}, 0x0) getpid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x62e, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1104}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x10, 0x800000000000803, 0x0) ioctl$BLKSECTGET(r0, 0x1267, &(0x7f0000000580)) sendto(r1, &(0x7f0000000000)="120000001600e70d017b00000000008e1584", 0x12, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(r0, r2, 0x0, 0x1) 09:39:43 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000]}, 0x45c) r1 = syz_open_dev$sndtimer(0x0, 0x0, 0x100) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000040)={{0x1}}) gettid() r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[@ANYBLOB="f75f9bf747594d0a1851415d989b48270bb03c9ef00b305cba0432a36b9310552b2e4de8c9de57a65146ad9194a585247c8d2a48e1311d4dd0e973234ea0a1a238326753d3da28e216683f91691b54351036cf18886cd3e555df4a1b907696264440c2e8407ed7160e8250e81157496310f16407a59d7e892d7ea55b9215d7eb723ff1b873c6af16ac27c40d2c4fe0c268984029a5c1adb5df4f4dd2"], 0xb) inotify_add_watch(r2, &(0x7f0000000180)='./file1\x00', 0x80000020) r3 = geteuid() getresgid(&(0x7f0000000140), 0x0, 0x0) fchown(r2, r3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r2) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={r1, 0x28, &(0x7f0000000240)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000002c0)={r4, 0xffffffff, 0xe6d3be648ff4b41c}, 0xc) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x3, 0x0) ioctl$UI_DEV_DESTROY(r0, 0x5502) [ 1013.826927] input: syz1 as /devices/virtual/input/input414 [ 1013.932779] input: syz1 as /devices/virtual/input/input415 09:39:46 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000]}, 0x45c) r1 = syz_open_dev$sndtimer(0x0, 0x0, 0x100) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000040)={{0x1}}) gettid() r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[@ANYBLOB="f75f9bf747594d0a1851415d989b48270bb03c9ef00b305cba0432a36b9310552b2e4de8c9de57a65146ad9194a585247c8d2a48e1311d4dd0e973234ea0a1a238326753d3da28e216683f91691b54351036cf18886cd3e555df4a1b907696264440c2e8407ed7160e8250e81157496310f16407a59d7e892d7ea55b9215d7eb723ff1b873c6af16ac27c40d2c4fe0c268984029a5c1adb5df4f4dd2"], 0xb) inotify_add_watch(r2, &(0x7f0000000180)='./file1\x00', 0x80000020) r3 = geteuid() getresgid(&(0x7f0000000140), 0x0, 0x0) fchown(0xffffffffffffffff, r3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r2) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={r1, 0x28, &(0x7f0000000240)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000002c0)={r4, 0xffffffff, 0xe6d3be648ff4b41c}, 0xc) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x3, 0x0) ioctl$UI_DEV_DESTROY(r0, 0x5502) 09:39:46 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x7c, 0x7c, 0x5, [@array, @restrict, @ptr, @func, @int, @int, @fwd, @enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x0, 0x9}]}]}, {0x0, [0x0, 0x61, 0x0]}}, &(0x7f0000000140)=""/26, 0x99, 0x1a}, 0x20) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000240)=ANY=[@ANYBLOB="cd80"], 0x2}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x39) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) ptrace$cont(0x1f, r0, 0x5, 0x800000000000) 09:39:46 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(r0, r1, 0x0, 0x1) 09:39:46 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000]}, 0x45c) r1 = syz_open_dev$sndtimer(0x0, 0x0, 0x100) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000040)={{0x1}}) gettid() r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[@ANYBLOB="f75f9bf747594d0a1851415d989b48270bb03c9ef00b305cba0432a36b9310552b2e4de8c9de57a65146ad9194a585247c8d2a48e1311d4dd0e973234ea0a1a238326753d3da28e216683f91691b54351036cf18886cd3e555df4a1b907696264440c2e8407ed7160e8250e81157496310f16407a59d7e892d7ea55b9215d7eb723ff1b873c6af16ac27c40d2c4fe0c268984029a5c1adb5df4f4dd2"], 0xb) inotify_add_watch(r2, &(0x7f0000000180)='./file1\x00', 0x80000020) r3 = geteuid() getresgid(&(0x7f0000000140), 0x0, 0x0) fchown(r2, r3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r2) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={r1, 0x28, &(0x7f0000000240)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000002c0)={r4, 0xffffffff, 0xe6d3be648ff4b41c}, 0xc) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x3, 0x0) ioctl$UI_DEV_DESTROY(r0, 0x5502) 09:39:46 executing program 3: keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000a80)={0x0, 0xc, 0xae}, &(0x7f0000000ac0)={'enc=', 'raw', ' hash=', {'sha384-avx2\x00'}}, &(0x7f0000000b40)="058f6a5fe2db85fa52baca0c", &(0x7f0000000c00)=""/174) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') prlimit64(0x0, 0x0, &(0x7f0000000280)={0x9, 0xff}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(r0, r2, 0x0, 0x1) 09:39:46 executing program 2: keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000a80)={0x0, 0x0, 0xae}, &(0x7f0000000ac0)={'enc=', 'raw', ' hash=', {'sha384-avx2\x00'}}, 0x0, &(0x7f0000000c00)=""/174) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xff}, 0x0) getpid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x62e, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1104}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x10, 0x800000000000803, 0x0) ioctl$BLKSECTGET(r0, 0x1267, &(0x7f0000000580)) sendto(r1, &(0x7f0000000000)="120000001600e70d017b00000000008e1584", 0x12, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(r0, r2, 0x0, 0x1) 09:39:46 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000]}, 0x45c) r1 = syz_open_dev$sndtimer(0x0, 0x0, 0x100) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000040)={{0x1}}) gettid() r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[@ANYBLOB="f75f9bf747594d0a1851415d989b48270bb03c9ef00b305cba0432a36b9310552b2e4de8c9de57a65146ad9194a585247c8d2a48e1311d4dd0e973234ea0a1a238326753d3da28e216683f91691b54351036cf18886cd3e555df4a1b907696264440c2e8407ed7160e8250e81157496310f16407a59d7e892d7ea55b9215d7eb723ff1b873c6af16ac27c40d2c4fe0c268984029a5c1adb5df4f4dd2"], 0xb) inotify_add_watch(r2, &(0x7f0000000180)='./file1\x00', 0x80000020) r3 = geteuid() getresgid(&(0x7f0000000140), 0x0, 0x0) fchown(0xffffffffffffffff, r3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r2) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={r1, 0x28, &(0x7f0000000240)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000002c0)={r4, 0xffffffff, 0xe6d3be648ff4b41c}, 0xc) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x3, 0x0) ioctl$UI_DEV_DESTROY(r0, 0x5502) 09:39:46 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(r0, r1, 0x0, 0x1) [ 1016.659059] input: syz1 as /devices/virtual/input/input416 09:39:46 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000]}, 0x45c) r1 = syz_open_dev$sndtimer(0x0, 0x0, 0x100) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000040)={{0x1}}) gettid() r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[@ANYBLOB="f75f9bf747594d0a1851415d989b48270bb03c9ef00b305cba0432a36b9310552b2e4de8c9de57a65146ad9194a585247c8d2a48e1311d4dd0e973234ea0a1a238326753d3da28e216683f91691b54351036cf18886cd3e555df4a1b907696264440c2e8407ed7160e8250e81157496310f16407a59d7e892d7ea55b9215d7eb723ff1b873c6af16ac27c40d2c4fe0c268984029a5c1adb5df4f4dd2"], 0xb) inotify_add_watch(r2, &(0x7f0000000180)='./file1\x00', 0x80000020) r3 = geteuid() getresgid(&(0x7f0000000140), 0x0, 0x0) fchown(r2, r3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r2) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={r1, 0x28, &(0x7f0000000240)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000002c0)={r4, 0xffffffff, 0xe6d3be648ff4b41c}, 0xc) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x3, 0x0) ioctl$UI_DEV_DESTROY(r0, 0x5502) 09:39:46 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000]}, 0x45c) r1 = syz_open_dev$sndtimer(0x0, 0x0, 0x100) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000040)={{0x1}}) gettid() r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[], 0x0) inotify_add_watch(r2, &(0x7f0000000180)='./file1\x00', 0x80000020) r3 = geteuid() getresgid(&(0x7f0000000140), 0x0, 0x0) fchown(r2, r3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r2) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={r1, 0x28, &(0x7f0000000240)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000002c0)={r4, 0xffffffff, 0xe6d3be648ff4b41c}, 0xc) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x3, 0x0) ioctl$UI_DEV_DESTROY(r0, 0x5502) 09:39:46 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(r0, r1, 0x0, 0x1) 09:39:46 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000]}, 0x45c) r1 = syz_open_dev$sndtimer(0x0, 0x0, 0x100) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000040)={{0x1}}) gettid() r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[], 0x0) inotify_add_watch(r2, &(0x7f0000000180)='./file1\x00', 0x80000020) r3 = geteuid() getresgid(&(0x7f0000000140), 0x0, 0x0) fchown(r2, r3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r2) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={r1, 0x28, &(0x7f0000000240)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000002c0)={r4, 0xffffffff, 0xe6d3be648ff4b41c}, 0xc) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x3, 0x0) ioctl$UI_DEV_DESTROY(r0, 0x5502) 09:39:46 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000]}, 0x45c) r1 = syz_open_dev$sndtimer(0x0, 0x0, 0x100) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000040)={{0x1}}) gettid() r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[@ANYBLOB="f75f9bf747594d0a1851415d989b48270bb03c9ef00b305cba0432a36b9310552b2e4de8c9de57a65146ad9194a585247c8d2a48e1311d4dd0e973234ea0a1a238326753d3da28e216683f91691b54351036cf18886cd3e555df4a1b907696264440c2e8407ed7160e8250e81157496310f16407a59d7e892d7ea55b9215d7eb723ff1b873c6af16ac27c40d2c4fe0c268984029a5c1adb5df4f4dd2"], 0xb) inotify_add_watch(r2, &(0x7f0000000180)='./file1\x00', 0x80000020) r3 = geteuid() getresgid(&(0x7f0000000140), 0x0, 0x0) fchown(r2, r3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r2) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={r1, 0x28, &(0x7f0000000240)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000002c0)={r4, 0xffffffff, 0xe6d3be648ff4b41c}, 0xc) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x3, 0x0) ioctl$UI_DEV_DESTROY(r0, 0x5502) [ 1016.773867] input: syz1 as /devices/virtual/input/input417 [ 1016.874146] input: syz1 as /devices/virtual/input/input418 09:39:49 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000]}, 0x45c) r1 = syz_open_dev$sndtimer(0x0, 0x0, 0x100) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000040)={{0x1}}) gettid() r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[], 0x0) inotify_add_watch(r2, &(0x7f0000000180)='./file1\x00', 0x80000020) r3 = geteuid() getresgid(&(0x7f0000000140), 0x0, 0x0) fchown(r2, r3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r2) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={r1, 0x28, &(0x7f0000000240)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000002c0)={r4, 0xffffffff, 0xe6d3be648ff4b41c}, 0xc) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x3, 0x0) ioctl$UI_DEV_DESTROY(r0, 0x5502) 09:39:49 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x7c, 0x7c, 0x4, [@array, @restrict, @ptr, @func, @int, @int, @fwd, @enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x0, 0x9}]}]}, {0x0, [0x0, 0x61]}}, &(0x7f0000000140)=""/26, 0x98, 0x1a}, 0x20) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000240)=ANY=[@ANYBLOB="cd80"], 0x2}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x39) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) ptrace$cont(0x1f, r0, 0x5, 0x800000000000) 09:39:49 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') r1 = syz_open_procfs(0x0, 0x0) sendfile(r0, r1, 0x0, 0x1) 09:39:49 executing program 3: keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000a80)={0x0, 0xc, 0xae}, &(0x7f0000000ac0)={'enc=', 'raw', ' hash=', {'sha384-avx2\x00'}}, &(0x7f0000000b40)="058f6a5fe2db85fa52baca0c", &(0x7f0000000c00)=""/174) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') prlimit64(0x0, 0x0, &(0x7f0000000280)={0x9, 0xff}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(r0, r2, 0x0, 0x1) 09:39:49 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000]}, 0x45c) r1 = syz_open_dev$sndtimer(0x0, 0x0, 0x100) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000040)={{0x1}}) gettid() r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[@ANYBLOB="f75f9bf747594d0a1851415d989b48270bb03c9ef00b305cba0432a36b9310552b2e4de8c9de57a65146ad9194a585247c8d2a48e1311d4dd0e973234ea0a1a238326753d3da28e216683f91691b54351036cf18886cd3e555df4a1b907696264440c2e8407ed7160e8250e81157496310f16407a59d7e892d7ea55b9215d7eb723ff1b873c6af16ac27c40d2c4fe0c268984029a5c1adb5df4f4dd2"], 0xb) inotify_add_watch(r2, &(0x7f0000000180)='./file1\x00', 0x80000020) r3 = geteuid() getresgid(&(0x7f0000000140), 0x0, 0x0) fchown(r2, r3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r2) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={r1, 0x28, &(0x7f0000000240)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000002c0)={r4, 0xffffffff, 0xe6d3be648ff4b41c}, 0xc) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x3, 0x0) ioctl$UI_DEV_DESTROY(r0, 0x5502) 09:39:49 executing program 2: keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000a80)={0x0, 0x0, 0xae}, &(0x7f0000000ac0)={'enc=', 'raw', ' hash=', {'sha384-avx2\x00'}}, 0x0, &(0x7f0000000c00)=""/174) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xff}, 0x0) getpid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x62e, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1104}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x10, 0x800000000000803, 0x0) ioctl$BLKSECTGET(r0, 0x1267, &(0x7f0000000580)) sendto(r1, &(0x7f0000000000)="120000001600e70d017b00000000008e1584", 0x12, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(r0, r2, 0x0, 0x1) 09:39:49 executing program 1: keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000a80)={0x0, 0x0, 0xae}, &(0x7f0000000ac0)={'enc=', 'raw', ' hash=', {'sha384-avx2\x00'}}, 0x0, &(0x7f0000000c00)=""/174) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xff}, 0x0) getpid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x62e, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1104}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x10, 0x800000000000803, 0x0) ioctl$BLKSECTGET(r0, 0x1267, &(0x7f0000000580)) sendto(r1, &(0x7f0000000000)="120000001600e70d017b00000000008e1584", 0x12, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(r0, r2, 0x0, 0x1) 09:39:49 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') r1 = syz_open_procfs(0x0, 0x0) sendfile(r0, r1, 0x0, 0x1) 09:39:49 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') r1 = syz_open_procfs(0x0, 0x0) sendfile(r0, r1, 0x0, 0x1) [ 1019.758575] input: syz1 as /devices/virtual/input/input419 09:39:49 executing program 3: keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000a80)={0x0, 0xc, 0xae}, &(0x7f0000000ac0)={'enc=', 'raw', ' hash=', {'sha384-avx2\x00'}}, &(0x7f0000000b40)="058f6a5fe2db85fa52baca0c", &(0x7f0000000c00)=""/174) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') prlimit64(0x0, 0xe, 0x0, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(r0, r2, 0x0, 0x1) 09:39:49 executing program 1: keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000a80)={0x0, 0x0, 0xae}, &(0x7f0000000ac0)={'enc=', 'raw', ' hash=', {'sha384-avx2\x00'}}, 0x0, &(0x7f0000000c00)=""/174) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xff}, 0x0) getpid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x62e, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1104}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x10, 0x800000000000803, 0x0) ioctl$BLKSECTGET(r0, 0x1267, &(0x7f0000000580)) sendto(r1, &(0x7f0000000000)="120000001600e70d017b00000000008e1584", 0x12, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(r0, r2, 0x0, 0x1) 09:39:49 executing program 4: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') r0 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(0xffffffffffffffff, r0, 0x0, 0x1) 09:39:49 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000]}, 0x45c) r1 = syz_open_dev$sndtimer(0x0, 0x0, 0x100) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000040)={{0x1}}) gettid() r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[@ANYBLOB="f75f9bf747594d0a1851415d989b48270bb03c9ef00b305cba0432a36b9310552b2e4de8c9de57a65146ad9194a585247c8d2a48e1311d4dd0e973234ea0a1a238326753d3da28e216683f91691b54351036cf18886cd3e555df4a1b907696264440c2e8407ed7160e8250e81157496310f16407a59d7e892d7ea55b9215d7eb723ff1b873c6af16ac27c40d2c4fe0c268984029a5c1adb5df4f4dd2"], 0xb) inotify_add_watch(r2, &(0x7f0000000180)='./file1\x00', 0x80000020) r3 = geteuid() getresgid(&(0x7f0000000140), 0x0, 0x0) fchown(r2, r3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r2) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={r1, 0x28, &(0x7f0000000240)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000002c0)={r4, 0xffffffff, 0xe6d3be648ff4b41c}, 0xc) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x3, 0x0) ioctl$UI_DEV_DESTROY(r0, 0x5502) [ 1019.948404] input: syz1 as /devices/virtual/input/input420 09:39:52 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x7c, 0x7c, 0x3, [@array, @restrict, @ptr, @func, @int, @int, @fwd, @enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x0, 0x9}]}]}, {0x0, [0x0]}}, &(0x7f0000000140)=""/26, 0x97, 0x1a}, 0x20) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000240)=ANY=[@ANYBLOB="cd80"], 0x2}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x39) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) ptrace$cont(0x1f, r0, 0x5, 0x800000000000) 09:39:52 executing program 4: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') r0 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(0xffffffffffffffff, r0, 0x0, 0x1) 09:39:52 executing program 1: keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000a80)={0x0, 0x0, 0xae}, &(0x7f0000000ac0)={'enc=', 'raw', ' hash=', {'sha384-avx2\x00'}}, 0x0, &(0x7f0000000c00)=""/174) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xff}, 0x0) getpid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x62e, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1104}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x10, 0x800000000000803, 0x0) ioctl$BLKSECTGET(r0, 0x1267, &(0x7f0000000580)) sendto(r1, &(0x7f0000000000)="120000001600e70d017b00000000008e1584", 0x12, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(r0, r2, 0x0, 0x1) 09:39:52 executing program 3: keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000a80)={0x0, 0xc, 0xae}, &(0x7f0000000ac0)={'enc=', 'raw', ' hash=', {'sha384-avx2\x00'}}, &(0x7f0000000b40)="058f6a5fe2db85fa52baca0c", &(0x7f0000000c00)=""/174) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') prlimit64(0x0, 0xe, 0x0, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(r0, r2, 0x0, 0x1) 09:39:52 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000]}, 0x45c) r1 = syz_open_dev$sndtimer(0x0, 0x0, 0x100) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000040)={{0x1}}) gettid() r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[@ANYBLOB="f75f9bf747594d0a1851415d989b48270bb03c9ef00b305cba0432a36b9310552b2e4de8c9de57a65146ad9194a585247c8d2a48e1311d4dd0e973234ea0a1a238326753d3da28e216683f91691b54351036cf18886cd3e555df4a1b907696264440c2e8407ed7160e8250e81157496310f16407a59d7e892d7ea55b9215d7eb723ff1b873c6af16ac27c40d2c4fe0c268984029a5c1adb5df4f4dd2"], 0xb) inotify_add_watch(r2, &(0x7f0000000180)='./file1\x00', 0x80000020) r3 = geteuid() getresgid(&(0x7f0000000140), 0x0, 0x0) fchown(r2, r3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r2) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={r1, 0x28, &(0x7f0000000240)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000002c0)={r4, 0xffffffff, 0xe6d3be648ff4b41c}, 0xc) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x3, 0x0) ioctl$UI_DEV_DESTROY(r0, 0x5502) 09:39:52 executing program 2: keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000a80)={0x0, 0x0, 0xae}, &(0x7f0000000ac0)={'enc=', 'raw', ' hash=', {'sha384-avx2\x00'}}, &(0x7f0000000b40), &(0x7f0000000c00)=""/174) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xff}, 0x0) getpid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x62e, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1104}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x10, 0x800000000000803, 0x0) ioctl$BLKSECTGET(r0, 0x1267, &(0x7f0000000580)) sendto(r1, &(0x7f0000000000)="120000001600e70d017b00000000008e1584", 0x12, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(r0, r2, 0x0, 0x1) 09:39:52 executing program 4: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') r0 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(0xffffffffffffffff, r0, 0x0, 0x1) 09:39:52 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000780)=ANY=[@ANYBLOB="4800000014000701b300001e000000000aff0006667e279639a91d7b7f0000017daf4204a00b32eadc2808417f000001e3d8960f65b27ee8120606a059e659655f42360200000015c9a297177fc9fd06561f45ff3c1715472db84ac00954d59c430837ac860f87e1c95277068eacc4c94e8711279b6e80a20f630cfecb32f6faf3331f4fc16123f83398215cc94565b7da3b1421ff16b351a9e6c374595365de3c5cd7ec89736962203d6a1d98f1d0126f8f57fa3c20e2f53a98c83581adca6ce8d349afb49f5871945c66f45f9c14331d3c67b37a5f04a289c8b0851df4084ff99a5af113c384e9536ec0b38ca9073967bc2c0b29e6519d98a104a071134cb2d7f436266d6d796837a24e913c517fe764e3ed5d17cb4fae0a3d4c310850f9a4fac27757b785720b5230260eecb230845d1f311696c28c83d42662c99699fdbb1fae54a4974eb951be2d68991736c2c9171b7454d900f3f633fe3aba49f670465622c9a13ec8b0be0636abd08b0aefa8e2886a00283796b3951538369e1cfb6c9aba4853f6dbc04642b9193334d8ecf403b05f84dfcaa2b15192dce662314b8b95867b108814c43cbec1dc68f96ad5d1a9af6e039d3e265ce111720b8f5c3f3a28d84915c44fe88b5170aa8e2d20b4f4db0400606f5990be034d0e2505016e19b71e7d307521bd11053558c3123bdf1c564c0617e1a598b37e92523be6d300"/523], 0x48}}, 0x0) [ 1022.752948] input: syz1 as /devices/virtual/input/input421 09:39:52 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000]}, 0x45c) r1 = syz_open_dev$sndtimer(0x0, 0x0, 0x100) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000040)={{0x1}}) gettid() r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[@ANYBLOB="f75f9bf747594d0a1851415d989b48270bb03c9ef00b305cba0432a36b9310552b2e4de8c9de57a65146ad9194a585247c8d2a48e1311d4dd0e973234ea0a1a238326753d3da28e216683f91691b54351036cf18886cd3e555df4a1b907696264440c2e8407ed7160e8250e81157496310f16407a59d7e892d7ea55b9215d7eb723ff1b873c6af16ac27c40d2c4fe0c268984029a5c1adb5df4f4dd2"], 0xb) inotify_add_watch(r2, &(0x7f0000000180)='./file1\x00', 0x80000020) r3 = geteuid() getresgid(&(0x7f0000000140), 0x0, 0x0) fchown(r2, r3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r2) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={r1, 0x28, &(0x7f0000000240)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000002c0)={r4, 0xffffffff, 0xe6d3be648ff4b41c}, 0xc) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x3, 0x0) ioctl$UI_DEV_DESTROY(r0, 0x5502) 09:39:52 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(r0, 0xffffffffffffffff, 0x0, 0x1) 09:39:52 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(r0, 0xffffffffffffffff, 0x0, 0x1) 09:39:52 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], &(0x7f0000000180)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2', 0x2, 0xfd13, &(0x7f0000000000)=""/195}, 0x48) [ 1022.913625] input: syz1 as /devices/virtual/input/input422 09:39:55 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(r0, 0xffffffffffffffff, 0x0, 0x1) 09:39:55 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000]}, 0x45c) r1 = syz_open_dev$sndtimer(0x0, 0x0, 0x100) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000040)={{0x1}}) gettid() r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[@ANYBLOB="f75f9bf747594d0a1851415d989b48270bb03c9ef00b305cba0432a36b9310552b2e4de8c9de57a65146ad9194a585247c8d2a48e1311d4dd0e973234ea0a1a238326753d3da28e216683f91691b54351036cf18886cd3e555df4a1b907696264440c2e8407ed7160e8250e81157496310f16407a59d7e892d7ea55b9215d7eb723ff1b873c6af16ac27c40d2c4fe0c268984029a5c1adb5df4f4dd2"], 0xb) inotify_add_watch(r2, &(0x7f0000000180)='./file1\x00', 0x80000020) r3 = geteuid() getresgid(&(0x7f0000000140), 0x0, 0x0) fchown(r2, r3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r2) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={r1, 0x28, &(0x7f0000000240)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000002c0)={r4, 0xffffffff, 0xe6d3be648ff4b41c}, 0xc) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x3, 0x0) ioctl$UI_DEV_DESTROY(r0, 0x5502) 09:39:55 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x7c, 0x7c, 0x2, [@array, @restrict, @ptr, @func, @int, @int, @fwd, @enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x0, 0x9}]}]}}, &(0x7f0000000140)=""/26, 0x96, 0x1a}, 0x20) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000240)=ANY=[@ANYBLOB="cd80"], 0x2}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x39) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) ptrace$cont(0x1f, r0, 0x5, 0x800000000000) 09:39:55 executing program 3: keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000a80)={0x0, 0xc, 0xae}, &(0x7f0000000ac0)={'enc=', 'raw', ' hash=', {'sha384-avx2\x00'}}, &(0x7f0000000b40)="058f6a5fe2db85fa52baca0c", &(0x7f0000000c00)=""/174) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') prlimit64(0x0, 0xe, 0x0, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(r0, r2, 0x0, 0x1) 09:39:55 executing program 2: keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000a80)={0x0, 0x0, 0xae}, &(0x7f0000000ac0)={'enc=', 'raw', ' hash=', {'sha384-avx2\x00'}}, &(0x7f0000000b40), &(0x7f0000000c00)=""/174) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xff}, 0x0) getpid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x62e, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1104}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x10, 0x800000000000803, 0x0) ioctl$BLKSECTGET(r0, 0x1267, &(0x7f0000000580)) sendto(r1, &(0x7f0000000000)="120000001600e70d017b00000000008e1584", 0x12, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(r0, r2, 0x0, 0x1) 09:39:55 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="11dca50d5e0bcfe47bf070") bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000000)=@framed={{}, [@call={0x161, 0x11, 0x1c}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f0000000200)=""/4096, 0x0, 0x0, [], 0x0, 0xe, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 09:39:55 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup\x00\f#\x9f\xd0\x85\xac\xc4\x9b\x81-\xb3\xd7=C\xea', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r1, 0x8200) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r3 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$P9_RREMOVE(r3, &(0x7f0000000180)={0x6e785e3d1cb434ee}, 0x14df) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000000100)={0x0, r3, 0x20000000, 0x8}) 09:39:55 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(r0, r1, 0x0, 0x0) 09:39:55 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000]}, 0x45c) r1 = syz_open_dev$sndtimer(0x0, 0x0, 0x100) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000040)={{0x1}}) gettid() r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[@ANYBLOB="f75f9bf747594d0a1851415d989b48270bb03c9ef00b305cba0432a36b9310552b2e4de8c9de57a65146ad9194a585247c8d2a48e1311d4dd0e973234ea0a1a238326753d3da28e216683f91691b54351036cf18886cd3e555df4a1b907696264440c2e8407ed7160e8250e81157496310f16407a59d7e892d7ea55b9215d7eb723ff1b873c6af16ac27c40d2c4fe0c268984029a5c1adb5df4f4dd2"], 0xb) inotify_add_watch(r2, &(0x7f0000000180)='./file1\x00', 0x80000020) r3 = geteuid() getresgid(&(0x7f0000000140), 0x0, 0x0) fchown(r2, r3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r2) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={r1, 0x28, &(0x7f0000000240)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000002c0)={r4, 0xffffffff, 0xe6d3be648ff4b41c}, 0xc) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x3, 0x0) ioctl$UI_DEV_DESTROY(r0, 0x5502) [ 1025.789523] input: syz1 as /devices/virtual/input/input423 09:39:55 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x7c, 0x7c, 0x2, [@array, @restrict, @ptr, @func, @int, @int, @fwd, @enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x0, 0x9}]}]}}, &(0x7f0000000140)=""/26, 0x96, 0x1a}, 0x20) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000240)=ANY=[@ANYBLOB="cd80"], 0x2}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x39) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) ptrace$cont(0x1f, r0, 0x5, 0x800000000000) 09:39:55 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r2, 0x1, 0xf, &(0x7f0000000180)=0xb, 0x4) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x33, &(0x7f0000000300)={0x1, &(0x7f0000000000)=[{0x6}]}, 0x10) 09:39:55 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(r0, r1, 0x0, 0x0) 09:39:55 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000]}, 0x45c) r1 = syz_open_dev$sndtimer(0x0, 0x0, 0x100) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000040)={{0x1}}) gettid() r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[@ANYBLOB="f75f9bf747594d0a1851415d989b48270bb03c9ef00b305cba0432a36b9310552b2e4de8c9de57a65146ad9194a585247c8d2a48e1311d4dd0e973234ea0a1a238326753d3da28e216683f91691b54351036cf18886cd3e555df4a1b907696264440c2e8407ed7160e8250e81157496310f16407a59d7e892d7ea55b9215d7eb723ff1b873c6af16ac27c40d2c4fe0c268984029a5c1adb5df4f4dd2"], 0xb) inotify_add_watch(r2, &(0x7f0000000180)='./file1\x00', 0x80000020) r3 = geteuid() getresgid(&(0x7f0000000140), 0x0, 0x0) fchown(r2, r3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r2) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={r1, 0x28, &(0x7f0000000240)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000002c0)={r4, 0xffffffff, 0xe6d3be648ff4b41c}, 0xc) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x3, 0x0) ioctl$UI_DEV_DESTROY(r0, 0x5502) [ 1025.908952] input: syz1 as /devices/virtual/input/input424 09:39:55 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(r0, r1, 0x0, 0x0) 09:39:55 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r0, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000780)=ANY=[@ANYBLOB="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"/523], 0x48}}, 0x0) [ 1026.036210] input: syz1 as /devices/virtual/input/input425 09:39:56 executing program 3: keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000a80)={0x0, 0xc, 0xae}, &(0x7f0000000ac0)={'enc=', 'raw', ' hash=', {'sha384-avx2\x00'}}, &(0x7f0000000b40)="058f6a5fe2db85fa52baca0c", &(0x7f0000000c00)=""/174) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') prlimit64(0x0, 0xe, &(0x7f0000000280)={0x0, 0xff}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(r0, r2, 0x0, 0x1) 09:39:56 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r3}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000300)=@newqdisc={0x58, 0x24, 0x507, 0x0, 0x0, {0x0, r3, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_sfb={{0x8, 0x1, 'sfb\x00'}, {0x2c, 0x2, @TCA_SFB_PARMS={0x1f}}}]}, 0x58}}, 0x0) 09:39:56 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000]}, 0x45c) r1 = syz_open_dev$sndtimer(0x0, 0x0, 0x100) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000040)={{0x1}}) gettid() r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[@ANYBLOB="f75f9bf747594d0a1851415d989b48270bb03c9ef00b305cba0432a36b9310552b2e4de8c9de57a65146ad9194a585247c8d2a48e1311d4dd0e973234ea0a1a238326753d3da28e216683f91691b54351036cf18886cd3e555df4a1b907696264440c2e8407ed7160e8250e81157496310f16407a59d7e892d7ea55b9215d7eb723ff1b873c6af16ac27c40d2c4fe0c268984029a5c1adb5df4f4dd2"], 0xb) inotify_add_watch(r2, &(0x7f0000000180)='./file1\x00', 0x80000020) r3 = geteuid() getresgid(&(0x7f0000000140), 0x0, 0x0) fchown(r2, r3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r2) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={r1, 0x28, &(0x7f0000000240)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000002c0)={r4, 0xffffffff, 0xe6d3be648ff4b41c}, 0xc) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x3, 0x0) ioctl$UI_DEV_DESTROY(r0, 0x5502) 09:39:56 executing program 2: keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000a80)={0x0, 0x0, 0xae}, &(0x7f0000000ac0)={'enc=', 'raw', ' hash=', {'sha384-avx2\x00'}}, &(0x7f0000000b40), &(0x7f0000000c00)=""/174) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xff}, 0x0) getpid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x62e, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1104}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x10, 0x800000000000803, 0x0) ioctl$BLKSECTGET(r0, 0x1267, &(0x7f0000000580)) sendto(r1, &(0x7f0000000000)="120000001600e70d017b00000000008e1584", 0x12, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(r0, r2, 0x0, 0x1) 09:39:56 executing program 1: 09:39:56 executing program 1: [ 1026.227401] input: syz1 as /devices/virtual/input/input426 09:39:58 executing program 1: 09:39:58 executing program 3: keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000a80)={0x0, 0xc, 0xae}, &(0x7f0000000ac0)={'enc=', 'raw', ' hash=', {'sha384-avx2\x00'}}, &(0x7f0000000b40)="058f6a5fe2db85fa52baca0c", &(0x7f0000000c00)=""/174) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') prlimit64(0x0, 0xe, &(0x7f0000000280)={0x0, 0xff}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(r0, r2, 0x0, 0x1) 09:39:58 executing program 4: 09:39:58 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000]}, 0x45c) r1 = syz_open_dev$sndtimer(0x0, 0x0, 0x100) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000040)={{0x1}}) gettid() r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[@ANYBLOB="f75f9bf747594d0a1851415d989b48270bb03c9ef00b305cba0432a36b9310552b2e4de8c9de57a65146ad9194a585247c8d2a48e1311d4dd0e973234ea0a1a238326753d3da28e216683f91691b54351036cf18886cd3e555df4a1b907696264440c2e8407ed7160e8250e81157496310f16407a59d7e892d7ea55b9215d7eb723ff1b873c6af16ac27c40d2c4fe0c268984029a5c1adb5df4f4dd2"], 0xb) inotify_add_watch(r2, &(0x7f0000000180)='./file1\x00', 0x80000020) r3 = geteuid() getresgid(&(0x7f0000000140), 0x0, 0x0) fchown(r2, r3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r2) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={r1, 0x28, &(0x7f0000000240)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000002c0)={r4, 0xffffffff, 0xe6d3be648ff4b41c}, 0xc) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x3, 0x0) ioctl$UI_DEV_DESTROY(r0, 0x5502) 09:39:58 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x7c, 0x7c, 0x2, [@array, @restrict, @ptr, @func, @int, @int, @fwd, @enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x0, 0x9}]}]}}, 0x0, 0x96}, 0x20) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000240)=ANY=[@ANYBLOB="cd80"], 0x2}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x39) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) ptrace$cont(0x1f, r0, 0x5, 0x800000000000) 09:39:58 executing program 2: keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000a80)={0x0, 0x6, 0xae}, &(0x7f0000000ac0)={'enc=', 'raw', ' hash=', {'sha384-avx2\x00'}}, &(0x7f0000000b40)="058f6a5fe2db", &(0x7f0000000c00)=""/174) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xff}, 0x0) getpid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x62e, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1104}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x10, 0x800000000000803, 0x0) ioctl$BLKSECTGET(r0, 0x1267, &(0x7f0000000580)) sendto(r1, &(0x7f0000000000)="120000001600e70d017b00000000008e1584", 0x12, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(r0, r2, 0x0, 0x1) 09:39:58 executing program 4: 09:39:58 executing program 1: 09:39:58 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000]}, 0x45c) r1 = syz_open_dev$sndtimer(0x0, 0x0, 0x100) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000040)={{0x1}}) gettid() r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[@ANYBLOB="f75f9bf747594d0a1851415d989b48270bb03c9ef00b305cba0432a36b9310552b2e4de8c9de57a65146ad9194a585247c8d2a48e1311d4dd0e973234ea0a1a238326753d3da28e216683f91691b54351036cf18886cd3e555df4a1b907696264440c2e8407ed7160e8250e81157496310f16407a59d7e892d7ea55b9215d7eb723ff1b873c6af16ac27c40d2c4fe0c268984029a5c1adb5df4f4dd2"], 0xb) inotify_add_watch(r2, &(0x7f0000000180)='./file1\x00', 0x80000020) r3 = geteuid() getresgid(&(0x7f0000000140), 0x0, 0x0) fchown(r2, r3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r2) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={r1, 0x28, &(0x7f0000000240)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000002c0)={r4, 0xffffffff, 0xe6d3be648ff4b41c}, 0xc) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x3, 0x0) ioctl$UI_DEV_DESTROY(r0, 0x5502) 09:39:58 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f00000001c0)='./file0\x00', r1, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='system.posix_acl_access\x00', &(0x7f0000000040)={{}, {}, [{}], {}, [], {0x10, 0x3}}, 0x2c, 0x0) chdir(&(0x7f0000000340)='./file0\x00') 09:39:58 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x40800000000003, 0x300) ioctl$sock_SIOCADDDLCI(r0, 0x8980, 0x0) [ 1028.962275] input: syz1 as /devices/virtual/input/input427 09:39:59 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000]}, 0x45c) r1 = syz_open_dev$sndtimer(0x0, 0x0, 0x100) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000040)={{0x1}}) gettid() r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[@ANYBLOB="f75f9bf747594d0a1851415d989b48270bb03c9ef00b305cba0432a36b9310552b2e4de8c9de57a65146ad9194a585247c8d2a48e1311d4dd0e973234ea0a1a238326753d3da28e216683f91691b54351036cf18886cd3e555df4a1b907696264440c2e8407ed7160e8250e81157496310f16407a59d7e892d7ea55b9215d7eb723ff1b873c6af16ac27c40d2c4fe0c268984029a5c1adb5df4f4dd2"], 0xb) inotify_add_watch(r2, &(0x7f0000000180)='./file1\x00', 0x80000020) r3 = geteuid() getresgid(&(0x7f0000000140), 0x0, 0x0) fchown(r2, r3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r2) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={r1, 0x28, &(0x7f0000000240)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000002c0)={r4, 0xffffffff, 0xe6d3be648ff4b41c}, 0xc) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x3, 0x0) ioctl$UI_DEV_DESTROY(r0, 0x5502) 09:39:59 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f00000001c0)='./file0\x00', r1, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='system.posix_acl_access\x00', &(0x7f0000000440)={{}, {}, [], {}, [], {0x10, 0x3}}, 0x24, 0x0) chdir(&(0x7f0000000340)='./file0\x00') r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000000c0)="11dca5155e0bcfe47bf070") open(&(0x7f0000000040)='./file0\x00', 0x10000000080040, 0x0) [ 1029.067971] input: syz1 as /devices/virtual/input/input428 09:39:59 executing program 3: keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000a80)={0x0, 0xc, 0xae}, &(0x7f0000000ac0)={'enc=', 'raw', ' hash=', {'sha384-avx2\x00'}}, &(0x7f0000000b40)="058f6a5fe2db85fa52baca0c", &(0x7f0000000c00)=""/174) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') prlimit64(0x0, 0xe, &(0x7f0000000280)={0x0, 0xff}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(r0, r2, 0x0, 0x1) 09:39:59 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000]}, 0x45c) r1 = syz_open_dev$sndtimer(0x0, 0x0, 0x100) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000040)={{0x1}}) gettid() r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[@ANYBLOB="f75f9bf747594d0a1851415d989b48270bb03c9ef00b305cba0432a36b9310552b2e4de8c9de57a65146ad9194a585247c8d2a48e1311d4dd0e973234ea0a1a238326753d3da28e216683f91691b54351036cf18886cd3e555df4a1b907696264440c2e8407ed7160e8250e81157496310f16407a59d7e892d7ea55b9215d7eb723ff1b873c6af16ac27c40d2c4fe0c268984029a5c1adb5df4f4dd2"], 0xb) inotify_add_watch(r2, &(0x7f0000000180)='./file1\x00', 0x80000020) r3 = geteuid() getresgid(&(0x7f0000000140), 0x0, 0x0) fchown(r2, r3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={r1, 0x28, &(0x7f0000000240)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000002c0)={r4, 0xffffffff, 0xe6d3be648ff4b41c}, 0xc) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x3, 0x0) ioctl$UI_DEV_DESTROY(r0, 0x5502) [ 1029.139614] input: syz1 as /devices/virtual/input/input429 09:39:59 executing program 1: r0 = socket(0x1000000010, 0x4008000000803, 0x0) timer_create(0x0, 0x0, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, 0x0, 0x0) [ 1029.256867] input: syz1 as /devices/virtual/input/input430 09:40:01 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x7c, 0x7c, 0x2, [@array, @restrict, @ptr, @func, @int, @int, @fwd, @enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x0, 0x9}]}]}}, 0x0, 0x96}, 0x20) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000240)=ANY=[@ANYBLOB="cd80"], 0x2}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x39) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) ptrace$cont(0x1f, r0, 0x5, 0x800000000000) 09:40:01 executing program 4: perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000a80), 0xfffffffffffffffd) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000280)={{{@in6=@mcast1, @in6=@mcast1}}, {{@in6=@mcast2}, 0x0, @in6}}, 0x0) ioprio_set$uid(0x0, 0x0, 0x81) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0xb2) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000002740)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) dup(0xffffffffffffffff) setsockopt$inet6_opts(r1, 0x29, 0x37, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], 0x1) sendmmsg(r1, 0x0, 0x0, 0x11) 09:40:01 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000]}, 0x45c) r1 = syz_open_dev$sndtimer(0x0, 0x0, 0x100) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000040)={{0x1}}) gettid() r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[@ANYBLOB="f75f9bf747594d0a1851415d989b48270bb03c9ef00b305cba0432a36b9310552b2e4de8c9de57a65146ad9194a585247c8d2a48e1311d4dd0e973234ea0a1a238326753d3da28e216683f91691b54351036cf18886cd3e555df4a1b907696264440c2e8407ed7160e8250e81157496310f16407a59d7e892d7ea55b9215d7eb723ff1b873c6af16ac27c40d2c4fe0c268984029a5c1adb5df4f4dd2"], 0xb) inotify_add_watch(r2, &(0x7f0000000180)='./file1\x00', 0x80000020) r3 = geteuid() getresgid(&(0x7f0000000140), 0x0, 0x0) fchown(r2, r3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r2) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={r1, 0x28, &(0x7f0000000240)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000002c0)={r4, 0xffffffff, 0xe6d3be648ff4b41c}, 0xc) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x3, 0x0) ioctl$UI_DEV_DESTROY(r0, 0x5502) 09:40:01 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000]}, 0x45c) r1 = syz_open_dev$sndtimer(0x0, 0x0, 0x100) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000040)={{0x1}}) gettid() r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[@ANYBLOB="f75f9bf747594d0a1851415d989b48270bb03c9ef00b305cba0432a36b9310552b2e4de8c9de57a65146ad9194a585247c8d2a48e1311d4dd0e973234ea0a1a238326753d3da28e216683f91691b54351036cf18886cd3e555df4a1b907696264440c2e8407ed7160e8250e81157496310f16407a59d7e892d7ea55b9215d7eb723ff1b873c6af16ac27c40d2c4fe0c268984029a5c1adb5df4f4dd2"], 0xb) inotify_add_watch(r2, &(0x7f0000000180)='./file1\x00', 0x80000020) r3 = geteuid() getresgid(&(0x7f0000000140), 0x0, 0x0) fchown(r2, r3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={r1, 0x28, &(0x7f0000000240)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000002c0)={r4, 0xffffffff, 0xe6d3be648ff4b41c}, 0xc) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x3, 0x0) ioctl$UI_DEV_DESTROY(r0, 0x5502) 09:40:01 executing program 2: keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000a80)={0x0, 0x6, 0xae}, &(0x7f0000000ac0)={'enc=', 'raw', ' hash=', {'sha384-avx2\x00'}}, &(0x7f0000000b40)="058f6a5fe2db", &(0x7f0000000c00)=""/174) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xff}, 0x0) getpid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x62e, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1104}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x10, 0x800000000000803, 0x0) ioctl$BLKSECTGET(r0, 0x1267, &(0x7f0000000580)) sendto(r1, &(0x7f0000000000)="120000001600e70d017b00000000008e1584", 0x12, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(r0, r2, 0x0, 0x1) 09:40:01 executing program 3: keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000a80)={0x0, 0xc, 0xae}, &(0x7f0000000ac0)={'enc=', 'raw', ' hash=', {'sha384-avx2\x00'}}, &(0x7f0000000b40)="058f6a5fe2db85fa52baca0c", &(0x7f0000000c00)=""/174) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(r0, r2, 0x0, 0x1) 09:40:01 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000]}, 0x45c) r1 = syz_open_dev$sndtimer(0x0, 0x0, 0x100) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000040)={{0x1}}) gettid() r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[@ANYBLOB="f75f9bf747594d0a1851415d989b48270bb03c9ef00b305cba0432a36b9310552b2e4de8c9de57a65146ad9194a585247c8d2a48e1311d4dd0e973234ea0a1a238326753d3da28e216683f91691b54351036cf18886cd3e555df4a1b907696264440c2e8407ed7160e8250e81157496310f16407a59d7e892d7ea55b9215d7eb723ff1b873c6af16ac27c40d2c4fe0c268984029a5c1adb5df4f4dd2"], 0xb) inotify_add_watch(r2, &(0x7f0000000180)='./file1\x00', 0x80000020) r3 = geteuid() getresgid(&(0x7f0000000140), 0x0, 0x0) fchown(r2, r3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r2) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={r1, 0x28, &(0x7f0000000240)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000002c0)={r4, 0xffffffff, 0xe6d3be648ff4b41c}, 0xc) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x3, 0x0) ioctl$UI_DEV_DESTROY(r0, 0x5502) 09:40:01 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000]}, 0x45c) r1 = syz_open_dev$sndtimer(0x0, 0x0, 0x100) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000040)={{0x1}}) gettid() r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[@ANYBLOB="f75f9bf747594d0a1851415d989b48270bb03c9ef00b305cba0432a36b9310552b2e4de8c9de57a65146ad9194a585247c8d2a48e1311d4dd0e973234ea0a1a238326753d3da28e216683f91691b54351036cf18886cd3e555df4a1b907696264440c2e8407ed7160e8250e81157496310f16407a59d7e892d7ea55b9215d7eb723ff1b873c6af16ac27c40d2c4fe0c268984029a5c1adb5df4f4dd2"], 0xb) inotify_add_watch(r2, &(0x7f0000000180)='./file1\x00', 0x80000020) r3 = geteuid() getresgid(&(0x7f0000000140), 0x0, 0x0) fchown(r2, r3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={r1, 0x28, &(0x7f0000000240)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000002c0)={r4, 0xffffffff, 0xe6d3be648ff4b41c}, 0xc) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x3, 0x0) ioctl$UI_DEV_DESTROY(r0, 0x5502) 09:40:02 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000]}, 0x45c) r1 = syz_open_dev$sndtimer(0x0, 0x0, 0x100) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000040)={{0x1}}) gettid() r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[@ANYBLOB="f75f9bf747594d0a1851415d989b48270bb03c9ef00b305cba0432a36b9310552b2e4de8c9de57a65146ad9194a585247c8d2a48e1311d4dd0e973234ea0a1a238326753d3da28e216683f91691b54351036cf18886cd3e555df4a1b907696264440c2e8407ed7160e8250e81157496310f16407a59d7e892d7ea55b9215d7eb723ff1b873c6af16ac27c40d2c4fe0c268984029a5c1adb5df4f4dd2"], 0xb) inotify_add_watch(r2, &(0x7f0000000180)='./file1\x00', 0x80000020) r3 = geteuid() getresgid(&(0x7f0000000140), 0x0, 0x0) fchown(r2, r3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r2) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={r1, 0x28, &(0x7f0000000240)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000002c0)={r4, 0xffffffff, 0xe6d3be648ff4b41c}, 0xc) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x3, 0x0) ioctl$UI_DEV_DESTROY(r0, 0x5502) [ 1031.998330] input: syz1 as /devices/virtual/input/input431 09:40:02 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000]}, 0x45c) r1 = syz_open_dev$sndtimer(0x0, 0x0, 0x100) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000040)={{0x1}}) gettid() r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[@ANYBLOB="f75f9bf747594d0a1851415d989b48270bb03c9ef00b305cba0432a36b9310552b2e4de8c9de57a65146ad9194a585247c8d2a48e1311d4dd0e973234ea0a1a238326753d3da28e216683f91691b54351036cf18886cd3e555df4a1b907696264440c2e8407ed7160e8250e81157496310f16407a59d7e892d7ea55b9215d7eb723ff1b873c6af16ac27c40d2c4fe0c268984029a5c1adb5df4f4dd2"], 0xb) inotify_add_watch(r2, &(0x7f0000000180)='./file1\x00', 0x80000020) r3 = geteuid() getresgid(&(0x7f0000000140), 0x0, 0x0) fchown(r2, r3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={r1, 0x28, &(0x7f0000000240)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000002c0)={r4, 0xffffffff, 0xe6d3be648ff4b41c}, 0xc) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x3, 0x0) ioctl$UI_DEV_DESTROY(r0, 0x5502) [ 1032.069933] input: syz1 as /devices/virtual/input/input432 09:40:02 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000]}, 0x45c) r1 = syz_open_dev$sndtimer(0x0, 0x0, 0x100) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000040)={{0x1}}) gettid() r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[@ANYBLOB="f75f9bf747594d0a1851415d989b48270bb03c9ef00b305cba0432a36b9310552b2e4de8c9de57a65146ad9194a585247c8d2a48e1311d4dd0e973234ea0a1a238326753d3da28e216683f91691b54351036cf18886cd3e555df4a1b907696264440c2e8407ed7160e8250e81157496310f16407a59d7e892d7ea55b9215d7eb723ff1b873c6af16ac27c40d2c4fe0c268984029a5c1adb5df4f4dd2"], 0xb) inotify_add_watch(r2, &(0x7f0000000180)='./file1\x00', 0x80000020) r3 = geteuid() getresgid(&(0x7f0000000140), 0x0, 0x0) fchown(r2, r3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r2) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={r1, 0x28, &(0x7f0000000240)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000002c0)={r4, 0xffffffff, 0xe6d3be648ff4b41c}, 0xc) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x3, 0x0) ioctl$UI_DEV_DESTROY(r0, 0x5502) 09:40:02 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000]}, 0x45c) r1 = syz_open_dev$sndtimer(0x0, 0x0, 0x100) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000040)={{0x1}}) gettid() r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[@ANYBLOB="f75f9bf747594d0a1851415d989b48270bb03c9ef00b305cba0432a36b9310552b2e4de8c9de57a65146ad9194a585247c8d2a48e1311d4dd0e973234ea0a1a238326753d3da28e216683f91691b54351036cf18886cd3e555df4a1b907696264440c2e8407ed7160e8250e81157496310f16407a59d7e892d7ea55b9215d7eb723ff1b873c6af16ac27c40d2c4fe0c268984029a5c1adb5df4f4dd2"], 0xb) inotify_add_watch(r2, &(0x7f0000000180)='./file1\x00', 0x80000020) r3 = geteuid() getresgid(&(0x7f0000000140), 0x0, 0x0) fchown(r2, r3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r2) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000002c0)={0x0, 0xffffffff, 0xe6d3be648ff4b41c}, 0xc) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x3, 0x0) ioctl$UI_DEV_DESTROY(r0, 0x5502) [ 1032.138535] input: syz1 as /devices/virtual/input/input433 [ 1032.245341] input: syz1 as /devices/virtual/input/input434 09:40:04 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x7c, 0x7c, 0x2, [@array, @restrict, @ptr, @func, @int, @int, @fwd, @enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x0, 0x9}]}]}}, 0x0, 0x96}, 0x20) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000240)=ANY=[@ANYBLOB="cd80"], 0x2}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x39) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) ptrace$cont(0x1f, r0, 0x5, 0x800000000000) 09:40:04 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000]}, 0x45c) r1 = syz_open_dev$sndtimer(0x0, 0x0, 0x100) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000040)={{0x1}}) gettid() r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[@ANYBLOB="f75f9bf747594d0a1851415d989b48270bb03c9ef00b305cba0432a36b9310552b2e4de8c9de57a65146ad9194a585247c8d2a48e1311d4dd0e973234ea0a1a238326753d3da28e216683f91691b54351036cf18886cd3e555df4a1b907696264440c2e8407ed7160e8250e81157496310f16407a59d7e892d7ea55b9215d7eb723ff1b873c6af16ac27c40d2c4fe0c268984029a5c1adb5df4f4dd2"], 0xb) inotify_add_watch(r2, &(0x7f0000000180)='./file1\x00', 0x80000020) r3 = geteuid() getresgid(&(0x7f0000000140), 0x0, 0x0) fchown(r2, r3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={r1, 0x28, &(0x7f0000000240)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000002c0)={r4, 0xffffffff, 0xe6d3be648ff4b41c}, 0xc) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x3, 0x0) ioctl$UI_DEV_DESTROY(r0, 0x5502) 09:40:04 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000]}, 0x45c) r1 = syz_open_dev$sndtimer(0x0, 0x0, 0x100) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000040)={{0x1}}) gettid() r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[@ANYBLOB="f75f9bf747594d0a1851415d989b48270bb03c9ef00b305cba0432a36b9310552b2e4de8c9de57a65146ad9194a585247c8d2a48e1311d4dd0e973234ea0a1a238326753d3da28e216683f91691b54351036cf18886cd3e555df4a1b907696264440c2e8407ed7160e8250e81157496310f16407a59d7e892d7ea55b9215d7eb723ff1b873c6af16ac27c40d2c4fe0c268984029a5c1adb5df4f4dd2"], 0xb) inotify_add_watch(r2, &(0x7f0000000180)='./file1\x00', 0x80000020) r3 = geteuid() getresgid(&(0x7f0000000140), 0x0, 0x0) fchown(r2, r3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r2) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={r1, 0x28, &(0x7f0000000240)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000002c0)={r4, 0xffffffff, 0xe6d3be648ff4b41c}, 0xc) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x3, 0x0) ioctl$UI_DEV_DESTROY(r0, 0x5502) 09:40:04 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000]}, 0x45c) r1 = syz_open_dev$sndtimer(0x0, 0x0, 0x100) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000040)={{0x1}}) gettid() r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[@ANYBLOB="f75f9bf747594d0a1851415d989b48270bb03c9ef00b305cba0432a36b9310552b2e4de8c9de57a65146ad9194a585247c8d2a48e1311d4dd0e973234ea0a1a238326753d3da28e216683f91691b54351036cf18886cd3e555df4a1b907696264440c2e8407ed7160e8250e81157496310f16407a59d7e892d7ea55b9215d7eb723ff1b873c6af16ac27c40d2c4fe0c268984029a5c1adb5df4f4dd2"], 0xb) inotify_add_watch(r2, &(0x7f0000000180)='./file1\x00', 0x80000020) r3 = geteuid() getresgid(&(0x7f0000000140), 0x0, 0x0) fchown(r2, r3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r2) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000002c0)={0x0, 0xffffffff, 0xe6d3be648ff4b41c}, 0xc) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x3, 0x0) ioctl$UI_DEV_DESTROY(r0, 0x5502) 09:40:04 executing program 3: keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000a80)={0x0, 0xc, 0xae}, &(0x7f0000000ac0)={'enc=', 'raw', ' hash=', {'sha384-avx2\x00'}}, &(0x7f0000000b40)="058f6a5fe2db85fa52baca0c", &(0x7f0000000c00)=""/174) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(r0, r2, 0x0, 0x1) 09:40:04 executing program 2: keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000a80)={0x0, 0x6, 0xae}, &(0x7f0000000ac0)={'enc=', 'raw', ' hash=', {'sha384-avx2\x00'}}, &(0x7f0000000b40)="058f6a5fe2db", &(0x7f0000000c00)=""/174) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xff}, 0x0) getpid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x62e, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1104}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x10, 0x800000000000803, 0x0) ioctl$BLKSECTGET(r0, 0x1267, &(0x7f0000000580)) sendto(r1, &(0x7f0000000000)="120000001600e70d017b00000000008e1584", 0x12, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(r0, r2, 0x0, 0x1) 09:40:05 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000]}, 0x45c) r1 = syz_open_dev$sndtimer(0x0, 0x0, 0x100) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000040)={{0x1}}) gettid() r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[@ANYBLOB="f75f9bf747594d0a1851415d989b48270bb03c9ef00b305cba0432a36b9310552b2e4de8c9de57a65146ad9194a585247c8d2a48e1311d4dd0e973234ea0a1a238326753d3da28e216683f91691b54351036cf18886cd3e555df4a1b907696264440c2e8407ed7160e8250e81157496310f16407a59d7e892d7ea55b9215d7eb723ff1b873c6af16ac27c40d2c4fe0c268984029a5c1adb5df4f4dd2"], 0xb) inotify_add_watch(r2, &(0x7f0000000180)='./file1\x00', 0x80000020) r3 = geteuid() getresgid(&(0x7f0000000140), 0x0, 0x0) fchown(r2, r3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={r1, 0x28, &(0x7f0000000240)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000002c0)={r4, 0xffffffff, 0xe6d3be648ff4b41c}, 0xc) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x3, 0x0) ioctl$UI_DEV_DESTROY(r0, 0x5502) [ 1034.995696] input: syz1 as /devices/virtual/input/input435 [ 1035.020721] input: syz1 as /devices/virtual/input/input436 09:40:05 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000]}, 0x45c) r1 = syz_open_dev$sndtimer(0x0, 0x0, 0x100) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000040)={{0x1}}) gettid() r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[@ANYBLOB="f75f9bf747594d0a1851415d989b48270bb03c9ef00b305cba0432a36b9310552b2e4de8c9de57a65146ad9194a585247c8d2a48e1311d4dd0e973234ea0a1a238326753d3da28e216683f91691b54351036cf18886cd3e555df4a1b907696264440c2e8407ed7160e8250e81157496310f16407a59d7e892d7ea55b9215d7eb723ff1b873c6af16ac27c40d2c4fe0c268984029a5c1adb5df4f4dd2"], 0xb) inotify_add_watch(r2, &(0x7f0000000180)='./file1\x00', 0x80000020) r3 = geteuid() getresgid(&(0x7f0000000140), 0x0, 0x0) fchown(r2, r3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r2) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000002c0)={0x0, 0xffffffff, 0xe6d3be648ff4b41c}, 0xc) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x3, 0x0) ioctl$UI_DEV_DESTROY(r0, 0x5502) 09:40:05 executing program 3: keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000a80)={0x0, 0xc, 0xae}, &(0x7f0000000ac0)={'enc=', 'raw', ' hash=', {'sha384-avx2\x00'}}, &(0x7f0000000b40)="058f6a5fe2db85fa52baca0c", &(0x7f0000000c00)=""/174) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(r0, r2, 0x0, 0x1) 09:40:05 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000]}, 0x45c) r1 = syz_open_dev$sndtimer(0x0, 0x0, 0x100) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000040)={{0x1}}) gettid() r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[@ANYBLOB="f75f9bf747594d0a1851415d989b48270bb03c9ef00b305cba0432a36b9310552b2e4de8c9de57a65146ad9194a585247c8d2a48e1311d4dd0e973234ea0a1a238326753d3da28e216683f91691b54351036cf18886cd3e555df4a1b907696264440c2e8407ed7160e8250e81157496310f16407a59d7e892d7ea55b9215d7eb723ff1b873c6af16ac27c40d2c4fe0c268984029a5c1adb5df4f4dd2"], 0xb) inotify_add_watch(r2, &(0x7f0000000180)='./file1\x00', 0x80000020) r3 = geteuid() getresgid(&(0x7f0000000140), 0x0, 0x0) fchown(r2, r3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={r1, 0x28, &(0x7f0000000240)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000002c0)={r4, 0xffffffff, 0xe6d3be648ff4b41c}, 0xc) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x3, 0x0) ioctl$UI_DEV_DESTROY(r0, 0x5502) 09:40:05 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000]}, 0x45c) r1 = syz_open_dev$sndtimer(0x0, 0x0, 0x100) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000040)={{0x1}}) gettid() r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[@ANYBLOB="f75f9bf747594d0a1851415d989b48270bb03c9ef00b305cba0432a36b9310552b2e4de8c9de57a65146ad9194a585247c8d2a48e1311d4dd0e973234ea0a1a238326753d3da28e216683f91691b54351036cf18886cd3e555df4a1b907696264440c2e8407ed7160e8250e81157496310f16407a59d7e892d7ea55b9215d7eb723ff1b873c6af16ac27c40d2c4fe0c268984029a5c1adb5df4f4dd2"], 0xb) inotify_add_watch(r2, &(0x7f0000000180)='./file1\x00', 0x80000020) r3 = geteuid() getresgid(&(0x7f0000000140), 0x0, 0x0) fchown(r2, r3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r2) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000002c0)={0x0, 0xffffffff, 0xe6d3be648ff4b41c}, 0xc) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x3, 0x0) ioctl$UI_DEV_DESTROY(r0, 0x5502) 09:40:05 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000]}, 0x45c) r1 = syz_open_dev$sndtimer(0x0, 0x0, 0x100) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000040)={{0x1}}) gettid() r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[@ANYBLOB="f75f9bf747594d0a1851415d989b48270bb03c9ef00b305cba0432a36b9310552b2e4de8c9de57a65146ad9194a585247c8d2a48e1311d4dd0e973234ea0a1a238326753d3da28e216683f91691b54351036cf18886cd3e555df4a1b907696264440c2e8407ed7160e8250e81157496310f16407a59d7e892d7ea55b9215d7eb723ff1b873c6af16ac27c40d2c4fe0c268984029a5c1adb5df4f4dd2"], 0xb) inotify_add_watch(r2, &(0x7f0000000180)='./file1\x00', 0x80000020) r3 = geteuid() getresgid(&(0x7f0000000140), 0x0, 0x0) fchown(r2, r3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r2) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={r1, 0x28, &(0x7f0000000240)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000002c0)={r4, 0xffffffff, 0xe6d3be648ff4b41c}, 0xc) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x3, 0x0) ioctl$UI_DEV_DESTROY(r0, 0x5502) [ 1035.199806] input: syz1 as /devices/virtual/input/input437 [ 1035.228209] input: syz1 as /devices/virtual/input/input438 09:40:07 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x7c, 0x7c, 0x2, [@array, @restrict, @ptr, @func, @int, @int, @fwd, @enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x0, 0x9}]}]}}, 0x0, 0x96}, 0x20) sendmsg$nl_netfilter(0xffffffffffffffff, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x39) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) ptrace$cont(0x1f, r0, 0x5, 0x800000000000) 09:40:07 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000]}, 0x45c) r1 = syz_open_dev$sndtimer(0x0, 0x0, 0x100) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000040)={{0x1}}) gettid() r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[@ANYBLOB="f75f9bf747594d0a1851415d989b48270bb03c9ef00b305cba0432a36b9310552b2e4de8c9de57a65146ad9194a585247c8d2a48e1311d4dd0e973234ea0a1a238326753d3da28e216683f91691b54351036cf18886cd3e555df4a1b907696264440c2e8407ed7160e8250e81157496310f16407a59d7e892d7ea55b9215d7eb723ff1b873c6af16ac27c40d2c4fe0c268984029a5c1adb5df4f4dd2"], 0xb) inotify_add_watch(r2, &(0x7f0000000180)='./file1\x00', 0x80000020) r3 = geteuid() getresgid(&(0x7f0000000140), 0x0, 0x0) fchown(r2, r3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r2) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={r1, 0x28, &(0x7f0000000240)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000002c0)={r4, 0xffffffff, 0xe6d3be648ff4b41c}, 0xc) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x3, 0x0) ioctl$UI_DEV_DESTROY(r0, 0x5502) 09:40:07 executing program 3: keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000a80)={0x0, 0xc, 0xae}, &(0x7f0000000ac0)={'enc=', 'raw', ' hash=', {'sha384-avx2\x00'}}, &(0x7f0000000b40)="058f6a5fe2db85fa52baca0c", &(0x7f0000000c00)=""/174) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xff}, 0x0) getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(r0, r1, 0x0, 0x1) 09:40:07 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000]}, 0x45c) r1 = syz_open_dev$sndtimer(0x0, 0x0, 0x100) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000040)={{0x1}}) gettid() r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[@ANYBLOB="f75f9bf747594d0a1851415d989b48270bb03c9ef00b305cba0432a36b9310552b2e4de8c9de57a65146ad9194a585247c8d2a48e1311d4dd0e973234ea0a1a238326753d3da28e216683f91691b54351036cf18886cd3e555df4a1b907696264440c2e8407ed7160e8250e81157496310f16407a59d7e892d7ea55b9215d7eb723ff1b873c6af16ac27c40d2c4fe0c268984029a5c1adb5df4f4dd2"], 0xb) inotify_add_watch(r2, &(0x7f0000000180)='./file1\x00', 0x80000020) r3 = geteuid() getresgid(&(0x7f0000000140), 0x0, 0x0) fchown(r2, r3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r2) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={0xffffffffffffffff, 0x28, &(0x7f0000000240)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000002c0)={r4, 0xffffffff, 0xe6d3be648ff4b41c}, 0xc) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x3, 0x0) ioctl$UI_DEV_DESTROY(r0, 0x5502) 09:40:07 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000]}, 0x45c) r1 = syz_open_dev$sndtimer(0x0, 0x0, 0x100) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000040)={{0x1}}) gettid() r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[@ANYBLOB="f75f9bf747594d0a1851415d989b48270bb03c9ef00b305cba0432a36b9310552b2e4de8c9de57a65146ad9194a585247c8d2a48e1311d4dd0e973234ea0a1a238326753d3da28e216683f91691b54351036cf18886cd3e555df4a1b907696264440c2e8407ed7160e8250e81157496310f16407a59d7e892d7ea55b9215d7eb723ff1b873c6af16ac27c40d2c4fe0c268984029a5c1adb5df4f4dd2"], 0xb) inotify_add_watch(r2, &(0x7f0000000180)='./file1\x00', 0x80000020) r3 = geteuid() getresgid(&(0x7f0000000140), 0x0, 0x0) fchown(r2, r3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r2) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={r1, 0x28, &(0x7f0000000240)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000002c0)={r4, 0xffffffff, 0xe6d3be648ff4b41c}, 0xc) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x3, 0x0) ioctl$UI_DEV_DESTROY(r0, 0x5502) 09:40:07 executing program 2: keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000a80)={0x0, 0x9, 0xae}, &(0x7f0000000ac0)={'enc=', 'raw', ' hash=', {'sha384-avx2\x00'}}, &(0x7f0000000b40)="058f6a5fe2db85fa52", &(0x7f0000000c00)=""/174) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xff}, 0x0) getpid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x62e, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1104}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x10, 0x800000000000803, 0x0) ioctl$BLKSECTGET(r0, 0x1267, &(0x7f0000000580)) sendto(r1, &(0x7f0000000000)="120000001600e70d017b00000000008e1584", 0x12, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(r0, r2, 0x0, 0x1) 09:40:08 executing program 1: keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000a80)={0x0, 0x0, 0xae}, &(0x7f0000000ac0)={'enc=', 'raw', ' hash=', {'sha384-avx2\x00'}}, 0x0, &(0x7f0000000c00)=""/174) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xff}, 0x0) getpid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x62e, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1104}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x10, 0x800000000000803, 0x0) ioctl$BLKSECTGET(r0, 0x1267, &(0x7f0000000580)) sendto(r1, &(0x7f0000000000)="120000001600e70d017b00000000008e1584", 0x12, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(r0, r2, 0x0, 0x1) [ 1038.048557] input: syz1 as /devices/virtual/input/input439 [ 1038.089174] input: syz1 as /devices/virtual/input/input440 09:40:08 executing program 1: keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000a80)={0x0, 0x0, 0xae}, &(0x7f0000000ac0)={'enc=', 'raw', ' hash=', {'sha384-avx2\x00'}}, 0x0, &(0x7f0000000c00)=""/174) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xff}, 0x0) getpid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x62e, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1104}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x10, 0x800000000000803, 0x0) ioctl$BLKSECTGET(r0, 0x1267, &(0x7f0000000580)) sendto(r1, &(0x7f0000000000)="120000001600e70d017b00000000008e1584", 0x12, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(r0, r2, 0x0, 0x1) 09:40:08 executing program 3: keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000a80)={0x0, 0xc, 0xae}, &(0x7f0000000ac0)={'enc=', 'raw', ' hash=', {'sha384-avx2\x00'}}, &(0x7f0000000b40)="058f6a5fe2db85fa52baca0c", &(0x7f0000000c00)=""/174) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xff}, 0x0) getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(r0, r1, 0x0, 0x1) 09:40:08 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000]}, 0x45c) r1 = syz_open_dev$sndtimer(0x0, 0x0, 0x100) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000040)={{0x1}}) gettid() r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[@ANYBLOB="f75f9bf747594d0a1851415d989b48270bb03c9ef00b305cba0432a36b9310552b2e4de8c9de57a65146ad9194a585247c8d2a48e1311d4dd0e973234ea0a1a238326753d3da28e216683f91691b54351036cf18886cd3e555df4a1b907696264440c2e8407ed7160e8250e81157496310f16407a59d7e892d7ea55b9215d7eb723ff1b873c6af16ac27c40d2c4fe0c268984029a5c1adb5df4f4dd2"], 0xb) inotify_add_watch(r2, &(0x7f0000000180)='./file1\x00', 0x80000020) r3 = geteuid() getresgid(&(0x7f0000000140), 0x0, 0x0) fchown(r2, r3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r2) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={0xffffffffffffffff, 0x28, &(0x7f0000000240)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000002c0)={r4, 0xffffffff, 0xe6d3be648ff4b41c}, 0xc) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x3, 0x0) ioctl$UI_DEV_DESTROY(r0, 0x5502) 09:40:08 executing program 1: keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000a80)={0x0, 0x0, 0xae}, &(0x7f0000000ac0)={'enc=', 'raw', ' hash=', {'sha384-avx2\x00'}}, 0x0, &(0x7f0000000c00)=""/174) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xff}, 0x0) getpid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x62e, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1104}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x10, 0x800000000000803, 0x0) ioctl$BLKSECTGET(r0, 0x1267, &(0x7f0000000580)) sendto(r1, &(0x7f0000000000)="120000001600e70d017b00000000008e1584", 0x12, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(r0, r2, 0x0, 0x1) 09:40:08 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000]}, 0x45c) r1 = syz_open_dev$sndtimer(0x0, 0x0, 0x100) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000040)={{0x1}}) gettid() r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[@ANYBLOB="f75f9bf747594d0a1851415d989b48270bb03c9ef00b305cba0432a36b9310552b2e4de8c9de57a65146ad9194a585247c8d2a48e1311d4dd0e973234ea0a1a238326753d3da28e216683f91691b54351036cf18886cd3e555df4a1b907696264440c2e8407ed7160e8250e81157496310f16407a59d7e892d7ea55b9215d7eb723ff1b873c6af16ac27c40d2c4fe0c268984029a5c1adb5df4f4dd2"], 0xb) inotify_add_watch(r2, &(0x7f0000000180)='./file1\x00', 0x80000020) r3 = geteuid() getresgid(&(0x7f0000000140), 0x0, 0x0) fchown(r2, r3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r2) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={r1, 0x28, &(0x7f0000000240)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000002c0)={r4, 0xffffffff, 0xe6d3be648ff4b41c}, 0xc) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x3, 0x0) ioctl$UI_DEV_DESTROY(r0, 0x5502) [ 1038.256064] input: syz1 as /devices/virtual/input/input441 [ 1038.362316] input: syz1 as /devices/virtual/input/input442 09:40:10 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000]}, 0x45c) r1 = syz_open_dev$sndtimer(0x0, 0x0, 0x100) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000040)={{0x1}}) gettid() r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[@ANYBLOB="f75f9bf747594d0a1851415d989b48270bb03c9ef00b305cba0432a36b9310552b2e4de8c9de57a65146ad9194a585247c8d2a48e1311d4dd0e973234ea0a1a238326753d3da28e216683f91691b54351036cf18886cd3e555df4a1b907696264440c2e8407ed7160e8250e81157496310f16407a59d7e892d7ea55b9215d7eb723ff1b873c6af16ac27c40d2c4fe0c268984029a5c1adb5df4f4dd2"], 0xb) inotify_add_watch(r2, &(0x7f0000000180)='./file1\x00', 0x80000020) r3 = geteuid() getresgid(&(0x7f0000000140), 0x0, 0x0) fchown(r2, r3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r2) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={r1, 0x28, &(0x7f0000000240)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000002c0)={r4, 0xffffffff, 0xe6d3be648ff4b41c}, 0xc) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x3, 0x0) ioctl$UI_DEV_DESTROY(r0, 0x5502) 09:40:10 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x7c, 0x7c, 0x2, [@array, @restrict, @ptr, @func, @int, @int, @fwd, @enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x0, 0x9}]}]}}, 0x0, 0x96}, 0x20) sendmsg$nl_netfilter(0xffffffffffffffff, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x39) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) ptrace$cont(0x1f, r0, 0x5, 0x800000000000) 09:40:10 executing program 2: keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000a80)={0x0, 0x9, 0xae}, &(0x7f0000000ac0)={'enc=', 'raw', ' hash=', {'sha384-avx2\x00'}}, &(0x7f0000000b40)="058f6a5fe2db85fa52", &(0x7f0000000c00)=""/174) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xff}, 0x0) getpid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x62e, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1104}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x10, 0x800000000000803, 0x0) ioctl$BLKSECTGET(r0, 0x1267, &(0x7f0000000580)) sendto(r1, &(0x7f0000000000)="120000001600e70d017b00000000008e1584", 0x12, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(r0, r2, 0x0, 0x1) 09:40:10 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000]}, 0x45c) r1 = syz_open_dev$sndtimer(0x0, 0x0, 0x100) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000040)={{0x1}}) gettid() r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[@ANYBLOB="f75f9bf747594d0a1851415d989b48270bb03c9ef00b305cba0432a36b9310552b2e4de8c9de57a65146ad9194a585247c8d2a48e1311d4dd0e973234ea0a1a238326753d3da28e216683f91691b54351036cf18886cd3e555df4a1b907696264440c2e8407ed7160e8250e81157496310f16407a59d7e892d7ea55b9215d7eb723ff1b873c6af16ac27c40d2c4fe0c268984029a5c1adb5df4f4dd2"], 0xb) inotify_add_watch(r2, &(0x7f0000000180)='./file1\x00', 0x80000020) r3 = geteuid() getresgid(&(0x7f0000000140), 0x0, 0x0) fchown(r2, r3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r2) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={0xffffffffffffffff, 0x28, &(0x7f0000000240)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000002c0)={r4, 0xffffffff, 0xe6d3be648ff4b41c}, 0xc) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x3, 0x0) ioctl$UI_DEV_DESTROY(r0, 0x5502) 09:40:10 executing program 3: keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000a80)={0x0, 0xc, 0xae}, &(0x7f0000000ac0)={'enc=', 'raw', ' hash=', {'sha384-avx2\x00'}}, &(0x7f0000000b40)="058f6a5fe2db85fa52baca0c", &(0x7f0000000c00)=""/174) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xff}, 0x0) getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(r0, r1, 0x0, 0x1) 09:40:10 executing program 4: keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000a80)={0x0, 0x9, 0xae}, &(0x7f0000000ac0)={'enc=', 'raw', ' hash=', {'sha384-avx2\x00'}}, &(0x7f0000000b40)="058f6a5fe2db85fa52", &(0x7f0000000c00)=""/174) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xff}, 0x0) getpid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x62e, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1104}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x10, 0x800000000000803, 0x0) ioctl$BLKSECTGET(r0, 0x1267, &(0x7f0000000580)) sendto(r1, &(0x7f0000000000)="120000001600e70d017b00000000008e1584", 0x12, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(r0, r2, 0x0, 0x1) 09:40:11 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000]}, 0x45c) r1 = syz_open_dev$sndtimer(0x0, 0x0, 0x100) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000040)={{0x1}}) gettid() r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[@ANYBLOB="f75f9bf747594d0a1851415d989b48270bb03c9ef00b305cba0432a36b9310552b2e4de8c9de57a65146ad9194a585247c8d2a48e1311d4dd0e973234ea0a1a238326753d3da28e216683f91691b54351036cf18886cd3e555df4a1b907696264440c2e8407ed7160e8250e81157496310f16407a59d7e892d7ea55b9215d7eb723ff1b873c6af16ac27c40d2c4fe0c268984029a5c1adb5df4f4dd2"], 0xb) inotify_add_watch(r2, &(0x7f0000000180)='./file1\x00', 0x80000020) r3 = geteuid() getresgid(&(0x7f0000000140), 0x0, 0x0) fchown(r2, r3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r2) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={r1, 0x28, &(0x7f0000000240)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000002c0)={r4, 0xffffffff, 0xe6d3be648ff4b41c}, 0xc) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x3, 0x0) ioctl$UI_DEV_DESTROY(r0, 0x5502) [ 1041.075984] input: syz1 as /devices/virtual/input/input443 09:40:11 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000]}, 0x45c) r1 = syz_open_dev$sndtimer(0x0, 0x0, 0x100) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000040)={{0x1}}) gettid() r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[@ANYBLOB="f75f9bf747594d0a1851415d989b48270bb03c9ef00b305cba0432a36b9310552b2e4de8c9de57a65146ad9194a585247c8d2a48e1311d4dd0e973234ea0a1a238326753d3da28e216683f91691b54351036cf18886cd3e555df4a1b907696264440c2e8407ed7160e8250e81157496310f16407a59d7e892d7ea55b9215d7eb723ff1b873c6af16ac27c40d2c4fe0c268984029a5c1adb5df4f4dd2"], 0xb) inotify_add_watch(r2, &(0x7f0000000180)='./file1\x00', 0x80000020) r3 = geteuid() getresgid(&(0x7f0000000140), 0x0, 0x0) fchown(r2, r3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r2) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={r1, 0x28, &(0x7f0000000240)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000002c0)={r4, 0xffffffff, 0xe6d3be648ff4b41c}, 0xc) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x3, 0x0) ioctl$UI_DEV_DESTROY(r0, 0x5502) 09:40:11 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000]}, 0x45c) r1 = syz_open_dev$sndtimer(0x0, 0x0, 0x100) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000040)={{0x1}}) gettid() r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[@ANYBLOB="f75f9bf747594d0a1851415d989b48270bb03c9ef00b305cba0432a36b9310552b2e4de8c9de57a65146ad9194a585247c8d2a48e1311d4dd0e973234ea0a1a238326753d3da28e216683f91691b54351036cf18886cd3e555df4a1b907696264440c2e8407ed7160e8250e81157496310f16407a59d7e892d7ea55b9215d7eb723ff1b873c6af16ac27c40d2c4fe0c268984029a5c1adb5df4f4dd2"], 0xb) inotify_add_watch(r2, &(0x7f0000000180)='./file1\x00', 0x80000020) r3 = geteuid() getresgid(&(0x7f0000000140), 0x0, 0x0) fchown(r2, r3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r2) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={r1, 0x0, 0x0}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000002c0)={0x0, 0xffffffff, 0xe6d3be648ff4b41c}, 0xc) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x3, 0x0) ioctl$UI_DEV_DESTROY(r0, 0x5502) 09:40:11 executing program 4: keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000a80)={0x0, 0xc, 0xae}, &(0x7f0000000ac0)={'enc=', 'raw', ' hash=', {'sha384-avx2\x00'}}, &(0x7f0000000b40)="058f6a5fe2db85fa52baca0c", &(0x7f0000000c00)=""/174) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xff}, 0x0) getpid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x62e, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1104}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x10, 0x800000000000803, 0x0) sendto(r1, &(0x7f0000000000)="120000001600e70d017b00000000008e1584", 0x12, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(r0, r2, 0x0, 0x1) 09:40:11 executing program 1: keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000a80)={0x0, 0xc, 0xae}, &(0x7f0000000ac0)={'enc=', 'raw', ' hash=', {'sha384-avx2\x00'}}, &(0x7f0000000b40)="058f6a5fe2db85fa52baca0c", &(0x7f0000000c00)=""/174) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xff}, 0x0) getpid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x62e, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1104}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket(0x10, 0x800000000000803, 0x0) ioctl$BLKSECTGET(r0, 0x1267, &(0x7f0000000580)) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(r0, r1, 0x0, 0x1) 09:40:11 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000]}, 0x45c) r1 = syz_open_dev$sndtimer(0x0, 0x0, 0x100) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000040)={{0x1}}) gettid() r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[@ANYBLOB="f75f9bf747594d0a1851415d989b48270bb03c9ef00b305cba0432a36b9310552b2e4de8c9de57a65146ad9194a585247c8d2a48e1311d4dd0e973234ea0a1a238326753d3da28e216683f91691b54351036cf18886cd3e555df4a1b907696264440c2e8407ed7160e8250e81157496310f16407a59d7e892d7ea55b9215d7eb723ff1b873c6af16ac27c40d2c4fe0c268984029a5c1adb5df4f4dd2"], 0xb) inotify_add_watch(r2, &(0x7f0000000180)='./file1\x00', 0x80000020) r3 = geteuid() getresgid(&(0x7f0000000140), 0x0, 0x0) fchown(r2, r3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r2) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={r1, 0x0, 0x0}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000002c0)={0x0, 0xffffffff, 0xe6d3be648ff4b41c}, 0xc) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x3, 0x0) ioctl$UI_DEV_DESTROY(r0, 0x5502) [ 1041.238540] input: syz1 as /devices/virtual/input/input444 09:40:11 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000]}, 0x45c) r1 = syz_open_dev$sndtimer(0x0, 0x0, 0x100) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000040)={{0x1}}) gettid() r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[@ANYBLOB="f75f9bf747594d0a1851415d989b48270bb03c9ef00b305cba0432a36b9310552b2e4de8c9de57a65146ad9194a585247c8d2a48e1311d4dd0e973234ea0a1a238326753d3da28e216683f91691b54351036cf18886cd3e555df4a1b907696264440c2e8407ed7160e8250e81157496310f16407a59d7e892d7ea55b9215d7eb723ff1b873c6af16ac27c40d2c4fe0c268984029a5c1adb5df4f4dd2"], 0xb) inotify_add_watch(r2, &(0x7f0000000180)='./file1\x00', 0x80000020) r3 = geteuid() getresgid(&(0x7f0000000140), 0x0, 0x0) fchown(r2, r3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r2) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={r1, 0x28, &(0x7f0000000240)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000002c0)={r4, 0xffffffff, 0xe6d3be648ff4b41c}, 0xc) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x3, 0x0) ioctl$UI_DEV_DESTROY(r0, 0x5502) [ 1041.348019] input: syz1 as /devices/virtual/input/input445 [ 1041.435494] input: syz1 as /devices/virtual/input/input446 09:40:14 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x7c, 0x7c, 0x2, [@array, @restrict, @ptr, @func, @int, @int, @fwd, @enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x0, 0x9}]}]}}, 0x0, 0x96}, 0x20) sendmsg$nl_netfilter(0xffffffffffffffff, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x39) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) ptrace$cont(0x1f, r0, 0x5, 0x800000000000) 09:40:14 executing program 1: keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000a80)={0x0, 0xc, 0xae}, &(0x7f0000000ac0)={'enc=', 'raw', ' hash=', {'sha384-avx2\x00'}}, &(0x7f0000000b40)="058f6a5fe2db85fa52baca0c", &(0x7f0000000c00)=""/174) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xff}, 0x0) getpid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x62e, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1104}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket(0x10, 0x800000000000803, 0x0) ioctl$BLKSECTGET(r0, 0x1267, &(0x7f0000000580)) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(r0, r1, 0x0, 0x1) 09:40:14 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000]}, 0x45c) r1 = syz_open_dev$sndtimer(0x0, 0x0, 0x100) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000040)={{0x1}}) gettid() r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[@ANYBLOB="f75f9bf747594d0a1851415d989b48270bb03c9ef00b305cba0432a36b9310552b2e4de8c9de57a65146ad9194a585247c8d2a48e1311d4dd0e973234ea0a1a238326753d3da28e216683f91691b54351036cf18886cd3e555df4a1b907696264440c2e8407ed7160e8250e81157496310f16407a59d7e892d7ea55b9215d7eb723ff1b873c6af16ac27c40d2c4fe0c268984029a5c1adb5df4f4dd2"], 0xb) inotify_add_watch(r2, &(0x7f0000000180)='./file1\x00', 0x80000020) r3 = geteuid() getresgid(&(0x7f0000000140), 0x0, 0x0) fchown(r2, r3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r2) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={r1, 0x0, 0x0}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000002c0)={0x0, 0xffffffff, 0xe6d3be648ff4b41c}, 0xc) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x3, 0x0) ioctl$UI_DEV_DESTROY(r0, 0x5502) 09:40:14 executing program 3: keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000a80)={0x0, 0xc, 0xae}, &(0x7f0000000ac0)={'enc=', 'raw', ' hash=', {'sha384-avx2\x00'}}, &(0x7f0000000b40)="058f6a5fe2db85fa52baca0c", &(0x7f0000000c00)=""/174) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xff}, 0x0) r1 = getpid() sched_setattr(r1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(r0, r2, 0x0, 0x1) 09:40:14 executing program 2: keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000a80)={0x0, 0x9, 0xae}, &(0x7f0000000ac0)={'enc=', 'raw', ' hash=', {'sha384-avx2\x00'}}, &(0x7f0000000b40)="058f6a5fe2db85fa52", &(0x7f0000000c00)=""/174) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xff}, 0x0) getpid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x62e, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1104}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x10, 0x800000000000803, 0x0) ioctl$BLKSECTGET(r0, 0x1267, &(0x7f0000000580)) sendto(r1, &(0x7f0000000000)="120000001600e70d017b00000000008e1584", 0x12, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(r0, r2, 0x0, 0x1) 09:40:14 executing program 4: keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000a80)={0x0, 0xc, 0xae}, &(0x7f0000000ac0)={'enc=', 'raw', ' hash=', {'sha384-avx2\x00'}}, &(0x7f0000000b40)="058f6a5fe2db85fa52baca0c", &(0x7f0000000c00)=""/174) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xff}, 0x0) getpid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x62e, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1104}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x10, 0x800000000000803, 0x0) ioctl$BLKSECTGET(r0, 0x1267, &(0x7f0000000580)) sendto(r1, &(0x7f0000000000)="120000001600e70d017b00000000008e1584", 0x12, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(r0, r2, 0x0, 0x1) 09:40:14 executing program 1: keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000a80)={0x0, 0xc, 0xae}, &(0x7f0000000ac0)={'enc=', 'raw', ' hash=', {'sha384-avx2\x00'}}, &(0x7f0000000b40)="058f6a5fe2db85fa52baca0c", &(0x7f0000000c00)=""/174) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xff}, 0x0) getpid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x62e, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1104}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket(0x10, 0x800000000000803, 0x0) ioctl$BLKSECTGET(r0, 0x1267, &(0x7f0000000580)) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(r0, r1, 0x0, 0x1) [ 1044.112584] input: syz1 as /devices/virtual/input/input447 09:40:14 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000]}, 0x45c) r1 = syz_open_dev$sndtimer(0x0, 0x0, 0x100) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000040)={{0x1}}) gettid() r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[@ANYBLOB="f75f9bf747594d0a1851415d989b48270bb03c9ef00b305cba0432a36b9310552b2e4de8c9de57a65146ad9194a585247c8d2a48e1311d4dd0e973234ea0a1a238326753d3da28e216683f91691b54351036cf18886cd3e555df4a1b907696264440c2e8407ed7160e8250e81157496310f16407a59d7e892d7ea55b9215d7eb723ff1b873c6af16ac27c40d2c4fe0c268984029a5c1adb5df4f4dd2"], 0xb) inotify_add_watch(r2, &(0x7f0000000180)='./file1\x00', 0x80000020) r3 = geteuid() getresgid(&(0x7f0000000140), 0x0, 0x0) fchown(r2, r3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r2) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={r1, 0x28, &(0x7f0000000240)}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x3, 0x0) ioctl$UI_DEV_DESTROY(r0, 0x5502) 09:40:14 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x2, 0x0) r1 = syz_open_dev$sndtimer(0x0, 0x0, 0x100) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000040)={{0x1}}) gettid() r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[@ANYBLOB="f75f9bf747594d0a1851415d989b48270bb03c9ef00b305cba0432a36b9310552b2e4de8c9de57a65146ad9194a585247c8d2a48e1311d4dd0e973234ea0a1a238326753d3da28e216683f91691b54351036cf18886cd3e555df4a1b907696264440c2e8407ed7160e8250e81157496310f16407a59d7e892d7ea55b9215d7eb723ff1b873c6af16ac27c40d2c4fe0c268984029a5c1adb5df4f4dd2"], 0xb) inotify_add_watch(r2, &(0x7f0000000180)='./file1\x00', 0x80000020) r3 = geteuid() getresgid(&(0x7f0000000140), 0x0, 0x0) fchown(r2, r3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r2) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={r1, 0x28, &(0x7f0000000240)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000002c0)={r4, 0xffffffff, 0xe6d3be648ff4b41c}, 0xc) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x3, 0x0) ioctl$UI_DEV_DESTROY(r0, 0x5502) 09:40:14 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000]}, 0x45c) ioctl$SNDRV_TIMER_IOCTL_SELECT(0xffffffffffffffff, 0x40345410, &(0x7f0000000040)={{0x1}}) gettid() r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="f75f9bf747594d0a1851415d989b48270bb03c9ef00b305cba0432a36b9310552b2e4de8c9de57a65146ad9194a585247c8d2a48e1311d4dd0e973234ea0a1a238326753d3da28e216683f91691b54351036cf18886cd3e555df4a1b907696264440c2e8407ed7160e8250e81157496310f16407a59d7e892d7ea55b9215d7eb723ff1b873c6af16ac27c40d2c4fe0c268984029a5c1adb5df4f4dd2"], 0xb) inotify_add_watch(r1, &(0x7f0000000180)='./file1\x00', 0x80000020) r2 = geteuid() getresgid(&(0x7f0000000140), 0x0, 0x0) fchown(r1, r2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={0xffffffffffffffff, 0x28, &(0x7f0000000240)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000002c0)={r3, 0xffffffff, 0xe6d3be648ff4b41c}, 0xc) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x3, 0x0) ioctl$UI_DEV_DESTROY(r0, 0x5502) 09:40:14 executing program 1: keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000a80)={0x0, 0xc, 0xae}, &(0x7f0000000ac0)={'enc=', 'raw', ' hash=', {'sha384-avx2\x00'}}, &(0x7f0000000b40)="058f6a5fe2db85fa52baca0c", &(0x7f0000000c00)=""/174) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xff}, 0x0) getpid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x62e, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1104}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x10, 0x800000000000803, 0x0) ioctl$BLKSECTGET(r0, 0x1267, &(0x7f0000000580)) sendto(r1, &(0x7f0000000000)="120000001600e70d017b00000000008e1584", 0x12, 0x0, 0x0, 0x0) sendmsg$nl_xfrm(r1, &(0x7f0000000500)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="5c0000001100dd392dbd7000fddbdfe646120e480a3510deada7000004d5020033002c001300e0000002000000000000000000000000ac1e00eadd10580000000000000000007b966700000a00000008001d0005000000c4f856f1308e68fd6639c49c0000000000000000"], 0x5c}, 0x1, 0x0, 0x0, 0x80}, 0x40) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000bc0)='fou\x00') sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000680)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000640)={&(0x7f00000005c0)={0x60, r2, 0x200, 0x70bd2a, 0x25dfdbfc, {}, [@FOU_ATTR_PORT={0x8, 0x1, 0x4e23}, @FOU_ATTR_TYPE={0x8, 0x4, 0x2}, @FOU_ATTR_TYPE={0x8}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0x3a}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e21}, @FOU_ATTR_TYPE={0x8, 0x4, 0x2}, @FOU_ATTR_LOCAL_V6={0x14, 0x7, @local}, @FOU_ATTR_LOCAL_V4={0x8, 0x6, @multicast2}]}, 0x60}, 0x1, 0x0, 0x0, 0x8050}, 0x4) prctl$PR_SET_TSC(0x1a, 0x0) setxattr$trusted_overlay_opaque(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='trusted.overlay.opaque\x00', &(0x7f0000000140)='y\x00', 0x2, 0x3) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f00000003c0)={0x0, 0x1d, 0x31}, 0x0, &(0x7f0000000400)="77a2f3ce3f8ea164cf9b079ca021912084ef93518ad756cebc75971f9c", &(0x7f0000000440)=""/49) recvmmsg(r1, &(0x7f0000000080), 0x0, 0xa, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(r0, r3, 0x0, 0x1) [ 1044.269640] input: syz1 as /devices/virtual/input/input448 09:40:14 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000]}, 0x45c) r1 = syz_open_dev$sndtimer(0x0, 0x0, 0x100) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000040)={{0x1}}) gettid() r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[@ANYBLOB="f75f9bf747594d0a1851415d989b48270bb03c9ef00b305cba0432a36b9310552b2e4de8c9de57a65146ad9194a585247c8d2a48e1311d4dd0e973234ea0a1a238326753d3da28e216683f91691b54351036cf18886cd3e555df4a1b907696264440c2e8407ed7160e8250e81157496310f16407a59d7e892d7ea55b9215d7eb723ff1b873c6af16ac27c40d2c4fe0c268984029a5c1adb5df4f4dd2"], 0xb) inotify_add_watch(r2, &(0x7f0000000180)='./file1\x00', 0x80000020) r3 = geteuid() getresgid(&(0x7f0000000140), 0x0, 0x0) fchown(r2, r3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r2) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={r1, 0x28, &(0x7f0000000240)}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x3, 0x0) ioctl$UI_DEV_DESTROY(r0, 0x5502) [ 1044.318425] input: syz1 as /devices/virtual/input/input449 [ 1044.407503] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1044.411446] input: syz1 as /devices/virtual/input/input450 09:40:17 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x7c, 0x7c, 0x2, [@array, @restrict, @ptr, @func, @int, @int, @fwd, @enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x0, 0x9}]}]}}, 0x0, 0x96}, 0x20) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x39) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) ptrace$cont(0x1f, r0, 0x5, 0x800000000000) 09:40:17 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000]}, 0x45c) r1 = syz_open_dev$sndtimer(0x0, 0x0, 0x100) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000040)={{0x1}}) r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[@ANYBLOB="f75f9bf747594d0a1851415d989b48270bb03c9ef00b305cba0432a36b9310552b2e4de8c9de57a65146ad9194a585247c8d2a48e1311d4dd0e973234ea0a1a238326753d3da28e216683f91691b54351036cf18886cd3e555df4a1b907696264440c2e8407ed7160e8250e81157496310f16407a59d7e892d7ea55b9215d7eb723ff1b873c6af16ac27c40d2c4fe0c268984029a5c1adb5df4f4dd2"], 0xb) inotify_add_watch(r2, &(0x7f0000000180)='./file1\x00', 0x80000020) r3 = geteuid() getresgid(&(0x7f0000000140), 0x0, 0x0) fchown(r2, r3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r2) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={r1, 0x28, &(0x7f0000000240)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000002c0)={r4, 0xffffffff, 0xe6d3be648ff4b41c}, 0xc) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x3, 0x0) ioctl$UI_DEV_DESTROY(r0, 0x5502) 09:40:17 executing program 3: keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000a80)={0x0, 0xc, 0xae}, &(0x7f0000000ac0)={'enc=', 'raw', ' hash=', {'sha384-avx2\x00'}}, &(0x7f0000000b40)="058f6a5fe2db85fa52baca0c", &(0x7f0000000c00)=""/174) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xff}, 0x0) r1 = getpid() sched_setattr(r1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(r0, r2, 0x0, 0x1) 09:40:17 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000]}, 0x45c) r1 = syz_open_dev$sndtimer(0x0, 0x0, 0x100) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000040)={{0x1}}) gettid() r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[@ANYBLOB="f75f9bf747594d0a1851415d989b48270bb03c9ef00b305cba0432a36b9310552b2e4de8c9de57a65146ad9194a585247c8d2a48e1311d4dd0e973234ea0a1a238326753d3da28e216683f91691b54351036cf18886cd3e555df4a1b907696264440c2e8407ed7160e8250e81157496310f16407a59d7e892d7ea55b9215d7eb723ff1b873c6af16ac27c40d2c4fe0c268984029a5c1adb5df4f4dd2"], 0xb) inotify_add_watch(r2, &(0x7f0000000180)='./file1\x00', 0x80000020) r3 = geteuid() getresgid(&(0x7f0000000140), 0x0, 0x0) fchown(r2, r3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r2) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={r1, 0x28, &(0x7f0000000240)}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x3, 0x0) ioctl$UI_DEV_DESTROY(r0, 0x5502) 09:40:17 executing program 1: keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000a80)={0x0, 0xc, 0xae}, &(0x7f0000000ac0)={'enc=', 'raw', ' hash=', {'sha384-avx2\x00'}}, &(0x7f0000000b40)="058f6a5fe2db85fa52baca0c", &(0x7f0000000c00)=""/174) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xff}, 0x0) getpid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x62e, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1104}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x10, 0x800000000000803, 0x0) ioctl$BLKSECTGET(r0, 0x1267, &(0x7f0000000580)) sendto(r1, &(0x7f0000000000)="120000001600e70d017b00000000008e1584", 0x12, 0x0, 0x0, 0x0) sendmsg$nl_xfrm(r1, &(0x7f0000000500)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="5c0000001100dd392dbd7000fddbdfe646120e480a3510deada7000004d5020033002c001300e0000002000000000000000000000000ac1e00eadd10580000000000000000007b966700000a00000008001d0005000000c4f856f1308e68fd6639c49c0000000000000000"], 0x5c}, 0x1, 0x0, 0x0, 0x80}, 0x40) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000bc0)='fou\x00') sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000680)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000640)={&(0x7f00000005c0)={0x60, r2, 0x200, 0x70bd2a, 0x25dfdbfc, {}, [@FOU_ATTR_PORT={0x8, 0x1, 0x4e23}, @FOU_ATTR_TYPE={0x8, 0x4, 0x2}, @FOU_ATTR_TYPE={0x8}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0x3a}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e21}, @FOU_ATTR_TYPE={0x8, 0x4, 0x2}, @FOU_ATTR_LOCAL_V6={0x14, 0x7, @local}, @FOU_ATTR_LOCAL_V4={0x8, 0x6, @multicast2}]}, 0x60}, 0x1, 0x0, 0x0, 0x8050}, 0x4) prctl$PR_SET_TSC(0x1a, 0x0) setxattr$trusted_overlay_opaque(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='trusted.overlay.opaque\x00', &(0x7f0000000140)='y\x00', 0x2, 0x3) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f00000003c0)={0x0, 0x1d, 0x31}, 0x0, &(0x7f0000000400)="77a2f3ce3f8ea164cf9b079ca021912084ef93518ad756cebc75971f9c", &(0x7f0000000440)=""/49) recvmmsg(r1, &(0x7f0000000080), 0x0, 0xa, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(r0, r3, 0x0, 0x1) 09:40:17 executing program 2: keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000a80)={0x0, 0xb, 0xae}, &(0x7f0000000ac0)={'enc=', 'raw', ' hash=', {'sha384-avx2\x00'}}, &(0x7f0000000b40)="058f6a5fe2db85fa52baca", &(0x7f0000000c00)=""/174) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xff}, 0x0) getpid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x62e, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1104}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x10, 0x800000000000803, 0x0) ioctl$BLKSECTGET(r0, 0x1267, &(0x7f0000000580)) sendto(r1, &(0x7f0000000000)="120000001600e70d017b00000000008e1584", 0x12, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(r0, r2, 0x0, 0x1) 09:40:17 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000]}, 0x45c) r1 = syz_open_dev$sndtimer(0x0, 0x0, 0x100) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000040)={{0x1}}) r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[@ANYBLOB="f75f9bf747594d0a1851415d989b48270bb03c9ef00b305cba0432a36b9310552b2e4de8c9de57a65146ad9194a585247c8d2a48e1311d4dd0e973234ea0a1a238326753d3da28e216683f91691b54351036cf18886cd3e555df4a1b907696264440c2e8407ed7160e8250e81157496310f16407a59d7e892d7ea55b9215d7eb723ff1b873c6af16ac27c40d2c4fe0c268984029a5c1adb5df4f4dd2"], 0xb) inotify_add_watch(r2, &(0x7f0000000180)='./file1\x00', 0x80000020) r3 = geteuid() getresgid(&(0x7f0000000140), 0x0, 0x0) fchown(r2, r3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r2) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={r1, 0x28, &(0x7f0000000240)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000002c0)={r4, 0xffffffff, 0xe6d3be648ff4b41c}, 0xc) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x3, 0x0) ioctl$UI_DEV_DESTROY(r0, 0x5502) [ 1047.112291] input: syz1 as /devices/virtual/input/input451 [ 1047.127576] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1047.143699] input: syz1 as /devices/virtual/input/input452 09:40:17 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000]}, 0x45c) r1 = syz_open_dev$sndtimer(0x0, 0x0, 0x100) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000040)={{0x1}}) gettid() r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[@ANYBLOB="f75f9bf747594d0a1851415d989b48270bb03c9ef00b305cba0432a36b9310552b2e4de8c9de57a65146ad9194a585247c8d2a48e1311d4dd0e973234ea0a1a238326753d3da28e216683f91691b54351036cf18886cd3e555df4a1b907696264440c2e8407ed7160e8250e81157496310f16407a59d7e892d7ea55b9215d7eb723ff1b873c6af16ac27c40d2c4fe0c268984029a5c1adb5df4f4dd2"], 0xb) inotify_add_watch(r2, &(0x7f0000000180)='./file1\x00', 0x80000020) r3 = geteuid() getresgid(&(0x7f0000000140), 0x0, 0x0) fchown(r2, r3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r2) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={r1, 0x28, &(0x7f0000000240)}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000002c0)={0x0, 0xffffffff, 0xe6d3be648ff4b41c}, 0xc) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x3, 0x0) ioctl$UI_DEV_DESTROY(r0, 0x5502) 09:40:17 executing program 1: keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000a80)={0x0, 0xc, 0xae}, &(0x7f0000000ac0)={'enc=', 'raw', ' hash=', {'sha384-avx2\x00'}}, &(0x7f0000000b40)="058f6a5fe2db85fa52baca0c", &(0x7f0000000c00)=""/174) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xff}, 0x0) getpid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x62e, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1104}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x10, 0x800000000000803, 0x0) ioctl$BLKSECTGET(r0, 0x1267, &(0x7f0000000580)) sendto(r1, &(0x7f0000000000)="120000001600e70d017b00000000008e1584", 0x12, 0x0, 0x0, 0x0) sendmsg$nl_xfrm(r1, &(0x7f0000000500)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="5c0000001100dd392dbd7000fddbdfe646120e480a3510deada7000004d5020033002c001300e0000002000000000000000000000000ac1e00eadd10580000000000000000007b966700000a00000008001d0005000000c4f856f1308e68fd6639c49c0000000000000000"], 0x5c}, 0x1, 0x0, 0x0, 0x80}, 0x40) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000bc0)='fou\x00') sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000680)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000640)={&(0x7f00000005c0)={0x60, r2, 0x200, 0x70bd2a, 0x25dfdbfc, {}, [@FOU_ATTR_PORT={0x8, 0x1, 0x4e23}, @FOU_ATTR_TYPE={0x8, 0x4, 0x2}, @FOU_ATTR_TYPE={0x8}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0x3a}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e21}, @FOU_ATTR_TYPE={0x8, 0x4, 0x2}, @FOU_ATTR_LOCAL_V6={0x14, 0x7, @local}, @FOU_ATTR_LOCAL_V4={0x8, 0x6, @multicast2}]}, 0x60}, 0x1, 0x0, 0x0, 0x8050}, 0x4) prctl$PR_SET_TSC(0x1a, 0x0) setxattr$trusted_overlay_opaque(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='trusted.overlay.opaque\x00', &(0x7f0000000140)='y\x00', 0x2, 0x3) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f00000003c0)={0x0, 0x1d, 0x31}, 0x0, &(0x7f0000000400)="77a2f3ce3f8ea164cf9b079ca021912084ef93518ad756cebc75971f9c", &(0x7f0000000440)=""/49) recvmmsg(r1, &(0x7f0000000080), 0x0, 0xa, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(r0, r3, 0x0, 0x1) [ 1047.282135] input: syz1 as /devices/virtual/input/input454 [ 1047.282419] input: syz1 as /devices/virtual/input/input453 09:40:17 executing program 3: keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000a80)={0x0, 0xc, 0xae}, &(0x7f0000000ac0)={'enc=', 'raw', ' hash=', {'sha384-avx2\x00'}}, &(0x7f0000000b40)="058f6a5fe2db85fa52baca0c", &(0x7f0000000c00)=""/174) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xff}, 0x0) r1 = getpid() sched_setattr(r1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(r0, r2, 0x0, 0x1) [ 1047.342222] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. 09:40:17 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000]}, 0x45c) r1 = syz_open_dev$sndtimer(0x0, 0x0, 0x100) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000040)={{0x1}}) gettid() r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[@ANYBLOB="f75f9bf747594d0a1851415d989b48270bb03c9ef00b305cba0432a36b9310552b2e4de8c9de57a65146ad9194a585247c8d2a48e1311d4dd0e973234ea0a1a238326753d3da28e216683f91691b54351036cf18886cd3e555df4a1b907696264440c2e8407ed7160e8250e81157496310f16407a59d7e892d7ea55b9215d7eb723ff1b873c6af16ac27c40d2c4fe0c268984029a5c1adb5df4f4dd2"], 0xb) inotify_add_watch(r2, &(0x7f0000000180)='./file1\x00', 0x80000020) r3 = geteuid() getresgid(&(0x7f0000000140), 0x0, 0x0) fchown(r2, r3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r2) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={r1, 0x28, &(0x7f0000000240)}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000002c0)={0x0, 0xffffffff, 0xe6d3be648ff4b41c}, 0xc) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x3, 0x0) ioctl$UI_DEV_DESTROY(r0, 0x5502) 09:40:17 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000]}, 0x45c) r1 = syz_open_dev$sndtimer(0x0, 0x0, 0x100) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000040)={{0x1}}) r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[@ANYBLOB="f75f9bf747594d0a1851415d989b48270bb03c9ef00b305cba0432a36b9310552b2e4de8c9de57a65146ad9194a585247c8d2a48e1311d4dd0e973234ea0a1a238326753d3da28e216683f91691b54351036cf18886cd3e555df4a1b907696264440c2e8407ed7160e8250e81157496310f16407a59d7e892d7ea55b9215d7eb723ff1b873c6af16ac27c40d2c4fe0c268984029a5c1adb5df4f4dd2"], 0xb) inotify_add_watch(r2, &(0x7f0000000180)='./file1\x00', 0x80000020) r3 = geteuid() getresgid(&(0x7f0000000140), 0x0, 0x0) fchown(r2, r3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r2) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={r1, 0x28, &(0x7f0000000240)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000002c0)={r4, 0xffffffff, 0xe6d3be648ff4b41c}, 0xc) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x3, 0x0) ioctl$UI_DEV_DESTROY(r0, 0x5502) [ 1047.468724] input: syz1 as /devices/virtual/input/input455 [ 1047.508727] input: syz1 as /devices/virtual/input/input456 09:40:20 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000]}, 0x45c) r1 = syz_open_dev$sndtimer(0x0, 0x0, 0x100) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000040)={{0x1}}) gettid() r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[@ANYBLOB="f75f9bf747594d0a1851415d989b48270bb03c9ef00b305cba0432a36b9310552b2e4de8c9de57a65146ad9194a585247c8d2a48e1311d4dd0e973234ea0a1a238326753d3da28e216683f91691b54351036cf18886cd3e555df4a1b907696264440c2e8407ed7160e8250e81157496310f16407a59d7e892d7ea55b9215d7eb723ff1b873c6af16ac27c40d2c4fe0c268984029a5c1adb5df4f4dd2"], 0xb) inotify_add_watch(r2, &(0x7f0000000180)='./file1\x00', 0x80000020) r3 = geteuid() getresgid(&(0x7f0000000140), 0x0, 0x0) fchown(r2, r3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r2) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={r1, 0x28, &(0x7f0000000240)}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000002c0)={0x0, 0xffffffff, 0xe6d3be648ff4b41c}, 0xc) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x3, 0x0) ioctl$UI_DEV_DESTROY(r0, 0x5502) 09:40:20 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x7c, 0x7c, 0x2, [@array, @restrict, @ptr, @func, @int, @int, @fwd, @enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x0, 0x9}]}]}}, 0x0, 0x96}, 0x20) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x39) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) ptrace$cont(0x1f, r0, 0x5, 0x800000000000) 09:40:20 executing program 3: keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000a80)={0x0, 0xc, 0xae}, &(0x7f0000000ac0)={'enc=', 'raw', ' hash=', {'sha384-avx2\x00'}}, &(0x7f0000000b40)="058f6a5fe2db85fa52baca0c", &(0x7f0000000c00)=""/174) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xff}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(r0, r2, 0x0, 0x1) 09:40:20 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000]}, 0x45c) r1 = syz_open_dev$sndtimer(0x0, 0x0, 0x100) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000040)={{0x1}}) gettid() r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[@ANYBLOB="f75f9bf747594d0a1851415d989b48270bb03c9ef00b305cba0432a36b9310552b2e4de8c9de57a65146ad9194a585247c8d2a48e1311d4dd0e973234ea0a1a238326753d3da28e216683f91691b54351036cf18886cd3e555df4a1b907696264440c2e8407ed7160e8250e81157496310f16407a59d7e892d7ea55b9215d7eb723ff1b873c6af16ac27c40d2c4fe0c268984029a5c1adb5df4f4dd2"], 0xb) inotify_add_watch(r2, &(0x7f0000000180)='./file1\x00', 0x80000020) getresgid(&(0x7f0000000140), 0x0, 0x0) fchown(r2, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r2) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={r1, 0x28, &(0x7f0000000240)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000002c0)={r3, 0xffffffff, 0xe6d3be648ff4b41c}, 0xc) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x3, 0x0) ioctl$UI_DEV_DESTROY(r0, 0x5502) 09:40:20 executing program 1: keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000a80)={0x0, 0xc, 0xae}, &(0x7f0000000ac0)={'enc=', 'raw', ' hash=', {'sha384-avx2\x00'}}, &(0x7f0000000b40)="058f6a5fe2db85fa52baca0c", &(0x7f0000000c00)=""/174) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xff}, 0x0) r1 = getpid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x62e, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1104}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x10, 0x800000000000803, 0x0) ioctl$BLKSECTGET(r0, 0x1267, &(0x7f0000000580)) sendto(r2, &(0x7f0000000000)="120000001600e70d017b00000000008e1584", 0x12, 0x0, 0x0, 0x0) sendmsg$nl_xfrm(r2, &(0x7f0000000500)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="5c0000001100dd392dbd7000fddbdfe646120e480a3510deada7000004d5020033002c001300e0000002000000000000000000000000ac1e00eadd10580000000000000000007b966700000a00000008001d0005000000c4f856f1308e68fd6639c49c0000000000000000"], 0x5c}, 0x1, 0x0, 0x0, 0x80}, 0x40) r3 = syz_genetlink_get_family_id$fou(&(0x7f0000000bc0)='fou\x00') sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000680)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000640)={&(0x7f00000005c0)={0x60, r3, 0x200, 0x70bd2a, 0x25dfdbfc, {}, [@FOU_ATTR_PORT={0x8, 0x1, 0x4e23}, @FOU_ATTR_TYPE={0x8, 0x4, 0x2}, @FOU_ATTR_TYPE={0x8}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0x3a}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e21}, @FOU_ATTR_TYPE={0x8, 0x4, 0x2}, @FOU_ATTR_LOCAL_V6={0x14, 0x7, @local}, @FOU_ATTR_LOCAL_V4={0x8, 0x6, @multicast2}]}, 0x60}, 0x1, 0x0, 0x0, 0x8050}, 0x4) prctl$PR_SET_TSC(0x1a, 0x0) setxattr$trusted_overlay_opaque(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='trusted.overlay.opaque\x00', &(0x7f0000000140)='y\x00', 0x2, 0x3) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f00000003c0)={0x0, 0x1d, 0x31}, 0x0, &(0x7f0000000400)="77a2f3ce3f8ea164cf9b079ca021912084ef93518ad756cebc75971f9c", &(0x7f0000000440)=""/49) recvmmsg(r2, &(0x7f0000000080), 0x0, 0xa, 0x0) recvmsg(r0, &(0x7f0000000a40)={&(0x7f00000006c0)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10}, 0x80, &(0x7f0000000900)=[{&(0x7f0000000740)=""/100, 0x64}, {&(0x7f00000007c0)=""/229, 0xe5}, {&(0x7f00000008c0)=""/37, 0x25}], 0x3, &(0x7f0000000940)=""/253, 0xfd}, 0x40) r4 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000480)='/selinux/mls\x00', 0x0, 0x0) ioctl$PPPIOCATTCHAN(r4, 0x40047438, &(0x7f00000000c0)=0x4) sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(r0, r5, 0x0, 0x1) 09:40:20 executing program 2: keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000a80)={0x0, 0xb, 0xae}, &(0x7f0000000ac0)={'enc=', 'raw', ' hash=', {'sha384-avx2\x00'}}, &(0x7f0000000b40)="058f6a5fe2db85fa52baca", &(0x7f0000000c00)=""/174) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xff}, 0x0) getpid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x62e, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1104}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x10, 0x800000000000803, 0x0) ioctl$BLKSECTGET(r0, 0x1267, &(0x7f0000000580)) sendto(r1, &(0x7f0000000000)="120000001600e70d017b00000000008e1584", 0x12, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(r0, r2, 0x0, 0x1) 09:40:20 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000]}, 0x45c) r1 = syz_open_dev$sndtimer(0x0, 0x0, 0x100) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000040)={{0x1}}) gettid() r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[@ANYBLOB="f75f9bf747594d0a1851415d989b48270bb03c9ef00b305cba0432a36b9310552b2e4de8c9de57a65146ad9194a585247c8d2a48e1311d4dd0e973234ea0a1a238326753d3da28e216683f91691b54351036cf18886cd3e555df4a1b907696264440c2e8407ed7160e8250e81157496310f16407a59d7e892d7ea55b9215d7eb723ff1b873c6af16ac27c40d2c4fe0c268984029a5c1adb5df4f4dd2"], 0xb) inotify_add_watch(r2, &(0x7f0000000180)='./file1\x00', 0x80000020) r3 = geteuid() getresgid(&(0x7f0000000140), 0x0, 0x0) fchown(r2, r3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r2) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={r1, 0x28, &(0x7f0000000240)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000002c0)={r4, 0x0, 0xe6d3be648ff4b41c}, 0xc) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x3, 0x0) ioctl$UI_DEV_DESTROY(r0, 0x5502) [ 1050.135631] input: syz1 as /devices/virtual/input/input457 [ 1050.165468] input: syz1 as /devices/virtual/input/input458 09:40:20 executing program 4: keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000a80)={0x0, 0xb, 0xae}, &(0x7f0000000ac0)={'enc=', 'raw', ' hash=', {'sha384-avx2\x00'}}, &(0x7f0000000b40)="058f6a5fe2db85fa52baca", &(0x7f0000000c00)=""/174) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xff}, 0x0) getpid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x62e, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1104}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x10, 0x800000000000803, 0x0) ioctl$BLKSECTGET(r0, 0x1267, &(0x7f0000000580)) sendto(r1, &(0x7f0000000000)="120000001600e70d017b00000000008e1584", 0x12, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(r0, r2, 0x0, 0x1) [ 1050.192910] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1050.229626] input: syz1 as /devices/virtual/input/input459 09:40:20 executing program 1: keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000a80)={0x0, 0xc, 0xae}, &(0x7f0000000ac0)={'enc=', 'raw', ' hash=', {'sha384-avx2\x00'}}, &(0x7f0000000b40)="058f6a5fe2db85fa52baca0c", &(0x7f0000000c00)=""/174) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xff}, 0x0) r1 = getpid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x62e, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1104}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x10, 0x800000000000803, 0x0) ioctl$BLKSECTGET(r0, 0x1267, &(0x7f0000000580)) sendto(r2, &(0x7f0000000000)="120000001600e70d017b00000000008e1584", 0x12, 0x0, 0x0, 0x0) sendmsg$nl_xfrm(r2, &(0x7f0000000500)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="5c0000001100dd392dbd7000fddbdfe646120e480a3510deada7000004d5020033002c001300e0000002000000000000000000000000ac1e00eadd10580000000000000000007b966700000a00000008001d0005000000c4f856f1308e68fd6639c49c0000000000000000"], 0x5c}, 0x1, 0x0, 0x0, 0x80}, 0x40) r3 = syz_genetlink_get_family_id$fou(&(0x7f0000000bc0)='fou\x00') sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000680)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000640)={&(0x7f00000005c0)={0x60, r3, 0x200, 0x70bd2a, 0x25dfdbfc, {}, [@FOU_ATTR_PORT={0x8, 0x1, 0x4e23}, @FOU_ATTR_TYPE={0x8, 0x4, 0x2}, @FOU_ATTR_TYPE={0x8}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0x3a}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e21}, @FOU_ATTR_TYPE={0x8, 0x4, 0x2}, @FOU_ATTR_LOCAL_V6={0x14, 0x7, @local}, @FOU_ATTR_LOCAL_V4={0x8, 0x6, @multicast2}]}, 0x60}, 0x1, 0x0, 0x0, 0x8050}, 0x4) prctl$PR_SET_TSC(0x1a, 0x0) setxattr$trusted_overlay_opaque(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='trusted.overlay.opaque\x00', &(0x7f0000000140)='y\x00', 0x2, 0x3) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f00000003c0)={0x0, 0x1d, 0x31}, 0x0, &(0x7f0000000400)="77a2f3ce3f8ea164cf9b079ca021912084ef93518ad756cebc75971f9c", &(0x7f0000000440)=""/49) recvmmsg(r2, &(0x7f0000000080), 0x0, 0xa, 0x0) recvmsg(r0, &(0x7f0000000a40)={&(0x7f00000006c0)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10}, 0x80, &(0x7f0000000900)=[{&(0x7f0000000740)=""/100, 0x64}, {&(0x7f00000007c0)=""/229, 0xe5}, {&(0x7f00000008c0)=""/37, 0x25}], 0x3, &(0x7f0000000940)=""/253, 0xfd}, 0x40) r4 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000480)='/selinux/mls\x00', 0x0, 0x0) ioctl$PPPIOCATTCHAN(r4, 0x40047438, &(0x7f00000000c0)=0x4) sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(r0, r5, 0x0, 0x1) 09:40:20 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000]}, 0x45c) r1 = syz_open_dev$sndtimer(0x0, 0x0, 0x100) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000040)={{0x1}}) gettid() r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[@ANYBLOB="f75f9bf747594d0a1851415d989b48270bb03c9ef00b305cba0432a36b9310552b2e4de8c9de57a65146ad9194a585247c8d2a48e1311d4dd0e973234ea0a1a238326753d3da28e216683f91691b54351036cf18886cd3e555df4a1b907696264440c2e8407ed7160e8250e81157496310f16407a59d7e892d7ea55b9215d7eb723ff1b873c6af16ac27c40d2c4fe0c268984029a5c1adb5df4f4dd2"], 0xb) inotify_add_watch(r2, &(0x7f0000000180)='./file1\x00', 0x80000020) r3 = geteuid() getresgid(&(0x7f0000000140), 0x0, 0x0) fchown(r2, r3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r2) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={r1, 0x28, &(0x7f0000000240)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000002c0)={r4, 0x0, 0xe6d3be648ff4b41c}, 0xc) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x3, 0x0) ioctl$UI_DEV_DESTROY(r0, 0x5502) 09:40:20 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000]}, 0x45c) r1 = syz_open_dev$sndtimer(0x0, 0x0, 0x100) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000040)={{0x1}}) gettid() r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[@ANYBLOB="f75f9bf747594d0a1851415d989b48270bb03c9ef00b305cba0432a36b9310552b2e4de8c9de57a65146ad9194a585247c8d2a48e1311d4dd0e973234ea0a1a238326753d3da28e216683f91691b54351036cf18886cd3e555df4a1b907696264440c2e8407ed7160e8250e81157496310f16407a59d7e892d7ea55b9215d7eb723ff1b873c6af16ac27c40d2c4fe0c268984029a5c1adb5df4f4dd2"], 0xb) inotify_add_watch(r2, &(0x7f0000000180)='./file1\x00', 0x80000020) r3 = geteuid() getresgid(&(0x7f0000000140), 0x0, 0x0) fchown(r2, r3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r2) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={r1, 0x28, &(0x7f0000000240)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000002c0)={r4, 0x0, 0xe6d3be648ff4b41c}, 0xc) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x3, 0x0) ioctl$UI_DEV_DESTROY(r0, 0x5502) 09:40:20 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000]}, 0x45c) r1 = syz_open_dev$sndtimer(0x0, 0x0, 0x100) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000040)={{0x1}}) gettid() r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[@ANYBLOB="f75f9bf747594d0a1851415d989b48270bb03c9ef00b305cba0432a36b9310552b2e4de8c9de57a65146ad9194a585247c8d2a48e1311d4dd0e973234ea0a1a238326753d3da28e216683f91691b54351036cf18886cd3e555df4a1b907696264440c2e8407ed7160e8250e81157496310f16407a59d7e892d7ea55b9215d7eb723ff1b873c6af16ac27c40d2c4fe0c268984029a5c1adb5df4f4dd2"], 0xb) inotify_add_watch(r2, &(0x7f0000000180)='./file1\x00', 0x80000020) r3 = geteuid() getresgid(&(0x7f0000000140), 0x0, 0x0) fchown(r2, r3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r2) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={r1, 0x28, &(0x7f0000000240)}, 0x10) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x3, 0x0) ioctl$UI_DEV_DESTROY(r0, 0x5502) [ 1050.383850] input: syz1 as /devices/virtual/input/input460 [ 1050.416000] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. 09:40:20 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000]}, 0x45c) r1 = syz_open_dev$sndtimer(0x0, 0x0, 0x100) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000040)={{0x1}}) gettid() r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[@ANYBLOB="f75f9bf747594d0a1851415d989b48270bb03c9ef00b305cba0432a36b9310552b2e4de8c9de57a65146ad9194a585247c8d2a48e1311d4dd0e973234ea0a1a238326753d3da28e216683f91691b54351036cf18886cd3e555df4a1b907696264440c2e8407ed7160e8250e81157496310f16407a59d7e892d7ea55b9215d7eb723ff1b873c6af16ac27c40d2c4fe0c268984029a5c1adb5df4f4dd2"], 0xb) inotify_add_watch(r2, &(0x7f0000000180)='./file1\x00', 0x80000020) r3 = geteuid() getresgid(&(0x7f0000000140), 0x0, 0x0) fchown(r2, r3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r2) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={r1, 0x28, &(0x7f0000000240)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000002c0)={r4, 0xffffffff}, 0xc) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x3, 0x0) ioctl$UI_DEV_DESTROY(r0, 0x5502) [ 1050.485986] input: syz1 as /devices/virtual/input/input461 [ 1050.505632] input: syz1 as /devices/virtual/input/input462 [ 1050.608251] input: syz1 as /devices/virtual/input/input463 09:40:23 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x7c, 0x7c, 0x2, [@array, @restrict, @ptr, @func, @int, @int, @fwd, @enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x0, 0x9}]}]}}, 0x0, 0x96}, 0x20) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x39) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) ptrace$cont(0x1f, r0, 0x5, 0x800000000000) 09:40:23 executing program 4: r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$BLKBSZGET(r0, 0x80081270, &(0x7f0000000080)) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') pipe(&(0x7f0000000240)={0xffffffffffffffff}) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) splice(r2, 0x0, r3, 0x0, 0x100000000ffdc, 0x0) sendfile(r3, r1, 0x0, 0x1) 09:40:23 executing program 1: keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000a80)={0x0, 0xc, 0xae}, &(0x7f0000000ac0)={'enc=', 'raw', ' hash=', {'sha384-avx2\x00'}}, &(0x7f0000000b40)="058f6a5fe2db85fa52baca0c", &(0x7f0000000c00)=""/174) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xff}, 0x0) r1 = getpid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x62e, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1104}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x10, 0x800000000000803, 0x0) ioctl$BLKSECTGET(r0, 0x1267, &(0x7f0000000580)) sendto(r2, &(0x7f0000000000)="120000001600e70d017b00000000008e1584", 0x12, 0x0, 0x0, 0x0) sendmsg$nl_xfrm(r2, &(0x7f0000000500)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="5c0000001100dd392dbd7000fddbdfe646120e480a3510deada7000004d5020033002c001300e0000002000000000000000000000000ac1e00eadd10580000000000000000007b966700000a00000008001d0005000000c4f856f1308e68fd6639c49c0000000000000000"], 0x5c}, 0x1, 0x0, 0x0, 0x80}, 0x40) r3 = syz_genetlink_get_family_id$fou(&(0x7f0000000bc0)='fou\x00') sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000680)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000640)={&(0x7f00000005c0)={0x60, r3, 0x200, 0x70bd2a, 0x25dfdbfc, {}, [@FOU_ATTR_PORT={0x8, 0x1, 0x4e23}, @FOU_ATTR_TYPE={0x8, 0x4, 0x2}, @FOU_ATTR_TYPE={0x8}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0x3a}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e21}, @FOU_ATTR_TYPE={0x8, 0x4, 0x2}, @FOU_ATTR_LOCAL_V6={0x14, 0x7, @local}, @FOU_ATTR_LOCAL_V4={0x8, 0x6, @multicast2}]}, 0x60}, 0x1, 0x0, 0x0, 0x8050}, 0x4) prctl$PR_SET_TSC(0x1a, 0x0) setxattr$trusted_overlay_opaque(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='trusted.overlay.opaque\x00', &(0x7f0000000140)='y\x00', 0x2, 0x3) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f00000003c0)={0x0, 0x1d, 0x31}, 0x0, &(0x7f0000000400)="77a2f3ce3f8ea164cf9b079ca021912084ef93518ad756cebc75971f9c", &(0x7f0000000440)=""/49) recvmmsg(r2, &(0x7f0000000080), 0x0, 0xa, 0x0) recvmsg(r0, &(0x7f0000000a40)={&(0x7f00000006c0)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10}, 0x80, &(0x7f0000000900)=[{&(0x7f0000000740)=""/100, 0x64}, {&(0x7f00000007c0)=""/229, 0xe5}, {&(0x7f00000008c0)=""/37, 0x25}], 0x3, &(0x7f0000000940)=""/253, 0xfd}, 0x40) r4 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000480)='/selinux/mls\x00', 0x0, 0x0) ioctl$PPPIOCATTCHAN(r4, 0x40047438, &(0x7f00000000c0)=0x4) sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(r0, r5, 0x0, 0x1) 09:40:23 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000]}, 0x45c) r1 = syz_open_dev$sndtimer(0x0, 0x0, 0x100) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000040)={{0x1}}) gettid() r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[@ANYBLOB="f75f9bf747594d0a1851415d989b48270bb03c9ef00b305cba0432a36b9310552b2e4de8c9de57a65146ad9194a585247c8d2a48e1311d4dd0e973234ea0a1a238326753d3da28e216683f91691b54351036cf18886cd3e555df4a1b907696264440c2e8407ed7160e8250e81157496310f16407a59d7e892d7ea55b9215d7eb723ff1b873c6af16ac27c40d2c4fe0c268984029a5c1adb5df4f4dd2"], 0xb) inotify_add_watch(r2, &(0x7f0000000180)='./file1\x00', 0x80000020) r3 = geteuid() getresgid(&(0x7f0000000140), 0x0, 0x0) fchown(r2, r3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r2) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={r1, 0x28, &(0x7f0000000240)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000002c0)={r4, 0xffffffff}, 0xc) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x3, 0x0) ioctl$UI_DEV_DESTROY(r0, 0x5502) 09:40:23 executing program 3: keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000a80)={0x0, 0xc, 0xae}, &(0x7f0000000ac0)={'enc=', 'raw', ' hash=', {'sha384-avx2\x00'}}, &(0x7f0000000b40)="058f6a5fe2db85fa52baca0c", &(0x7f0000000c00)=""/174) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xff}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(r0, r2, 0x0, 0x1) 09:40:23 executing program 2: keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000a80)={0x0, 0xb, 0xae}, &(0x7f0000000ac0)={'enc=', 'raw', ' hash=', {'sha384-avx2\x00'}}, &(0x7f0000000b40)="058f6a5fe2db85fa52baca", &(0x7f0000000c00)=""/174) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xff}, 0x0) getpid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x62e, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1104}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x10, 0x800000000000803, 0x0) ioctl$BLKSECTGET(r0, 0x1267, &(0x7f0000000580)) sendto(r1, &(0x7f0000000000)="120000001600e70d017b00000000008e1584", 0x12, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(r0, r2, 0x0, 0x1) 09:40:23 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(r0, r1, 0x0, 0x1) 09:40:23 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000]}, 0x45c) r1 = syz_open_dev$sndtimer(0x0, 0x0, 0x100) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000040)={{0x1}}) gettid() r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[@ANYBLOB="f75f9bf747594d0a1851415d989b48270bb03c9ef00b305cba0432a36b9310552b2e4de8c9de57a65146ad9194a585247c8d2a48e1311d4dd0e973234ea0a1a238326753d3da28e216683f91691b54351036cf18886cd3e555df4a1b907696264440c2e8407ed7160e8250e81157496310f16407a59d7e892d7ea55b9215d7eb723ff1b873c6af16ac27c40d2c4fe0c268984029a5c1adb5df4f4dd2"], 0xb) inotify_add_watch(r2, &(0x7f0000000180)='./file1\x00', 0x80000020) r3 = geteuid() getresgid(&(0x7f0000000140), 0x0, 0x0) fchown(r2, r3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r2) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={r1, 0x28, &(0x7f0000000240)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000002c0)={r4, 0xffffffff}, 0xc) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x3, 0x0) ioctl$UI_DEV_DESTROY(r0, 0x5502) [ 1053.160095] input: syz1 as /devices/virtual/input/input464 [ 1053.188437] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. 09:40:23 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') sendfile(r0, 0xffffffffffffffff, 0x0, 0x1) 09:40:23 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(r0, r1, 0x0, 0x8000000000000001) 09:40:23 executing program 1: keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000a80)={0x0, 0xb, 0xae}, &(0x7f0000000ac0)={'enc=', 'raw', ' hash=', {'sha384-avx2\x00'}}, &(0x7f0000000b40)="058f6a5fe2db85fa52baca", &(0x7f0000000c00)=""/174) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xff}, 0x0) getpid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x62e, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1104}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x10, 0x800000000000803, 0x0) ioctl$BLKSECTGET(r0, 0x1267, &(0x7f0000000580)) sendto(r1, &(0x7f0000000000)="120000001600e70d017b00000000008e1584", 0x12, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(r0, r2, 0x0, 0x1) [ 1053.305496] input: syz1 as /devices/virtual/input/input465 09:40:23 executing program 4: r0 = syz_open_dev$binder(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x2) fchdir(r0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') syz_open_procfs(0x0, &(0x7f0000000080)='limits\x00') pipe(&(0x7f0000000240)={0xffffffffffffffff}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) splice(r1, 0x0, r2, 0x0, 0x100000000ffdc, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r3, &(0x7f0000000140)=ANY=[], 0xfffffc8f) fcntl$setpipe(r3, 0x407, 0x0) sendfile(r2, r3, 0x0, 0x1) 09:40:26 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x7c, 0x7c, 0x2, [@array, @restrict, @ptr, @func, @int, @int, @fwd, @enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x0, 0x9}]}]}}, 0x0, 0x96}, 0x20) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x39) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) ptrace$cont(0x1f, r0, 0x5, 0x800000000000) 09:40:26 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000]}, 0x45c) r1 = syz_open_dev$sndtimer(0x0, 0x0, 0x100) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000040)={{0x1}}) gettid() r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[@ANYBLOB="f75f9bf747594d0a1851415d989b48270bb03c9ef00b305cba0432a36b9310552b2e4de8c9de57a65146ad9194a585247c8d2a48e1311d4dd0e973234ea0a1a238326753d3da28e216683f91691b54351036cf18886cd3e555df4a1b907696264440c2e8407ed7160e8250e81157496310f16407a59d7e892d7ea55b9215d7eb723ff1b873c6af16ac27c40d2c4fe0c268984029a5c1adb5df4f4dd2"], 0xb) inotify_add_watch(r2, &(0x7f0000000180)='./file1\x00', 0x80000020) r3 = geteuid() getresgid(&(0x7f0000000140), 0x0, 0x0) fchown(r2, r3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r2) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={r1, 0x28, &(0x7f0000000240)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000002c0)={r4, 0xffffffff, 0xe6d3be648ff4b41c}, 0xc) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x3, 0x0) ioctl$UI_DEV_DESTROY(r0, 0x5502) 09:40:26 executing program 1: keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000a80)={0x0, 0xb, 0xae}, &(0x7f0000000ac0)={'enc=', 'raw', ' hash=', {'sha384-avx2\x00'}}, &(0x7f0000000b40)="058f6a5fe2db85fa52baca", &(0x7f0000000c00)=""/174) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xff}, 0x0) getpid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x62e, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1104}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x10, 0x800000000000803, 0x0) ioctl$BLKSECTGET(r0, 0x1267, &(0x7f0000000580)) sendto(r1, &(0x7f0000000000)="120000001600e70d017b00000000008e1584", 0x12, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(r0, r2, 0x0, 0x1) 09:40:26 executing program 3: keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000a80)={0x0, 0xc, 0xae}, &(0x7f0000000ac0)={'enc=', 'raw', ' hash=', {'sha384-avx2\x00'}}, &(0x7f0000000b40)="058f6a5fe2db85fa52baca0c", &(0x7f0000000c00)=""/174) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xff}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(r0, r2, 0x0, 0x1) 09:40:26 executing program 2: keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000a80)={0x0, 0xc}, &(0x7f0000000ac0)={'enc=', 'raw', ' hash=', {'sha384-avx2\x00'}}, &(0x7f0000000b40)="058f6a5fe2db85fa52baca0c", 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xff}, 0x0) getpid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x62e, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1104}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x10, 0x800000000000803, 0x0) ioctl$BLKSECTGET(r0, 0x1267, &(0x7f0000000580)) sendto(r1, &(0x7f0000000000)="120000001600e70d017b00000000008e1584", 0x12, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(r0, r2, 0x0, 0x1) 09:40:26 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sync_file_range(r0, 0x84a, 0x3, 0x0) sendfile(r0, r1, 0x0, 0x1) 09:40:26 executing program 1: keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000a80)={0x0, 0xb, 0xae}, &(0x7f0000000ac0)={'enc=', 'raw', ' hash=', {'sha384-avx2\x00'}}, &(0x7f0000000b40)="058f6a5fe2db85fa52baca", &(0x7f0000000c00)=""/174) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xff}, 0x0) getpid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x62e, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1104}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x10, 0x800000000000803, 0x0) ioctl$BLKSECTGET(r0, 0x1267, &(0x7f0000000580)) sendto(r1, &(0x7f0000000000)="120000001600e70d017b00000000008e1584", 0x12, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(r0, r2, 0x0, 0x1) 09:40:26 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') r2 = getpid() rt_tgsigqueueinfo(r2, r2, 0x16, &(0x7f0000000080)) ptrace(0x10, r2) ptrace$getregset(0x4204, r2, 0x1, &(0x7f0000001140)={0xffffffffffffffff}) syz_open_procfs(r2, &(0x7f0000000040)='net/udplite6\x00') sendfile(r0, r1, 0x0, 0x40000001) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)) 09:40:26 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000]}, 0x45c) r1 = syz_open_dev$sndtimer(0x0, 0x0, 0x100) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000040)={{0x1}}) gettid() r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[@ANYBLOB="f75f9bf747594d0a1851415d989b48270bb03c9ef00b305cba0432a36b9310552b2e4de8c9de57a65146ad9194a585247c8d2a48e1311d4dd0e973234ea0a1a238326753d3da28e216683f91691b54351036cf18886cd3e555df4a1b907696264440c2e8407ed7160e8250e81157496310f16407a59d7e892d7ea55b9215d7eb723ff1b873c6af16ac27c40d2c4fe0c268984029a5c1adb5df4f4dd2"], 0xb) inotify_add_watch(r2, &(0x7f0000000180)='./file1\x00', 0x80000020) r3 = geteuid() getresgid(&(0x7f0000000140), 0x0, 0x0) fchown(r2, r3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r2) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={r1, 0x28, &(0x7f0000000240)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000002c0)={r4, 0xffffffff}, 0xc) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x3, 0x0) ioctl$UI_DEV_DESTROY(r0, 0x5502) [ 1056.265451] input: syz1 as /devices/virtual/input/input466 09:40:26 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') write$binfmt_elf32(r1, &(0x7f00000003c0)={{0x7f, 0x45, 0x4c, 0x46, 0x800, 0xffffffffffff0000, 0x4, 0x1, 0x5, 0x2, 0x4, 0x2f, 0xb2, 0x36, 0x3a, 0x2, 0x9, 0x20, 0x1, 0x200, 0x10000, 0x76c4}, [{0x70000000, 0x8000, 0x4b8, 0x7, 0x4, 0x2, 0x36, 0x5}, {0x5, 0x7, 0x5, 0x91, 0x0, 0x9, 0xca, 0x2}], "75d20d2d030500e589c4ddf2149b7a4ee9ec2e83c77ed9486a401a8561fd64d442597ea3605fce3a9b5ce92e3dcdae496d04f8a3048872e62ea29dd2b9d03bf1384802d2984aa0b072955d737167e01a8f7d74246032fa4e4fc18265d0d003f47c4abf6685ce6852e89bd65c50008be325fc62", [[], [], [], [], [], [], [], [], [], []]}, 0xfffffffffffffee0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000240)={0xffffffffffffffff}) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) splice(r3, 0x0, r4, 0x0, 0x100000000ffdc, 0x0) r5 = dup3(r3, r2, 0x80000) r6 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ADD(r5, &(0x7f00000002c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x34, r6, 0x800, 0x70bd29, 0x25dfdbfd, {}, [@TIPC_NLA_NODE={0x14, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x7fffffff}]}, @TIPC_NLA_SOCK={0xc, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x5}]}]}, 0x34}, 0x1, 0x0, 0x0, 0x80}, 0x20040051) pipe(&(0x7f0000000240)={0xffffffffffffffff}) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) splice(r7, 0x0, r8, 0x0, 0x100000000ffdc, 0x0) readahead(r7, 0x0, 0xffff) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xfffffc8f) fcntl$setpipe(r2, 0x407, 0x0) ioctl$EVIOCGKEY(r2, 0x80404518, &(0x7f00000001c0)=""/212) sendfile(r0, r1, 0x0, 0x1) setsockopt$inet_tcp_int(r1, 0x6, 0x17, &(0x7f0000000140)=0x7fff, 0x4) 09:40:26 executing program 1: mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='hugetlbfs\x00', 0x0, &(0x7f0000000100)='dos1xfloppy') syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@fat=@dos1xfloppy='dos1xfloppy'}]}) 09:40:26 executing program 3: keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000a80)={0x0, 0xc, 0xae}, &(0x7f0000000ac0)={'enc=', 'raw', ' hash=', {'sha384-avx2\x00'}}, &(0x7f0000000b40)="058f6a5fe2db85fa52baca0c", &(0x7f0000000c00)=""/174) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xff}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2}, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(r0, r2, 0x0, 0x1) 09:40:29 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x7c, 0x7c, 0x2, [@array, @restrict, @ptr, @func, @int, @int, @fwd, @enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x0, 0x9}]}]}}, 0x0, 0x96}, 0x20) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x39) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) ptrace$cont(0x1f, r0, 0x5, 0x800000000000) 09:40:29 executing program 1: syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="17ff0300000000000047504d00"]) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000000)=0x0) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f0000000000)) ptrace(0x10, r1) ptrace$getregset(0x4204, r1, 0x1, &(0x7f0000001140)={0xffffffffffffffff}) setpgid(r1, r0) ptrace$cont(0xffffffffffffffff, r0, 0x2, 0x3) 09:40:29 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000]}, 0x45c) r1 = syz_open_dev$sndtimer(0x0, 0x0, 0x100) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000040)={{0x1}}) gettid() r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[@ANYBLOB="f75f9bf747594d0a1851415d989b48270bb03c9ef00b305cba0432a36b9310552b2e4de8c9de57a65146ad9194a585247c8d2a48e1311d4dd0e973234ea0a1a238326753d3da28e216683f91691b54351036cf18886cd3e555df4a1b907696264440c2e8407ed7160e8250e81157496310f16407a59d7e892d7ea55b9215d7eb723ff1b873c6af16ac27c40d2c4fe0c268984029a5c1adb5df4f4dd2"], 0xb) inotify_add_watch(r2, &(0x7f0000000180)='./file1\x00', 0x80000020) r3 = geteuid() getresgid(&(0x7f0000000140), 0x0, 0x0) fchown(r2, r3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r2) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={r1, 0x28, &(0x7f0000000240)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000002c0)={r4, 0xffffffff, 0xe6d3be648ff4b41c}, 0xc) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x3, 0x0) ioctl$UI_DEV_DESTROY(r0, 0x5502) 09:40:29 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(r0, r1, 0x0, 0x1) pipe(&(0x7f0000000240)={0xffffffffffffffff}) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) splice(r2, 0x0, r3, 0x0, 0x100000000ffdc, 0x0) r4 = getpid() getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0xc) r6 = getegid() setresgid(r6, 0x0, 0x0) r7 = getpid() rt_tgsigqueueinfo(r7, r7, 0x16, &(0x7f0000000000)) ptrace(0x10, r7) ptrace$getregset(0x4204, r7, 0x1, &(0x7f0000001140)={0xffffffffffffffff}) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r8, &(0x7f0000000140)=ANY=[], 0xfffffc8f) fcntl$setpipe(r8, 0x407, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r8, 0x29, 0x23, &(0x7f0000000240)={{{@in=@loopback, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f0000000340)=0xe8) r10 = getegid() setresgid(r10, 0x0, 0x0) getgroups(0x5, &(0x7f0000000380)=[0xee00, 0x0, 0xffffffffffffffff, 0xee01, r10]) r12 = socket$netlink(0x10, 0x3, 0xd) pipe(&(0x7f0000000240)={0xffffffffffffffff}) r14 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) splice(r13, 0x0, r14, 0x0, 0x100000000ffdc, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff}) r16 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) splice(r15, 0x0, r16, 0x0, 0x100000000ffdc, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r17, &(0x7f0000000140)=ANY=[], 0xfffffc8f) fcntl$setpipe(r17, 0x407, 0x0) ioctl$TIOCGSID(r17, 0x5429, &(0x7f0000002800)=0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff}) r20 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) splice(r19, 0x0, r20, 0x0, 0x100000000ffdc, 0x0) getsockopt$sock_cred(r20, 0x1, 0x11, &(0x7f0000002840)={0x0, 0x0}, &(0x7f0000002880)=0xc) fstat(r0, &(0x7f00000028c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) sendmmsg$unix(r2, &(0x7f0000002980)=[{&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000140)=[{&(0x7f00000000c0)="5695d8a61068923eb09b5458d79f69b30ff44fb5c3716a7eef9474b47f2266b49b0d66481d20a58b0fea515f1a3cd549b3283035b32ad6305112cc400d9c4211514115e520e6d99ffd62043610c36145abf5ea4d00051c5bc18d6845fb82d719c0bdac6b1b6e0e367a090d2909cc", 0x6e}], 0x1, &(0x7f00000003c0)=[@rights={{0x10}}, @cred={{0x1c, 0x1, 0x2, {r4, r5, r6}}}, @cred={{0x1c, 0x1, 0x2, {r7, r9, r11}}}, @rights={{0x24, 0x1, 0x1, [r12, r0, r0, r13, 0xffffffffffffffff]}}], 0x78, 0x40010}, {&(0x7f0000000440)=@abs={0x1, 0x0, 0x4e22}, 0x6e, &(0x7f0000002780)=[{&(0x7f00000004c0)="738287ca7a518bfc4c89b233a7c67e04525cc8dfb1f8d19ca11d7318c63e867d1f002d3121a11dee57374453a3efc83f286332ef2e0af3927153", 0x3a}, {&(0x7f0000000500)="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", 0x1000}, {&(0x7f0000001500)="20d8aea42dfa1ecef1f7fa47a6b8eaef2a966a9a560736b7c02818fb8a5261b399dddd43d91059c694d2dce195ba6182fd5fa58e", 0x34}, {&(0x7f0000001540)="51a2cbc56391cfc589b3397d0370d2c8e2dff523f9bb44253127e55af061769d52c05f724e9ce86d9e7257584e3f3f511be0fc2500613e4b8b34c7f1d097741034d34cc08efa1712021b05b6ee2d", 0x4e}, {&(0x7f00000015c0)="23a3c386284922b4fcf88e945146f62a550cb714a08d0ba193916c0f716671d09f637c053173f3c8e2357987ba158f124001e705af54fea322c405b540143a26064c73bae1dec241793ca138542920788d70a81af624ec81bac6248ee6dedc391c3fc078522226d2984d236533638ba80a6a71393db3b8ba26b53d4bf515cb9727dcdd46c0a58a319f7f7120f6609951093aeb1191d685d2b71b5edf2066e0bef6bc4f7a87c13cfdf958d0d81ca6b566", 0xb0}, {&(0x7f0000001680)="9aabc941eeb87f7e70af", 0xa}, {&(0x7f00000016c0)="2a3416cf9caa63cf7d6f2fcc5c7568ee1879e0c065951a969e55ec90f1f3f3495ac0539a78fdcf5d5525a99fde6a5f507852e26d88f286f0ce66aa31d0b9e40bc35ca264a2e2c09e7821307859796519dfbfc6efbd7a2c9f10c7304f84b7a411dede544cfab4b00eac8c57f7b91ba370d2d2ebaf78825cce8f768b55300f5f1172f761e683a6387c641b7a4b243dde3bf4c365a58b0a787ce5b62ba12e05045d4bcda52c7a096c782f27046f700703aba3d93c3144292210cee2e257", 0xbc}, {&(0x7f0000001780)="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", 0x1000}], 0x8, &(0x7f0000002940)=[@rights={{0x18, 0x1, 0x1, [r16, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {r18, r21, r22}}}], 0x38, 0x80}], 0x2, 0x40800) 09:40:29 executing program 2: keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000a80)={0x0, 0xc}, &(0x7f0000000ac0)={'enc=', 'raw', ' hash=', {'sha384-avx2\x00'}}, &(0x7f0000000b40)="058f6a5fe2db85fa52baca0c", 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xff}, 0x0) getpid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x62e, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1104}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x10, 0x800000000000803, 0x0) ioctl$BLKSECTGET(r0, 0x1267, &(0x7f0000000580)) sendto(r1, &(0x7f0000000000)="120000001600e70d017b00000000008e1584", 0x12, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(r0, r2, 0x0, 0x1) 09:40:29 executing program 3: keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000a80)={0x0, 0xc, 0xae}, &(0x7f0000000ac0)={'enc=', 'raw', ' hash=', {'sha384-avx2\x00'}}, &(0x7f0000000b40)="058f6a5fe2db85fa52baca0c", &(0x7f0000000c00)=""/174) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xff}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2}, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(r0, r2, 0x0, 0x1) 09:40:29 executing program 1: syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@fat=@dos1xfloppy='dos1xfloppy'}]}) r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/enforce\x00', 0x21c080, 0x0) r1 = geteuid() setreuid(0x0, r1) r2 = getgid() fchownat(r0, &(0x7f0000000080)='./file0/file0\x00', r1, r2, 0x1000) 09:40:29 executing program 3: keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000a80)={0x0, 0xc, 0xae}, &(0x7f0000000ac0)={'enc=', 'raw', ' hash=', {'sha384-avx2\x00'}}, &(0x7f0000000b40)="058f6a5fe2db85fa52baca0c", &(0x7f0000000c00)=""/174) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xff}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2}, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(r0, r2, 0x0, 0x1) 09:40:29 executing program 1: syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x14f, 0x0, 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="646f733178666c6f7070460a28b34179ba2099a0124210d5980a77807e57002daa1ad3c8fb0092a65c61480fc9a298c6bc023a674d820c1f6d4e7acd308910c7f13f48bfc67b4c032efa972b27b508b7d01c03845cc72cc84726b050036159ae92bbabaf8dd79918958dd0f837225cfccf8606af8eb049050022704421f7fde92b373595202284e242e4f2d8720fbc3f4f06fc81ed52d02f4f0c3008936fb023d099d00f804c"]) r0 = openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/current\x00', 0x2, 0x0) write$binfmt_script(r0, &(0x7f0000000280)=ANY=[@ANYBLOB="2321202e2f66696c65406d696d655f74849a6edb4a4460e646ba413c31796e6520c5656d30266e6f646576207666617400200abae345caf356ac94153ae40d91f17f1432c219bb3a666e5e7296d9afa4798b6ad380fd5ef719166e0330b5bcdbf2478d728c99c181f94a049900723e3db957d4fa23224033ab1805820a00000000000000000000004adcb9e0af09ca0bc39efce0b1b25185abd558fdd1798ae8bb29c2f1d336"], 0x7e) [ 1059.277560] input: syz1 as /devices/virtual/input/input467 09:40:29 executing program 1: syz_mount_image$vfat(&(0x7f0000000140)='v\xdf\xa9c\xa6', &(0x7f0000000180)='./file0\x00', 0x0, 0xfb4c05c5a5536a12, 0x0, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="59edd7b16d4a06039ccec759ae5f6cab3914dd3e9c32104015dc638c08459cb33f50ef3744e743d5e3a2508f074e6760f77c41fdc0af489b02c67e78a0b36e16e0a9a24e5e1ce854c930f21ea1f5131cbebd14a7cc0d8a51aae44d678e"]) 09:40:29 executing program 2: keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000a80)={0x0, 0xc}, &(0x7f0000000ac0)={'enc=', 'raw', ' hash=', {'sha384-avx2\x00'}}, &(0x7f0000000b40)="058f6a5fe2db85fa52baca0c", 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xff}, 0x0) getpid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x62e, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1104}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x10, 0x800000000000803, 0x0) ioctl$BLKSECTGET(r0, 0x1267, &(0x7f0000000580)) sendto(r1, &(0x7f0000000000)="120000001600e70d017b00000000008e1584", 0x12, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(r0, r2, 0x0, 0x1) 09:40:29 executing program 1: pipe(&(0x7f0000000240)={0xffffffffffffffff}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) splice(r0, 0x0, r1, 0x0, 0x100000000ffdc, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r3, &(0x7f0000000140)=ANY=[], 0xfffffc8f) fcntl$setpipe(r3, 0x407, 0x0) sendmsg(r2, &(0x7f0000000040)={&(0x7f0000001840)=@caif=@rfm={0x25, 0x6, "60e505ecbecbcf4507760b2bc475c3d3"}, 0x80, 0xfffffffffffffffe}, 0x20000000) bind(r3, &(0x7f0000001780)=@generic={0x5, "d1fda771ef45be0981fc074c7cae3fe06c4aeff69dbf348a278ffae5c337b8542910a87777040b50bce5193376cf769f8df614471fb0187cab165ca66c1944c8093d5c1eb9c3d1d77a0c6914ab9e4c85f31f700b1a713a24cfe595963dbd64d2c35b982f266a562622066c9bdd5d1b41f6535cd0cfde2545d6b292e538fe"}, 0x80) sendmmsg$sock(r0, &(0x7f0000000100)=[{{&(0x7f0000000080)=@un=@abs={0x0, 0x0, 0x4e22}, 0x80, &(0x7f0000001600)=[{&(0x7f00000001c0)="be05f57ba0251c54ff9a7b2f35dd34693b2d7f06b0db5b94233790765d9a08d53a4e6bf8c37e6a2160aed02c0e6c4d8b665bcfef933bed85fd792443271edc527fac0ca6de0c85dc420290c2f74d0da39cbde304ba07ca5ec51fe97663dd976909a8158e33e6f832cbb96a85a0c14c4e05d9b5e310ac233ebc23ad591637ac1f814822fddfb3c9caac7c3ff4535dc7ec22c4c9187d05c39b252100780ed3503b09f56f8070b629fe3e93d6106524575391637efa1d3e7a80a446c733cd834fa841a1648a7e95e5fe55af", 0xca}, {&(0x7f00000002c0)="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", 0xfd}, {&(0x7f00000003c0)="752c4fd5870e862b6cf7118c03ad8fc265959a07e3c8967e50593dfcf0a873b2bf3a1da4343ae4881e4c2d17f7846939a9cbd7db98daa73186ad533f199617446c2b0a67ed9bce2f93d5042d0fb25a9043a24b4970eceebb2cbd589288eb96d2ebac49990da3c4a7d832ef01dc335c6a8647af3c", 0x74}, {&(0x7f0000000440)="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", 0x1000}, {&(0x7f0000001440)="61fe6d09c6b0c8577a6c2d5a9382804eebee78167300cedb13609ea8272e1fed3a01e78f7a08b33c2fbf35e42ac0e88aaf24006fcc143aec8c5bb4112eb217f4aa553bc08cd97bd955363e42d93a42bcf9646c12abd46a9e70c9cd3bc8f84e246f962920192690c0bf7ecc518babf382050a34af5fe4a71385b444951b781364ba888dcd7e0861e03b643b12d648415f35f9551783698fd5f5211dd3f42034f1b162aafa8fc14564ab16a9d88c664b127c8efba80ba83a71521ecebd3a528809075e28da6b9b0c4057c602113cd008fe9995", 0xd2}, {&(0x7f0000000000)="f513151bbdf92543f42543eb34742f4ff436ea8862f498959e1ac7b7748b76cecf1a0849d4ce", 0x26}, {&(0x7f0000001540)="9945b00a0717ad5c3f8e072556dd172280bc7276bf141fc5a19850e74b35457e4be2e976152aca9a66ed7111f5913c6583dd6afc326ccd8e6b47cd80d1b677e7ba570ca825ccdb59575eda71675758eb9cd2e1c57db86c58b05e47680696e93f15da52f101499fffa12fb6a6525917b4f5bba094f50268c1b61098a9639e6f10951de4a6aa8913aac450f06647775eabc8f1cb3c64b9d83b3a44ac3e245388fbad4e582b7196eabda68af181eae1f40a1e6d", 0xb2}], 0x7, &(0x7f0000001680)=[@mark={{0x14, 0x1, 0x24, 0x2}}, @mark={{0x14, 0x1, 0x24, 0x3}}, @txtime={{0x18, 0x1, 0x3d, 0x8}}, @timestamping={{0x14, 0x1, 0x25, 0x5}}, @mark={{0x14, 0x1, 0x24, 0x1}}, @timestamping={{0x14, 0x1, 0x25, 0x8}}, @mark={{0x14, 0x1, 0x24, 0x7ff}}, @txtime={{0x18, 0x1, 0x3d, 0x4}}, @timestamping={{0x14, 0x1, 0x25, 0x7}}], 0xd8}}], 0x1, 0x20000000) syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001800)=ANY=[@ANYBLOB="646f733178666c6f7078792c00f27ee675442f992c75be12ba8b51b0f2ab799bc2c2b4d573587aa7"]) 09:40:32 executing program 2: keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000a80)={0x0, 0xc, 0xae}, &(0x7f0000000ac0)={'enc=', 'raw', ' hash=', {'sha384-avx2\x00'}}, &(0x7f0000000b40)="058f6a5fe2db85fa52baca0c", &(0x7f0000000c00)=""/174) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xff}, 0x0) getpid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x62e, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1104}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x10, 0x800000000000803, 0x0) ioctl$BLKSECTGET(r0, 0x1267, &(0x7f0000000580)) sendto(r1, &(0x7f0000000000)="120000001600e70d017b00000000008e1584", 0x12, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(r0, r2, 0x0, 0x1) 09:40:32 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x7c, 0x7c, 0x2, [@array, @restrict, @ptr, @func, @int, @int, @fwd, @enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x0, 0x9}]}]}}, 0x0, 0x96}, 0x20) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x39) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) ptrace$cont(0x1f, r0, 0x5, 0x800000000000) 09:40:32 executing program 3: keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000a80)={0x0, 0xc, 0xae}, &(0x7f0000000ac0)={'enc=', 'raw', ' hash=', {'sha384-avx2\x00'}}, &(0x7f0000000b40)="058f6a5fe2db85fa52baca0c", &(0x7f0000000c00)=""/174) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xff}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = syz_open_procfs(0x0, 0x0) sendfile(r0, r2, 0x0, 0x1) 09:40:32 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000]}, 0x45c) r1 = syz_open_dev$sndtimer(0x0, 0x0, 0x100) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000040)={{0x1}}) gettid() r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[@ANYBLOB="f75f9bf747594d0a1851415d989b48270bb03c9ef00b305cba0432a36b9310552b2e4de8c9de57a65146ad9194a585247c8d2a48e1311d4dd0e973234ea0a1a238326753d3da28e216683f91691b54351036cf18886cd3e555df4a1b907696264440c2e8407ed7160e8250e81157496310f16407a59d7e892d7ea55b9215d7eb723ff1b873c6af16ac27c40d2c4fe0c268984029a5c1adb5df4f4dd2"], 0xb) inotify_add_watch(r2, &(0x7f0000000180)='./file1\x00', 0x80000020) r3 = geteuid() getresgid(&(0x7f0000000140), 0x0, 0x0) fchown(r2, r3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r2) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={r1, 0x28, &(0x7f0000000240)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000002c0)={r4, 0xffffffff, 0xe6d3be648ff4b41c}, 0xc) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x3, 0x0) ioctl$UI_DEV_DESTROY(r0, 0x5502) 09:40:32 executing program 4: setxattr$security_capability(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='security.capability\x00', &(0x7f0000000100)=@v1={0x1000000, [{0x6, 0x1f}]}, 0xc, 0x2) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(r0, r1, 0x0, 0x1) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xfffffc8f) fcntl$setpipe(r2, 0x407, 0x0) ioctl$TIOCLINUX6(r2, 0x541c, &(0x7f0000000000)={0x6, 0xfc}) 09:40:32 executing program 1: syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@fat=@dos1xfloppy='dos1xfloppy'}]}) pipe(&(0x7f0000000240)={0xffffffffffffffff}) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f00000000c0)={0x8, &(0x7f0000000080)=[{0xffffffffb9372ef0, 0x47e5, 0x3, 0x3}, {0x4, 0x8, 0x400, 0x800}, {0xff, 0x7fffffff, 0x9, 0x1af0}, {0x3, 0x8, 0xf5, 0x7f}, {0x29, 0x0, 0x3, 0x7}, {0x6, 0xe4cf, 0x8, 0x4}, {0x1f70, 0x1, 0x6, 0x7c9c}, {0x3f, 0x20, 0x6, 0x400}]}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000440)={0x0, r0, 0x0, 0x5, &(0x7f0000000400)='vfat\x00'}, 0x30) ioctl$sock_SIOCSPGRP(r0, 0x8902, &(0x7f0000000480)=r2) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000100)) fsync(0xffffffffffffffff) splice(r0, 0x0, r1, 0x0, 0x100000000ffdc, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r3, &(0x7f0000000140)=ANY=[], 0xfffffc8f) fcntl$setpipe(r3, 0x407, 0x0) setsockopt$inet_tcp_TCP_QUEUE_SEQ(r3, 0x6, 0x15, &(0x7f00000001c0)=0x100f, 0x4) getsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x40, &(0x7f0000000200), &(0x7f0000000280)=0x4) pipe(&(0x7f0000000240)={0xffffffffffffffff}) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) splice(r4, 0x0, r5, 0x0, 0x100000000ffdc, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r5, 0xc0506617, &(0x7f00000002c0)={{0x0, 0x0, @reserved="4de7a2e3df243cd9315c202d1e789bc82a0f74683b8fd677260221d3fccf6f3b"}, 0xd2, [], "6a8dd9a858a69012c3b2d29dc9168f398dc08a4b83defbf0eae0a50eaa87bf502078842dcb54ba58c812eb051f444a9b2ab366560440dce973833f66680d73442f91423c773de275c258df14fa1493c3fb2b830856cf5d6f625389ab5c2d29acf90985c32cd5716c39fa4aa4748553ca0fbbbabc81f9eac24fdcfc032d28e747c7ee863171c3ede52656630576b3fb55aaf0f4be32b6f6ef6b74fdd1a51577d14827bef7be351759e3cf932f50529cd88d39c4cdd37f8f3494c8ce06ab54ad84172aee809e824cec382cf693715990b9fef4"}) mmap$binder(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x1, 0x11, r1, 0x0) write$P9_ROPEN(r0, &(0x7f0000000000)={0x18, 0x71, 0x2, {{0x10, 0x2, 0x2}, 0x9}}, 0x18) 09:40:32 executing program 3: keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000a80)={0x0, 0xc, 0xae}, &(0x7f0000000ac0)={'enc=', 'raw', ' hash=', {'sha384-avx2\x00'}}, &(0x7f0000000b40)="058f6a5fe2db85fa52baca0c", &(0x7f0000000c00)=""/174) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xff}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = syz_open_procfs(0x0, 0x0) sendfile(r0, r2, 0x0, 0x1) 09:40:32 executing program 2: keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000a80)={0x0, 0xc, 0xae}, &(0x7f0000000ac0)={'enc=', 'raw', ' hash=', {'sha384-avx2\x00'}}, &(0x7f0000000b40)="058f6a5fe2db85fa52baca0c", &(0x7f0000000c00)=""/174) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xff}, 0x0) getpid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x62e, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1104}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x10, 0x800000000000803, 0x0) ioctl$BLKSECTGET(r0, 0x1267, &(0x7f0000000580)) sendto(r1, &(0x7f0000000000)="120000001600e70d017b00000000008e1584", 0x12, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(r0, r2, 0x0, 0x1) [ 1062.286799] input: syz1 as /devices/virtual/input/input468 09:40:32 executing program 3: keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000a80)={0x0, 0xc, 0xae}, &(0x7f0000000ac0)={'enc=', 'raw', ' hash=', {'sha384-avx2\x00'}}, &(0x7f0000000b40)="058f6a5fe2db85fa52baca0c", &(0x7f0000000c00)=""/174) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xff}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = syz_open_procfs(0x0, 0x0) sendfile(r0, r2, 0x0, 0x1) 09:40:32 executing program 2: keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000a80)={0x0, 0xc, 0xae}, &(0x7f0000000ac0)={'enc=', 'raw', ' hash=', {'sha384-avx2\x00'}}, &(0x7f0000000b40)="058f6a5fe2db85fa52baca0c", &(0x7f0000000c00)=""/174) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xff}, 0x0) getpid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x62e, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1104}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x10, 0x800000000000803, 0x0) ioctl$BLKSECTGET(r0, 0x1267, &(0x7f0000000580)) sendto(r1, &(0x7f0000000000)="120000001600e70d017b00000000008e1584", 0x12, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(r0, r2, 0x0, 0x1) 09:40:32 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000]}, 0x45c) r1 = syz_open_dev$sndtimer(0x0, 0x0, 0x100) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000040)={{0x1}}) gettid() r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[@ANYBLOB="f75f9bf747594d0a1851415d989b48270bb03c9ef00b305cba0432a36b9310552b2e4de8c9de57a65146ad9194a585247c8d2a48e1311d4dd0e973234ea0a1a238326753d3da28e216683f91691b54351036cf18886cd3e555df4a1b907696264440c2e8407ed7160e8250e81157496310f16407a59d7e892d7ea55b9215d7eb723ff1b873c6af16ac27c40d2c4fe0c268984029a5c1adb5df4f4dd2"], 0xb) inotify_add_watch(r2, &(0x7f0000000180)='./file1\x00', 0x80000020) r3 = geteuid() getresgid(&(0x7f0000000140), 0x0, 0x0) fchown(r2, r3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r2) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={r1, 0x28, &(0x7f0000000240)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000002c0)={r4, 0xffffffff, 0xe6d3be648ff4b41c}, 0xc) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(0x0, 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x3, 0x0) ioctl$UI_DEV_DESTROY(r0, 0x5502) 09:40:32 executing program 3: keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000a80)={0x0, 0xc, 0xae}, &(0x7f0000000ac0)={'enc=', 'raw', ' hash=', {'sha384-avx2\x00'}}, &(0x7f0000000b40)="058f6a5fe2db85fa52baca0c", &(0x7f0000000c00)=""/174) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xff}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(0xffffffffffffffff, r1, 0x0, 0x1) [ 1062.515478] input: syz1 as /devices/virtual/input/input469 09:40:32 executing program 3: keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000a80)={0x0, 0xc, 0xae}, &(0x7f0000000ac0)={'enc=', 'raw', ' hash=', {'sha384-avx2\x00'}}, &(0x7f0000000b40)="058f6a5fe2db85fa52baca0c", &(0x7f0000000c00)=""/174) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xff}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(0xffffffffffffffff, r1, 0x0, 0x1) 09:40:35 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x7c, 0x7c, 0x2, [@array, @restrict, @ptr, @func, @int, @int, @fwd, @enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x0, 0x9}]}]}}, 0x0, 0x96}, 0x20) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000240)=ANY=[]}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x39) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) ptrace$cont(0x1f, r0, 0x5, 0x800000000000) 09:40:35 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000]}, 0x45c) r1 = syz_open_dev$sndtimer(0x0, 0x0, 0x100) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000040)={{0x1}}) gettid() r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[@ANYBLOB="f75f9bf747594d0a1851415d989b48270bb03c9ef00b305cba0432a36b9310552b2e4de8c9de57a65146ad9194a585247c8d2a48e1311d4dd0e973234ea0a1a238326753d3da28e216683f91691b54351036cf18886cd3e555df4a1b907696264440c2e8407ed7160e8250e81157496310f16407a59d7e892d7ea55b9215d7eb723ff1b873c6af16ac27c40d2c4fe0c268984029a5c1adb5df4f4dd2"], 0xb) inotify_add_watch(r2, &(0x7f0000000180)='./file1\x00', 0x80000020) r3 = geteuid() getresgid(&(0x7f0000000140), 0x0, 0x0) fchown(r2, r3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r2) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={r1, 0x28, &(0x7f0000000240)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000002c0)={r4, 0xffffffff, 0xe6d3be648ff4b41c}, 0xc) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(0x0, 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x3, 0x0) ioctl$UI_DEV_DESTROY(r0, 0x5502) 09:40:35 executing program 2: keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000a80)={0x0, 0xc, 0xae}, &(0x7f0000000ac0)={'enc=', 'raw', ' hash=', {'sha384-avx2\x00'}}, &(0x7f0000000b40)="058f6a5fe2db85fa52baca0c", &(0x7f0000000c00)=""/174) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') prlimit64(0x0, 0x0, &(0x7f0000000280)={0x9, 0xff}, 0x0) getpid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x62e, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1104}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x10, 0x800000000000803, 0x0) ioctl$BLKSECTGET(r0, 0x1267, &(0x7f0000000580)) sendto(r1, &(0x7f0000000000)="120000001600e70d017b00000000008e1584", 0x12, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(r0, r2, 0x0, 0x1) 09:40:35 executing program 3: keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000a80)={0x0, 0xc, 0xae}, &(0x7f0000000ac0)={'enc=', 'raw', ' hash=', {'sha384-avx2\x00'}}, &(0x7f0000000b40)="058f6a5fe2db85fa52baca0c", &(0x7f0000000c00)=""/174) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xff}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(0xffffffffffffffff, r1, 0x0, 0x1) 09:40:35 executing program 1: ioctl$TCSBRKP(0xffffffffffffffff, 0x5425, 0x3) syz_mount_image$vfat(&(0x7f0000000280)='vfat\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0xfffffffffffffee7, 0x0, 0x90, &(0x7f00000000c0)=ANY=[@ANYRESHEX]) r0 = add_key$keyring(&(0x7f0000000200)='keyring\x00', &(0x7f0000000240)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) keyctl$restrict_keyring(0x1d, r0, &(0x7f0000000000)='keyring\x00', &(0x7f0000000040)='/\x00') keyctl$set_timeout(0xf, r0, 0x0) lgetxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000340)=@random={'system.', 'v\x03\xe8&A:\xcd'}, &(0x7f00000002c0)=""/58, 0x3a) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r1, 0x407, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r1, 0x40086607, &(0x7f0000000080)=0x2b5) keyctl$reject(0x13, 0x0, 0x5f0, 0xa3, r0) 09:40:35 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xfffffc8f) fcntl$setpipe(r2, 0x407, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r3, &(0x7f0000000140)=ANY=[], 0xfffffc8f) fcntl$setpipe(r3, 0x407, 0x0) ioctl$TIOCLINUX7(r3, 0x541c, &(0x7f0000000040)={0x7, 0x6}) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r2, 0x800c6613, &(0x7f00000000c0)=@v2={0x2, @aes128, 0x1, [], "e0f4b7387f8a0374d109fc402a4ac1e6"}) sendfile(r0, r1, 0x0, 0x1) 09:40:35 executing program 1: syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@fat=@dos1xfloppy='dos1xfloppy'}]}) r0 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_stats\x00', 0x0, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f00000002c0)={{{@in=@dev, @in6=@local}}, {{@in=@multicast1}, 0x0, @in6=@initdev}}, &(0x7f00000000c0)=0xe8) 09:40:35 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x7c, 0x7c, 0x2, [@array, @restrict, @ptr, @func, @int, @int, @fwd, @enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x0, 0x9}]}]}}, 0x0, 0x96}, 0x20) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000240)=ANY=[]}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x39) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) ptrace$cont(0x1f, r0, 0x5, 0x800000000000) 09:40:35 executing program 1: r0 = geteuid() setreuid(0x0, r0) r1 = geteuid() setreuid(0x0, r1) syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)={[{@fat=@dos1xfloppy='dos1xfloppy'}], [{@euid_lt={'euid<', r0}}, {@hash='hash'}, {@permit_directio='permit_dir]ctio'}, {@uid_lt={'uid<', r1}}]}) 09:40:35 executing program 1: syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000000)='./file0\x00', 0x6, 0x0, 0x0, 0x0, &(0x7f0000000040)) [ 1065.325146] input: syz1 as /devices/virtual/input/input470 09:40:35 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000]}, 0x45c) r1 = syz_open_dev$sndtimer(0x0, 0x0, 0x100) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000040)={{0x1}}) gettid() r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[@ANYBLOB="f75f9bf747594d0a1851415d989b48270bb03c9ef00b305cba0432a36b9310552b2e4de8c9de57a65146ad9194a585247c8d2a48e1311d4dd0e973234ea0a1a238326753d3da28e216683f91691b54351036cf18886cd3e555df4a1b907696264440c2e8407ed7160e8250e81157496310f16407a59d7e892d7ea55b9215d7eb723ff1b873c6af16ac27c40d2c4fe0c268984029a5c1adb5df4f4dd2"], 0xb) inotify_add_watch(r2, &(0x7f0000000180)='./file1\x00', 0x80000020) r3 = geteuid() getresgid(&(0x7f0000000140), 0x0, 0x0) fchown(r2, r3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r2) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={r1, 0x28, &(0x7f0000000240)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000002c0)={r4, 0xffffffff, 0xe6d3be648ff4b41c}, 0xc) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(0x0, 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x3, 0x0) ioctl$UI_DEV_DESTROY(r0, 0x5502) 09:40:35 executing program 2: keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000a80)={0x0, 0xc, 0xae}, &(0x7f0000000ac0)={'enc=', 'raw', ' hash=', {'sha384-avx2\x00'}}, &(0x7f0000000b40)="058f6a5fe2db85fa52baca0c", &(0x7f0000000c00)=""/174) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') prlimit64(0x0, 0x0, &(0x7f0000000280)={0x9, 0xff}, 0x0) getpid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x62e, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1104}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x10, 0x800000000000803, 0x0) ioctl$BLKSECTGET(r0, 0x1267, &(0x7f0000000580)) sendto(r1, &(0x7f0000000000)="120000001600e70d017b00000000008e1584", 0x12, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(r0, r2, 0x0, 0x1) 09:40:35 executing program 1: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001200)={0x0, 0x0}, &(0x7f0000001240)=0xc) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000080)='./file0\x00', 0x6, 0x2, &(0x7f00000011c0)=[{&(0x7f00000001c0)="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", 0x1000, 0x10000}, {&(0x7f00000000c0)="079c4342d614a49226d47f1550af2039447eec2826f8261aac36d5fd4faa030b8e552cef65537b14c917e9465a26052b386109eadbfa5a903bfe784df71be1379bf294865d088d3de742e291041ba6733db3e513035a5466ca2c69727f7ec7378c", 0x61, 0x5}], 0x2000000, &(0x7f0000001280)={[{@nonumtail='nnonumtail=1'}], [{@fowner_eq={'fowner', 0x3d, r0}}, {@smackfsdef={'smackfsdef', 0x3d, 'vfat\x00'}}, {@pcr={'pcr', 0x3d, 0x13}}, {@mask={'mask', 0x3d, 'MAY_READ'}}]}) syz_genetlink_get_family_id$tipc2(&(0x7f0000001300)='TIPCv2\x00') syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@fat=@dos1xfloppy='dos1xfloppy'}]}) prctl$PR_GET_KEEPCAPS(0x7) 09:40:35 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000]}, 0x45c) r1 = syz_open_dev$sndtimer(0x0, 0x0, 0x100) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000040)={{0x1}}) gettid() r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[@ANYBLOB="f75f9bf747594d0a1851415d989b48270bb03c9ef00b305cba0432a36b9310552b2e4de8c9de57a65146ad9194a585247c8d2a48e1311d4dd0e973234ea0a1a238326753d3da28e216683f91691b54351036cf18886cd3e555df4a1b907696264440c2e8407ed7160e8250e81157496310f16407a59d7e892d7ea55b9215d7eb723ff1b873c6af16ac27c40d2c4fe0c268984029a5c1adb5df4f4dd2"], 0xb) inotify_add_watch(r2, &(0x7f0000000180)='./file1\x00', 0x80000020) r3 = geteuid() getresgid(&(0x7f0000000140), 0x0, 0x0) fchown(r2, r3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r2) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={r1, 0x28, &(0x7f0000000240)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000002c0)={r4, 0xffffffff, 0xe6d3be648ff4b41c}, 0xc) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x3, 0x0) ioctl$UI_DEV_DESTROY(r0, 0x5502) [ 1065.438679] input: syz1 as /devices/virtual/input/input471 09:40:35 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000]}, 0x45c) r1 = syz_open_dev$sndtimer(0x0, 0x0, 0x100) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000040)={{0x1}}) gettid() r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[@ANYBLOB="f75f9bf747594d0a1851415d989b48270bb03c9ef00b305cba0432a36b9310552b2e4de8c9de57a65146ad9194a585247c8d2a48e1311d4dd0e973234ea0a1a238326753d3da28e216683f91691b54351036cf18886cd3e555df4a1b907696264440c2e8407ed7160e8250e81157496310f16407a59d7e892d7ea55b9215d7eb723ff1b873c6af16ac27c40d2c4fe0c268984029a5c1adb5df4f4dd2"], 0xb) inotify_add_watch(r2, &(0x7f0000000180)='./file1\x00', 0x80000020) r3 = geteuid() getresgid(&(0x7f0000000140), 0x0, 0x0) fchown(r2, r3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r2) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={r1, 0x28, &(0x7f0000000240)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000002c0)={r4, 0xffffffff, 0xe6d3be648ff4b41c}, 0xc) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x3, 0x0) ioctl$UI_DEV_DESTROY(r0, 0x5502) 09:40:35 executing program 3: keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000a80)={0x0, 0xc, 0xae}, &(0x7f0000000ac0)={'enc=', 'raw', ' hash=', {'sha384-avx2\x00'}}, &(0x7f0000000b40)="058f6a5fe2db85fa52baca0c", &(0x7f0000000c00)=""/174) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xff}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(r0, 0xffffffffffffffff, 0x0, 0x1) 09:40:35 executing program 1: syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="646f73316fad00007070792c00"]) r0 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x1}, &(0x7f00000001c0)="c0368c27e486a646d2c88f9d7d1a726873e67e97c3a28722de4699ec4752cd7a15657011e5f8fcab6c3d6f533452785418eb736b0bc5b08925c1262f4740ba7186e28a84e748bb0d6668ca3dae47d15a5d905e598fc5636724821c13333aa89a77fa2b9a972653b96176c9f18dcaea60aa6eb1b71a0209733c1e39a7bfde3014ce9984864e78646494b33d98ae39222ca3f1f4c9eea1bc41ef5778f7eaf85f56cdcd6b3464b8f79444", 0xa9, 0xfffffffffffffffd) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) r2 = add_key$user(&(0x7f0000000400)='user\x00', &(0x7f0000000500)={'syz', 0x2}, &(0x7f0000000740)="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", 0x1000, 0xfffffffffffffffb) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000001740)={{{@in6=@loopback, @in6=@ipv4={[], [], @broadcast}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in6=@dev}}, &(0x7f0000000440)=0xffffffffffffff75) r4 = getgid() keyctl$chown(0x4, r2, r3, r4) r5 = socket$inet(0x2, 0x4000000000000001, 0x0) r6 = add_key$user(&(0x7f0000000400)='user\x00', &(0x7f0000000500)={'syz', 0x2}, &(0x7f0000000740)="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", 0x1000, 0xfffffffffffffffb) getsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f0000000540)={{{@in6=@loopback, @in6=@ipv4={[], [], @broadcast}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in6=@dev}}, &(0x7f0000000680)=0xe8) r8 = getgid() keyctl$chown(0x4, r6, r7, r8) keyctl$dh_compute(0x17, &(0x7f00000000c0)={r0, r2, r6}, &(0x7f0000000280)=""/147, 0x93, &(0x7f00000003c0)={&(0x7f0000000100)={'rmd320\x00'}, &(0x7f0000000340)="a0d224e25652715ddbf67fac831b53c85b0517c40c6826fbc760cf57d1388715ae4b43c6d3a1d061f5370503f333d271fb9c62e64d0f008634f0f55f86808bbd0cfb081ba1d44f0881673e2cd00ade038953e6a09d8b2ef97672c5e41f20860466", 0x61}) 09:40:36 executing program 4: r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f0000000000)) ptrace(0x10, r0) ptrace$getregset(0x4204, r0, 0x1, &(0x7f0000001140)={0xffffffffffffffff}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000040)=0x0) r2 = syz_open_procfs(r1, &(0x7f0000000000)='clear_refs\x00') pipe(&(0x7f0000000240)={0xffffffffffffffff}) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) splice(r3, 0x0, r4, 0x0, 0x100000000ffdc, 0x0) ioctl$TUNSETVNETHDRSZ(r3, 0x400454d8, &(0x7f0000000080)=0x4) r5 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(r2, r5, 0x0, 0x1) 09:40:36 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000]}, 0x45c) r1 = syz_open_dev$sndtimer(0x0, 0x0, 0x100) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000040)={{0x1}}) gettid() r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[@ANYBLOB="f75f9bf747594d0a1851415d989b48270bb03c9ef00b305cba0432a36b9310552b2e4de8c9de57a65146ad9194a585247c8d2a48e1311d4dd0e973234ea0a1a238326753d3da28e216683f91691b54351036cf18886cd3e555df4a1b907696264440c2e8407ed7160e8250e81157496310f16407a59d7e892d7ea55b9215d7eb723ff1b873c6af16ac27c40d2c4fe0c268984029a5c1adb5df4f4dd2"], 0xb) inotify_add_watch(r2, &(0x7f0000000180)='./file1\x00', 0x80000020) r3 = geteuid() getresgid(&(0x7f0000000140), 0x0, 0x0) fchown(r2, r3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r2) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={r1, 0x28, &(0x7f0000000240)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000002c0)={r4, 0xffffffff, 0xe6d3be648ff4b41c}, 0xc) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x3, 0x0) ioctl$UI_DEV_DESTROY(r0, 0x5502) 09:40:38 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x7c, 0x7c, 0x2, [@array, @restrict, @ptr, @func, @int, @int, @fwd, @enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x0, 0x9}]}]}}, 0x0, 0x96}, 0x20) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000240)=ANY=[]}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x39) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) ptrace$cont(0x1f, r0, 0x5, 0x800000000000) 09:40:38 executing program 1: syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x400, &(0x7f0000000040)=ANY=[@ANYBLOB="646f7331e9666c6f7070792c00"]) 09:40:38 executing program 3: keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000a80)={0x0, 0xc, 0xae}, &(0x7f0000000ac0)={'enc=', 'raw', ' hash=', {'sha384-avx2\x00'}}, &(0x7f0000000b40)="058f6a5fe2db85fa52baca0c", &(0x7f0000000c00)=""/174) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xff}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(r0, 0xffffffffffffffff, 0x0, 0x1) 09:40:38 executing program 2: keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000a80)={0x0, 0xc, 0xae}, &(0x7f0000000ac0)={'enc=', 'raw', ' hash=', {'sha384-avx2\x00'}}, &(0x7f0000000b40)="058f6a5fe2db85fa52baca0c", &(0x7f0000000c00)=""/174) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') prlimit64(0x0, 0x0, &(0x7f0000000280)={0x9, 0xff}, 0x0) getpid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x62e, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1104}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x10, 0x800000000000803, 0x0) ioctl$BLKSECTGET(r0, 0x1267, &(0x7f0000000580)) sendto(r1, &(0x7f0000000000)="120000001600e70d017b00000000008e1584", 0x12, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(r0, r2, 0x0, 0x1) 09:40:38 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000]}, 0x45c) r1 = syz_open_dev$sndtimer(0x0, 0x0, 0x100) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000040)={{0x1}}) gettid() r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[@ANYBLOB="f75f9bf747594d0a1851415d989b48270bb03c9ef00b305cba0432a36b9310552b2e4de8c9de57a65146ad9194a585247c8d2a48e1311d4dd0e973234ea0a1a238326753d3da28e216683f91691b54351036cf18886cd3e555df4a1b907696264440c2e8407ed7160e8250e81157496310f16407a59d7e892d7ea55b9215d7eb723ff1b873c6af16ac27c40d2c4fe0c268984029a5c1adb5df4f4dd2"], 0xb) inotify_add_watch(r2, &(0x7f0000000180)='./file1\x00', 0x80000020) r3 = geteuid() getresgid(&(0x7f0000000140), 0x0, 0x0) fchown(r2, r3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r2) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={r1, 0x28, &(0x7f0000000240)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000002c0)={r4, 0xffffffff, 0xe6d3be648ff4b41c}, 0xc) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) syz_open_dev$evdev(0x0, 0x3, 0x0) ioctl$UI_DEV_DESTROY(r0, 0x5502) 09:40:38 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfffffc8f) fcntl$setpipe(r1, 0x407, 0x0) sendfile(r0, r1, 0x0, 0x6) 09:40:38 executing program 1: r0 = socket(0xa, 0x1, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, '\x00\x00\x00\x00\x03\x00\x00\x00i\b p\x80\x00', 0x1}, 0x10d) ioctl(r0, 0x8916, &(0x7f0000000000)) ioctl(r0, 0x8936, &(0x7f0000000000)) syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB=',\x00'/13]) [ 1068.354475] input: syz1 as /devices/virtual/input/input475 09:40:38 executing program 1: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@fat=@dos1xfloppy='dos1xfloppy'}]}) 09:40:38 executing program 3: keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000a80)={0x0, 0xc, 0xae}, &(0x7f0000000ac0)={'enc=', 'raw', ' hash=', {'sha384-avx2\x00'}}, &(0x7f0000000b40)="058f6a5fe2db85fa52baca0c", &(0x7f0000000c00)=""/174) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xff}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(r0, 0xffffffffffffffff, 0x0, 0x1) 09:40:38 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000]}, 0x45c) r1 = syz_open_dev$sndtimer(0x0, 0x0, 0x100) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000040)={{0x1}}) gettid() r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[@ANYBLOB="f75f9bf747594d0a1851415d989b48270bb03c9ef00b305cba0432a36b9310552b2e4de8c9de57a65146ad9194a585247c8d2a48e1311d4dd0e973234ea0a1a238326753d3da28e216683f91691b54351036cf18886cd3e555df4a1b907696264440c2e8407ed7160e8250e81157496310f16407a59d7e892d7ea55b9215d7eb723ff1b873c6af16ac27c40d2c4fe0c268984029a5c1adb5df4f4dd2"], 0xb) inotify_add_watch(r2, &(0x7f0000000180)='./file1\x00', 0x80000020) r3 = geteuid() getresgid(&(0x7f0000000140), 0x0, 0x0) fchown(r2, r3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r2) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={r1, 0x28, &(0x7f0000000240)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000002c0)={r4, 0xffffffff, 0xe6d3be648ff4b41c}, 0xc) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) syz_open_dev$evdev(0x0, 0x3, 0x0) ioctl$UI_DEV_DESTROY(r0, 0x5502) 09:40:38 executing program 1: r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/enforce\x00', 0x800, 0x0) r1 = getpgid(0x0) fcntl$setownex(r0, 0xf, &(0x7f0000000200)={0x0, r1}) syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x8204, &(0x7f0000000040)={[{@fat=@dos1xfloppy='\x00\x00Sy\x00'}]}) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) splice(r2, 0x0, r4, 0x0, 0x100000000ffdc, 0x0) r5 = dup2(0xffffffffffffffff, r3) getsockopt$inet_tcp_buf(r5, 0x6, 0xd, &(0x7f0000000280)=""/187, &(0x7f0000000000)=0xbb) ioctl$UI_SET_KEYBIT(r2, 0x40045565, 0x230) 09:40:38 executing program 1: syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@fat=@dos1xfloppy='dos1xfloppy'}]}) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000240)={0xffffffffffffffff}) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) splice(r2, 0x0, r3, 0x0, 0x100000000ffdc, 0x0) write$cgroup_type(r3, &(0x7f00000000c0)='threaded\x00', 0x9) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfffffffffffffe07) fcntl$setpipe(r0, 0x407, 0x0) ioctl$EVIOCGRAB(r0, 0x40044590, &(0x7f0000000000)=0x6) [ 1068.504342] input: syz1 as /devices/virtual/input/input476 09:40:41 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x7c, 0x7c, 0x2, [@array, @restrict, @ptr, @func, @int, @int, @fwd, @enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x0, 0x9}]}]}}, 0x0, 0x96}, 0x20) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000240)=ANY=[@ANYBLOB]}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x39) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) ptrace$cont(0x1f, r0, 0x5, 0x800000000000) 09:40:41 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000]}, 0x45c) r1 = syz_open_dev$sndtimer(0x0, 0x0, 0x100) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000040)={{0x1}}) gettid() r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[@ANYBLOB="f75f9bf747594d0a1851415d989b48270bb03c9ef00b305cba0432a36b9310552b2e4de8c9de57a65146ad9194a585247c8d2a48e1311d4dd0e973234ea0a1a238326753d3da28e216683f91691b54351036cf18886cd3e555df4a1b907696264440c2e8407ed7160e8250e81157496310f16407a59d7e892d7ea55b9215d7eb723ff1b873c6af16ac27c40d2c4fe0c268984029a5c1adb5df4f4dd2"], 0xb) inotify_add_watch(r2, &(0x7f0000000180)='./file1\x00', 0x80000020) r3 = geteuid() getresgid(&(0x7f0000000140), 0x0, 0x0) fchown(r2, r3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r2) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={r1, 0x28, &(0x7f0000000240)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000002c0)={r4, 0xffffffff, 0xe6d3be648ff4b41c}, 0xc) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) syz_open_dev$evdev(0x0, 0x3, 0x0) ioctl$UI_DEV_DESTROY(r0, 0x5502) 09:40:41 executing program 2: keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000a80)={0x0, 0xc, 0xae}, &(0x7f0000000ac0)={'enc=', 'raw', ' hash=', {'sha384-avx2\x00'}}, &(0x7f0000000b40)="058f6a5fe2db85fa52baca0c", &(0x7f0000000c00)=""/174) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') prlimit64(0x0, 0xe, 0x0, 0x0) getpid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x62e, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1104}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x10, 0x800000000000803, 0x0) ioctl$BLKSECTGET(r0, 0x1267, &(0x7f0000000580)) sendto(r1, &(0x7f0000000000)="120000001600e70d017b00000000008e1584", 0x12, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(r0, r2, 0x0, 0x1) 09:40:41 executing program 3: keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000a80)={0x0, 0xc, 0xae}, &(0x7f0000000ac0)={'enc=', 'raw', ' hash=', {'sha384-avx2\x00'}}, &(0x7f0000000b40)="058f6a5fe2db85fa52baca0c", &(0x7f0000000c00)=""/174) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xff}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(r0, r2, 0x0, 0x0) 09:40:41 executing program 1: r0 = geteuid() setreuid(0x0, r0) getresuid(&(0x7f0000000100), &(0x7f00000001c0), &(0x7f0000000200)) syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@fat=@showexec='showexec'}], [{@obj_user={'obj_user', 0x3d, 'uid<'}}]}) pipe(&(0x7f0000000240)={0xffffffffffffffff}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) splice(r1, 0x0, r2, 0x0, 0x100000000ffdc, 0x0) r3 = geteuid() setreuid(0x0, r3) getrandom(&(0x7f0000000280)=""/4096, 0x1000, 0x2) r4 = getegid() write$P9_RGETATTR(r2, &(0x7f0000000040)={0xa0, 0x19, 0x1, {0x10, {0x40, 0x3, 0x2}, 0x12, r3, r4, 0x7, 0x10001, 0x8, 0x2f02, 0x50e, 0x20, 0x1, 0x1000, 0x3ff, 0xff, 0x7fff, 0x9, 0x7ff, 0xff, 0x7ff}}, 0xa0) 09:40:41 executing program 4: pipe(&(0x7f0000000240)={0xffffffffffffffff}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xfffffc8f) fcntl$setpipe(r2, 0x407, 0x0) setsockopt$inet_msfilter(r2, 0x0, 0x29, &(0x7f0000000040)={@multicast1, @rand_addr=0x7, 0x1, 0x7, [@multicast1, @remote, @empty, @loopback, @broadcast, @empty, @dev={0xac, 0x14, 0x14, 0x1c}]}, 0x2c) splice(r0, 0x0, r1, 0x0, 0x100000000ffdc, 0x0) preadv(r0, &(0x7f0000000040), 0x0, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') r4 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(r3, r4, 0x0, 0x1) 09:40:41 executing program 1: syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@fat=@dos1xfloppy='dos1xfloppy'}]}) r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) fsetxattr$security_evm(r0, &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@ng={0x4, 0x14, "1654544988d834c52d08d6058a9322ab26ddd4"}, 0x15, 0x2) 09:40:41 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000]}, 0x45c) r1 = syz_open_dev$sndtimer(0x0, 0x0, 0x100) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000040)={{0x1}}) gettid() r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[@ANYBLOB="f75f9bf747594d0a1851415d989b48270bb03c9ef00b305cba0432a36b9310552b2e4de8c9de57a65146ad9194a585247c8d2a48e1311d4dd0e973234ea0a1a238326753d3da28e216683f91691b54351036cf18886cd3e555df4a1b907696264440c2e8407ed7160e8250e81157496310f16407a59d7e892d7ea55b9215d7eb723ff1b873c6af16ac27c40d2c4fe0c268984029a5c1adb5df4f4dd2"], 0xb) inotify_add_watch(r2, &(0x7f0000000180)='./file1\x00', 0x80000020) r3 = geteuid() getresgid(&(0x7f0000000140), 0x0, 0x0) fchown(r2, r3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r2) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={r1, 0x28, &(0x7f0000000240)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000002c0)={r4, 0xffffffff, 0xe6d3be648ff4b41c}, 0xc) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$UI_DEV_DESTROY(r0, 0x5502) 09:40:41 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x7c, 0x7c, 0x2, [@array, @restrict, @ptr, @func, @int, @int, @fwd, @enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x0, 0x9}]}]}}, 0x0, 0x96}, 0x20) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000240)=ANY=[@ANYBLOB]}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x39) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) ptrace$cont(0x1f, r0, 0x5, 0x800000000000) 09:40:41 executing program 1: prctl$PR_GET_NAME(0x10, &(0x7f0000000080)=""/183) syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@fat=@dos1xfloppy='dos1xfloppy'}]}) 09:40:41 executing program 1: syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x350, 0x0, 0x0, &(0x7f0000000040)={[{@fat=@dos1xfloppy='dos1xfloppy'}]}) r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/enforce\x00', 0x110000, 0x0) ioctl$TIOCGRS485(r0, 0x542e, &(0x7f00000001c0)) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfffffc8f) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/rt_acct\x00') ioctl$BINDER_THREAD_EXIT(r2, 0x40046208, 0x0) fcntl$setpipe(r1, 0x407, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x802, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQNSD(r1, 0x894b, &(0x7f0000000080)) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000200)={@mcast2, 0x32, 0x2, 0x1, 0xf, 0xff, 0x20}, 0x20) [ 1071.469442] input: syz1 as /devices/virtual/input/input478 09:40:41 executing program 3: keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000a80)={0x0, 0xc, 0xae}, &(0x7f0000000ac0)={'enc=', 'raw', ' hash=', {'sha384-avx2\x00'}}, &(0x7f0000000b40)="058f6a5fe2db85fa52baca0c", &(0x7f0000000c00)=""/174) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xff}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(r0, r2, 0x0, 0x0) 09:40:41 executing program 1: syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="646f683178666c6f7070792c0026ab8b34b3f9de455337669f7119237431436e71d06bc4d771867e7d59b2600000fdffffffffffffff459c1375c2b85aebfa8b6973430aa636f70a2e4a0a7f9456f5daec530e79c674ba2aa5ba4264cd86"]) 09:40:41 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000]}, 0x45c) r1 = syz_open_dev$sndtimer(0x0, 0x0, 0x100) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000040)={{0x1}}) gettid() r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[@ANYBLOB="f75f9bf747594d0a1851415d989b48270bb03c9ef00b305cba0432a36b9310552b2e4de8c9de57a65146ad9194a585247c8d2a48e1311d4dd0e973234ea0a1a238326753d3da28e216683f91691b54351036cf18886cd3e555df4a1b907696264440c2e8407ed7160e8250e81157496310f16407a59d7e892d7ea55b9215d7eb723ff1b873c6af16ac27c40d2c4fe0c268984029a5c1adb5df4f4dd2"], 0xb) inotify_add_watch(r2, &(0x7f0000000180)='./file1\x00', 0x80000020) r3 = geteuid() getresgid(&(0x7f0000000140), 0x0, 0x0) fchown(r2, r3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r2) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={r1, 0x28, &(0x7f0000000240)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000002c0)={r4, 0xffffffff, 0xe6d3be648ff4b41c}, 0xc) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$UI_DEV_DESTROY(r0, 0x5502) [ 1071.611241] input: syz1 as /devices/virtual/input/input479 09:40:41 executing program 2: keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000a80)={0x0, 0xc, 0xae}, &(0x7f0000000ac0)={'enc=', 'raw', ' hash=', {'sha384-avx2\x00'}}, &(0x7f0000000b40)="058f6a5fe2db85fa52baca0c", &(0x7f0000000c00)=""/174) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') prlimit64(0x0, 0xe, 0x0, 0x0) getpid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x62e, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1104}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x10, 0x800000000000803, 0x0) ioctl$BLKSECTGET(r0, 0x1267, &(0x7f0000000580)) sendto(r1, &(0x7f0000000000)="120000001600e70d017b00000000008e1584", 0x12, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(r0, r2, 0x0, 0x1) 09:40:41 executing program 1: syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="646f0200000000000000792c00"]) 09:40:41 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000]}, 0x45c) r1 = syz_open_dev$sndtimer(0x0, 0x0, 0x100) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000040)={{0x1}}) gettid() r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[@ANYBLOB="f75f9bf747594d0a1851415d989b48270bb03c9ef00b305cba0432a36b9310552b2e4de8c9de57a65146ad9194a585247c8d2a48e1311d4dd0e973234ea0a1a238326753d3da28e216683f91691b54351036cf18886cd3e555df4a1b907696264440c2e8407ed7160e8250e81157496310f16407a59d7e892d7ea55b9215d7eb723ff1b873c6af16ac27c40d2c4fe0c268984029a5c1adb5df4f4dd2"], 0xb) inotify_add_watch(r2, &(0x7f0000000180)='./file1\x00', 0x80000020) r3 = geteuid() getresgid(&(0x7f0000000140), 0x0, 0x0) fchown(r2, r3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r2) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={r1, 0x28, &(0x7f0000000240)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000002c0)={r4, 0xffffffff, 0xe6d3be648ff4b41c}, 0xc) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$UI_DEV_DESTROY(r0, 0x5502) [ 1071.743531] input: syz1 as /devices/virtual/input/input480 09:40:42 executing program 1: syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="646d733178666c6f7070792c0058fd82c855aa174f84143beef0f70c52fc64fa74f1d5cb9228268879ecd909c860bd4927831920edbf78c5ddc7ff18b9886880ccc1233719a5ea953858c8f4be59951e188ed37a0c8eae09a10909e920b72fc9b7bdd9"]) 09:40:42 executing program 3: keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000a80)={0x0, 0xc, 0xae}, &(0x7f0000000ac0)={'enc=', 'raw', ' hash=', {'sha384-avx2\x00'}}, &(0x7f0000000b40)="058f6a5fe2db85fa52baca0c", &(0x7f0000000c00)=""/174) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xff}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(r0, r2, 0x0, 0x0) 09:40:42 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000]}, 0x45c) r1 = syz_open_dev$sndtimer(0x0, 0x0, 0x100) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000040)={{0x1}}) gettid() r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[@ANYBLOB="f75f9bf747594d0a1851415d989b48270bb03c9ef00b305cba0432a36b9310552b2e4de8c9de57a65146ad9194a585247c8d2a48e1311d4dd0e973234ea0a1a238326753d3da28e216683f91691b54351036cf18886cd3e555df4a1b907696264440c2e8407ed7160e8250e81157496310f16407a59d7e892d7ea55b9215d7eb723ff1b873c6af16ac27c40d2c4fe0c268984029a5c1adb5df4f4dd2"], 0xb) inotify_add_watch(r2, &(0x7f0000000180)='./file1\x00', 0x80000020) r3 = geteuid() getresgid(&(0x7f0000000140), 0x0, 0x0) fchown(r2, r3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r2) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={r1, 0x28, &(0x7f0000000240)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000002c0)={r4, 0xffffffff, 0xe6d3be648ff4b41c}, 0xc) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x3, 0x0) ioctl$UI_DEV_DESTROY(0xffffffffffffffff, 0x5502) [ 1072.242721] input: syz1 as /devices/virtual/input/input481 09:40:44 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x7c, 0x7c, 0x2, [@array, @restrict, @ptr, @func, @int, @int, @fwd, @enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x0, 0x9}]}]}}, 0x0, 0x96}, 0x20) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000240)=ANY=[@ANYBLOB]}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x39) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) ptrace$cont(0x1f, r0, 0x5, 0x800000000000) 09:40:44 executing program 2: keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000a80)={0x0, 0xc, 0xae}, &(0x7f0000000ac0)={'enc=', 'raw', ' hash=', {'sha384-avx2\x00'}}, &(0x7f0000000b40)="058f6a5fe2db85fa52baca0c", &(0x7f0000000c00)=""/174) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') prlimit64(0x0, 0xe, 0x0, 0x0) getpid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x62e, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1104}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x10, 0x800000000000803, 0x0) ioctl$BLKSECTGET(r0, 0x1267, &(0x7f0000000580)) sendto(r1, &(0x7f0000000000)="120000001600e70d017b00000000008e1584", 0x12, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(r0, r2, 0x0, 0x1) 09:40:44 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(r0, r1, 0x0, 0x1) r2 = add_key$keyring(&(0x7f0000000200)='keyring\x00', &(0x7f0000000240)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) keyctl$restrict_keyring(0x1d, r2, &(0x7f0000000000)='keyring\x00', &(0x7f0000000040)='/\x00') keyctl$set_timeout(0xf, r2, 0x0) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz', 0x1}, &(0x7f00000000c0)="898b3e7ef527b41ea14e0bc1", 0xa, r2) 09:40:44 executing program 1: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000180)='./file0\x00', 0x4000000000, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@uni_xlate='uni_xlate=1'}]}) 09:40:44 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000]}, 0x45c) r1 = syz_open_dev$sndtimer(0x0, 0x0, 0x100) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000040)={{0x1}}) gettid() r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[@ANYBLOB="f75f9bf747594d0a1851415d989b48270bb03c9ef00b305cba0432a36b9310552b2e4de8c9de57a65146ad9194a585247c8d2a48e1311d4dd0e973234ea0a1a238326753d3da28e216683f91691b54351036cf18886cd3e555df4a1b907696264440c2e8407ed7160e8250e81157496310f16407a59d7e892d7ea55b9215d7eb723ff1b873c6af16ac27c40d2c4fe0c268984029a5c1adb5df4f4dd2"], 0xb) inotify_add_watch(r2, &(0x7f0000000180)='./file1\x00', 0x80000020) r3 = geteuid() getresgid(&(0x7f0000000140), 0x0, 0x0) fchown(r2, r3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r2) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={r1, 0x28, &(0x7f0000000240)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000002c0)={r4, 0xffffffff, 0xe6d3be648ff4b41c}, 0xc) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x3, 0x0) ioctl$UI_DEV_DESTROY(0xffffffffffffffff, 0x5502) 09:40:44 executing program 3: keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000a80)={0x0, 0xc, 0xae}, &(0x7f0000000ac0)={'enc=', 'raw', ' hash=', {'sha384-avx2\x00'}}, &(0x7f0000000b40)="058f6a5fe2db85fa52baca0c", &(0x7f0000000c00)=""/174) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') prlimit64(0x0, 0xe, 0x0, 0x0) getpid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x62e, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1104}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x10, 0x800000000000803, 0x0) ioctl$BLKSECTGET(r0, 0x1267, &(0x7f0000000580)) sendto(r1, &(0x7f0000000000)="120000001600e70d017b00000000008e1584", 0x12, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(r0, r2, 0x0, 0x1) 09:40:44 executing program 1: r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/policy\x00', 0x0, 0x0) sendto$unix(r0, &(0x7f0000000040)="f0a919bce918a14a59007b7fdb0af58232b1618b8247087be3972f1f993d444de145a3b70844a81064", 0x29, 0x6000001, &(0x7f00000001c0)=@file={0x1, './file0\x00'}, 0x6e) syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)={[{@numtail='nonumtail=0'}], [{@subj_role={'subj_role', 0x3d, '\\eth1'}}, {@smackfstransmute={'smackfstransmute', 0x3d, 'vfat\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'dos1xfloppy'}}, {@defcontext={'defcontext', 0x3d, 'system_u'}}, {@defcontext={'defcUnQ4xt', 0x3d, 'root'}}, {@smackfsdef={'smackfsdef', 0x3d, 'dos1xfloppy'}}]}) 09:40:44 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000]}, 0x45c) r1 = syz_open_dev$sndtimer(0x0, 0x0, 0x100) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000040)={{0x1}}) gettid() r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[@ANYBLOB="f75f9bf747594d0a1851415d989b48270bb03c9ef00b305cba0432a36b9310552b2e4de8c9de57a65146ad9194a585247c8d2a48e1311d4dd0e973234ea0a1a238326753d3da28e216683f91691b54351036cf18886cd3e555df4a1b907696264440c2e8407ed7160e8250e81157496310f16407a59d7e892d7ea55b9215d7eb723ff1b873c6af16ac27c40d2c4fe0c268984029a5c1adb5df4f4dd2"], 0xb) inotify_add_watch(r2, &(0x7f0000000180)='./file1\x00', 0x80000020) r3 = geteuid() getresgid(&(0x7f0000000140), 0x0, 0x0) fchown(r2, r3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r2) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={r1, 0x28, &(0x7f0000000240)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000002c0)={r4, 0xffffffff, 0xe6d3be648ff4b41c}, 0xc) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x3, 0x0) ioctl$UI_DEV_DESTROY(0xffffffffffffffff, 0x5502) 09:40:44 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(r0, 0xffffffffffffffff, 0x0, 0x1) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000240)={0xffffffffffffffff}) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) splice(r4, 0x0, r5, 0x0, 0x100000000ffdc, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff}) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r8 = openat$ion(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ion\x00', 0x200000, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r9, &(0x7f0000000140)=ANY=[], 0xfffffc8f) fcntl$setpipe(r9, 0x407, 0x0) r10 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000280)={&(0x7f0000000200)='./file0\x00', 0x0, 0x8}, 0x10) splice(r10, 0x0, r8, 0x0, 0x100000000ffd9, 0xb) pipe(&(0x7f0000000240)={0xffffffffffffffff}) r12 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bind$netlink(r7, &(0x7f0000000080)={0x10, 0x0, 0x25dfdbfb, 0x110010}, 0xc) splice(r11, 0x0, r12, 0x0, 0x100000000ffdc, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r13, &(0x7f0000000140)=ANY=[], 0xfffffc8f) fcntl$setpipe(r13, 0x407, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r14, &(0x7f0000000140)=ANY=[], 0xfffffc8f) fcntl$setpipe(r14, 0x407, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r15, &(0x7f0000000140)=ANY=[], 0xfffffc8f) fcntl$setpipe(r15, 0x407, 0x0) write$binfmt_misc(r2, &(0x7f00000000c0)=ANY=[@ANYRES64, @ANYRES64=r5, @ANYRESOCT=0x0, @ANYPTR64=&(0x7f00000006c0)=ANY=[@ANYBLOB="273328c48be4028258bdbd0ccf10624a6413a4f5fd3d275ef895918e01829b4d3292fcc829f097769d15ba7798665a821c05cf6ea6d9016b46208d2eb79e18fd5417c445bd41160420394e391b1d70a4c56b23cd6f508747081641704ad1b8497899ec6c6be730d384649623ffb7ad9d1b9ae9ada908c88cb3e4c3b9820c7fe789de7d2c167b6944d884d736feee98438bda494062aa3ecbb07680e851b981775925ee407e7df67d400b220096ac614e877dcb9649ded1", @ANYRESHEX=r6, @ANYRESDEC=r1, @ANYRES32=r1, @ANYRESHEX=r15], @ANYRESDEC=r14, @ANYPTR], 0x4b) fcntl$setpipe(r3, 0x407, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r3, 0xc0406618, &(0x7f0000000040)={{0x1, 0x0, @identifier="b45810c8f9e1dc5ed68d6cad99ec1430"}}) [ 1074.526516] input: syz1 as /devices/virtual/input/input482 09:40:44 executing program 1: syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@fat=@dos1xfloppy='dos1xfloppy'}]}) pipe(&(0x7f0000000240)={0xffffffffffffffff}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) splice(r0, 0x0, r1, 0x0, 0x100000000ffdc, 0x0) r2 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) renameat(r1, &(0x7f0000000000)='./file0\x00', r2, &(0x7f00000000c0)='./file0\x00') 09:40:44 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000]}, 0x45c) r1 = syz_open_dev$sndtimer(0x0, 0x0, 0x100) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000040)={{0x1}}) gettid() r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[@ANYBLOB="f75f9bf747594d0a1851415d989b48270bb03c9ef00b305cba0432a36b9310552b2e4de8c9de57a65146ad9194a585247c8d2a48e1311d4dd0e973234ea0a1a238326753d3da28e216683f91691b54351036cf18886cd3e555df4a1b907696264440c2e8407ed7160e8250e81157496310f16407a59d7e892d7ea55b9215d7eb723ff1b873c6af16ac27c40d2c4fe0c268984029a5c1adb5df4f4dd2"], 0xb) inotify_add_watch(r2, &(0x7f0000000180)='./file1\x00', 0x80000020) r3 = geteuid() getresgid(&(0x7f0000000140), 0x0, 0x0) fchown(r2, r3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r2) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={r1, 0x28, &(0x7f0000000240)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000002c0)={r4, 0xffffffff, 0xe6d3be648ff4b41c}, 0xc) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) syz_open_dev$evdev(0x0, 0x3, 0x0) ioctl$UI_DEV_DESTROY(r0, 0x5502) [ 1074.613407] input: syz1 as /devices/virtual/input/input483 09:40:44 executing program 1: syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@fat=@nfs='nfs'}]}) [ 1074.715303] input: syz1 as /devices/virtual/input/input484 09:40:47 executing program 1: syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@fat=@dos1xfloppy='dos1xfloppy'}]}) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f0000000000)) ptrace(0x10, r0) ptrace$getregset(0x4204, r0, 0x1, &(0x7f0000001140)={0xffffffffffffffff}) ioprio_get$pid(0x2, r0) 09:40:47 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000]}, 0x45c) r1 = syz_open_dev$sndtimer(0x0, 0x0, 0x100) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000040)={{0x1}}) gettid() r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[@ANYBLOB="f75f9bf747594d0a1851415d989b48270bb03c9ef00b305cba0432a36b9310552b2e4de8c9de57a65146ad9194a585247c8d2a48e1311d4dd0e973234ea0a1a238326753d3da28e216683f91691b54351036cf18886cd3e555df4a1b907696264440c2e8407ed7160e8250e81157496310f16407a59d7e892d7ea55b9215d7eb723ff1b873c6af16ac27c40d2c4fe0c268984029a5c1adb5df4f4dd2"], 0xb) inotify_add_watch(r2, &(0x7f0000000180)='./file1\x00', 0x80000020) r3 = geteuid() getresgid(&(0x7f0000000140), 0x0, 0x0) fchown(r2, r3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r2) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={r1, 0x28, &(0x7f0000000240)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000002c0)={r4, 0xffffffff, 0xe6d3be648ff4b41c}, 0xc) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) syz_open_dev$evdev(0x0, 0x3, 0x0) ioctl$UI_DEV_DESTROY(r0, 0x5502) 09:40:47 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x7c, 0x7c, 0x2, [@array, @restrict, @ptr, @func, @int, @int, @fwd, @enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x0, 0x9}]}]}}, 0x0, 0x96}, 0x20) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000240)=ANY=[@ANYBLOB="cd"], 0x1}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x39) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) ptrace$cont(0x1f, r0, 0x5, 0x800000000000) 09:40:47 executing program 2: keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000a80)={0x0, 0xc, 0xae}, &(0x7f0000000ac0)={'enc=', 'raw', ' hash=', {'sha384-avx2\x00'}}, &(0x7f0000000b40)="058f6a5fe2db85fa52baca0c", &(0x7f0000000c00)=""/174) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') prlimit64(0x0, 0xe, &(0x7f0000000280)={0x0, 0xff}, 0x0) getpid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x62e, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1104}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x10, 0x800000000000803, 0x0) ioctl$BLKSECTGET(r0, 0x1267, &(0x7f0000000580)) sendto(r1, &(0x7f0000000000)="120000001600e70d017b00000000008e1584", 0x12, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(r0, r2, 0x0, 0x1) 09:40:47 executing program 3: keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000a80)={0x0, 0xc, 0xae}, &(0x7f0000000ac0)={'enc=', 'raw', ' hash=', {'sha384-avx2\x00'}}, &(0x7f0000000b40)="058f6a5fe2db85fa52baca0c", &(0x7f0000000c00)=""/174) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') prlimit64(0x0, 0xe, 0x0, 0x0) getpid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x62e, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1104}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x10, 0x800000000000803, 0x0) ioctl$BLKSECTGET(r0, 0x1267, &(0x7f0000000580)) sendto(r1, &(0x7f0000000000)="120000001600e70d017b00000000008e1584", 0x12, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(r0, r2, 0x0, 0x1) 09:40:47 executing program 4: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') r0 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfffffc8f) fcntl$setpipe(r1, 0x407, 0x0) pidfd_send_signal(r1, 0x2e, &(0x7f0000000040)={0x34, 0x1, 0x10001}, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) sendfile(r2, r0, 0x0, 0x1) 09:40:47 executing program 1: syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@fat=@dos1xfloppy='dos1xfloppy'}]}) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x1c5) r1 = open(&(0x7f0000000980)='./file0\x00', 0x8000, 0x20) pipe(&(0x7f0000000240)={0xffffffffffffffff}) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) splice(r2, 0x0, r3, 0x0, 0x100000000ffdc, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff}) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) splice(r4, 0x0, r5, 0x0, 0x100000000ffdc, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r6, &(0x7f0000000140)=ANY=[], 0xfffffc8f) fcntl$setpipe(r6, 0x407, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000009c0)={0xffffffffffffffff}) r8 = socket$netlink(0x10, 0x3, 0x5) r9 = openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f0000000a00)='/proc/self/attr/current\x00', 0x2, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff}) r11 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) splice(r10, 0x0, r11, 0x0, 0x100000000ffdc, 0x0) r12 = openat$zero(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/zero\x00', 0x569882, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff}) r14 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) splice(r13, 0x0, r14, 0x0, 0x100000000ffdc, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r15, &(0x7f0000000140)=ANY=[], 0xfffffc8f) fcntl$setpipe(r15, 0x407, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000ac0)={0xffffffffffffffff, r0, 0x0, 0x2, &(0x7f0000000a80)='*\x00'}, 0x30) r17 = geteuid() setreuid(0x0, r17) r18 = getegid() setresgid(r18, 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff}) r20 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) splice(r19, 0x0, r20, 0x0, 0x100000000ffdc, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff}) r22 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) splice(r21, 0x0, r22, 0x0, 0x100000000ffdc, 0x0) r23 = openat$selinux_member(0xffffffffffffff9c, &(0x7f0000000b00)='/selinux/member\x00', 0x2, 0x0) clock_gettime(0x0, &(0x7f0000003840)={0x0, 0x0}) recvmmsg(0xffffffffffffffff, &(0x7f0000003740)=[{{&(0x7f0000000b40)=@generic, 0x80, &(0x7f0000000d00)=[{&(0x7f0000000bc0)=""/164, 0xa4}, {&(0x7f0000000c80)=""/94, 0x5e}], 0x2}, 0x7f}, {{&(0x7f0000000d40)=@nfc_llcp, 0x80, &(0x7f0000001100)=[{&(0x7f0000000dc0)=""/236, 0xec}, {&(0x7f0000000ec0)=""/170, 0xaa}, {&(0x7f0000000f80)=""/2, 0x2}, {&(0x7f0000000fc0)=""/189, 0xbd}, {&(0x7f0000001080)=""/116, 0x74}], 0x5, &(0x7f0000001180)=""/88, 0x58}, 0xffffffffffffffd5}, {{&(0x7f0000001200)=@xdp, 0x80, &(0x7f0000002400)=[{&(0x7f0000001280)=""/4096, 0x1000}, {&(0x7f0000002280)=""/21, 0x15}, {&(0x7f00000022c0)=""/83, 0x53}, {&(0x7f0000002340)=""/153, 0x99}], 0x4, &(0x7f0000002440)=""/209, 0xd1}, 0x101}, {{&(0x7f0000002540)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @initdev}}}, 0x80, &(0x7f0000003700)=[{&(0x7f00000025c0)=""/4096, 0x1000}, {&(0x7f00000035c0)=""/185, 0xb9}, {&(0x7f0000003680)=""/32, 0x20}, {&(0x7f00000036c0)=""/34, 0x22}], 0x4}}], 0x4, 0x1f0, &(0x7f0000003880)={r24, r25+30000000}) pipe(&(0x7f0000000240)={0xffffffffffffffff}) r28 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) splice(r27, 0x0, r28, 0x0, 0x100000000ffdc, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff}) r30 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) splice(r29, 0x0, r30, 0x0, 0x100000000ffdc, 0x0) r31 = getpid() rt_tgsigqueueinfo(r31, r31, 0x16, &(0x7f0000000000)) ptrace(0x10, r31) ptrace$getregset(0x4204, r31, 0x1, &(0x7f0000001140)={0xffffffffffffffff}) r32 = getegid() sendmsg$unix(r0, &(0x7f0000003a00)={&(0x7f0000000080)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000800)=[{&(0x7f00000001c0)="81708873074062b4eed02173047fbffec66fd6ae44cea3bad1b3288b7ee44e9436522d26b90ee0c6c2cf6fe913564aa074814ec702a35ee3a043b91672202fea72471f66e7c36f8761dde0f7ea2a42715cc7a8d6b23fef4437c6edfd10231552d5962f603765ff9477daeeb2400cafb47dabaa6e45ac6e86d378ec334c168280ea7f3e688bbe41327ceeb367", 0x8c}, {&(0x7f0000000280)="02704671f3ad0c83068aac6d8c51303a62380bd773c30e8323ef901f925f57e334aa74cf38f38564c2633562d067ff97b9830ddd5d7d241df30aa9214aaedb47aa4f350043cb005618f07fa7890743def52165c35fb883612d1849a5268edbac8e7821ff293f0f2993cb591a73b8f575d770ae03a5e15dd9ddd7a03d62fd8274274c9d13aa11d8f9ca963ea2acf2258d5e164842377125d41e33673281b38cb5e73aa22841860d899a518f715562fd7f2c88fb27bff5", 0xb6}, {&(0x7f0000000340)="9098d990b225456815a3413a51a326b474a2d7ac1cef3cfe868508af530d756f5697deb016dec0496f2963b17e4f154e071f27d2880098d894a99c8ce2620d1500d0ffa1250903dadc70a9401f1e480f21cee20fff9acc3e67d9d5c74b1695fd8ae8d685f723126884963b83f81818fcb3a0c342dbae7676f7b8e0e562e121f337fa910da6106ee01feee0ccfa5a7a65f4b89050c0af45272fc3b925ac32f49557ca15a1b6a928d5b9c15d6a3d1268468e2d5cdefce7a6580f6e0c6f763c1e394fef9b79cd85d70a9f27a7ab81127a1c7ac62c755ae4ac2820f2af0f761915875e21fb785dda677613c5793a121f8654bdf9dd6acec777", 0xf7}, {&(0x7f0000000440)="370ecdcee143b2b9400ab2f2afcc9f6dffdab0922146e3648ac1472eb2c6d99d17497bb35715859615dc2bdbee026e5d344c7df6c847237e235c946572f69c9c501dbf5f15d71d76083b29d2a10c59e3709e304146ad59b9e771c155f37621fbd691038fa6aaed01c5cd3a420b290610af88063a5accc378e5e6a80d75e8ffb4f772e8f7ac8fd6a153044e8a63f322a1272591d068f56b242ddd23289059605e576b8b3c8df653a81fcde276b2b66ea0b766312f387e41c55667d2f00c60e091352179c03558d7adc0bb36df1b51cddfa600f4dbfe826fb2bf0379653e5b187c8524d09f0684c59b11da51a28ffc5d", 0xef}, {&(0x7f0000000540)="10cc31050605ab03bc3cd089dbd72432be744d9e9e62206c457b56efca5718761df662ad9dcc2cf9ff28ca207ba313e1388a6ff9e720c78843bc56ff64ec482821747dee5327420801b839044bb094a5715215fbaf5500d7e94a4dad98c4ddd72a48f967668ecb6a38a8ff290781a266014539d646334a9a9707bd", 0x7b}, {&(0x7f00000005c0)="3528342a431a4cc4ade2bd764192af0ebf02967caab064a128fcc56856e511626576c2fe45b3affd74db05e663f89cbf2e09889fe668c66bc553e627026cc90a9e778ad34baec436b71f68afb51a904467027cc72cc367174a4e8ae45990f71c142d39", 0x63}, {&(0x7f0000000640)="f89bef9b6aac561309aec408e116ce367c00bf6613e8455d4af848807f4a05fb3c56ecd18a97cabebf1646e1ad046189cf1ca762ace4118a4a3941614526badbccfb411c53ecd3655dd7c68eb33c30b29c3846f97ed7336948224e94f4b2a6eabf1396226cf0e477f113fcbe4237fcdc0f4f9fa0e3692e4dc9c4eaa7c5f8a7d2f58dbfcf9e60f3a49ccfd2aba50b8cac20a7987e5de8759f97075c52f9228c1c3bd1f491c94ace96a632adb1db8c3fc8b162a1d8bdab79aff0e45b3df95ec4cd2f88febd62385ff281627f24d5d8d5622ab7389daea7f3bcdb0d5e5e4ace4d3f22addc87a9d99d2367", 0xe9}, {&(0x7f0000000740)="06317d39b08a04f16273d8bb2a3fcc6e3dd794f03c4cfef35b00cc5844ef8ffd25e621938a4b9f3e26cd9f79b430d456d8490b3a5aaadee28ea441a5bba264d4bc0d4058a35c23ce473d4d385e767d7711e583a34e26837953b845f21b7f5bbb227a7e92888cb677fc6f3da04403d7ba6ab2bea0645c3bc05fbc334be5cd471f34fa376c85d0eee7c4fbec4298278e0c8b743d02e1ba525bdcb3f20a24eef6a91b12", 0xa2}, {&(0x7f0000000100)="15f9054af550befbb446f0a108b829784ca198a72709f142aae994dc691c733d025a384e1f493283ee5ace25597a93f0f46aa391f7", 0x35}], 0x9, &(0x7f00000038c0)=[@rights={{0x20, 0x1, 0x1, [r0, r1, r2, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, r5, r6, r7]}}, @rights={{0x18, 0x1, 0x1, [r8, r9]}}, @rights={{0x24, 0x1, 0x1, [r0, r0, r11, r12, r13]}}, @rights={{0x18, 0x1, 0x1, [r15, r0]}}, @cred={{0x1c, 0x1, 0x2, {r16, r17, r18}}}, @rights={{0x30, 0x1, 0x1, [r0, r20, 0xffffffffffffffff, r21, r23, r26, r27, r30]}}, @cred={{0x1c, 0x1, 0x2, {r31, 0xee00, r32}}}], 0x108, 0x8000801}, 0x80) 09:40:47 executing program 0: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x7c, 0x7c, 0x2, [@array, @restrict, @ptr, @func, @int, @int, @fwd, @enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x0, 0x9}]}]}}, 0x0, 0x96}, 0x20) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000240)=ANY=[]}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x39) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) ptrace$cont(0x1f, r0, 0x5, 0x800000000000) [ 1077.579464] input: syz1 as /devices/virtual/input/input485 09:40:47 executing program 2: keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000a80)={0x0, 0xc, 0xae}, &(0x7f0000000ac0)={'enc=', 'raw', ' hash=', {'sha384-avx2\x00'}}, &(0x7f0000000b40)="058f6a5fe2db85fa52baca0c", &(0x7f0000000c00)=""/174) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') prlimit64(0x0, 0xe, &(0x7f0000000280)={0x0, 0xff}, 0x0) getpid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x62e, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1104}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x10, 0x800000000000803, 0x0) ioctl$BLKSECTGET(r0, 0x1267, &(0x7f0000000580)) sendto(r1, &(0x7f0000000000)="120000001600e70d017b00000000008e1584", 0x12, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(r0, r2, 0x0, 0x1) 09:40:47 executing program 2: keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000a80)={0x0, 0xc, 0xae}, &(0x7f0000000ac0)={'enc=', 'raw', ' hash=', {'sha384-avx2\x00'}}, &(0x7f0000000b40)="058f6a5fe2db85fa52baca0c", &(0x7f0000000c00)=""/174) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') prlimit64(0x0, 0xe, &(0x7f0000000280)={0x0, 0xff}, 0x0) getpid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x62e, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1104}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x10, 0x800000000000803, 0x0) ioctl$BLKSECTGET(r0, 0x1267, &(0x7f0000000580)) sendto(r1, &(0x7f0000000000)="120000001600e70d017b00000000008e1584", 0x12, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(r0, r2, 0x0, 0x1) 09:40:47 executing program 3: keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000a80)={0x0, 0xc, 0xae}, &(0x7f0000000ac0)={'enc=', 'raw', ' hash=', {'sha384-avx2\x00'}}, &(0x7f0000000b40)="058f6a5fe2db85fa52baca0c", &(0x7f0000000c00)=""/174) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') prlimit64(0x0, 0xe, &(0x7f0000000280)={0x0, 0xff}, 0x0) getpid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x62e, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1104}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x10, 0x800000000000803, 0x0) ioctl$BLKSECTGET(r0, 0x1267, &(0x7f0000000580)) sendto(r1, &(0x7f0000000000)="120000001600e70d017b00000000008e1584", 0x12, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(r0, r2, 0x0, 0x1) 09:40:47 executing program 2: keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000a80)={0x0, 0xc, 0xae}, &(0x7f0000000ac0)={'enc=', 'raw', ' hash=', {'sha384-avx2\x00'}}, &(0x7f0000000b40)="058f6a5fe2db85fa52baca0c", &(0x7f0000000c00)=""/174) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9}, 0x0) getpid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x62e, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1104}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x10, 0x800000000000803, 0x0) ioctl$BLKSECTGET(r0, 0x1267, &(0x7f0000000580)) sendto(r1, &(0x7f0000000000)="120000001600e70d017b00000000008e1584", 0x12, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(r0, r2, 0x0, 0x1) 09:40:47 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000]}, 0x45c) r1 = syz_open_dev$sndtimer(0x0, 0x0, 0x100) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000040)={{0x1}}) gettid() r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[@ANYBLOB="f75f9bf747594d0a1851415d989b48270bb03c9ef00b305cba0432a36b9310552b2e4de8c9de57a65146ad9194a585247c8d2a48e1311d4dd0e973234ea0a1a238326753d3da28e216683f91691b54351036cf18886cd3e555df4a1b907696264440c2e8407ed7160e8250e81157496310f16407a59d7e892d7ea55b9215d7eb723ff1b873c6af16ac27c40d2c4fe0c268984029a5c1adb5df4f4dd2"], 0xb) inotify_add_watch(r2, &(0x7f0000000180)='./file1\x00', 0x80000020) r3 = geteuid() getresgid(&(0x7f0000000140), 0x0, 0x0) fchown(r2, r3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r2) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={r1, 0x28, &(0x7f0000000240)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000002c0)={r4, 0xffffffff, 0xe6d3be648ff4b41c}, 0xc) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x3, 0x0) ioctl$UI_DEV_DESTROY(r0, 0x5502) 09:40:47 executing program 2: keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000a80)={0x0, 0xc, 0xae}, &(0x7f0000000ac0)={'enc=', 'raw', ' hash=', {'sha384-avx2\x00'}}, &(0x7f0000000b40)="058f6a5fe2db85fa52baca0c", &(0x7f0000000c00)=""/174) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9}, 0x0) getpid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x62e, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1104}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x10, 0x800000000000803, 0x0) ioctl$BLKSECTGET(r0, 0x1267, &(0x7f0000000580)) sendto(r1, &(0x7f0000000000)="120000001600e70d017b00000000008e1584", 0x12, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(r0, r2, 0x0, 0x1) 09:40:50 executing program 2: keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000a80)={0x0, 0xc, 0xae}, &(0x7f0000000ac0)={'enc=', 'raw', ' hash=', {'sha384-avx2\x00'}}, &(0x7f0000000b40)="058f6a5fe2db85fa52baca0c", &(0x7f0000000c00)=""/174) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9}, 0x0) getpid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x62e, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1104}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x10, 0x800000000000803, 0x0) ioctl$BLKSECTGET(r0, 0x1267, &(0x7f0000000580)) sendto(r1, &(0x7f0000000000)="120000001600e70d017b00000000008e1584", 0x12, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(r0, r2, 0x0, 0x1) 09:40:50 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x7c, 0x7c, 0x2, [@array, @restrict, @ptr, @func, @int, @int, @fwd, @enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x0, 0x9}]}]}}, 0x0, 0x96}, 0x20) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000240)=ANY=[@ANYBLOB="cd"], 0x1}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x39) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) ptrace$cont(0x1f, r0, 0x5, 0x800000000000) 09:40:50 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/sctp\x00') r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f0000000000)) ptrace(0x10, r1) ptrace$getregset(0x4204, r1, 0x1, &(0x7f0000001140)={0xffffffffffffffff}) mlock(&(0x7f0000feb000/0x14000)=nil, 0x14000) r2 = syz_open_procfs(r1, &(0x7f0000000180)='sta\x9f\x00') sendfile(r0, r2, 0x0, 0x1) 09:40:50 executing program 3: keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000a80)={0x0, 0xc, 0xae}, &(0x7f0000000ac0)={'enc=', 'raw', ' hash=', {'sha384-avx2\x00'}}, &(0x7f0000000b40)="058f6a5fe2db85fa52baca0c", &(0x7f0000000c00)=""/174) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xff}, 0x0) getpid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x62e, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1104}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x10, 0x800000000000803, 0x0) ioctl$BLKSECTGET(r0, 0x1267, &(0x7f0000000580)) sendto(r1, &(0x7f0000000000)="120000001600e70d017b00000000008e1584", 0x12, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(r0, r2, 0x0, 0x1) 09:40:50 executing program 1: syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)={[{@fat=@dos1xfloppy='dos1xfloppy'}], [{@dont_measure='dont_measure'}, {@mask={'mask', 0x3d, '^MAY_WRITE'}}, {@permit_directio='permit_directio'}, {@subj_type={'subj_type', 0x3d, '\x00'}}, {@pcr={'pcr', 0x3d, 0xe}}, {@audit='audit'}]}) 09:40:50 executing program 0: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x7c, 0x7c, 0x2, [@array, @restrict, @ptr, @func, @int, @int, @fwd, @enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x0, 0x9}]}]}}, 0x0, 0x96}, 0x20) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000240)=ANY=[]}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x39) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) ptrace$cont(0x1f, r0, 0x5, 0x800000000000) 09:40:50 executing program 1: openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x200002, 0x0) syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="646f733178666c6f7070792c000a0c5af2ad0eed910788a268ee81716a341b818fe265ea28aab0cfa3c14c8df912d1c085"]) setxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f00000002c0)={0x0, 0xfb, 0xdb, 0x3, 0x0, "70da0bdf1fe4f8e47841508161436589", "8fd1d7948379eda662760aaf1991b44946bd9f4f1c38a653a6c642920b818825dbdd6741fa6fc7288878ac1d019554ceed544a2433c9fe03a1b9eeb1cdbec389e9573b18ee75272a91c5b5aeaf29c76c6dbc4bb00b0e05cbba1a4c1c8723bb9f7d74e3a047bef316c65ef328a4cb915b9155e488f321a0d21fd0b3eb1390c051d898c36580c1d370414957dffed8afc50fd3fccab27ed6037ed2f9fd00404bfa6c38e26da20180666fa026b9aa8e4256954f1f5ba2f90b3ca579c93cea0a32ae8e801ecacfc4"}, 0xdb, 0x2) lsetxattr$security_smack_entry(&(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='security.SMACK64IPIN\x00', &(0x7f0000000200)='!trusted+-$\x00', 0xc, 0x3) 09:40:50 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f00000001c0)=@buf={0xe6, &(0x7f0000000040)="84065a436f61a84ec8f56d8b15403e5d6b113ad7bd7cdc23863d280358346560f7afbe2a969355a82b3d0346645664d6a4b0c95e4a41d77d8d2ce2fe8e8b1e3df0d2bcb3d0f3cf7c0c587c155e0f34c97994512361787bb91d965f986aaea0c5a6bf2c49e5a081e70c001ec7a301a434d7cd04d271ea9e5f4d79eb59efdd4090077cf95c8f30ecd0b1752193b421e5cb74ca66e6a86f9ea4527ed0f510a51e80c4fee1c0210d5d59f6bfdbf16be0eb75e5aa4f94e51ee4441c148e18eededc654ad33b6b96f5ab43e15dde3576f2bd49ab51fcfecc11cc0fd04d2bfaabcc476b28c905321924"}) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') pipe(&(0x7f0000000240)={0xffffffffffffffff}) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) splice(r2, 0x0, r3, 0x0, 0x100000000ffdc, 0x0) ioctl$EXT4_IOC_MIGRATE(r2, 0x6609) sendfile(r0, r1, 0x0, 0x1) ioctl$EXT4_IOC_MIGRATE(r0, 0x6609) 09:40:50 executing program 1: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@loopback, @in6=@ipv4={[], [], @multicast2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000000)=0xe8) syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)={[{@fat=@dos1xfloppy='dos1xfloppy'}], [{@func={'func', 0x3d, 'PATH_CHECK'}}, {@context={'context', 0x3d, 'sysadm_u'}}, {@fsuuid={'fsuuid', 0x3d, {[0x30, 0x6, 0x39, 0x0, 0x63, 0x33, 0x63, 0x66], 0x2d, [0xc2183055ff98a0e9, 0x0, 0x65], 0x2d, [0x35, 0x61, 0x35, 0x65], 0x2d, [0x61, 0x66, 0x64, 0x30], 0x2d, [0x31, 0xae514b26100147dc, 0x64, 0x34, 0x80e1e60128dbf432, 0x34, 0x36, 0x63]}}}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@permit_directio='permit_directio'}, {@euid_gt={'euid>', r0}}, {@obj_role={'obj_role', 0x3d, 'self'}}]}) 09:40:50 executing program 1: getresuid(&(0x7f0000000000)=0x0, &(0x7f0000000080), &(0x7f00000000c0)) syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={[{@fat=@dos1xfloppy='dos1xfloppy'}], [{@audit='audit'}, {@smackfsdef={'smackfsdef', 0x3d, '@%'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@fsmagic={'fsmagic', 0x3d, 0x3}}, {@uid_eq={'uid', 0x3d, r0}}]}) 09:40:50 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f0000000000)) ptrace(0x10, r1) ptrace$getregset(0x4204, r1, 0x1, &(0x7f0000001140)={0xffffffffffffffff}) r2 = syz_open_procfs(r1, &(0x7f0000000180)='stat\x00') pipe(&(0x7f0000000240)={0xffffffffffffffff}) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) splice(r3, 0x0, r4, 0x0, 0x100000000ffdc, 0x0) sendfile(r0, r2, 0x0, 0x1) getsockopt$EBT_SO_GET_INIT_ENTRIES(r0, 0x0, 0x83, &(0x7f0000000100)={'broute\x00', 0x0, 0x3, 0x0, [], 0x7, &(0x7f0000000040)=[{}, {}, {}, {}, {}, {}, {}], &(0x7f00000000c0)}, &(0x7f00000001c0)=0x78) setxattr$security_smack_entry(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)='security.SMACC64\x00', &(0x7f0000000280)='\x00', 0x1, 0x2) 09:40:50 executing program 1: syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@fat=@dos1xfloppy='dos1xfloppy'}]}) pipe(&(0x7f0000000240)={0xffffffffffffffff}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) splice(r0, 0x0, r1, 0x0, 0x100000000ffdc, 0x0) ioctl$KDSKBLED(r1, 0x4b65, 0x312543ba) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000080)='./file0\x00', 0x40, 0x3, &(0x7f0000000340)=[{&(0x7f00000001c0)="2096ae31e54a00ebdc689f33bf5463cc070e689a0c985bf49e0bc98a5114c6329a89f892d78a92cdb091682f7cd1a31951a03ce31e1b5f36d1fe5a4ebbe0f2559fc9e658a9594b748de092c7aa157245795c9f253c8223155487f66a451c25aa10fcb41b3f4c023bc7a7ed45ce44d47d152bd94c3d2274d78f716b47bae80db918d1b65fe6243ed8c1d7b6da50c3b1d97461ad8332e3e4e4daa6", 0x9a, 0xff}, {&(0x7f00000000c0)="b3533b276c14b44cce565f4eb9b2b1451b9f38a001c9ec07c0df", 0x1a, 0x10000}, {&(0x7f0000000280)="6a660ee09727699b474bbe904361c1b853caee91554dafa762c58d78ab6e792517b7437cdcb51b1526639a37f1ec3f854d440227f7ab224e5baf26333ecceebe876f306b9bef312d580cf2b5d6255b9275d67d80f9f5f53e56810e6c42b53e480bff923cc722bcf85226983fc64c12fecd2517897c723bd7c351273f31446bc0834eb742688e693d6fd4bb8af1910978fd0dc11ad9a4986a9af988388acf4036b066b656605f1475215ad4", 0xab, 0x4}], 0x1000000, &(0x7f00000003c0)={[{@shortname_win95='shortname=win95'}], [{@subj_type={'subj_type', 0x3d, 'dos1xfloppy'}}, {@obj_user={'obj_user', 0x3d, 'vmnet1security,/[wlan0'}}, {@context={'context', 0x3d, 'user_u'}}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '\\'}}, {@fsuuid={'fsuuid', 0x3d, {[0x62, 0x62, 0x0, 0x0, 0x35, 0x35, 0x66], 0x2d, [0x31, 0xf, 0x30, 0x61], 0x2d, [0x39, 0x63, 0x65, 0x37], 0x2d, [0x38, 0x38, 0x39, 0x31], 0x2d, [0x4b, 0x36, 0x36, 0x0, 0x34, 0x33, 0x38, 0x62]}}}, {@appraise='appraise'}, {@smackfsfloor={'smackfsfloor', 0x3d, 'vfat\x00'}}]}) 09:40:50 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000]}, 0x45c) r1 = syz_open_dev$sndtimer(0x0, 0x0, 0x100) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000040)={{0x1}}) gettid() r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[@ANYBLOB="f75f9bf747594d0a1851415d989b48270bb03c9ef00b305cba0432a36b9310552b2e4de8c9de57a65146ad9194a585247c8d2a48e1311d4dd0e973234ea0a1a238326753d3da28e216683f91691b54351036cf18886cd3e555df4a1b907696264440c2e8407ed7160e8250e81157496310f16407a59d7e892d7ea55b9215d7eb723ff1b873c6af16ac27c40d2c4fe0c268984029a5c1adb5df4f4dd2"], 0xb) inotify_add_watch(r2, &(0x7f0000000180)='./file1\x00', 0x80000020) r3 = geteuid() getresgid(&(0x7f0000000140), 0x0, 0x0) fchown(r2, r3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r2) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={r1, 0x28, &(0x7f0000000240)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000002c0)={r4, 0xffffffff, 0xe6d3be648ff4b41c}, 0xc) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r5 = syz_genetlink_get_family_id$nbd(&(0x7f0000000200)='nbd\x00') sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f00000008c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x5}, 0xc, &(0x7f0000000880)={&(0x7f00000003c0)={0x2c, r5, 0x400, 0x70bd27, 0x25dfdbfc, {}, [@NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0x8}, @NBD_ATTR_TIMEOUT={0xc, 0x4, 0x9}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x4c054) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x3, 0x0) ioctl$UI_DEV_DESTROY(r0, 0x5502) 09:40:50 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x100, 0x0) ioctl$PPPIOCGFLAGS1(r2, 0x8004745a, &(0x7f0000000080)) r3 = getpgid(0xffffffffffffffff) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r4, &(0x7f0000000140)=ANY=[], 0xfffffc8f) fcntl$setpipe(r4, 0x407, 0x0) perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0x8, 0x7, 0x8, 0x4506, 0x0, 0x80000001, 0x404, 0xc, 0x4, 0xd578, 0x26, 0x8100000000000000, 0x8, 0x3, 0x0, 0x4, 0x4, 0xfffffffffffffffb, 0x2, 0xfffffffffffffe01, 0x5, 0x2, 0x7d, 0x0, 0x2, 0x7, 0xff, 0x58a, 0x3, 0xffffffff80000001, 0x100, 0x0, 0x0, 0x5, 0x6, 0x4, 0x0, 0xc2, 0x1, @perf_bp={&(0x7f00000000c0), 0xf}, 0x20020, 0x0, 0x10, 0x5, 0x57a, 0x4, 0x7fffffff}, r3, 0x9, r4, 0x0) sendfile(r0, r1, 0x0, 0x1) [ 1080.898775] input: syz1 as /devices/virtual/input/input487 [ 1081.021285] input: syz1 as /devices/virtual/input/input488 09:40:53 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x7c, 0x7c, 0x2, [@array, @restrict, @ptr, @func, @int, @int, @fwd, @enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x0, 0x9}]}]}}, 0x0, 0x96}, 0x20) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000240)=ANY=[@ANYBLOB="cd"], 0x1}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x39) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) ptrace$cont(0x1f, r0, 0x5, 0x800000000000) 09:40:53 executing program 2: keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000a80)={0x0, 0xc, 0xae}, &(0x7f0000000ac0)={'enc=', 'raw', ' hash=', {'sha384-avx2\x00'}}, &(0x7f0000000b40)="058f6a5fe2db85fa52baca0c", &(0x7f0000000c00)=""/174) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xff}, 0x0) getpid() perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x10, 0x800000000000803, 0x0) ioctl$BLKSECTGET(r0, 0x1267, &(0x7f0000000580)) sendto(r1, &(0x7f0000000000)="120000001600e70d017b00000000008e1584", 0x12, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(r0, r2, 0x0, 0x1) 09:40:53 executing program 1: syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="646f00000000000003ff792c00"]) 09:40:53 executing program 0: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x7c, 0x7c, 0x2, [@array, @restrict, @ptr, @func, @int, @int, @fwd, @enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x0, 0x9}]}]}}, 0x0, 0x96}, 0x20) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000240)=ANY=[]}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x39) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) ptrace$cont(0x1f, r0, 0x5, 0x800000000000) 09:40:53 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1], [0x0, 0x0, 0x401, 0x0, 0x0, 0x2, 0x0, 0x9, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x378]}, 0x45c) r1 = syz_open_dev$sndtimer(0x0, 0x0, 0x100) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000040)={{0x1}}) gettid() r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[@ANYBLOB="f75f9bf747594d0a1851415d989b48270bb03c9ef00b305cba0432a36b9310552b2e4de8c9de57a65146ad9194a585247c8d2a48e1311d4dd0e973234ea0a1a238326753d3da28e216683f916936041c02f7c01b54351036cf18886cd3e555df4a1b907696264440c2e8407ed7160e8250e81157496310f16407a59d7e892d7ea5539215d7eb723ff1b873c6af16ac27c40d2c4fe0c268984029a5c1"], 0xb) pipe(&(0x7f0000000240)={0xffffffffffffffff}) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) splice(r3, 0x0, r4, 0x0, 0x100000000ffdc, 0x0) ioctl$TIOCMIWAIT(r4, 0x545c, 0x0) inotify_add_watch(r2, &(0x7f0000000180)='./file1\x00', 0x80000020) r5 = geteuid() getresgid(&(0x7f0000000140), 0x0, 0x0) fchown(r2, r5, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r2) readahead(r4, 0x81, 0x80000000) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={r1, 0x28, &(0x7f0000000240)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000002c0)={r6, 0xffffffff, 0xe6d3be648ff4b41c}, 0xc) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) write$uinput_user_dev(r2, &(0x7f0000000880)={'syz0\x00', {0x76, 0x4, 0x40, 0xfff}, 0x4e, [0x101, 0x7, 0x8, 0x100000001, 0x4, 0x0, 0xd, 0x1, 0x100000000, 0x1, 0x7, 0x100000, 0x20, 0x7, 0x0, 0x6, 0xfffffffffffffc00, 0x0, 0x7, 0xffffffff, 0x0, 0x105, 0x6, 0x5, 0x0, 0x8001, 0x9, 0x5d6, 0x2, 0x2, 0x9, 0x800, 0x6, 0x9, 0xffffffff, 0x3, 0xffffffffffff2ea2, 0x8, 0xad7, 0x3, 0x6, 0x7, 0x61d9, 0x8001, 0xfffffffffffff001, 0x0, 0x0, 0x5, 0x4, 0x7, 0x800, 0x8000, 0x1, 0x6, 0x1, 0x7, 0x849, 0x8, 0x0, 0x7f, 0x7, 0x9ebc, 0x6, 0xd49], [0x7f, 0x7, 0x0, 0x4, 0x7, 0x3, 0x400, 0x0, 0x80000001, 0x80000001, 0x7268, 0x8, 0xff, 0x5, 0x9, 0x4, 0x1, 0x3f, 0x5, 0x4, 0x1, 0xee15, 0x2, 0x6dc6e531, 0xfff, 0x2, 0x7, 0x8, 0x8, 0x6, 0x1, 0x726, 0x4c21, 0x1, 0x1, 0xfffffffffffffff7, 0x6, 0x100000000, 0x4534, 0x7, 0x3f, 0x791, 0x8001, 0x20, 0x0, 0x7f, 0x200, 0x8, 0x8000, 0x3, 0x200, 0x1, 0x69, 0x9, 0x2f859b9f, 0x20, 0x2, 0xc313, 0x8, 0x1, 0x8, 0x6, 0x7cf, 0x7ff], [0xfffffffffffff800, 0x200, 0x52b4, 0x18d, 0xffffffffffffff81, 0x0, 0x7f, 0x7, 0xff, 0x3fffc, 0x9, 0xfff, 0xffffffffffff0b8b, 0xc47, 0x5, 0x1ff, 0xd8, 0xce3f, 0x401, 0x9d2b, 0x4, 0x6815399b, 0x6, 0x9ba8, 0x3ff, 0x6, 0x9, 0x8, 0x7, 0x9, 0x5, 0x3, 0x7fffffff, 0x8, 0x2, 0x0, 0x1c66, 0xffffffff, 0x4, 0x4, 0x7, 0x3b4, 0x61, 0x4, 0x8b7, 0x2, 0x18, 0x8, 0xfffffffffffffffc, 0x7, 0x4, 0x7, 0x100, 0x9, 0x6, 0x10001, 0x0, 0x1f, 0x9, 0x3, 0x4, 0x7, 0x0, 0x3c8000], [0xed, 0x5, 0xfffffffffffffffe, 0x9ea, 0x1ff, 0xfffffffffffffbff, 0x7, 0x0, 0xff, 0x6, 0x0, 0x0, 0x9, 0x8, 0x3, 0x2, 0x200000000, 0x3eac, 0x42a, 0xb5cf, 0x10001, 0x80000001, 0x1ff, 0x5, 0x10001, 0x800, 0x401, 0x4, 0x1ff, 0x1, 0x274ada10, 0x8, 0x1, 0x7, 0x46f, 0x1000, 0x5, 0x2, 0xdb50, 0x6, 0x7, 0x1, 0xd1, 0x80, 0xff, 0x9c82, 0x3, 0x9, 0x7fff, 0x3, 0xfffffffffffffc00, 0x8, 0x40000000000, 0x400, 0x9, 0x1, 0x5, 0x5, 0x5, 0x8ed, 0x3f, 0x9, 0x7, 0x3]}, 0x45c) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x3, 0x0) ioctl$UI_DEV_DESTROY(r0, 0x5502) 09:40:53 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') r2 = socket$inet6_udp(0xa, 0x2, 0x0) r3 = getpid() rt_tgsigqueueinfo(r3, r3, 0x16, &(0x7f0000000000)) ptrace(0x10, r3) ptrace$getregset(0x4204, r3, 0x1, &(0x7f0000001140)={0xffffffffffffffff}) fcntl$lock(r2, 0x7, &(0x7f0000000040)={0x7, 0x1, 0x0, 0x2, r3}) sendfile(r0, r1, 0x0, 0x1) mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x102) 09:40:53 executing program 2: keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000a80)={0x0, 0xc, 0xae}, &(0x7f0000000ac0)={'enc=', 'raw', ' hash=', {'sha384-avx2\x00'}}, &(0x7f0000000b40)="058f6a5fe2db85fa52baca0c", &(0x7f0000000c00)=""/174) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xff}, 0x0) getpid() perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x10, 0x800000000000803, 0x0) ioctl$BLKSECTGET(r0, 0x1267, &(0x7f0000000580)) sendto(r1, &(0x7f0000000000)="120000001600e70d017b00000000008e1584", 0x12, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(r0, r2, 0x0, 0x1) 09:40:53 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x7c, 0x7c, 0x2, [@array, @restrict, @ptr, @func, @int, @int, @fwd, @enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x0, 0x9}]}]}}, 0x0, 0x96}, 0x20) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000240)=ANY=[@ANYBLOB="cd80"], 0x2}}, 0x0) ptrace$setopts(0xffffffffffffffff, r0, 0x0, 0x0) tkill(r0, 0x39) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) ptrace$cont(0x1f, r0, 0x5, 0x800000000000) 09:40:53 executing program 1: syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x2000, &(0x7f0000000040)) pipe(&(0x7f0000000240)={0xffffffffffffffff}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) splice(r0, 0x0, r1, 0x0, 0x100000000ffdc, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='setgroups\x00\x06\xa2\xff\xd6zS\xcf^\xd3\x89\xc9\x02\xf0\x88Tv\xc0\x06\xfa\xf6\\=q\xab\xf6\x1dH!\xd5\xd1W\x84\n\xbe\x01u\xa0\xdd\x17\x9f!\x93Z\xb8\x16\x12\xe7\x84\r\xe4\xf9\x8d\xcf3\x96 \f\xee\xeb\x81\x92\xa9$\x90\x82\xc9D\xee\xc5Yf\t\x894\xd3x\x86@\x90\x99\xa7\x88\x92\xe4\xe0v\xe2mOF\xd5\xa4e\x12\xb3>\"\x1d\xc6\xf1\xfe\x03\xc3\x04\xc2\xcf5\"mh%\x9bs\xe0\xef\xfcf\xef\xf7\x01@') writev(r2, &(0x7f00000003c0)=[{&(0x7f00000000c0)="db", 0x1}], 0x1) r3 = syz_genetlink_get_family_id$SEG6(&(0x7f00000001c0)='SEG6\x00') pipe(&(0x7f0000000200)={0xffffffffffffffff}) sendmsg$SEG6_CMD_SETHMAC(r4, &(0x7f00000002c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x1c, r3, 0x8, 0x70bd28, 0x25dfdbff, {}, [@SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x21}]}, 0x1c}, 0x1, 0x0, 0x0, 0x9981f5e18c7fe218}, 0x30001880) sendmsg$SEG6_CMD_SETHMAC(r1, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x24, r3, 0x20, 0x70bd2a, 0x25dfdbfd, {}, [@SEG6_ATTR_ALGID={0x8, 0x6, 0x7}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x7fff}]}, 0x24}, 0x1, 0x0, 0x0, 0x20091}, 0x20c0085) 09:40:53 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x7c, 0x7c, 0x2, [@array, @restrict, @ptr, @func, @int, @int, @fwd, @enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x0, 0x9}]}]}}, 0x0, 0x96}, 0x20) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000240)=ANY=[@ANYBLOB="cd80"], 0x2}}, 0x0) ptrace$setopts(0xffffffffffffffff, r0, 0x0, 0x0) tkill(r0, 0x39) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) ptrace$cont(0x1f, r0, 0x5, 0x800000000000) 09:40:53 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/stat\x00') getsockopt$IP_VS_SO_GET_VERSION(r0, 0x0, 0x480, &(0x7f0000000080), &(0x7f00000000c0)=0x40) sendfile(r0, r1, 0x0, 0x1) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xfffffc8f) fcntl$setpipe(r2, 0x407, 0x0) epoll_ctl$EPOLL_CTL_DEL(r2, 0x2, r1) ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d) 09:40:53 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x7c, 0x7c, 0x2, [@array, @restrict, @ptr, @func, @int, @int, @fwd, @enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x0, 0x9}]}]}}, 0x0, 0x96}, 0x20) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000240)=ANY=[@ANYBLOB="cd80"], 0x2}}, 0x0) ptrace$setopts(0xffffffffffffffff, r0, 0x0, 0x0) tkill(r0, 0x39) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) ptrace$cont(0x1f, r0, 0x5, 0x800000000000) 09:40:53 executing program 1: pipe(&(0x7f0000000040)={0xffffffffffffffff}) r1 = openat$selinux_access(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/access\x00', 0x2, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r1) llistxattr(&(0x7f0000000000)='./file0\x00', &(0x7f00000002c0)=""/242, 0xf2) socket$nl_netfilter(0x10, 0x3, 0xc) syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x108000, &(0x7f00000001c0)=ANY=[@ANYBLOB="0006c4ceab1bd698c0002200f59ae990234557b7bf1d8552f1e1a120115193084041fc3ef7a87dc0227dbfd640bae36d1a02e14ef791d08cd8797e9a7b0d799f2767e3e9214eccd7cfbb3ca3f6003a92bdae033007d534d0181ec16aa37e13ab1f0fb6e2698f5635a19f67853babe0f192855ffc46596b84a90a06388f3c80d8be45e2d5bb3cb77b8681cb0dd8203b4e1a046dc8eaea9fc42c8c35990463f53857ef7b86bda7b66b9294c26e70168338c4f6e6b71dd72bae33d582a85f0b9f60a1beb0e540473e3dce2c366f95fe3107b543aa4276c22e11d038a5721084609d292db5"]) 09:40:53 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x7c, 0x7c, 0x2, [@array, @restrict, @ptr, @func, @int, @int, @fwd, @enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x0, 0x9}]}]}}, 0x0, 0x96}, 0x20) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000240)=ANY=[@ANYBLOB="cd80"], 0x2}}, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(r0, 0x39) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) ptrace$cont(0x1f, r0, 0x5, 0x800000000000) 09:40:53 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x7c, 0x7c, 0x2, [@array, @restrict, @ptr, @func, @int, @int, @fwd, @enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x0, 0x9}]}]}}, 0x0, 0x96}, 0x20) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000240)=ANY=[@ANYBLOB="cd80"], 0x2}}, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(r0, 0x39) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) ptrace$cont(0x1f, r0, 0x5, 0x800000000000) 09:40:56 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3]}, 0x45c) r1 = syz_open_dev$sndtimer(0x0, 0x0, 0x100) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000040)={{0x1}}) gettid() r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[@ANYBLOB="f75f9bf747594d0a1851415d989b48270bb03c9ef00b305cba0432a36b9310552b2e4de8c9de57a65146ad9194a585247c8d2a48e1311d4dd0e973234ea0a1a238326753d3da28e216683f91691b54351036cf18886cd3e555df4a1b907696264440c2e8407ed7160e8250e81157496310f16407a59d7e892d7ea55b9215d7eb723ff1b873c6af16ac27c40d2c4fe0c268984029a5c1adb5df4f4dd2"], 0xb) r3 = geteuid() getresgid(&(0x7f0000000140), 0x0, 0x0) fchown(r2, r3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r2) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={r1, 0x28, &(0x7f0000000240)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000002c0)={r4, 0xffffffff, 0xe6d3be648ff4b41c}, 0xc) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x3, 0x0) ioctl$UI_DEV_DESTROY(r0, 0x5502) 09:40:56 executing program 0: keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000a80)={0x0, 0xc, 0xfffffffffffffe10}, &(0x7f0000000ac0)={'^1^\a', 'raw', ' hash=', {'sha384-avx2\x00'}}, &(0x7f0000000080)="058f6a5fe2db85fa52baca0c", &(0x7f00000000c0)=""/174) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xff}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(r0, r2, 0x0, 0x1) 09:40:56 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') r1 = socket$netlink(0x10, 0x3, 0x18) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_STATS(r1, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400400}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x1c, r2, 0x410, 0x70bd26, 0x25dfdbff, {}, ["", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x8fd6769557eb7f88}, 0x8000) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f00000001c0)=0x0) r4 = syz_open_procfs(r3, &(0x7f0000000180)='stat\x00') sendfile(r0, r4, 0x0, 0x1) 09:40:56 executing program 1: syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@fat=@dos1xfloppy='dos1xfloppy'}]}) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') sendmsg$TIPC_CMD_GET_NETID(r1, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x1c, r2, 0x200, 0x70bd25, 0x25dfdbfe, {}, ["", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x80}, 0x800) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r3, &(0x7f0000000140)=ANY=[], 0xfffffc8f) fcntl$setpipe(r3, 0x407, 0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000880)=ANY=[@ANYRES16=r2, @ANYRESHEX=r1, @ANYRESDEC=r2, @ANYRES64=r1, @ANYBLOB=',\aQ', @ANYRESDEC=r2, @ANYPTR=&(0x7f0000000900)=ANY=[@ANYPTR=&(0x7f0000000200)=ANY=[@ANYRESOCT=r3], @ANYRES16, @ANYBLOB="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"]], 0x4f) sendmsg$TIPC_CMD_GET_NETID(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1440301}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x1c, r2, 0x500, 0x70bd25, 0x25dfdbfc, {}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x1}, 0x40080) 09:40:56 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x7c, 0x7c, 0x2, [@array, @restrict, @ptr, @func, @int, @int, @fwd, @enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x0, 0x9}]}]}}, 0x0, 0x96}, 0x20) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000240)=ANY=[@ANYBLOB="cd80"], 0x2}}, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(r0, 0x39) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) ptrace$cont(0x1f, r0, 0x5, 0x800000000000) 09:40:56 executing program 2: keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000a80)={0x0, 0xc, 0xae}, &(0x7f0000000ac0)={'enc=', 'raw', ' hash=', {'sha384-avx2\x00'}}, &(0x7f0000000b40)="058f6a5fe2db85fa52baca0c", &(0x7f0000000c00)=""/174) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xff}, 0x0) getpid() perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x10, 0x800000000000803, 0x0) ioctl$BLKSECTGET(r0, 0x1267, &(0x7f0000000580)) sendto(r1, &(0x7f0000000000)="120000001600e70d017b00000000008e1584", 0x12, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(r0, r2, 0x0, 0x1) 09:40:56 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x7c, 0x7c, 0x2, [@array, @restrict, @ptr, @func, @int, @int, @fwd, @enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x0, 0x9}]}]}}, 0x0, 0x96}, 0x20) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000240)=ANY=[@ANYBLOB="cd80"], 0x2}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(0x0, 0x39) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) ptrace$cont(0x1f, r0, 0x5, 0x800000000000) 09:40:56 executing program 0: keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000a80)={0x0, 0xc, 0xae}, &(0x7f0000000ac0)={'enc=', 'raw', ' hash=', {'sha384-avx2\x00'}}, &(0x7f0000000b40)="058f6a5fe2db85fa52baca0c", &(0x7f0000000c00)=""/174) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xff}, 0x0) r1 = getpid() pipe(&(0x7f0000000240)={0xffffffffffffffff}) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) splice(r2, 0x0, r3, 0x0, 0x100000000ffdc, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff}) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) splice(r4, 0x0, r5, 0x0, 0x100000000ffdc, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r5, 0x0, 0x41, &(0x7f00000001c0)={'nat\x00', 0x5, [{}, {}, {}, {}, {}]}, 0x78) ioctl$EVIOCGRAB(r2, 0x40044590, &(0x7f00000000c0)=0x3) pipe(&(0x7f0000000240)={0xffffffffffffffff}) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) splice(r6, 0x0, r7, 0x0, 0x100000000ffdc, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(r7, 0x891c, &(0x7f0000000100)={'ip_vti0\x00', {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x21}}}) sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r8 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(r0, r8, 0x0, 0x1) r9 = socket$inet(0x2, 0x100002, 0xffffffffffffff01) setsockopt$inet_mreqsrc(r9, 0x0, 0x0, &(0x7f0000000080)={@remote, @local, @dev={0xac, 0x14, 0x14, 0x1c}}, 0xc) 09:40:56 executing program 4: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') r0 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') pipe(&(0x7f0000000240)={0xffffffffffffffff}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = getpid() ptrace$getenv(0x4201, r3, 0xcbb8, &(0x7f0000000040)) splice(r1, 0x0, r2, 0x0, 0x100000000ffdc, 0x0) sendfile(r0, r2, 0x0, 0x1) 09:40:56 executing program 0: r0 = request_key(&(0x7f0000000540)='rxrpc\x00', &(0x7f0000000580)={'syz', 0x3}, &(0x7f00000005c0)='memory.events\x00', 0xfffffffffffffffc) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000680)={r0, 0xc, 0x6bc98215e5ffc8da}, &(0x7f0000000740)=ANY=[], &(0x7f0000000640)="040000000000000052baca0c", &(0x7f0000000480)=""/174) r1 = creat(&(0x7f00000003c0)='./file0\x00', 0x80) ioctl$RTC_WKALM_RD(r1, 0x80287010, &(0x7f0000000440)) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xff}, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x1, 0x0, 0x101, 0xeab6}, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') pipe(&(0x7f0000000240)={0xffffffffffffffff}) splice(r5, 0x0, 0xffffffffffffffff, 0x0, 0x100000000ffdc, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff}) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) splice(r6, 0x0, r7, 0x0, 0x100000000ffdc, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r6, 0x29, 0x22, &(0x7f00000002c0)={{{@in=@remote, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@mcast2}}, &(0x7f0000000400)=0xe8) ioprio_get$uid(0x0, r8) accept4$packet(0xffffffffffffffff, &(0x7f00000001c0), &(0x7f0000000200)=0x14, 0x800) sendfile(r2, r4, 0x0, 0x1) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r9, &(0x7f0000000140)=ANY=[], 0xfffffc8f) fcntl$setpipe(r9, 0x407, 0x0) fsetxattr$trusted_overlay_opaque(r9, &(0x7f0000000100)='trusted.overlay.opaque\x00', &(0x7f0000000140)='y\x00', 0x2, 0x2) [ 1086.824198] input: syz1 as /devices/virtual/input/input490 09:40:56 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000]}, 0x45c) r1 = syz_open_dev$sndtimer(0x0, 0x0, 0x100) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000040)={{0x1}}) gettid() r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], 0xb) inotify_add_watch(r2, &(0x7f0000000180)='./file1\x00', 0x80000020) r3 = geteuid() getresgid(&(0x7f0000000140), 0x0, 0x0) fchown(r2, r3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r2) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={r1, 0x28, &(0x7f0000000240)={0x0, 0x0}}, 0x10) r5 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000002c0)={r4, 0xffffffff, 0xe6d3be648ff4b41c}, 0xc) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x3, 0x0) ioctl$UI_DEV_DESTROY(r0, 0x5502) r6 = geteuid() setreuid(0x0, r6) r7 = getegid() setresgid(r7, 0x0, 0x0) write$P9_RGETATTR(r5, &(0x7f0000000300)={0xa0, 0x19, 0x2, {0x88, {0x64, 0x1, 0x6}, 0x10, r6, r7, 0x55e, 0x0, 0x35, 0xff5, 0x7f, 0x6, 0x1, 0x8, 0x80, 0x5, 0x4, 0x7, 0x3, 0xfff, 0x677}}, 0xa0) 09:40:56 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='$lea\x00\x00ref\x1e\xdf2r\a\x1d\x97\x1d\xfa\xa7\xec\x1e81<\xefF\xd1\xc0\xb0\xc7w\x06d\xa1T(l\xcc\x85g\xe99p\xf9\xace\xff\x980K\xc2\xf1\xc2da\x9c\x1d\\\xee\x19\t\xa5\xa6\x0f\x1e\x1d\x1d\xe1\t\xbe\x98i\xc1\xebS\xa4\xbf\x03\xa1\xd2\xb5\xaei\xe6U\xcer@\xff\xfe\x15!%z/\xf4|\xe6\xb8 \x82%\xbcO}\x01X\xb8\"K\xdb\xac\x1e9S\xa5\xf9\xa9\xb3\xcb\xe6\xa5\xce\x18\xae\xd0WJ\x9a\xee\x18\xb7\xe0\n\xa8\x979Lk;\x13(\x98\xddP\xbc\x0fx\xf9\xcaV\x91J\xb8\x98 \xee\xe18\a\x1d\x00[\xc2\xf3\x87\\^\xddq)e\x19\xd5\xea|\x96\x9a>\x03\xbb0\x98l\xeb\x8b\xa2Cl\xf0\xcffX\x05\xede)\xb6\x03\xca@6\xf6D\x8f\t~\x03LFm\x8e\xe4\x98,vS\x06F\xe7\x8d\xc7\xb3\xe38\xf4\xa5)\x92\xdb\xd2\x86im}d\x1c\x88zQ\xdf\xbf\xa1\x81N\x00\x00\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(r0, r1, 0x0, 0x1) 09:40:56 executing program 2: keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000a80)={0x0, 0xc, 0xae}, &(0x7f0000000ac0)={'enc=', 'raw', ' hash=', {'sha384-avx2\x00'}}, &(0x7f0000000b40)="058f6a5fe2db85fa52baca0c", &(0x7f0000000c00)=""/174) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xff}, 0x0) getpid() perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x62e, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1104}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x10, 0x800000000000803, 0x0) ioctl$BLKSECTGET(r0, 0x1267, &(0x7f0000000580)) sendto(r1, &(0x7f0000000000)="120000001600e70d017b00000000008e1584", 0x12, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(r0, r2, 0x0, 0x1) 09:40:56 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(r0, r1, 0x0, 0x1) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xfffffc8f) fcntl$setpipe(r2, 0x407, 0x0) accept$inet(r2, 0x0, &(0x7f0000000040)) 09:40:57 executing program 2: keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000a80)={0x0, 0xc, 0xae}, &(0x7f0000000ac0)={'enc=', 'raw', ' hash=', {'sha384-avx2\x00'}}, &(0x7f0000000b40)="058f6a5fe2db85fa52baca0c", &(0x7f0000000c00)=""/174) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xff}, 0x0) getpid() perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x62e, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1104}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x10, 0x800000000000803, 0x0) ioctl$BLKSECTGET(r0, 0x1267, &(0x7f0000000580)) sendto(r1, &(0x7f0000000000)="120000001600e70d017b00000000008e1584", 0x12, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(r0, r2, 0x0, 0x1) [ 1087.038372] input: syz1 as /devices/virtual/input/input491 09:40:57 executing program 1: syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@fat=@dos1xfloppy='dos1xfloppy'}]}) open(&(0x7f0000000000)='./file0\x00', 0x82002, 0x160) open(&(0x7f0000000080)='./file1\x00', 0x400000, 0x224) 09:40:57 executing program 2: keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000a80)={0x0, 0xc, 0xae}, &(0x7f0000000ac0)={'enc=', 'raw', ' hash=', {'sha384-avx2\x00'}}, &(0x7f0000000b40)="058f6a5fe2db85fa52baca0c", &(0x7f0000000c00)=""/174) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xff}, 0x0) getpid() perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x62e, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1104}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x10, 0x800000000000803, 0x0) ioctl$BLKSECTGET(r0, 0x1267, &(0x7f0000000580)) sendto(r1, &(0x7f0000000000)="120000001600e70d017b00000000008e1584", 0x12, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(r0, r2, 0x0, 0x1) 09:40:57 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000]}, 0x45c) r1 = syz_open_dev$sndtimer(0x0, 0x0, 0x100) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000040)={{0x1}}) gettid() r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[@ANYBLOB="f75f9bf747594d0a1851415d989b48270bb03c9ef00b305cba0432a36b9310552b2e4de8c9de57a65146ad9194a585247c8d2a48e1311d4dd0e973234ea0a1a238326753d3da28e216683f91691b54351036cf18886cd3e555df4a1b907696264440c2e8407ed7160e8250e81157496310f16407a59d7e892d7ea55b9215d7eb723ff1b873c6af16ac27c40d2c4fe0c268984029a5c1adb5df4f4dd2"], 0xb) inotify_add_watch(r2, &(0x7f0000000180)='./file1\x00', 0x80000020) r3 = geteuid() getresgid(&(0x7f0000000140), 0x0, 0x0) fchown(r2, r3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r2) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={r1, 0x28, &(0x7f0000000240)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000002c0)={r4, 0xffffffff, 0xe6d3be648ff4b41c}, 0xc) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) socket$inet_udp(0x2, 0x2, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x3, 0x0) ioctl$UI_DEV_DESTROY(r0, 0x5502) [ 1087.599176] input: syz1 as /devices/virtual/input/input493 [ 1087.732974] input: syz1 as /devices/virtual/input/input494 09:40:59 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x7c, 0x7c, 0x2, [@array, @restrict, @ptr, @func, @int, @int, @fwd, @enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x0, 0x9}]}]}}, 0x0, 0x96}, 0x20) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000240)=ANY=[@ANYBLOB="cd80"], 0x2}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(0x0, 0x39) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) ptrace$cont(0x1f, r0, 0x5, 0x800000000000) 09:40:59 executing program 1: syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@shortname_mixed='shortname=mixed'}]}) r0 = socket$key(0xf, 0x3, 0x2) sendfile(r0, r0, &(0x7f0000000200), 0x1) sendmsg(r0, &(0x7f00000001c0)={&(0x7f0000000040)=@ax25={{0x3, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x6}, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}, 0x80, &(0x7f0000000100)=[{&(0x7f00000000c0)="f4aee09b9db7b8fa1f03c90b9fe3239eeaa780bd5efdf6", 0x17}], 0x1}, 0x80) 09:40:59 executing program 2: keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000a80)={0x0, 0xc, 0xae}, &(0x7f0000000ac0)={'enc=', 'raw', ' hash=', {'sha384-avx2\x00'}}, &(0x7f0000000b40)="058f6a5fe2db85fa52baca0c", &(0x7f0000000c00)=""/174) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xff}, 0x0) getpid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x62e, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1104}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x10, 0x800000000000803, 0x0) ioctl$BLKSECTGET(r0, 0x1267, &(0x7f0000000580)) sendto(r1, &(0x7f0000000000)="120000001600e70d017b00000000008e1584", 0x12, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(r0, r2, 0x0, 0x1) 09:40:59 executing program 0: keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000a80)={0x0, 0xc, 0xae}, &(0x7f0000000ac0)={'enc=', 'raw', ' hash=', {'sha384-avx2\x00'}}, &(0x7f0000000b40)="058f6a5fe2db85fa52baca0c", &(0x7f0000000c00)=""/174) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xff}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') ioctl$RTC_IRQP_SET(r0, 0x4008700c, 0xbf7) sendfile(r0, r2, 0x0, 0x1) 09:40:59 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') fcntl$getown(r0, 0x9) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xfffffc8f) fcntl$setpipe(r2, 0x407, 0x0) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f0000000080)) r3 = getpid() rt_tgsigqueueinfo(r3, r3, 0x16, &(0x7f0000000000)) ptrace(0x10, r3) getsockopt$SO_COOKIE(r1, 0x1, 0x39, &(0x7f00000000c0), &(0x7f0000000100)=0x8) ptrace$getregset(0x4204, r3, 0x1, &(0x7f0000001140)={0xffffffffffffffff}) r4 = syz_open_procfs(r3, &(0x7f0000000040)='stat\x00') sendfile(r0, r4, 0x0, 0x1) 09:40:59 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000]}, 0x45c) r1 = syz_open_dev$sndtimer(0x0, 0x0, 0x100) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000040)={{0x1}}) gettid() r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[@ANYBLOB="f75f9bf747594d0a1851415d989b48270bb03c9ef00b305cba0432a36b9310552b2e4de8c9de57a65146ad9194a585247c8d2a48e1311d4dd0e973234ea0a1a238326753d3da28e216683f91691b54351036cf18886cd3e555df4a1b907696264440c2e8407ed7160e8250e81157496310f16407a59d7e892d7ea55b9215d7eb723ff1b873c6af16ac27c40d2c4fe0c268984029a5c1adb5df4f4dd2"], 0xb) inotify_add_watch(r2, &(0x7f0000000180)='./file1\x00', 0x80000020) r3 = geteuid() getresgid(&(0x7f0000000140), 0x0, 0x0) fchown(r2, r3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r2) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={r1, 0x28, &(0x7f0000000240)}, 0x10) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x3, 0x0) ioctl$UI_DEV_DESTROY(r0, 0x5502) 09:40:59 executing program 0: keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000a80)={0x0, 0xc, 0xae}, &(0x7f00000002c0)=ANY=[@ANYBLOB="656e633d72617720686173683d7368613338342d61767832000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e90072aff5914011ef6093e24edac945d8a576cdc2b4aea3be25ff139eef7012307ddd3d0cb16c1f7b474631420720bc04fc1364e9fadbec9316d72e8ebf2af3d15a46d408375a12eb7f2f36ae340bf41d25172fe68290d101a95b71b5aa57e9204bd36404a95ee50a12de4959c667b8a4b273344d93f339ce187c0805f69f0581380cca0a49fb6827d32af33bb34fe5f2d3dd8718dbcf6c25e6d90bc86acf2e8080c610f6ff93e7896ad50b172882319f180f1677d241b88576545e27956846d2b0c53d4f492b23e07bc1cbc938"], &(0x7f0000000b40)="058f6a5fe2db85fa52baca0c", &(0x7f0000000c00)=""/174) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xff}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(r0, r2, 0x0, 0x1) r3 = add_key$keyring(&(0x7f0000000200)='keyring\x00', &(0x7f0000000240)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) pipe(&(0x7f0000000240)={0xffffffffffffffff}) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) splice(r4, 0x0, r5, 0x0, 0x100000000ffdc, 0x0) ioctl$EVIOCGNAME(r5, 0x80404506, &(0x7f0000000500)=""/114) keyctl$restrict_keyring(0x1d, r3, &(0x7f0000000000)='keyring\x00', &(0x7f0000000040)='/\x00') keyctl$set_timeout(0xf, r3, 0x0) r6 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, r3) open(&(0x7f0000000140)='./file0\x00', 0x201002, 0x187) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000100)={r6, 0x57, 0xff}, 0x0, &(0x7f00000001c0)="70aa4fb4f2af30d8b897be21e67e8ec5b1b0468613e26f5daf5c15cf9ec04544251d50c489ecb97a0b592c73ac69bdeec110938ea0ee087af9942a84c2242767c78a4e1651a78c356348d2cbeced31a8ce9189a4753b43", &(0x7f0000000400)=""/255) 09:40:59 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x7c, 0x7c, 0x2, [@array, @restrict, @ptr, @func, @int, @int, @fwd, @enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x0, 0x9}]}]}}, 0x0, 0x96}, 0x20) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000240)=ANY=[@ANYBLOB="cd80"], 0x2}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(0x0, 0x39) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) ptrace$cont(0x1f, r0, 0x5, 0x800000000000) 09:40:59 executing program 0: keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000a80)={0x0, 0xc, 0xae}, &(0x7f0000000ac0)={'enc=', 'raw', ' hash=', {'sha384-avx2\x00'}}, &(0x7f0000000b40)="058f6a5fe2db85fa52baca0c", &(0x7f0000000c00)=""/174) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xff}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) init_module(&(0x7f0000000240)='posix_acl_accesscgroup+:%security\x00', 0x22, &(0x7f00000002c0)='GPL%\x00') close(r3) io_setup(0x3, &(0x7f00000001c0)=0x0) io_submit(r4, 0xff3b, 0x0) io_submit(r4, 0x1e09328e, &(0x7f0000000040)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1000800000000001, 0x0, r3, 0x0, 0x12f}]) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) close(r5) io_setup(0x3, &(0x7f00000001c0)=0x0) io_submit(r6, 0xff3b, 0x0) io_submit(r6, 0x1e09328e, &(0x7f0000000040)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1000800000000001, 0x0, r5, 0x0, 0x12f}]) io_setup(0x1000, &(0x7f0000000340)=0x0) io_getevents(r7, 0x1, 0x5, &(0x7f0000000080)=[{}, {}, {}, {}, {}], &(0x7f0000000140)={0x77359400}) sendfile(r0, r2, 0x0, 0x1) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0x7, &(0x7f0000000300)={0x12428f71, 0x8, 0x7, 0xfff}, 0x10) 09:40:59 executing program 1: syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x2e2, 0x0, 0x0, &(0x7f0000000000)={[{@fat=@sys_immutable='sys_immutable'}]}) 09:40:59 executing program 2: keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000a80)={0x0, 0xc, 0xae}, &(0x7f0000000ac0)={'enc=', 'raw', ' hash=', {'sha384-avx2\x00'}}, &(0x7f0000000b40)="058f6a5fe2db85fa52baca0c", &(0x7f0000000c00)=""/174) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xff}, 0x0) getpid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x62e, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1104}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x10, 0x800000000000803, 0x0) ioctl$BLKSECTGET(r0, 0x1267, &(0x7f0000000580)) sendto(r1, &(0x7f0000000000)="120000001600e70d017b00000000008e1584", 0x12, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(r0, r2, 0x0, 0x1) 09:40:59 executing program 1: syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="b90ff322e572da2ce5496ab1476a8560c854f8e7dcc6737ce962c6e4a87ac5b0861d740c77a5a20c0ecd199a512d252036fde9d404d764ac59a153c6aa61fb256661ae54647b5ca9d78b931ec39854ffde63a28142480200000072ac294216646913db57255824b9fbe170cb4d"]) r0 = creat(&(0x7f0000000000)='./file0\x00', 0xa0) setsockopt$inet_tcp_TLS_RX(r0, 0x6, 0x2, &(0x7f0000000040)=@gcm_128={{0x304}, "3a3b075bcdea3966", "7613cc99a9adbab64eb0ba4c15f2f842", "bea887fc", "e3ca551d84b10f55"}, 0x28) 09:40:59 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f0000000000)) ptrace(0x10, r0) ptrace$getregset(0x4204, r0, 0x1, &(0x7f0000001140)={0xffffffffffffffff}) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfffffc8f) fcntl$setpipe(r1, 0x407, 0x0) r2 = perf_event_open(&(0x7f0000000300)={0x4, 0x70, 0xdc, 0x3, 0x6, 0x0, 0x0, 0x401, 0x8000, 0xa, 0x6, 0x4e, 0x4, 0x6c3d, 0x7, 0x7fffffff, 0x3, 0x0, 0x3, 0x1929, 0x8, 0x2b, 0x4, 0x1, 0x0, 0x3b56, 0x9, 0x6, 0xdf3, 0x101, 0x0, 0x0, 0x2, 0x1, 0x7ff, 0xac2, 0x6fc, 0x1f, 0x0, 0x6, 0x2, @perf_config_ext={0x7, 0x3}, 0x20000, 0x8, 0x8001, 0xe, 0x1, 0x5bb566ed, 0x4}, r0, 0xd, r1, 0x2) ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r3 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet6_int(r3, 0x29, 0x4d, &(0x7f0000b67000), &(0x7f0000000000)=0xfffffffffffffff5) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r4, &(0x7f0000000140)=ANY=[], 0xfffffc8f) fcntl$setpipe(r4, 0x407, 0x0) ioctl$FIBMAP(r4, 0x1, &(0x7f0000000100)=0x7) syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="646f792c00ce64b8958746eec8ffc0a487d15a170059b2536a8b43a06c7dfc6d878d7ca645dc60c2ac0ac4351f027ed26943ffa10ba4788b48a5ea0399cf56690628a265464937291941693b32e57571bfd3e5ff21e37c7b61fcdc588231f7cacf5f3c14"]) pipe(&(0x7f0000000380)={0xffffffffffffffff}) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x400) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/loop-control\x00', 0x80000, 0x0) splice(r5, 0x0, r6, 0x0, 0x100000000ffdc, 0x0) accept4$unix(r5, &(0x7f0000000080), &(0x7f0000000000)=0x6e, 0x1000) 09:41:00 executing program 2: keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000a80)={0x0, 0xc, 0xae}, &(0x7f0000000ac0)={'enc=', 'raw', ' hash=', {'sha384-avx2\x00'}}, &(0x7f0000000b40)="058f6a5fe2db85fa52baca0c", &(0x7f0000000c00)=""/174) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xff}, 0x0) getpid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x62e, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1104}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x10, 0x800000000000803, 0x0) ioctl$BLKSECTGET(r0, 0x1267, &(0x7f0000000580)) sendto(r1, &(0x7f0000000000)="120000001600e70d017b00000000008e1584", 0x12, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(r0, r2, 0x0, 0x1) [ 1089.958934] input: syz1 as /devices/virtual/input/input495 09:41:00 executing program 2: keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000a80)={0x0, 0xc, 0xae}, &(0x7f0000000ac0)={'enc=', 'raw', ' hash=', {'sha384-avx2\x00'}}, &(0x7f0000000b40)="058f6a5fe2db85fa52baca0c", &(0x7f0000000c00)=""/174) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xff}, 0x0) getpid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x62e, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1104}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x10, 0x800000000000803, 0x0) ioctl$BLKSECTGET(r0, 0x1267, &(0x7f0000000580)) sendto(r1, &(0x7f0000000000)="120000001600e70d017b00000000008e1584", 0x12, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(r0, r2, 0x0, 0x1) [ 1090.023424] input: syz1 as /devices/virtual/input/input496 09:41:00 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000]}, 0x45c) r1 = syz_open_dev$sndtimer(0x0, 0x0, 0x100) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000040)={{0x1}}) gettid() r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x1) clock_gettime(0x0, &(0x7f0000000200)={0x0, 0x0}) utimensat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', &(0x7f00000003c0)={{0x77359400}, {r3, r4/1000+30000}}, 0x100) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[@ANYBLOB="f75f9bf747594d0a1851415d989b48270bb03c9ef00b305cba0432a36b9310552b2e4de8c9de57a65146ad9194a585247c8d2a48e1311d4dd0e973234ea0a1a238326753d3da28e216683f91691b54351036cf18886cd3e555df4a1b907696264440c2e8407ed7160e8250e81157496310f16407a59d7e892d7ea55b9215d7eb723ff1b873c6af16ac27c40d2c4fe0c268984029a5c1adb5df4f4dd2"], 0xb) inotify_add_watch(r2, &(0x7f0000000180)='./file1\x00', 0x80000020) r5 = geteuid() getresgid(&(0x7f0000000140), 0x0, 0x0) fchown(r2, r5, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r2) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000880)={r1, 0xfc38, &(0x7f0000000240)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000002c0)={r6, 0xffffffff, 0xe6d3be648ff4b41c}, 0xc) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x3, 0x0) ioctl$UI_DEV_DESTROY(r0, 0x5502) [ 1090.165109] input: syz1 as /devices/virtual/input/input497 09:41:00 executing program 2: keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000a80)={0x0, 0xc, 0xae}, &(0x7f0000000ac0)={'enc=', 'raw', ' hash=', {'sha384-avx2\x00'}}, &(0x7f0000000b40)="058f6a5fe2db85fa52baca0c", &(0x7f0000000c00)=""/174) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xff}, 0x0) getpid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x62e, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1104}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x10, 0x800000000000803, 0x0) ioctl$BLKSECTGET(r0, 0x1267, &(0x7f0000000580)) sendto(r1, &(0x7f0000000000)="120000001600e70d017b00000000008e1584", 0x12, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(r0, r2, 0x0, 0x1) 09:41:00 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000]}, 0x45c) r1 = syz_open_dev$sndtimer(0x0, 0x0, 0x100) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000040)={{0x1}}) gettid() r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[@ANYBLOB="f75f9bf747594d0a1851415d989b48270bb03c9ef00b305cba0432a36b9310552b2e4de8c9de57a65146ad9194a585247c8d2a48e1311d4dd0e973234ea0a1a238326753d3da28e216683f91691b54351036cf18886cd3e555df4a1b907696264440c2e8407ed7160e8250e81157496310f16407a59d7e892d7ea55b9215d7eb723ff1b873c6af16ac27c40d2c4fe0c268984029a5c1adb5df4f4dd2"], 0xb) inotify_add_watch(r2, &(0x7f0000000180)='./file1\x00', 0x80000020) r3 = geteuid() getresgid(&(0x7f0000000140), 0x0, 0x0) fchown(r2, r3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r2) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={r1, 0x28, &(0x7f0000000240)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000002c0)={r4, 0xffffffff, 0xe6d3be648ff4b41c}, 0xc) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff}) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) splice(r5, 0x0, r6, 0x0, 0x100000000ffdc, 0x0) getpeername$unix(r6, &(0x7f00000001c0)=@abs, &(0x7f00000003c0)=0x6e) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x3, 0x0) ioctl$UI_DEV_DESTROY(r0, 0x5502) 09:41:00 executing program 4: r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/enforce\x00', 0x3e1ca730f52abd7e, 0x0) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x61, &(0x7f0000000080)={'filter\x00', 0x4}, 0x68) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') r2 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(r1, r2, 0x0, 0x1) writev(r1, &(0x7f0000000880)=[{&(0x7f00000001c0)="39b6dd7d2f81cab74c7134d1e0860788653ddb1954fcbb79a78c8b39ef68d94f7585fa3c0c385cf02f524d481f5d03b8a80ed11d84cb7a19d7709e610c923b2b47d26e77b38f8dfbb74d157aded1f0a98bf236e9999b8da648064c6534f2abf946f2aeb2ce80c17c4d2c8eccfc52fd4049dbf602f83ac39a74964ef8c6b56547e2d43886b7e66fa77703f1adf74e5e78140b324a7583321e199cb5cbe731d89d5d800c785ec2bc893385c70cd3004fb64ab38f2dc6648c60902559ceefb086d8294c460b419060b1d2", 0xc9}, {&(0x7f00000002c0)="f7a884b8a9ceb868b0b9bf2cd1ddbee20c00252135c58ea52c84becdfcb3e00d7ad8daf9c3e686321b6ac5351dbd62b64d0289ad0926b6f67dc5088f01de2eda91f1c35d7f78cf407113a078c20e35fe3f46d704b396d8a77208442a", 0x5c}, {&(0x7f0000000340)="4ababbc9a4ab5155c454a007838cfd0b1510515240dbeb11aab83fd5ce30fb26eb36ddf70858da06d3f997a962bfba341e81c3dcdadc658caa61697953db7d54043f1842774a9e4a36657851eaf12b3e18e6706b1d1ea429bfe612cd1b0f2408318e21d321488cac0059d0ff07e42a7460b532b1ee09537f1508e3343a548855deb3f2fc3dd9f182", 0x88}, {&(0x7f0000000400)="84f7173ea54cf53fdf02f4f5b19ee369afa4d46147f3800d3022c77179f5b7bbfd712f9f21cc4f8c270b3dacc7c306bf25327ab3b9b7137941ce95a89c434de2d2046a731c8331deb84c2c8f2d685a54d939b6ef102dbc788d2e6d96a767c456153f9cceef404b366d1065df2e8d2a5156bfd92371182336ad72169339ab624e331bb9adf8c1ec1eb3ae47d5ede24b3bef70832e97312d866252b84a45d7b98d9a008f5898a113f7a730be36573654c34ff5d3f38b14a4884c4118b77ee0a61de321e066b6446c1868b8fc45da576ec269813c3e745d75ea28132cefc1ad8a602ca58cad8514c4c94c1bf4b704608fe7ccb755f9", 0xf4}, {&(0x7f0000000500)="a5db3de13f3d18b095897c40a1ee8ad15eeb422f88a3519b3d71d224a50aa19ff28028deebf7aad8a604243a225a0da8e6", 0x31}, {&(0x7f0000000540)="00f830dc26627475204d181bae043c1670f63c4738de3ecf2f7fa1e8ec179f4ea221fa060a6b0589327fef8381940200bbbcf4cde7b4695f10be00de4250b77ab4a2e8f72408e70e762ae7e8cfef16de1e47df46e97e279c98057d194858e237a4386530201c2fcf99ba729ac6177694ce07094d10700d2de5e4e434b6346c786f40c29cc11d9cdebd332a92d65527a98e76c94af43b120309f2cb5b7c8dffd7f15ff1e8ea47c64f69b170ff36bd1409520a2ff77645f67e485484aec82a04ff3e997aed602f5ca0b398bcf2bbd1a5f6fb8bfdf838498b71891727160e80b8a26ee99e822ae865f994a52da313d636e079be09caec28", 0xf6}, {&(0x7f0000000640)="bef1110a109ecd07abdebca6c213484253e92e7c079da0a3005101db2e469fe981024bcd9d0d909585fe1f7b7232c7240d3294e429f090d1bd9eef8a0183432f7f742f638489f7b2599f5e7c8b88cba6033f0d0f641729f3a959a3f595378730427a", 0x62}, {&(0x7f00000006c0)="2cc2a6e14e9e6b1cf8db564f19f75a16ed8bd3e88548022487a2eb1dec5152134405c236625d264a27fc3e13a05dc1e4a1031fd60419b200b96acefe7e60ffe7bb06d81ba11ba0b415357521150209eea392119dc13f1c060074482a9d8eb2e505eaf634566be7e7c925167a820b101ae34e451553078860beb53854abb499ec8fdb4d31e0c0472d1d7ffd9ebcaf624f996f204f8fbb654bc9cbafd812450ccbd27cbbd02dcc336d65a172bf34db3a1e3c8e8eb5353fe84b4ec1ce5718b27a98fb54a4048f38cd928340453bb3a8270a7f4ccdae3693a9f8b3d3b5", 0xdb}, {&(0x7f00000007c0)="80265879342258db605d26294ed11e67af8c6275ef5c324663a0c6ab26b3ab2561225b182124858006690b58d4495d28784df19cb9e229867caaeb275af737050efa658fadceee90b408aeb921dba06de55414ffc1b70349128fa937bb3ef1e3ad795f55a508ce2921990f3094b5e64e4f16c6d94eb7618b99c751ad3bf23a5d5aeb2648cb77cde15b4bd69a2fbac464a6", 0x91}], 0x9) pipe(0x0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0xfffffc8f) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r3 = signalfd(0xffffffffffffffff, &(0x7f0000000040)={0xfffffffffffffeff}, 0x8) fcntl$getownex(r3, 0x10, &(0x7f0000000140)) [ 1090.679274] input: syz1 as /devices/virtual/input/input499 09:41:02 executing program 2: keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000a80)={0x0, 0xc, 0xae}, &(0x7f0000000ac0)={'enc=', 'raw', ' hash=', {'sha384-avx2\x00'}}, &(0x7f0000000b40)="058f6a5fe2db85fa52baca0c", &(0x7f0000000c00)=""/174) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xff}, 0x0) getpid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x62e, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1104}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x10, 0x800000000000803, 0x0) ioctl$BLKSECTGET(r0, 0x1267, &(0x7f0000000580)) sendto(r1, &(0x7f0000000000)="120000001600e70d017b00000000008e1584", 0x12, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(r0, r2, 0x0, 0x1) 09:41:02 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000]}, 0x45c) r1 = syz_open_dev$sndtimer(0x0, 0x0, 0x100) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000040)={{0x1}}) gettid() r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[@ANYBLOB="f75f9bf747594d0a1851415d989b48270bb03c9ef00b305cba0432a36b9310552b2e4de8c9de57a65146ad9194a585247c8d2a48e1311d4dd0e973234ea0a1a238326753d3da28e216683f91691b54351036cf18886cd3e555df4a1b907696264440c2e8407ed7160e8250e81157496310f16407a59d7e892d7ea55b9215d7eb723ff1b873c6af16ac27c40d2c4fe0c268984029a5c1adb5df4f4dd2"], 0xb) inotify_add_watch(r2, &(0x7f0000000180)='./file1\x00', 0x80000020) r3 = geteuid() getresgid(&(0x7f0000000140), 0x0, 0x0) fchown(r2, r3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r2) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={r1, 0x28, &(0x7f0000000240)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000002c0)={r4, 0xffffffff, 0xe6d3be648ff4b41c}, 0xc) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x3, 0x0) ioctl$UI_DEV_DESTROY(r0, 0x5502) 09:41:02 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(0xffffffffffffffff, r0, 0x0, 0x1) 09:41:02 executing program 0: keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000a80)={0x0, 0xc, 0xae}, &(0x7f0000000ac0)={'enc=', 'raw', ' hash=', {'sha384-avx2\x00'}}, &(0x7f0000000b40)="058f6a5fe2db85fa52baca0c", &(0x7f0000000c00)=""/174) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xff}, 0x0) getpid() r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f0000000000)) ptrace(0x10, r1) ptrace$getregset(0x4204, r1, 0x1, &(0x7f0000001140)={0xffffffffffffffff}) r2 = getpid() rt_tgsigqueueinfo(r2, r2, 0x16, &(0x7f0000000000)) ptrace(0x10, r2) ptrace$getregset(0x4204, r2, 0x1, &(0x7f0000001140)={0xffffffffffffffff}) sched_setattr(r2, &(0x7f0000000200)={0x30, 0x6, 0x0, 0x20000000000, 0x4, 0x0, 0x0, 0x5}, 0x0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_SET(r0, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x72000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)=ANY=[@ANYBLOB="38800000", @ANYRES16=r3, @ANYBLOB="080026bd7000fcdbdf2505000000240006000400020004000200080001000500000004000200080001000700000004000200"], 0x38}, 0x1, 0x0, 0x0, 0x4008000}, 0x40) r4 = syz_genetlink_get_family_id$fou(&(0x7f00000000c0)='fou\x00') sendmsg$FOU_CMD_GET(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x4100800}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x28, r4, 0x0, 0x70bd29, 0x25dfdbfe, {}, [@FOU_ATTR_PEER_V6={0x14, 0x9, @ipv4={[], [], @rand_addr=0x10001}}]}, 0x28}, 0x1, 0x0, 0x0, 0x81}, 0x24014040) r5 = getpid() rt_tgsigqueueinfo(r5, r5, 0x16, &(0x7f0000000000)) ptrace(0x10, r5) ptrace$getregset(0x4204, r5, 0x1, &(0x7f0000001140)={0xffffffffffffffff}) r6 = syz_open_procfs(r5, &(0x7f0000000180)='stat\x00') sendfile(r0, r6, 0x0, 0x1) 09:41:02 executing program 1: r0 = geteuid() r1 = geteuid() setreuid(0x0, r1) r2 = getuid() pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r3, &(0x7f0000000140)=ANY=[], 0xfffffc8f) fcntl$setpipe(r3, 0x407, 0x0) write$P9_RFLUSH(r3, &(0x7f0000000180)={0x7, 0x6d, 0x1}, 0x7) socket$key(0xf, 0x3, 0x2) mount$bpf(0x0, &(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000080)='bpf\x00', 0x0, &(0x7f00000000c0)={[], [{@euid_gt={'euid>', r0}}, {@uid_gt={'uid>', r1}}, {@defcontext={'defcontext', 0x3d, 's\x13\xd8\xd2Z_u'}}, {@euid_lt={'euid<', r2}}]}) clock_adjtime(0x4, &(0x7f00000002c0)={0x53b, 0x20, 0x3ff, 0x6, 0x5, 0x3, 0x5, 0x9, 0x9, 0x3, 0xd9fb, 0x7, 0x4, 0x0, 0x40, 0x9, 0x10001, 0x80, 0x100000000, 0x4, 0xb0, 0x6, 0x5, 0x2, 0x7, 0xff}) syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x10003, &(0x7f0000000040)={[{@utf8='utf8=1'}]}) pipe(&(0x7f0000000240)={0xffffffffffffffff}) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) splice(r4, 0x0, r5, 0x0, 0x100000000ffdc, 0x0) fcntl$F_SET_FILE_RW_HINT(r5, 0x40e, &(0x7f00000001c0)=0x3) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r6, &(0x7f0000000140)=ANY=[], 0xfffffc8f) fcntl$setpipe(r6, 0x407, 0x0) ioctl$RTC_WKALM_SET(r6, 0x4028700f, &(0x7f0000000280)={0x1, 0x1, {0x4, 0x1b4, 0xd, 0x1b, 0x6, 0x0, 0x1, 0xf7, 0xffffffffffffffff}}) 09:41:02 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x7c, 0x7c, 0x2, [@array, @restrict, @ptr, @func, @int, @int, @fwd, @enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x0, 0x9}]}]}}, 0x0, 0x96}, 0x20) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000240)=ANY=[@ANYBLOB="cd80"], 0x2}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) ptrace$cont(0x1f, r0, 0x5, 0x800000000000) 09:41:02 executing program 4: sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x10000108}, 0xc, &(0x7f0000000500)={&(0x7f00000002c0)=@deltaction={0x238, 0x31, 0x10, 0x6, 0x25dfdbfc, {}, [@TCA_ACT_TAB={0x38, 0x1, [{0x10, 0xf, @TCA_ACT_INDEX={0x8, 0x3, 0x708}}, {0x14, 0x11, @TCA_ACT_KIND={0xc, 0x1, 'sample\x00'}}, {0x10, 0x9, @TCA_ACT_INDEX={0x8, 0x3, 0x2}}]}, @TCA_ACT_TAB={0x3c, 0x1, [{0x14, 0xd, @TCA_ACT_KIND={0xc, 0x1, 'mirred\x00'}}, {0x14, 0x3, @TCA_ACT_KIND={0xc, 0x1, 'pedit\x00'}}, {0x10, 0x1d, @TCA_ACT_KIND={0x8, 0x1, 'ipt\x00'}}]}, @TCA_ACT_TAB={0x7c, 0x1, [{0x10, 0xe, @TCA_ACT_INDEX={0x8, 0x3, 0x7}}, {0x10, 0x1, @TCA_ACT_INDEX={0x8, 0x3, 0x6}}, {0x10, 0x16, @TCA_ACT_INDEX={0x8, 0x3, 0x8}}, {0x10, 0x6, @TCA_ACT_INDEX={0x8, 0x3, 0x400}}, {0x18, 0x1f, @TCA_ACT_KIND={0x10, 0x1, 'tunnel_key\x00'}}, {0x10, 0x3, @TCA_ACT_INDEX={0x8}}, {0x10, 0x15, @TCA_ACT_INDEX={0x8, 0x3, 0x40}}]}, @TCA_ACT_TAB={0x54, 0x1, [{0x10, 0x18, @TCA_ACT_KIND={0x8, 0x1, 'xt\x00'}}, {0x10, 0xd, @TCA_ACT_KIND={0x8, 0x1, 'ife\x00'}}, {0x10, 0x20, @TCA_ACT_KIND={0x8, 0x1, 'xt\x00'}}, {0x10, 0x15, @TCA_ACT_KIND={0x8, 0x1, 'nat\x00'}}, {0x10, 0x5, @TCA_ACT_KIND={0x8, 0x1, 'bpf\x00'}}]}, @TCA_ACT_TAB={0x84, 0x1, [{0x10, 0xe, @TCA_ACT_INDEX={0x8, 0x3, 0x100}}, {0x10, 0x10, @TCA_ACT_INDEX={0x8, 0x3, 0x3f}}, {0x10, 0xa, @TCA_ACT_INDEX={0x8, 0x3, 0x1}}, {0x10, 0x20, @TCA_ACT_KIND={0x8, 0x1, 'ipt\x00'}}, {0x10, 0x3, @TCA_ACT_INDEX={0x8, 0x3, 0xa86}}, {0x10, 0x8, @TCA_ACT_INDEX={0x8, 0x3, 0x7ff}}, {0x10, 0x8, @TCA_ACT_INDEX={0x8, 0x3, 0x5}}, {0x10, 0x13, @TCA_ACT_INDEX={0x8}}]}, @TCA_ACT_TAB={0x5c, 0x1, [{0x14, 0x1f, @TCA_ACT_KIND={0xc, 0x1, 'skbedit\x00'}}, {0x14, 0x8, @TCA_ACT_KIND={0xc, 0x1, 'skbedit\x00'}}, {0x10, 0x18, @TCA_ACT_KIND={0x8, 0x1, 'ife\x00'}}, {0x10, 0x8, @TCA_ACT_INDEX={0x8, 0x3, 0xe9}}, {0x10, 0xe, @TCA_ACT_INDEX={0x8, 0x3, 0x6}}]}]}, 0x238}, 0x1, 0x0, 0x0, 0x40c0044}, 0x15) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='4$$>|\xe8c\xe6\x82\n\xc0\x95\x1eR\x17{\xd5\xfbY1&q\xc8\xfa9=b\'\x8b\xcf\x128z\x03,\x9b2| \xd8H\x03 \xd5%\x86\xeb\xc8\xa4\x12)\xec\xad\xf6\xf6m\xfc\x05?\x1ez(\b\xa2\x96nE\xec\x01Y\x8bI\xd3\x84\x1f\x8e\xf6\xe0\xa1\xfc\xc8\x82Y\x03\rXlR\xc1(\xdf\xac\xed6l0P\a\xd28>\xec\x00'/112) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfffffc8f) fcntl$setpipe(r1, 0x407, 0x0) ioctl$FITRIM(r1, 0xc0185879, &(0x7f00000000c0)={0x4, 0x100, 0xffffffffffffff87}) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xfffffc8f) fcntl$setpipe(r2, 0x407, 0x0) write$P9_RVERSION(r2, &(0x7f0000000100)={0x15, 0x65, 0xffff, 0x8, 0x8, '9P2000.L'}, 0x15) r3 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(r0, r3, 0x0, 0x1) ioctl$FITRIM(r0, 0xc0185879, &(0x7f0000000000)={0x1fd, 0x10002, 0x4}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000001c0)={0xffffffffffffffff, 0x28, &(0x7f0000000140)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={r4, 0x400, 0x8}, 0xc) 09:41:02 executing program 0: keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000a80)={0x0, 0xc, 0xae}, &(0x7f0000000ac0)={'enc=', 'raw', ' hash=', {'sha384-avx2\x00'}}, &(0x7f0000000b40)="058f6a5fe2db85fa52baca0c", &(0x7f0000000c00)=""/174) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xff}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(r0, r2, 0x0, 0x1) r3 = getpid() r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$IPT_SO_GET_ENTRIES(r4, 0x0, 0x41, &(0x7f0000000080)={'security\x00', 0xb7, "40e19f1d569516f2a4959ec9c35b0fafae5bc469a7c39489ba72820c5ac868b8878d5bef701864efd254d48f518032654b4188a05708311f0fddc3a6e01b14667e9e878ae2a08fb9a09065fb196ad0e23bdda6f1b16cfd27ac7802a0ad1c42083459e620c1109db3cafd4f7ca4eed90bb990b395ae083bba71b7362f44d1c8fb24709062f5f52eec41df4a2f35d05423606a48187948e9f7798d049ab3c18ca2712ecaf1966a02ea146a53bc55e212ed879cbe0e3b1d8b"}, &(0x7f00000001c0)=0xdb) rt_tgsigqueueinfo(r3, r3, 0x16, &(0x7f0000000000)) openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x42442, 0x0) ptrace(0x10, r3) ptrace$getregset(0x4204, r3, 0x1, &(0x7f0000001140)={0xffffffffffffffff}) prctl$PR_SET_PTRACER(0x59616d61, r3) 09:41:02 executing program 0: add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000100)={'syz', 0x3}, 0x0, 0x0, 0x0) r0 = add_key$keyring(&(0x7f0000000200)='keyring\x00', &(0x7f0000000240)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) keyctl$restrict_keyring(0x1d, r0, &(0x7f0000000000)='keyring\x00', &(0x7f0000000040)='/\x00') keyctl$set_timeout(0xf, r0, 0x0) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000000440)="3e601253ca29647ac8ef2beb168bca92501e724ccfa8de116ac24944cb307f0e1a3b151a8dfec01777f008582d45a2301617630cf5bbd3833b805e6489d2cd97cb6b777a8cab43b3", 0x48, r0) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f00000001c0)={r1, 0xa7, 0xae}, &(0x7f0000000ac0)=ANY=[@ANYBLOB="656e6374320a9597aff38e683d7368613338342d6176783200000000000000000000000000000000000000000000000000000000008000"/77], &(0x7f0000000300)="0a8f6a5fe2db85fa52baca0c05c0c2b59072671cf083fd9156dcdd264ab008cff1b4695d0c82ecea899d600363ab25fd7259c1d5a0602cdd88ec0d10517e43133053ef35cca27715c16af3fab3ddb5d0c3057fda5d77213c281af8991a1fb7f7805d751bbcdbb7bd9f45d54beffad93d5a7ece8a92e8123301704d3ccd8387d57dd6015983ebf441370178fe63f7cdde9bdff39658de97cdcbde0dac9ce918ec5f40ead032f02ed61374ade9b7767dc0e3fdaaa04437e55f7c43458e0500de380b73bcedef7a359a11872de0a1fca2781c340c0f1b8618b450d7904944dd22103e89557f603645295e79e8e31b179a438d44b492724d48f9020561607e83daadad5c9cecb24c7e07760f6d00956a0c4de7db69c66cdc17ee29b09588ff4d104155", &(0x7f0000000c00)=""/174) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') prlimit64(0x0, 0xe, &(0x7f00000002c0)={0x9, 0xff}, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff}) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) splice(r4, 0x0, r5, 0x0, 0x100000000ffdc, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r5, 0x40106614, &(0x7f0000000080)) r6 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') pipe(&(0x7f0000000240)={0xffffffffffffffff}) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) splice(r7, 0x0, r8, 0x0, 0x100000000ffdc, 0x0) r9 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000500)='IPVS\x00') sendmsg$IPVS_CMD_GET_INFO(r8, &(0x7f0000000640)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000600)={&(0x7f0000000540)={0x8c, r9, 0x10, 0x70bd2a, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x8368}, @IPVS_CMD_ATTR_SERVICE={0x44, 0x1, [@IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x29}, @IPVS_SVC_ATTR_SCHED_NAME={0xc, 0x6, 'lblcr\x00'}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e24}, @IPVS_SVC_ATTR_PROTOCOL={0x8}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x4, 0x4}}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e20}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x8}, @IPVS_CMD_ATTR_DAEMON={0x1c, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @rand_addr=0x100000001}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x2}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0xd2}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x4}]}, 0x8c}, 0x1, 0x0, 0x0, 0x4000}, 0x40) sendfile(r2, r6, 0x0, 0x1) [ 1093.005451] input: syz1 as /devices/virtual/input/input501 09:41:03 executing program 0: keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000a80)={0x0, 0xc, 0xae}, &(0x7f0000000ac0)={'enc=', 'raw', ' hash=', {'sha384-avx2\x00'}}, &(0x7f0000000b40)="058f6a5fe2db85fa52baca0c", &(0x7f0000000c00)=""/174) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xff}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) rt_sigreturn() r2 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(r0, r2, 0x0, 0x1) 09:41:03 executing program 0: r0 = ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x7ff) ioctl$TIOCSSOFTCAR(r0, 0x541a, &(0x7f0000000100)=0x1f) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfffffc8f) fcntl$setpipe(r1, 0x407, 0x0) ioctl$GIO_UNIMAP(r1, 0x4b66, &(0x7f00000000c0)={0x2, &(0x7f0000000080)=[{}, {}]}) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000a80)={0x0, 0xc, 0xae}, &(0x7f0000000ac0)={'enc=', 'raw', ' hash=', {'sha384-avx2\x00'}}, &(0x7f0000000b40)="058f6a5fe2db85fa52baca0c", &(0x7f0000000c00)=""/174) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xff}, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x1, 0x5}, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(r2, r4, 0x0, 0x1) 09:41:03 executing program 2: keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000a80)={0x0, 0xc, 0xae}, &(0x7f0000000ac0)={'enc=', 'raw', ' hash=', {'sha384-avx2\x00'}}, &(0x7f0000000b40)="058f6a5fe2db85fa52baca0c", &(0x7f0000000c00)=""/174) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xff}, 0x0) getpid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1104}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x10, 0x800000000000803, 0x0) ioctl$BLKSECTGET(r0, 0x1267, &(0x7f0000000580)) sendto(r1, &(0x7f0000000000)="120000001600e70d017b00000000008e1584", 0x12, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(r0, r2, 0x0, 0x1) [ 1093.126219] input: syz1 as /devices/virtual/input/input502 09:41:03 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x2, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) splice(r1, 0x0, r2, 0x0, 0x100000000ffdc, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000880)={0x0, r1, 0x3e6173a4fa78027d}, 0x10) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000]}, 0x45c) r3 = syz_open_dev$sndtimer(0x0, 0x0, 0x100) ioctl$SNDRV_TIMER_IOCTL_SELECT(r3, 0x40345410, &(0x7f0000000040)={{0x1}}) gettid() r4 = creat(&(0x7f00000000c0)='./file0\x00', 0x1) write$binfmt_script(r4, &(0x7f0000000300)=ANY=[@ANYBLOB="f75f9bf747594d0a1851415d989b48270bb03c9ef00b305cba0432a36b9310552b2e4de8c9de57a65146ad9194a585247c8d2a48e1311d4dd0e973234ea0a1a238326753d3da28e216683f91fbead5511036cf180d00d36555df4a1b907696264440c2e8407ed7160e8250e81157496310f16407a59d7e892d7ea55b9215d7eb723ff1b873c6af16ac27c40d2c4fe0c268984029a5c1adb5df4f4dd2"], 0xb) inotify_add_watch(r4, &(0x7f0000000180)='./file1\x00', 0x80000020) r5 = geteuid() getresgid(&(0x7f0000000140), 0x0, 0x0) fchown(r4, r5, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff}) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) splice(r6, 0x0, r7, 0x0, 0x100000000ffdc, 0x0) openat$cgroup(r7, &(0x7f00000003c0)='syz1\x00', 0x200002, 0x0) close(r4) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={r3, 0x28, &(0x7f0000000240)={0x0, 0x0}}, 0x10) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/checkreqprot\x00', 0x400, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r4, 0x6, 0x13, &(0x7f00000001c0)=0xffffffffffffffff, 0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000002c0)={r8, 0xffffffff, 0xe6d3be648ff4b41c}, 0xc) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x3, 0x0) ioctl$UI_DEV_DESTROY(r0, 0x5502) [ 1093.303817] input: syz1 as /devices/virtual/input/input503 09:41:05 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x7c, 0x7c, 0x2, [@array, @restrict, @ptr, @func, @int, @int, @fwd, @enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x0, 0x9}]}]}}, 0x0, 0x96}, 0x20) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000240)=ANY=[@ANYBLOB="cd80"], 0x2}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) ptrace$cont(0x1f, r0, 0x5, 0x800000000000) 09:41:05 executing program 2: keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000a80)={0x0, 0xc, 0xae}, &(0x7f0000000ac0)={'enc=', 'raw', ' hash=', {'sha384-avx2\x00'}}, &(0x7f0000000b40)="058f6a5fe2db85fa52baca0c", &(0x7f0000000c00)=""/174) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xff}, 0x0) getpid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1104}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x10, 0x800000000000803, 0x0) ioctl$BLKSECTGET(r0, 0x1267, &(0x7f0000000580)) sendto(r1, &(0x7f0000000000)="120000001600e70d017b00000000008e1584", 0x12, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(r0, r2, 0x0, 0x1) 09:41:05 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000]}, 0x45c) r1 = syz_open_dev$sndtimer(0x0, 0x0, 0x100) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000040)={{0x1}}) gettid() r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[@ANYBLOB="f75f9bf747594d0a1851415d989b48270bb03c9ef00b305cba0432a36b9310552b2e4de8c9de57a65146ad9194a585247c8d2a48e1311d4dd0e973234ea0a1a238326753d3da28e216683f91691b54351036cf18886cd3e555df4a1b907696264440c2e8407ed7160e8250e81157496310f16407a59d7e892d7ea55b9215d7eb723ff1b873c6af16ac27c40d2c4fe0c268984029a5c1adb5df4f4dd2"], 0xb) r3 = getpid() rt_tgsigqueueinfo(r3, r3, 0x16, &(0x7f0000000000)) ptrace(0x10, r3) ptrace$getregset(0x4204, r3, 0x1, &(0x7f0000001140)={0xffffffffffffffff}) sched_setattr(r3, &(0x7f0000000a40)={0x30, 0x0, 0x1, 0xff, 0x8, 0xd8d3, 0x2e7, 0x8}, 0x0) inotify_add_watch(r2, &(0x7f0000000180)='./file1\x00', 0x80000020) r4 = geteuid() getresgid(&(0x7f0000000140), 0x0, 0x0) fchown(r2, r4, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r2) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={r1, 0x28, &(0x7f0000000240)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000002c0)={r5, 0xffffffff, 0xe6d3be648ff4b41c}, 0xc) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x3, 0x0) ioctl$UI_DEV_DESTROY(r0, 0x5502) syz_mount_image$vfat(&(0x7f00000001c0)='vfat\x00', &(0x7f0000000200)='./file1\x00', 0x1, 0x1, &(0x7f00000003c0)=[{&(0x7f0000000880)="f57cacdd9e60e206d6d48b3bf3e9851a91259a8eeba04d119b173326ab6a15c5629d1bcd2f03dd073b51852765be2a6122340ae8691fbdd7b2b5bc185105e2d6de2bbdeb8047e9265f54eeeef3d0833b7945fb2f0b085e4bf23ddfbd6ac221e4634a43871df15fb30854f4e5d2602767bf37b5f4edbd37cddd7e173b96fb4ebc1a13412a7c43455003cae48583df858c7d21b9aadb27e432a4b4379bd06f22a73be00b43bf3a619ee7a5dd5c2860205d3ae8133b6e62538e1fcdc660f133476d39823739de27a946228817f91a4ce9be9a539fb3fcf90e90382ef26699d1332d369baf5f0218892873e8d4aafa6f34", 0xef, 0x6}], 0x2000c00, &(0x7f0000000980)={[{@fat=@check_normal='check=normal'}, {@uni_xlate='uni_xlate=1'}, {@shortname_win95='shortname=win95'}, {@nonumtail='nnonumtail=1'}, {@iocharset={'iocharset', 0x3d, 'cp737'}}, {@utf8='utf8=1'}, {@iocharset={'iocharset', 0x3d, 'cp863'}}], [{@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@audit='audit'}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}, {@smackfshat={'smackfshat', 0x3d, 'user:'}}, {@hash='hash'}]}) 09:41:05 executing program 1: r0 = geteuid() setreuid(0x0, r0) syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)={[], [{@mask={'mask', 0x3d, '^MAY_APPEND'}}, {@euid_gt={'euid>', r0}}, {@fscontext={'fscontext', 0x3d, 'system_u'}}, {@fscontext={'fscontext', 0x3d, 'system_u'}}, {@dont_measure='dont_measure'}, {@fsmagic={'fsmagic', 0x3d, 0x4}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}, {@audit='_u~i\x06'}]}) 09:41:05 executing program 4: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) syncfs(r0) flock(r0, 0x3) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/netstat\x00') syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xfffffc8f) fcntl$setpipe(r2, 0x407, 0x0) r3 = syz_genetlink_get_family_id$nbd(&(0x7f00000000c0)='nbd\x00') sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000000), 0xc, &(0x7f00000001c0)={&(0x7f0000000100)={0x68, r3, 0x800, 0x70bd2a, 0x25dfdbfc, {}, [@NBD_ATTR_BLOCK_SIZE_BYTES={0xc}, @NBD_ATTR_TIMEOUT={0xc, 0x4, 0x2a6c}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x2}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x209}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0xffffffffffffffff}, @NBD_ATTR_CLIENT_FLAGS={0xc}, @NBD_ATTR_SERVER_FLAGS={0xc}]}, 0x68}}, 0x20000001) sendfile(r1, r2, 0x0, 0x4) 09:41:05 executing program 0: keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000a80)={0x0, 0xc, 0xae}, &(0x7f0000000080)=ANY=[@ANYBLOB="656e633d7261772068617368613338342d617678320000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000eaad5a7073a952858c826625a060e04497b820ed515417a0789e1c75cce8d0e21dc638b054026b"], &(0x7f0000000b40)="058f6a5fe2db85fa52baca0c", &(0x7f0000000c00)=""/174) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xff}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(r0, r2, 0x0, 0x1) 09:41:05 executing program 1: get_thread_area(&(0x7f0000000000)={0x800, 0x100000, 0xffffffffffffffff, 0x7, 0xfffffffffffffffd, 0x7f, 0x1000000, 0x2, 0x31}) 09:41:05 executing program 0: keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000a80)={0x0, 0xc, 0xae}, &(0x7f0000000ac0)={'enc=', 'raw', ' hash=', {'sha384-avx2\x00'}}, &(0x7f0000000b40)="058f6a5fe2db85fa52baca0c", &(0x7f0000000c00)=""/174) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f0000000000)) ptrace(0x10, r1) ptrace$getregset(0x4204, r1, 0x1, &(0x7f0000001140)={0xffffffffffffffff}) r2 = perf_event_open$cgroup(&(0x7f00000001c0)={0x2, 0x70, 0x401, 0x0, 0x401, 0x2, 0x0, 0xe20, 0xa8088, 0x2, 0x2, 0x6, 0x8001, 0x4, 0xac2, 0x656ef113, 0xf18e, 0x10001, 0x9add, 0x800, 0x10000, 0x69c2, 0x8, 0xfff, 0xfff, 0x2, 0xc797, 0xffffffffffffffff, 0xffffffff, 0x529a, 0x3, 0x0, 0x6, 0x4, 0xa8f, 0xdc5f, 0x223, 0x10000, 0x0, 0xfffffffffffffffd, 0x2, @perf_config_ext={0x3, 0x5}, 0x852, 0x9, 0x2, 0xd, 0x1, 0x5, 0x400}, r0, 0xe, r0, 0x3) perf_event_open(&(0x7f00000000c0)={0x4, 0x70, 0x9, 0xfffffffffffffffd, 0xfd1, 0x3f, 0x0, 0x1, 0xa40c42a2b8cc98c2, 0x14, 0x0, 0x7, 0x5, 0x8, 0x101, 0x3, 0x7fffffff, 0x7fff, 0x1, 0x400, 0x8, 0x3ff, 0x8, 0x3, 0xffffffffffff89ea, 0xffffffff, 0x0, 0x1f962cac, 0x8, 0x2, 0x8001, 0x8, 0x3, 0x80000000, 0x5d4, 0x8000, 0x2, 0x1, 0x0, 0x3, 0x0, @perf_bp={&(0x7f0000000080), 0x1}, 0x4080, 0x8, 0x0, 0x0, 0x7b673362, 0xcb, 0xa00000000000}, r1, 0xffffffffffffffff, r2, 0x10) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xff}, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(r0, r4, 0x0, 0x1) 09:41:05 executing program 1: pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r0, &(0x7f0000000140)=ANY=[], 0xfffffc8f) fcntl$setpipe(r0, 0x407, 0x0) ioctl$EVIOCGUNIQ(r0, 0x80404508, &(0x7f0000000000)=""/38) syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@fat=@dos1xfloppy='dos1xfloppy'}]}) 09:41:05 executing program 0: keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000a80)={0x0, 0xc, 0xae}, &(0x7f0000000ac0)={'enc=', 'raw', ' hash=', {'sha384-avx2\x00'}}, &(0x7f0000000b40)="058f6a5fe2db85fa52baca0c", &(0x7f0000000c00)=""/174) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xff}, 0x0) r1 = getpid() perf_event_open(&(0x7f0000000080)={0x5, 0x70, 0x80000001, 0x4, 0x797, 0x5, 0x0, 0x0, 0xc8aa, 0xf, 0x7, 0x4, 0x7, 0xcbd, 0x8001, 0x6, 0x600000000000000, 0x3f, 0x3, 0x100000001, 0x1, 0x5, 0x8, 0x1, 0xff, 0x80, 0x3, 0x4, 0x2, 0x3, 0x8, 0x0, 0x1ff, 0x0, 0x6, 0x9, 0x9, 0x2, 0x0, 0x879, 0x0, @perf_config_ext={0x2, 0x8}, 0x2000, 0x5, 0x1, 0x0, 0x4, 0x9, 0x100}, 0xffffffffffffffff, 0x7, 0xffffffffffffffff, 0x1) sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(r0, r2, 0x0, 0x1) 09:41:06 executing program 0: keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000a80)={0x0, 0xc, 0xae}, &(0x7f0000000ac0)=ANY=[@ANYBLOB="656e633d72617720686173683d7368613338342d61767832000000008000"/77], &(0x7f0000000b40)="058f6a5fe2db85fa52baca0c", &(0x7f0000000c00)=""/174) r0 = socket$netlink(0x10, 0x3, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) splice(r1, 0x0, r2, 0x0, 0x100000000ffdc, 0x0) exit_group(0x80000001) pwrite64(r2, &(0x7f0000000100)="43bb1345a0fef6e478a90422ce5c540185fc295ca9027bbfec0fb871726c9a", 0x1f, 0x0) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)="3900000013000904688a0700000000000700ff3f04000000450001070000001419081a0005000000010000000208000800005d14dfb51571a4", 0x39}], 0x1) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xff}, 0x0) r4 = getpid() sched_setattr(r4, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000080)={0x0}, &(0x7f00000000c0)=0xc) r6 = syz_open_procfs(r5, &(0x7f0000000140)='stat\x00') sendfile(r3, r6, 0x0, 0x1) 09:41:06 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x1], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0xfffffffffffffffb, 0x0, 0x100000000], [0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401]}, 0x45c) r1 = syz_open_dev$sndtimer(0x0, 0x0, 0x100) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000040)={{0x1}}) gettid() r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[@ANYBLOB="f75f9bf747594d0a1851415d989b48270bb03c9ef00b305cba0432a36b9310552b2e4de8c9de57a65146ad9194a585247c8d2a48e1311d4dd0e973234ea0a1a238326753d3da28e216683f91691b54355036cf18886cd3e555df4a1b907696264440c2e8407ed7160e8250e81157496310f16407a59d7e892d7ea55b9215c8eb723ff1b873c6af16ac27c40d2c4fe0c268984029a5c1adb5df4f4dd2"], 0xb) inotify_add_watch(r2, &(0x7f0000000180)='./file1\x00', 0x80000020) r3 = geteuid() getresgid(&(0x7f0000000140), 0x0, 0x0) fchown(r2, r3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r2) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={r1, 0x10, &(0x7f0000000240)={0x0, 0x0}}, 0xffffff72) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000002c0)={r4, 0xffffffff, 0xe6d3be648ff4b41c}, 0xc) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fdatasync(0xffffffffffffffff) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x3, 0x0) ioctl$UI_DEV_DESTROY(r0, 0x5502) [ 1096.155089] input: syz1 as /devices/virtual/input/input506 [ 1096.265312] input: syz1 as /devices/virtual/input/input507 09:41:08 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x7c, 0x7c, 0x2, [@array, @restrict, @ptr, @func, @int, @int, @fwd, @enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x0, 0x9}]}]}}, 0x0, 0x96}, 0x20) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000240)=ANY=[@ANYBLOB="cd80"], 0x2}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) ptrace$cont(0x1f, r0, 0x5, 0x800000000000) 09:41:08 executing program 0: keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000a80)={0x0, 0xc, 0xae}, &(0x7f0000000ac0)={'enc=', 'raw', ' hash=', {'sha384-avx2\x00'}}, &(0x7f0000000b40)="058f6a5fe2db85fa52baca0c", &(0x7f0000000c00)=""/174) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xff}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(r0, r2, 0x0, 0x1) write$binfmt_misc(r2, &(0x7f0000000080)={'syz0', "2b21d9990085e4e83c6c5fdc766d0cf44806dbdf2036d1bf5b8c4f5636bae41df09ad8227ac9ae4adfcb66e98ab1fee72f44eb402b571743bb9726cf43453788e93d27d9ac4a987013062063ab1f2825aa6d173b6a4c99b47a44e5637eb289f2918a64df6e640d125bf3fa487b77c984ff9f038ce52819825e725597921014dcbe8bed305cd33170529b445d07f61b7d8838ca50ced4bcc4e3c38e1f66742b9007094fc176952093cc4c1cbade09a9bc41f309de232eecc39d95dbf0015fe4249d5d15144601b4a8330cbe5925c6166440b827"}, 0xd7) 09:41:08 executing program 2: keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000a80)={0x0, 0xc, 0xae}, &(0x7f0000000ac0)={'enc=', 'raw', ' hash=', {'sha384-avx2\x00'}}, &(0x7f0000000b40)="058f6a5fe2db85fa52baca0c", &(0x7f0000000c00)=""/174) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xff}, 0x0) getpid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1104}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x10, 0x800000000000803, 0x0) ioctl$BLKSECTGET(r0, 0x1267, &(0x7f0000000580)) sendto(r1, &(0x7f0000000000)="120000001600e70d017b00000000008e1584", 0x12, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(r0, r2, 0x0, 0x1) 09:41:08 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000]}, 0x45c) r1 = syz_open_dev$sndtimer(0x0, 0x0, 0x100) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000040)={{0x1}}) r2 = gettid() r3 = creat(&(0x7f00000000c0)='./file0\x00', 0x1) write$binfmt_script(r3, &(0x7f0000000300)=ANY=[@ANYBLOB="f75f9bf747594d0a1851415d989b48270bb03c9ef00b305cba0432a36b9310552b2e4de8c9de57a65146ad9194a585247c8d2a48e1311d4dd0e973234ea0a1a238326753d3da28e216683f91691b54351036cf18886cd3e555df4a1b907696264440c2e8407ed7160e8250e81157496310f16407a59d7e892d7ea55b9215d7eb723ff1b873c6af16ac27c40d2c4fe0c268984029a5c1adb5df4f4dd2"], 0xb) inotify_add_watch(r3, &(0x7f0000000180)='./file1\x00', 0x80000020) r4 = geteuid() getresgid(&(0x7f0000000140), 0x0, 0x0) ioctl$TCSETS(r3, 0x5402, &(0x7f0000000200)={0x1, 0xc8d9, 0x7fffffff, 0x8, 0x2, 0x1f, 0x2, 0x101, 0x3f, 0x8, 0xfffffffffffffff7, 0xb5f}) fchown(r3, r4, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x9, 0x0, 0x400, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffffffffffffe, 0xffffffffffffffff, 0x0) close(r3) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={r1, 0x28, &(0x7f0000000240)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000002c0)={r5, 0xffffffff, 0xe6d3be648ff4b41c}, 0xc) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sched_setattr(r2, &(0x7f00000001c0)={0x30, 0x0, 0x0, 0x0, 0x5, 0x180, 0x9, 0x3}, 0x0) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x3, 0x0) ioctl$UI_DEV_DESTROY(r0, 0x5502) 09:41:08 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r4, 0x5421, 0xfffffffffffffffe) r5 = syz_genetlink_get_family_id$ipvs(&(0x7f00000004c0)='IPVS\x00') sendmsg$IPVS_CMD_SET_DEST(r4, &(0x7f0000000640)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x28000000}, 0xc, &(0x7f0000000600)={&(0x7f0000000500)={0xa4, r5, 0x8, 0x70bd29, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_SERVICE={0x28, 0x1, [@IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e24}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x1}}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x14}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x400}, @IPVS_CMD_ATTR_DEST={0x4}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x10001}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x4}, @IPVS_CMD_ATTR_DEST={0x4c, 0x2, [@IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@mcast2}, @IPVS_DEST_ATTR_WEIGHT={0xffd4, 0x4, 0x100}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x2}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x3d}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@empty}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x3}]}]}, 0xa4}, 0x1, 0x0, 0x0, 0x40}, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000100)={&(0x7f0000000280)={0xc8, r5, 0x800, 0x70bd27, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x80000001}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x900000000000000}, @IPVS_CMD_ATTR_DAEMON={0x44, 0x3, [@IPVS_DAEMON_ATTR_STATE={0x8}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x2}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'ip6tnl0\x00'}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast1}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @multicast2}]}, @IPVS_CMD_ATTR_SERVICE={0x18, 0x1, [@IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x23, 0x12}}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}]}, @IPVS_CMD_ATTR_DEST={0x28, 0x2, [@IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e21}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x7fff}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@mcast1}]}, @IPVS_CMD_ATTR_DAEMON={0x18, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'nlmon0\x00'}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x1}]}, 0xc8}}, 0x8000) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) splice(r2, 0x0, r6, 0x0, 0x100000000ffdc, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff}) getsockopt$IP_VS_SO_GET_SERVICE(r3, 0x0, 0x483, &(0x7f0000000380), &(0x7f0000000400)=0x68) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) splice(r7, 0x0, r8, 0x0, 0x100000000ffdc, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff}) pipe(&(0x7f0000000240)={0xffffffffffffffff}) r11 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) splice(r10, 0x0, r11, 0x0, 0x100000000ffdc, 0x0) ioctl$EVIOCGKEY(r11, 0x80404518, &(0x7f0000000680)=""/157) r12 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) splice(r9, 0x0, r12, 0x0, 0x100000000ffdc, 0x0) ioctl$BLKIOMIN(r9, 0x1278, &(0x7f0000000080)) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r8, 0x400c6615, &(0x7f0000000040)={0x0, @adiantum}) sendfile(r0, r1, 0x0, 0x9) 09:41:08 executing program 1: syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="646f733178666c6f7070792c00b04a8f0b512d095c8f6341a48b2cc1475c491b43c923676e62465cf2d813d6679e56891db9ad2e3cc2c9701d"]) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000040)={0x85, 0x75, 0x2, {0x7a, "792a858451dd4b6a31a1d2b11bb0be873720d7a71ac3431dbcf8f8bea1526ea907d6d08ea0ef9661dc6aee73fe01528db30b7fcb61a3276b428034699eb85b31a8263089a9c18b1deda4b488d3fdf0b02f95ca9b3695d3141503e06163c280a55388e357925f5b1bda6444ba9c53bd3aeb5f481c08a3917ffa91"}}, 0x85) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x400, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r2, 0x5421, 0xfffffffffffffffe) ioctl$BLKALIGNOFF(r1, 0x127a, &(0x7f0000000340)) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f00000004c0)='IPVS\x00') sendmsg$IPVS_CMD_SET_DEST(r2, &(0x7f0000000640)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x28000000}, 0xc, &(0x7f0000000600)={&(0x7f0000000500)={0xa4, r3, 0x8, 0x70bd29, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_SERVICE={0x28, 0x1, [@IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e24}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x1}}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x14}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x400}, @IPVS_CMD_ATTR_DEST={0x4}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x10001}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x4}, @IPVS_CMD_ATTR_DEST={0x4c, 0x2, [@IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@mcast2}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x100}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x2}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x3a}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@empty}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x3}]}]}, 0xa4}, 0x1, 0x0, 0x0, 0x40}, 0x0) sendmsg$IPVS_CMD_FLUSH(r0, &(0x7f0000000300)={&(0x7f00000001c0), 0xc, &(0x7f00000002c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="a4000000", @ANYRES16=r3, @ANYBLOB="00022cbd7000fbdbdf25110000000800050000020000680003001400020073797a6b616c6c6572300000000000000800030000000000140006000000000000000000010800080081000000140002006e723000000000000000000000000000080007004e210000080004000200000008000100010000001800010008000200320000000c000700330000000200000008000500ff0f0000000000000000001e5b1e4ae8a83eb115e66ae6bb28acf275fc"], 0xa4}, 0x1, 0x0, 0x0, 0x800}, 0x0) 09:41:08 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f0000000000)) ptrace(0x10, r1) ptrace$getregset(0x4204, r1, 0x1, &(0x7f0000001140)={0xffffffffffffffff}) ioctl$sock_FIOSETOWN(r0, 0x8901, &(0x7f00000000c0)=r1) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000a80)={0x0, 0xc, 0xae}, &(0x7f0000000ac0)={'enc=', 'raw', ' hash=', {'sha384-avx2\x00'}}, &(0x7f0000000b40)="058f6a5fe2db85fa52baca0c", &(0x7f0000000c00)=""/174) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xff}, 0x0) socket(0x36fc9034b14b3e94, 0xcb173509ca023e1f, 0x6) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/checkreqprot\x00', 0x100000, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(r2, r4, 0x0, 0x1) 09:41:09 executing program 1: setsockopt$inet_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x0, 0x2d, &(0x7f0000000280)={0x0, {{0x2, 0x4e20, @loopback}}}, 0x88) pipe(&(0x7f0000000240)={0xffffffffffffffff}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpuset.effective_mems\x00', 0x7a05, 0x1700) splice(r0, 0x0, r1, 0x0, 0x100000000ffdc, 0x0) ioctl$GIO_FONT(r0, 0x4b60, &(0x7f0000000000)=""/33) syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='dos1xfloPpy,\x00']) 09:41:09 executing program 0: keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000a80)={0x0, 0xc, 0xae}, &(0x7f00000002c0)=ANY=[@ANYBLOB="656e633d72117d20686173683d73686133380000000000000000000000000000000900000000000000000000000000000000000000000000000000000000000000000000000000000000000000fc9318634847045e0bc7077168199e3cf2aaecdce396b844f38dab64e988dad7b19efc8d82948a4a21ec5f548406d47adc9e1d20eda1c112d269639f30222567"], &(0x7f0000000b40)="058f6a5fe2db85fa52baca0c", &(0x7f0000000c00)=""/174) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xff}, 0x0) r1 = getpid() pipe(&(0x7f0000000240)={0xffffffffffffffff}) pipe(&(0x7f0000000240)={0xffffffffffffffff}) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) splice(r3, 0x0, r4, 0x0, 0x100000000ffdc, 0x0) r5 = openat$cgroup_ro(r4, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) splice(r2, 0x0, r5, 0x0, 0x100000000ffdc, 0x0) ioctl$KDSKBMETA(r2, 0x4b63, &(0x7f0000000100)=0x6457) sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r6 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(r0, r6, 0x0, 0x1) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x4100, 0x0) openat$cgroup_type(r6, &(0x7f00000000c0)='cgroup.type\x00', 0x2, 0x0) 09:41:09 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') write$char_usb(r0, &(0x7f0000000080), 0x0) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/hash_stats\x00', 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(r0, r1, 0x0, 0x1) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xfffffc8f) fcntl$setpipe(r2, 0x407, 0xfffffffffffffffc) fcntl$setsig(r2, 0xa, 0xc) 09:41:09 executing program 1: syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@fat=@dos1xfloppy='dos1xfloppy'}]}) setxattr$security_ima(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f00000000c0)=@v1={0x2, "618f35300220"}, 0x7, 0x1) 09:41:09 executing program 0: keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000a80)={0x0, 0xc, 0xae}, &(0x7f0000000ac0)={'\x02\x00\x1b\x80', 'raw', ' hash=', {'sha384-avx2\x00'}}, &(0x7f0000000b40)="058f6a5fe2db85fa52baca0c", &(0x7f0000000c00)=""/174) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') pipe(&(0x7f0000000240)={0xffffffffffffffff}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) splice(r1, 0x0, r2, 0x0, 0x100000000ffdc, 0x0) ioctl$TIOCGRS485(r2, 0x542e, &(0x7f0000000080)) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x7ff}, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(r0, r4, 0x0, 0x1) [ 1099.131170] input: syz1 as /devices/virtual/input/input508 09:41:11 executing program 0: keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000a80)={0x0, 0xfffffdbd, 0xae}, &(0x7f00000002c0)={'enc=', '\xd1\xceB\x86u\x88\xb4\x1bxy1\xeb8\xfcGA\xc3\xf5\xc2\xed\xa2\x9a4o\xde\x17A\xbaX\xd3 l\xde&\xf7\xb6\xefp\xc5]\xf4\xb0\x82\x02\xc1\x0e\x9c:\xbc+a\xb0\xc7x)\xd6\x94\x83\xbb\xb6\xfc\xeb\xee\xb2\xe0\xca8 \x01\xa8n\xc9op\xa6}\x96\x94j\xaf\xa1ljT<\xdak\xe1\x8a,\x8e\xdb\x1e_\xc2\x94\xf6\v\xe2\x91\xa18\xe3\xd8\x86~,\xddG\x8dw\xfcK\x90\xe5\b\xa1:\xa0?\xb1P\xa1\xe7}C\x13b\xecI\f', ' hash=', {'sha256_mb\x00'}}, &(0x7f0000000080)="000000ef020000008dd700763f61a973ad00", &(0x7f0000000c00)=""/174) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xff}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(r0, r2, 0x0, 0x1) 09:41:11 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x7c, 0x7c, 0x2, [@array, @restrict, @ptr, @func, @int, @int, @fwd, @enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x0, 0x9}]}]}}, 0x0, 0x96}, 0x20) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000240)=ANY=[@ANYBLOB="cd80"], 0x2}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x39) ptrace$setregs(0xffffffffffffffff, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) ptrace$cont(0x1f, r0, 0x5, 0x800000000000) 09:41:11 executing program 1: syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='{1,\x00']) r0 = getuid() getresuid(&(0x7f00000014c0), &(0x7f0000001500), &(0x7f0000001540)=0x0) syz_mount_image$vfat(&(0x7f0000000040)='vfat\x00', &(0x7f00000000c0)='./file0\x00', 0x6, 0x6, &(0x7f0000001400)=[{&(0x7f0000000180)="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", 0x1000, 0x8}, {&(0x7f0000000100)="6cdf11e858ed50c4fcdf63", 0xb, 0x7}, {&(0x7f0000001180)="7f633f66a72a2ab6e951feb1de5709a052454f447a81197a2039f1229e5537fb0851c65005cc9afbf2aab1dbd6ab2ec8827e152ace240ab8334f5d800d541fd7109811c78f060f96b8dc39c1c1329b5f5ba12094fe91631dd821d0898759a6f59d147798ffe1b3163c55c1ce518b691f8469f24f52df41d0e1e1b342b0aa963331a557f6fd40550c7b5b21d5dcf7a47b498822a5e6b672e868c77fb16af0534cc195ea34365bb3cb64cc5383653ca07a78167667dd0801cbbca4fe5124a470b2cf2446a287fbe1bf9f2848623ffc48127d5c72a19b6228d8a8c803518b31f3f9189e1b1d490149b5c373fc4038ba5c", 0xef, 0x6}, {&(0x7f0000001280)="e9e0f31f38cd1b", 0x7, 0x1000}, {&(0x7f00000012c0)="5ce2bc6c422f191869d54bceb7980837fd95e1518048c0cab56c886ab401160ff2c7df8f0405eaebef3dd85c60d359bb93e4edd3fbca02af9049af95ab52276892", 0x41, 0x8b}, {&(0x7f0000001340)="ae51f176297352a3405c63db1f290bda8aaf9737ee68ef062505fd0959ae8cc568a4afe90a3a93c683e896f82559e91d9f540cde7be05b024a27147904b8000a0e822ef0a8c467b4bd8e0fa4c22615f99438f90fec2408d329c21123f980e1536a894b9e6570ed701324f5a85bff3a1f6ce9b718ec3ce9bc113fa125cba339c3adcd83d4c1e144f58a68df9420b62ade12e30a51c9210b7cecb952357646b23f4f1d44d2f0", 0xa5, 0x4}], 0x800006, &(0x7f0000001580)={[{@shortname_win95='shortname=win95'}], [{@uid_lt={'uid<', 0xffffffffffffffff}}, {@smackfshat={'smackfshat', 0x3d, 'vfat\x00'}}, {@uid_eq={'uid', 0x3d, r0}}, {@uid_eq={'uid', 0x3d, r1}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@dont_measure='dont_measure'}, {@smackfstransmute={'smackfstransmute', 0x3d, 'vmnet1bdev\x00'}}, {@smackfshat={'smackfshat'}}, {@audit='audit'}]}) 09:41:11 executing program 2: keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000a80)={0x0, 0xc, 0xae}, &(0x7f0000000ac0)={'enc=', 'raw', ' hash=', {'sha384-avx2\x00'}}, &(0x7f0000000b40)="058f6a5fe2db85fa52baca0c", &(0x7f0000000c00)=""/174) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xff}, 0x0) getpid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x62e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1104}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x10, 0x800000000000803, 0x0) ioctl$BLKSECTGET(r0, 0x1267, &(0x7f0000000580)) sendto(r1, &(0x7f0000000000)="120000001600e70d017b00000000008e1584", 0x12, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(r0, r2, 0x0, 0x1) 09:41:11 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000]}, 0x45c) r1 = syz_open_dev$sndtimer(0x0, 0x0, 0x100) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000040)={{0x1}}) gettid() r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[@ANYBLOB="f75f9bf747594d0a1851415d989b48270bb03c9ee80b305cba0432a36b9310552b2e4de8c9de57a65146ad9194a585247c8d2a48e1311d4dd0e973234ea0a1a238326753d3da28e216683f91691b54351036cf18886cd3e555df4a1b907696264440c2e8407ed7160e8250e81157496310f16407a59d7e892d7ea55b9215d7eb723ff1b873c6af16ac27c40d2c4fe0c268984029a5c1adb5df4f4dd2"], 0xb) inotify_add_watch(r2, &(0x7f0000000180)='./file1\x00', 0x80000020) r3 = geteuid() getresgid(&(0x7f0000000140), 0x0, 0x0) fchown(r2, r3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r2) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={r1, 0x28, &(0x7f0000000240)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000002c0)={r4, 0xffffffff, 0xe6d3be648ff4b41c}, 0xc) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x3, 0x0) ioctl$UI_DEV_DESTROY(r0, 0x5502) 09:41:11 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(r0, r1, 0x0, 0x1) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x280000, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff}) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) splice(r3, 0x0, r4, 0x0, 0x100000000ffdc, 0x0) r5 = inotify_add_watch(r3, &(0x7f0000000080)='./file0\x00', 0x8000400) inotify_rm_watch(r2, r5) 09:41:11 executing program 1: syz_mount_image$vfat(&(0x7f0000000040)='\x00\x7f@\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffbf, 0x3cf, 0x0, 0x800, &(0x7f0000000080)=ANY=[]) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r0, &(0x7f0000000140)=ANY=[], 0xfffffc8f) fcntl$setpipe(r0, 0x407, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000080)='cpuacct.stat\x00', 0x0, 0x0) ioctl$TUNSETNOCSUM(r1, 0x400454c8, 0x1) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/\xb0[re\x04u\x93rent\x00\xa2\xa2H\x9a\x00\x00\x00\x00\x00\x00\x00\x02\x00', 0x2, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff}) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) splice(r2, 0x0, r3, 0x0, 0x100000000ffdc, 0x0) ioctl$TCSETXF(r2, 0x5434, &(0x7f0000000100)={0x6cb83955, 0x6f4b1b7e, [0x8, 0x400, 0xffffffffffffffc1, 0x8000, 0x8001], 0xffffffffffffffce}) ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608) 09:41:11 executing program 0: keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000a80)={0x0, 0xc, 0xae}, &(0x7f0000000ac0)={'enc=', 'raw', ' hash=', {'sha384-avx2\x00'}}, &(0x7f0000000b40)="058f6a5fe2db85fa52baca0c", &(0x7f0000000c00)=""/174) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfffffc8f) fcntl$setpipe(r1, 0x407, 0x0) getsockopt$EBT_SO_GET_ENTRIES(r1, 0x0, 0x81, &(0x7f00000001c0)={'broute\x00', 0x0, 0x3, 0x80, [], 0x2, &(0x7f00000000c0)=[{}, {}], &(0x7f0000000100)=""/128}, &(0x7f0000000240)=0x78) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xff}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000080)) r3 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(r0, r3, 0x0, 0x1) 09:41:12 executing program 1: prctl$PR_GET_PDEATHSIG(0x2, &(0x7f0000000080)) syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="646f093178666c6f7070792c00ac4e05377999441ada8b7ebac5582b5fcef53b90cc5bf5e2021c7c2fea1fe9bbb9ea310c040000000d6648af1d7afb544b605e0eb1d3d64096498a2c201012b12aa7b509de3a717bdfc835546e90ba724afcca782a6a626ef049b926edf262ecfc8cac273f6e95424d91378a640e58bec02556a8718773ce52c1c6be173efe0996351e4fcd6247c9cb3d4e21db65501fd9c90a0129a0c7e2f7a664800000"]) pipe2(&(0x7f0000000040)={0xffffffffffffffff}, 0xc800) ioctl$RTC_WIE_OFF(r0, 0x7010) syz_genetlink_get_family_id$tipc(&(0x7f0000000000)='TIPC\x00') 09:41:12 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') recvfrom(r1, &(0x7f00000001c0)=""/137, 0x89, 0x2100, &(0x7f0000000280)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x4e21, 0x40, @dev={0xfe, 0x80, [], 0x13}, 0xffffffff00000001}}, 0x80) sendfile(r0, r1, 0x0, 0x1) getgid() 09:41:12 executing program 4: r0 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_GET_REMOTE_MNG(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x1c, r0, 0x35167ec74c53f472, 0x70bd28, 0x25dfdbfd, {}, ["", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0xf92434ae519d8402}, 0x80) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') r2 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(r1, r2, 0x0, 0x1) 09:41:12 executing program 1: syz_mount_image$vfat(&(0x7f0000000140)='\x00\x00\x00\x16\x00', &(0x7f0000000180)='./file0\x00', 0x6, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[]) pipe(&(0x7f0000000240)={0xffffffffffffffff}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) splice(r0, 0x0, r1, 0x0, 0x100000000ffdc, 0x0) futimesat(r1, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)={{0x0, 0x7530}, {0x77359400}}) 09:41:12 executing program 1: syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@fat=@dos1xfloppy='dos1xfloppy'}]}) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='security.selinux\x00', &(0x7f00000000c0)='system_u:object_r:mtrr_device_t:s0\x00', 0x23, 0x3) 09:41:12 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x20, 0x2342e96739fd0796) r1 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f00000001c0)={{{@in6=@empty, @in6=@local}}, {{@in6=@empty}, 0x0, @in6=@empty}}, &(0x7f00000000c0)=0xe8) ioctl$IOC_PR_REGISTER(r0, 0x401870c8, &(0x7f0000000080)={0x5, 0x111cbf3b}) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') r3 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(r2, r3, 0x0, 0x1) [ 1102.233517] input: syz1 as /devices/virtual/input/input510 [ 1102.372061] input: syz1 as /devices/virtual/input/input511 09:41:14 executing program 1: syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="6482ffffffffffffed7006192d9e1fbd14a1feb685068d098100"/38]) 09:41:14 executing program 2: keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000a80)={0x0, 0xc, 0xae}, &(0x7f0000000ac0)={'enc=', 'raw', ' hash=', {'sha384-avx2\x00'}}, &(0x7f0000000b40)="058f6a5fe2db85fa52baca0c", &(0x7f0000000c00)=""/174) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xff}, 0x0) getpid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x62e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1104}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x10, 0x800000000000803, 0x0) ioctl$BLKSECTGET(r0, 0x1267, &(0x7f0000000580)) sendto(r1, &(0x7f0000000000)="120000001600e70d017b00000000008e1584", 0x12, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(r0, r2, 0x0, 0x1) 09:41:14 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x7c, 0x7c, 0x2, [@array, @restrict, @ptr, @func, @int, @int, @fwd, @enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x0, 0x9}]}]}}, 0x0, 0x96}, 0x20) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000240)=ANY=[@ANYBLOB="cd80"], 0x2}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x39) ptrace$setregs(0xffffffffffffffff, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) ptrace$cont(0x1f, r0, 0x5, 0x800000000000) 09:41:14 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') sendfile(r0, 0xffffffffffffffff, 0x0, 0x1) 09:41:14 executing program 0: keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000a80)={0x0, 0xc, 0xae}, &(0x7f0000000ac0)={'enc=', 'raw', ' hash=', {'sha384-avx2\x00'}}, &(0x7f0000000b40)="058f6a5fe2db85fa52baca0c", &(0x7f0000000c00)=""/174) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xff}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(0xffffffffffffffff, r1, 0x0, 0x1) 09:41:14 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000]}, 0x45c) r1 = syz_open_dev$sndtimer(0x0, 0x0, 0x100) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000040)={{0x1}}) prctl$PR_GET_PDEATHSIG(0x2, &(0x7f00000001c0)) gettid() r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[@ANYBLOB="f75f9bf747594d0a1851415d989b48270bb03c9ef00b305cba0432a36b9310552b2e4de8c9de57a65146ad9194a585247c8d2a48e1311d4dd0e973234ea0a1a238326753d3da28e216683f91691b54351036cf18886cd3e555df4a1b907696264440c2e8407ed7160e8250e81157496310f16407a59d7e892d7ea55b9215d7eb723ff1b873c6af16ac27c40d2c4fe0c268984029a5c1adb5df4f4dd2"], 0xb) inotify_add_watch(r2, &(0x7f0000000180)='./file1\x00', 0x80000020) r3 = geteuid() getresgid(&(0x7f0000000140), 0x0, 0x0) fchown(r2, r3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x3, 0x2000000000, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x0, 0x400, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x0, 0x9, 0xfffffffffffffffa}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r2) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={r1, 0x28, &(0x7f0000000240)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000002c0)={r4, 0xffffffff, 0xe6d3be648ff4b41c}, 0xc) prctl$PR_GET_DUMPABLE(0x3) r5 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000a40)='/selinux/mls\x00', 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCGSTAMP(r6, 0x8906, &(0x7f00000003c0)) getsockopt$inet_IP_IPSEC_POLICY(r7, 0x0, 0x10, &(0x7f0000000400)={{{@in6=@local, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000500)=0xe8) ioctl$sock_inet6_SIOCDIFADDR(r6, 0x8936, &(0x7f0000000540)={@local, 0x7, r8}) setsockopt$packet_drop_memb(r5, 0x107, 0x2, &(0x7f0000000a80)={r8, 0x1, 0x6, @remote}, 0x10) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x3, 0x0) ioctl$UI_DEV_DESTROY(r0, 0x5502) pipe(&(0x7f0000000240)={0xffffffffffffffff}) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) splice(r9, 0x0, r10, 0x0, 0x100000000ffdc, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000880)={{{@in=@initdev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in6=@empty}}, &(0x7f00000003c0)=0xe8) sendmsg$nl_route_sched(r9, &(0x7f0000000a00)={&(0x7f0000000200), 0xc, &(0x7f00000009c0)={&(0x7f0000000ac0)=ANY=[@ANYBLOB="2c000000280002002bbd7000fbdbdf2500000000", @ANYRES32=r11, @ANYBLOB="040012000000000000002730f205238f39abe43bfe820feefb065284edf1a9ba9b2014c5f7000000000000000028eb93c1663eb7adb48c6d5bfa339a459fdb4ae1ef894f3bbf1d90491e97a8995e7baa295bdf9d02ac25633ab2fb9ea4127ea93b3fad4a294e1c3a013670188e502cb42c2137351d63e259e617f5"], 0x2c}, 0x1, 0x0, 0x0, 0x40}, 0x409c011) 09:41:15 executing program 1: r0 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$BINDER_SET_MAX_THREADS(r0, 0x40046205, &(0x7f0000000080)=0x634) syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@fat=@dos1xfloppy='dos1xfloppy'}]}) 09:41:15 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000180)={0x1, 0x1, [@random="857e70087713"]}) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='\x00\x00\x00\x00\x00\x9d\x10\xaf\xd5\xa8\xb4T\x93\xabZ \xa3\xf7\xbd\x10\x93\xbeC\xba-\xa1\x0e7V\x17\x1ar\xb2\xa2\x15\xf0M\xba]\xbe\x1f\x0fa:H\xd9\xf2\xba\xbf\xbc\x89C\xde5=\x82UY\xf5\xc1[\xf6\xf3\xfb\xef~g\tB\t\xbd\x95\x99\x11\xca\x06)\x8f\x83\x1f\xf4`\x85\x05\x9f\x1ea\xc2\xfb\x91\xe6~\xbe\x80\x9b6$NtX\x10[\a\xaa\v\xa1\xc4x\x1a\xa4\xcf\xb75H+\xfc\xd6Q\xaf\xf0\xcd\btT\xde\xc9U\xee-sj+ED\xd2)Ke>\n\x0e\xed\xef^\"\xcfB\xdfJ\xb5\xb5\x81~JR\x9a#\xf0\xa8\x84\x8c\x7f\xdc\f\x11\x03\x90\x8f\xc3\xe1\x01\xfc\xb9n\xc1E\xd9\x87\xbd\x95Z\x03\x89&5\xe50\xc0\xf2\x8c\xb6\xdf2\xb5\x1e!kf\xc0\xf8\xac\xbdk\x95\xa2\xafP\xb5\xd5\xd0\x15J$\xc9o-\xdd\x1f&^\x02\x959$\xa6,\xf2\xeeW\xe5T\xf8\t\xe65\x99\xb5\x9b\x92\xd1k\xd5\xa8\xe8s\xd5\xccG%\xf1\xa6\x9fJ\xce\xe8\xd4\x94\xdf\xbf\x97Q\x9a\xca\xa0I\xde\x1d\xe5\xfb\x92\tSC\xeb8X\x96\xf8\xdd\xc2\x8d\x19\xd2tj\x10fO\xc5w\x9f') sendfile(r0, r1, 0x0, 0x1) 09:41:15 executing program 0: keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000a80)={0x0, 0xc, 0xae}, &(0x7f0000000ac0)={'enc=', 'raw', ' hash=', {'sha384-avx2\x00'}}, &(0x7f0000000b40)="058f6a5fe2db85fa52baca0c", &(0x7f0000000c00)=""/174) r0 = openat$selinux_member(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/member\x00', 0x2, 0x0) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000cc0)="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", 0x1000}, {&(0x7f00000000c0)="4834003645a6b4817eb2f2469bd1455652b6cc88d450655fdfcaeaed8631ccf04e37b75925a2e6840994fab1fb3832d8ce0851d5e20ff7006e7599350c4ba14b33f669a7cc9f5074c02d5776fdc93a68c42f", 0x52}, {&(0x7f00000001c0)="b720fef63b0bda23d6edccfa8faff8443351776840781c90f1cdaa73dc227319a34a00eb8016de72f3f479d005732038ffbc10b11cd15402f96c8c50d6eb4ce4f55eca51b5b3c0345bd5ad7cd911088ddf0e547c4573449069570064443716d46e513e", 0x63}], 0x3) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xff}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') setpriority(0x2, r2, 0x0) sendfile(r1, r3, 0x0, 0x1) 09:41:15 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') pipe(&(0x7f0000000240)={0xffffffffffffffff}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) splice(r1, 0x0, r2, 0x0, 0x100000000ffdc, 0x0) ioctl$EVIOCSKEYCODE(r1, 0x40084504, &(0x7f0000000080)=[0x9, 0x100000001]) r3 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') pipe(&(0x7f0000000240)={0xffffffffffffffff}) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) splice(r4, 0x0, r5, 0x0, 0x100000000ffdc, 0x0) connect$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22, 0x9, @loopback, 0x20}, 0x1c) pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff}, 0x800) ioctl$FS_IOC_FSSETXATTR(r6, 0x401c5820, &(0x7f00000001c0)={0x2, 0x6, 0xfffffffffffff801, 0x6, 0x6}) pipe(&(0x7f0000000240)={0xffffffffffffffff}) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r10 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/avc/hash_stats\x00', 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff}) r12 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) splice(r11, 0x0, r12, 0x0, 0x100000000ffdc, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff}) r14 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) splice(r13, 0x0, r14, 0x0, 0x100000000ffdc, 0x0) write$binfmt_misc(r10, &(0x7f0000000d80)=ANY=[@ANYRES16=r13, @ANYBLOB="e97a423673b5c4f2cef9be2e29801a39a2b8e69813c174fde365582fbf7491c3dc4b11b0ec5a204292f7f0c07b351617d6716047eb6ca6380d6ecb8093cc7e2da363b1908c4b374976a6b676f1fa74f8e9a8feec810fa37b99e431f624838096ddea9931b4c3d2644208f24a58fd8e9f469048ddf2ee450fc9a630c5730ddc13a570e40d375d97e950e8abe53e70c35f720bc5f72cc6c6df237a0ae5a8e467698fdbf216aca49a6c82069fa84b164b3113ff771d125163e5196bbec853e8bb35a39ec8421841", @ANYBLOB="efccdc560fb098810014b82854350fa96cc3c468833818f4167d24d5143a0f1d9f8d709dacb7676732373b9348982ee3913bcb17a1705fecc2c903b2d8ab7bd0a122f6ba7a8403be317499cd24a0a6639c2278293068b6b2edec893ec2c5f55fdaffd290a4f42702c88bc175fb3f6d3b33822634489b211f3fd7e99953fa3fa3"], 0x148) fcntl$setpipe(r9, 0x407, 0x0) write$binfmt_aout(r9, &(0x7f0000000280)=ANY=[@ANYBLOB="cc00fc8b30000000c0000000070000006d02000000000000000000000000000077a03d540d3798743af354dff27a659cdac1f29e5c14f8636f3e23db9df2b14772d819a3399143b392e2d4571df04b239bb36a45c407befb5b57297a508a307e1e9443e15dcbb2f1fcd12604bf6867416ffcb10650ebaa408e3fa736718770a60be9426063cfe4aea968ab7654ca5314ab4fbccbb630589ac67ec94a36422d56c115651a60612a99734329a3a3b4f861d824ed3ea1202f5516e6c89aa6090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000b02700"/1982], 0x7be) splice(r7, 0x0, r8, 0x0, 0x100000000ffdc, 0x0) ioctl$BLKGETSIZE64(r7, 0x80081272, &(0x7f00000000c0)) sendfile(r0, r3, 0x0, 0x1) [ 1105.061784] input: syz1 as /devices/virtual/input/input512 09:41:15 executing program 1: syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x840, &(0x7f0000000040)={[{@fat=@dos1xfloppy='dos1xfloppy'}]}) 09:41:15 executing program 0: keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000a80)={0x0, 0x23e, 0xfffffec9}, &(0x7f0000000ac0)={'enc=', 'raw', ' hash=', {'sha224-avx\x00'}}, &(0x7f0000000b40)="058f6a5fe2db85fa52baca0c", &(0x7f0000000c00)=""/174) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r0, &(0x7f0000000140)=ANY=[], 0xfffffc8f) fcntl$setpipe(r0, 0x407, 0x0) ioctl$BLKFRASET(r0, 0x1264, &(0x7f0000000080)=0x9) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xff}, 0x0) r1 = getpid() r2 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x2e00, 0x0) ioctl$RTC_WKALM_SET(r2, 0x4028700f, &(0x7f0000000100)={0x1, 0x1, {0x13, 0x2e, 0xe, 0xc, 0x5, 0x20, 0x1, 0xab}}) sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) sendfile(0xffffffffffffffff, r3, 0x0, 0x1) 09:41:15 executing program 1: pipe(&(0x7f0000000240)={0xffffffffffffffff}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) splice(r0, 0x0, r1, 0x0, 0x100000000ffdc, 0x0) ioctl(r0, 0x7, &(0x7f0000000080)="b84771a0a765f714d7a69e077835dfabda31e4f1865a9442e14afbd9ccefa2a18283b19688121fc707dcc026a015e1ee401a2702f48b1256431182eeb9c19d78af712b5fcdd2c39013243dc7fbf7887c62012f8d2b68a8f04ab754e37ef75284e8ada04ebbaf8524cdcc4a17985b9bc6da8911716f48072a40cfab3efd9a5a7ed45e9b4803465fdeb1fe358c1d08cc18a302fd193535885a4678d3857c51b3e963c858dc346cb528b00956b10d0c86e950") syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@fat=@dos1xfloppy='dos1xfloppy'}]}) 09:41:15 executing program 4: sched_yield() r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f0000000000)) ptrace(0x10, r0) ptrace$getregset(0x4204, r0, 0x1, &(0x7f0000001140)={0xffffffffffffffff}) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f0000000000)) ptrace(0x10, r1) ptrace$getregset(0x4204, r1, 0x1, &(0x7f0000001140)={0xffffffffffffffff}) r2 = syz_open_procfs(r1, &(0x7f00000000c0)='clear_refs\x00') r3 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(r2, r3, 0x0, 0x1) ioctl$SNDRV_TIMER_IOCTL_PVERSION(r2, 0x80045400, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000080)=0x8) 09:41:18 executing program 2: keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000a80)={0x0, 0xc, 0xae}, &(0x7f0000000ac0)={'enc=', 'raw', ' hash=', {'sha384-avx2\x00'}}, &(0x7f0000000b40)="058f6a5fe2db85fa52baca0c", &(0x7f0000000c00)=""/174) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xff}, 0x0) getpid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x62e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1104}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x10, 0x800000000000803, 0x0) ioctl$BLKSECTGET(r0, 0x1267, &(0x7f0000000580)) sendto(r1, &(0x7f0000000000)="120000001600e70d017b00000000008e1584", 0x12, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(r0, r2, 0x0, 0x1) 09:41:18 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x7c, 0x7c, 0x2, [@array, @restrict, @ptr, @func, @int, @int, @fwd, @enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x0, 0x9}]}]}}, 0x0, 0x96}, 0x20) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000240)=ANY=[@ANYBLOB="cd80"], 0x2}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x39) ptrace$setregs(0xffffffffffffffff, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) ptrace$cont(0x1f, r0, 0x5, 0x800000000000) 09:41:18 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000]}, 0x45c) r1 = syz_open_dev$sndtimer(0x0, 0x0, 0x100) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000040)={{0x1}}) gettid() r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[@ANYBLOB="f75f9bf747594d0a1851415d989b48270bb03c9ef00b305cba0432a36b9310552b2e4de8c9de57a65146ad9194a585247c8d2af8e1311d4dd0e973234ea0a1a238326753d3da28e216683f91691b54351036cf18886cd3e555df4a1b907696264440c2e8407ed7160e8250e81157496310f16407a59d7e892d7ea55b9215d7eb723ff1b873c6af16ac27c40d2c4fe0c268984029a5c1adb5df4f4dd2"], 0xb) inotify_add_watch(r2, &(0x7f0000000180)='./file1\x00', 0x80000020) r3 = geteuid() getresgid(&(0x7f0000000140), 0x0, 0x0) fchown(r2, r3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r2) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={r1, 0x28, &(0x7f0000000240)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000002c0)={r4, 0xffffffff, 0xe6d3be648ff4b41c}, 0xc) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x3, 0x0) ioctl$UI_DEV_DESTROY(r0, 0x5502) 09:41:18 executing program 1: getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000001c0)={{{@in=@multicast2, @in=@loopback}}, {{}, 0x0, @in=@initdev}}, &(0x7f0000000100)=0xffffffffffffff5f) r0 = geteuid() setreuid(0x0, r0) syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x2028, &(0x7f0000000080)=ANY=[@ANYBLOB='dos1O\x00\x00\x00\x00\x00\x00\x00\x00']) pipe(&(0x7f0000000240)={0xffffffffffffffff}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) splice(r1, 0x0, r2, 0x0, 0x100000000ffdc, 0x0) r3 = openat$cgroup_ro(r1, &(0x7f0000000000)='pids.current\x00', 0x0, 0x0) ioctl$EVIOCSABS3F(r3, 0x401845ff, &(0x7f0000000040)={0x1, 0x401, 0x8, 0x5, 0x572, 0x7}) 09:41:18 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000180)='stav\x00') sendfile(r0, r1, 0x0, 0x1) 09:41:18 executing program 0: keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000a80)={0x0, 0xc, 0xae}, &(0x7f00000006c0)=ANY=[@ANYBLOB="656e633d72617720686173683d7368613338342d6176783200000000000064abba84bda33f990000000000000000000000000000000000000000000000000000bb00"/78], &(0x7f0000000b40)="058f6a5fe2db85fa52baca0c", &(0x7f0000000c00)=""/174) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xff}, 0x0) r1 = getpid() pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xfffffc8f) fcntl$setpipe(r2, 0x407, 0x0) r3 = getpid() rt_tgsigqueueinfo(r3, r3, 0x16, &(0x7f0000000000)) pipe(&(0x7f0000000240)={0xffffffffffffffff}) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) splice(r4, 0x0, r5, 0x0, 0x100000000ffdc, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff}) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) splice(r6, 0x0, r7, 0x0, 0x100000000ffdc, 0x0) recvmmsg(r6, &(0x7f0000000600)=[{{&(0x7f0000000100)=@pptp, 0x80, &(0x7f0000000400)=[{&(0x7f00000002c0)=""/176, 0xb0}, {&(0x7f00000001c0)=""/23, 0x17}, {&(0x7f0000000200)}, {&(0x7f0000000380)=""/54, 0x36}, {&(0x7f00000003c0)=""/7, 0x7}], 0x5}, 0x101}, {{&(0x7f0000000480)=@can={0x1d, 0x0}, 0x80, &(0x7f0000000500), 0x0, &(0x7f0000000540)=""/145, 0x91}, 0x4}], 0x2, 0x40000000, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(r4, 0x8918, &(0x7f0000000680)={@rand_addr="5c34133273713783fe172c675bb1ca60", 0x76, r8}) ptrace(0x10, r3) ptrace$getregset(0x4204, r3, 0x1, &(0x7f0000001140)={0xffffffffffffffff}) write$P9_RGETLOCK(r2, &(0x7f00000000c0)={0x1e, 0x37, 0x2, {0x0, 0x5, 0xfff, r3}}, 0x1e) ioctl$sock_inet_SIOCGIFADDR(r0, 0x8915, &(0x7f0000000080)={'bridge_slave_0\x00', {0x2, 0x4e23, @loopback}}) restart_syscall() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x100000000, 0x5}, 0x0) r9 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(r0, r9, 0x0, 0x1) 09:41:18 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') r2 = getpgid(0x0) fcntl$lock(r0, 0x7, &(0x7f0000000040)={0x0, 0x1, 0x648, 0x47fa5b9a, r2}) sendfile(r0, r1, 0x0, 0x1) 09:41:18 executing program 1: syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x3432020, &(0x7f0000000000)={[{@fat=@dos1xfloppy='dos1xfloppy'}], [{@context={'context', 0x3d, 'sysadm_u'}}, {@fsname={'fsname'}}, {@appraise_type='appraise_type=imasig'}]}) 09:41:18 executing program 1: syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="72100000795b00"]) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x501040, 0x1) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) splice(r1, 0x0, r2, 0x0, 0x100000000ffdc, 0x0) ioctl$int_out(r0, 0x82f0, &(0x7f0000000100)) utimensat(r1, &(0x7f0000000080)='./file0/file0\x00', &(0x7f00000000c0)={{}, {0x77359400}}, 0x100) 09:41:18 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(r0, r1, 0x0, 0x1) ioctl$TCSETS(r1, 0x5402, &(0x7f0000000040)={0x6, 0x7, 0x4, 0xbc04, 0x8, 0xa64, 0x7ff, 0x65, 0x20, 0x9, 0x100000001, 0x8}) pipe(&(0x7f0000000240)={0xffffffffffffffff}) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) splice(r2, 0x0, r3, 0x0, 0x100000000ffdc, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff}) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) splice(r4, 0x0, r5, 0x0, 0x100000000ffdc, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r5, 0x0, 0x10, &(0x7f00000001c0)={{{@in=@multicast1, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in6=@ipv4={[], [], @loopback}}}, &(0x7f00000000c0)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000100)={0x0, 0x0}, &(0x7f0000000140)=0xc) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000002c0)=0x0) sendmsg$nl_netfilter(r2, &(0x7f0000000580)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000540)={&(0x7f0000000300)={0x214, 0xe, 0x17ea75a051cab4a6, 0x2, 0x70bd2c, 0x25dfdbff, {0x5}, [@nested={0x194, 0x18, [@typed={0x100, 0x46, @binary="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"}, @typed={0x8, 0x61, @ipv4=@loopback}, @typed={0x8, 0x4c, @uid=r6}, @typed={0x4, 0x5f}, @typed={0xc, 0x1, @str='stat\x00'}, @generic="e06bd3dbb54215e7f091818e46a835d2642ea6663fbc5a4326883486b9ef7c950304cd957d5a4571626d38a0c22529202f4a659b5c708744317ce60ee5f3f60a15e9c7900be752e0c0f4b8ed52946a185ed4a98f9b70c89c9d41eee1e43988b15b7124fb49c995c9d94b8d77fbe8"]}, @nested={0x40, 0x5a, [@typed={0x8, 0x2e, @uid=r7}, @typed={0x8, 0x58, @pid=r8}, @typed={0x8, 0x4e, @pid}, @typed={0x24, 0x65, @str='eth0ppp0,vboxnet0-\x8abdevem1eth0&\x00'}]}, @typed={0x8, 0xf, @fd=r0}, @generic="9f4d1a243cc2e898dcfe315506403eb3b201a84127cff6f5a7028e6ad57be345554f"]}, 0x214}, 0x1, 0x0, 0x0, 0x2001c0d0}, 0x20044094) 09:41:18 executing program 1: syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@fat=@dos1xfloppy='dos1xfloppy'}]}) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000000c0)={r0, 0x9, 0x0, 0xc, &(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0], 0x4}, 0x20) 09:41:18 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(r0, r1, 0x0, 0x1) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xfffffc8f) fcntl$setpipe(r2, 0x407, 0x0) write$binfmt_misc(r2, &(0x7f0000000080)={'syz0', "7d03c06d5bcc868cda3ab91b7b407ec681ae2903cd0b56212e68c2956bb0a78d46d7ed459ee80304680139a20b31b8e8400ea369c65898bf92529a9a8fd66e38149339dd294c3dda824bd0452df91b63f3fdc02c199133718d4b39f1d1"}, 0x61) open(&(0x7f0000000040)='./file0\x00', 0x929fcc5ca12841b8, 0x180) 09:41:18 executing program 2: keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000a80)={0x0, 0xc, 0xae}, &(0x7f0000000ac0)={'enc=', 'raw', ' hash=', {'sha384-avx2\x00'}}, &(0x7f0000000b40)="058f6a5fe2db85fa52baca0c", &(0x7f0000000c00)=""/174) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xff}, 0x0) getpid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x62e, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x10, 0x800000000000803, 0x0) ioctl$BLKSECTGET(r0, 0x1267, &(0x7f0000000580)) sendto(r1, &(0x7f0000000000)="120000001600e70d017b00000000008e1584", 0x12, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(r0, r2, 0x0, 0x1) 09:41:21 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x7c, 0x7c, 0x2, [@array, @restrict, @ptr, @func, @int, @int, @fwd, @enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x0, 0x9}]}]}}, 0x0, 0x96}, 0x20) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000240)=ANY=[@ANYBLOB="cd80"], 0x2}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x39) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) ptrace$cont(0x1f, r0, 0x5, 0x800000000000) 09:41:21 executing program 1: syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@fat=@errors_remount='errors=remount-ro'}]}) 09:41:21 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f0000005580)=[{{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000880)=""/195, 0xc3}, {&(0x7f00000058c0)=""/223, 0xdf}], 0x2, &(0x7f0000000a80)=""/4096, 0x1000}, 0x4}, {{&(0x7f0000001a80)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev}}}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000001b00)=""/188, 0xbc}, {&(0x7f0000000200)=""/7, 0x7}, {&(0x7f0000001bc0)=""/176, 0xb0}], 0x3, &(0x7f0000001c80)=""/155, 0x9b}, 0x4}, {{&(0x7f0000001d40)=@caif=@util, 0x80, &(0x7f0000001fc0)=[{&(0x7f00000059c0)=""/194, 0xc2}, {&(0x7f0000001ec0)}, {&(0x7f0000001f00)=""/155, 0x9b}], 0x3, &(0x7f0000002000)=""/4096, 0x1000}, 0x3f}, {{&(0x7f0000003000)=@ax25={{0x3, @default}, [@null, @netrom, @rose, @null, @default, @rose, @null]}, 0x80, &(0x7f00000033c0)=[{&(0x7f0000003080)=""/141, 0x8d}, {&(0x7f0000003140)=""/154, 0x9a}, {&(0x7f0000003200)=""/229, 0xe5}, {&(0x7f0000003300)=""/155, 0x9b}], 0x4, &(0x7f0000003400)=""/113, 0x71}, 0x5}, {{&(0x7f0000003480)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @loopback}}, 0x80, &(0x7f0000003900)=[{&(0x7f0000003500)=""/244, 0xf4}, {&(0x7f0000003600)=""/132, 0x84}, {&(0x7f00000036c0)=""/223, 0xdf}, {&(0x7f00000037c0)=""/1, 0x1}, {&(0x7f0000003800)=""/223, 0xdf}], 0x5, &(0x7f0000003980)=""/139, 0x8b}, 0x5}, {{0x0, 0x0, &(0x7f0000004cc0)=[{&(0x7f0000003a40)=""/92, 0x5c}, {&(0x7f0000003ac0)=""/4096, 0x1000}, {&(0x7f0000004ac0)=""/53, 0x35}, {&(0x7f0000004b00)=""/196, 0xc4}, {&(0x7f0000004c00)=""/98, 0x62}, {&(0x7f0000004c80)=""/21, 0x15}], 0x6}, 0x69f}, {{&(0x7f0000004d40)=@pptp={0x18, 0x2, {0x0, @initdev}}, 0x80, &(0x7f0000004fc0)=[{&(0x7f0000004dc0)=""/195, 0xc3}, {&(0x7f0000004ec0)=""/199, 0xc7}], 0x2}, 0x80000001}, {{&(0x7f0000005000)=@x25={0x9, @remote}, 0x80, &(0x7f0000005500)=[{&(0x7f0000005080)=""/9, 0x9}, {&(0x7f00000050c0)=""/101, 0x65}, {&(0x7f0000005140)=""/224, 0xe0}, {&(0x7f0000005240)=""/156, 0x9c}, {&(0x7f0000005300)=""/180, 0xb4}, {&(0x7f00000053c0)=""/150, 0x96}, {&(0x7f0000005480)=""/84, 0x54}], 0x7}, 0x7f}], 0x8, 0x20, &(0x7f0000005780)={0x77359400}) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5421, 0xfffffffffffffffe) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f00000004c0)='IPVS\x00') sendmsg$IPVS_CMD_SET_DEST(r1, &(0x7f0000000640)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x28000000}, 0xc, &(0x7f0000000600)={&(0x7f0000000500)={0xa4, r2, 0x8, 0x70bd29, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_SERVICE={0x28, 0x1, [@IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e24}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x1}}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x14}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x400}, @IPVS_CMD_ATTR_DEST={0x4}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x10001}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x4}, @IPVS_CMD_ATTR_DEST={0x4c, 0x2, [@IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@mcast2}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x100}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x2}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x3a}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@empty}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x3}]}]}, 0xa4}, 0x1, 0x0, 0x0, 0x40}, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(r0, &(0x7f0000005880)={&(0x7f00000057c0)={0x10, 0x0, 0x0, 0x42000000}, 0xc, &(0x7f0000005840)={&(0x7f0000005800)={0x24, r2, 0x20, 0x70bd29, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x7f}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x8}]}, 0x24}, 0x1, 0x0, 0x0, 0x4}, 0x4000) r3 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r3, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc]}, 0x45c) r4 = syz_open_dev$sndtimer(0x0, 0x0, 0x100) ioctl$SNDRV_TIMER_IOCTL_SELECT(r4, 0x40345410, &(0x7f0000000040)={{0x1}}) gettid() r5 = creat(&(0x7f00000000c0)='./file0\x00', 0x1) inotify_add_watch(r5, &(0x7f0000000180)='./file1\x00', 0x80000020) r6 = geteuid() getresgid(&(0x7f0000000140), 0x0, 0x0) fchown(r5, r6, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r5) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={r4, 0x28, &(0x7f0000000240)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000002c0)={r7, 0xffffffff, 0xe6d3be648ff4b41c}, 0xc) pipe(&(0x7f0000000240)={0xffffffffffffffff}) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) splice(r8, 0x0, r9, 0x0, 0x100000000ffdc, 0x0) fcntl$F_GET_FILE_RW_HINT(r8, 0x40d, &(0x7f0000001ec0)) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r3, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x3, 0x0) ioctl$UI_DEV_DESTROY(r3, 0x5502) 09:41:21 executing program 2: keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000a80)={0x0, 0xc, 0xae}, &(0x7f0000000ac0)={'enc=', 'raw', ' hash=', {'sha384-avx2\x00'}}, &(0x7f0000000b40)="058f6a5fe2db85fa52baca0c", &(0x7f0000000c00)=""/174) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xff}, 0x0) getpid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x62e, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x10, 0x800000000000803, 0x0) ioctl$BLKSECTGET(r0, 0x1267, &(0x7f0000000580)) sendto(r1, &(0x7f0000000000)="120000001600e70d017b00000000008e1584", 0x12, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(r0, r2, 0x0, 0x1) 09:41:21 executing program 0: keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000a80)={0x0, 0xc, 0xae}, &(0x7f0000000ac0)={'enc=', 'raw', ' hash=', {'sha384-avx2\x00'}}, &(0x7f0000000b40)="058f6a5fe2db85fa52baca0c", &(0x7f0000000c00)=""/174) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xff}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(r0, r2, 0x0, 0x1) pipe(&(0x7f0000000240)={0xffffffffffffffff}) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) splice(r3, 0x0, r4, 0x0, 0x100000000ffdc, 0x0) setsockopt$inet_mreq(r4, 0x0, 0x24, &(0x7f0000000080)={@remote, @multicast2}, 0x8) 09:41:21 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f0000000000)) ptrace(0x10, r1) ptrace$getregset(0x4204, r1, 0x1, &(0x7f0000001140)={0xffffffffffffffff}) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xfffffc8f) fcntl$setpipe(r2, 0x407, 0x0) ioctl$TIOCOUTQ(r2, 0x5411, &(0x7f0000000080)) sendfile(r0, 0xffffffffffffffff, 0x0, 0x1) 09:41:21 executing program 1: setxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f00000000c0)={0x0, 0xfb, 0x63, 0x1, 0x8, "1a8411478e8ebfcbe3cebcd8f833c2dd", "6d1bd772482be368cdf56d76fc75163a06d1d071a7dd076e01f7133baa16cf05f92a1f7f11bb3cd738c01d94b5cebaa731e5d1e5523743df9a9751c19c1147e55301e2009db3eb54e0037efd4455"}, 0x63, 0x3) syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@fat=@dos1xfloppy='dos1xfloppy'}]}) setxattr$security_selinux(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='security.selinux\x00', &(0x7f0000000240)='system_u:object_r:crond_exec_t:s0\x00', 0x22, 0x1) 09:41:21 executing program 0: keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000a80)={0x0, 0xc, 0xae}, &(0x7f0000000080)=ANY=[@ANYBLOB="656e633d7265772068615a684625cf87901876656176783200000000000000000000000000000000000000000000000000000000000000000000f40000000000000000000000000000000000005100000000000000000d6546a8e949a13a604b55e45d1d1b627223284dc0282924a8739823edc4c9b91b1b4a8f5d095aa66ea5271234cfbbd887e5aedd7b7893adbbb158bd8ec4ed394fceb1bdc19abcd528b26c740df8efdd5b6849eed9b432b70e3eeae200"/191], &(0x7f0000000b40)="058f6a5fe2db85fa52baca0c", &(0x7f0000000c00)=""/174) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xff}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(0xffffffffffffffff, r1, 0x0, 0x1) pipe(&(0x7f0000000240)={0xffffffffffffffff}) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) splice(r2, 0x0, r3, 0x0, 0x100000000ffdc, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r3, 0x10e, 0x4, &(0x7f0000000000)=0xbb, 0x4) r4 = open(&(0x7f00000001c0)='./file0\x00', 0x400000, 0x20) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r4, 0xc0506617, &(0x7f00000002c0)={{0x5, 0x0, @descriptor="1823c8638d6b4d1e"}, 0xf7, [], "df6bd5a02f42779586dd2a4cb46a4fd43a1d9c7e5929214009f1e15ad9537340bfc60da99947f4ab1550ce92326e452741273968701296de3a19286d305fb06deea1915fb6cbd0c4e6291459fd6ebfe9055aef0f64e857accc7f3c1c277a8a50f414eb77361f632a1f209b8143e84bd14c94bd6c3b519e69d1b096e7c6799bce04053c722513ff8c321bc8719dced84abe655bc6ac89a13cb0695cea0a21d586dd4957ad377c63d171d100feea666dd472f1a6f2e75ff585e029ddb344a0c27f644489a151f6653ae7bf8dbb1fcdb568bea4c3de950d97cd09f5d00d2be13cbe84716865fa8c6a09a0c239c9e1f62fb74696917581e744"}) 09:41:21 executing program 1: syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="642da53550b2596f5d0dd0b161"]) openat$pidfd(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self\x00', 0x80002, 0x0) [ 1111.124150] input: syz1 as /devices/virtual/input/input514 09:41:21 executing program 0: keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000a80)={0x0, 0xc, 0xae}, &(0x7f0000000ac0)={'enc=', 'raw', ' hash=', {'sha384-avx2\x00'}}, &(0x7f0000000b40)="058f6a5fe2db85fa52baca0c", &(0x7f0000000c00)=""/174) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') prlimit64(0x0, 0xb, &(0x7f0000000280)={0x9, 0xff}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = gettid() r3 = syz_open_procfs(r2, &(0x7f00000003c0)='status\x00') sendfile(r0, r3, 0x0, 0x1) 09:41:21 executing program 1: syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000180)='./file0\x00', 0x4, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@fat=@dos1xfloppy='dos1xfloppy'}], [{@defcontext={'defcontext', 0x3d, 'root'}}]}) 09:41:21 executing program 1: syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@fat=@dos1xfloppy='dos1xfloppy'}]}) rt_sigpending(&(0x7f0000000000), 0x8) 09:41:24 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x7c, 0x7c, 0x2, [@array, @restrict, @ptr, @func, @int, @int, @fwd, @enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x0, 0x9}]}]}}, 0x0, 0x96}, 0x20) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000240)=ANY=[@ANYBLOB="cd80"], 0x2}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x39) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) ptrace$cont(0x1f, r0, 0x5, 0x800000000000) 09:41:24 executing program 0: keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000a80)={0x0, 0xc, 0xae}, &(0x7f0000000080)=ANY=[@ANYBLOB="656e633d7276772068ce386173683d7368613338342d6176783200000000000000000000000000000000000000000000000000000000000000001500000000000000000000000000000000007ee208e6c097829500"/97], &(0x7f0000000b40)="058f6a5fe2db85fa52baca0c", &(0x7f0000000c00)=""/174) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') r1 = add_key(&(0x7f0000000100)='trusted\x00', &(0x7f0000000140)={'syz', 0x1}, &(0x7f00000002c0)="686b30ebf9d11b93202cbde045572f7ee37430f48b57078aa54b95cb260e757f513ed6999dc3c449e10a29bbb4d46f7bd64ced42b0cbee2bf46fa1ab4f840b08db7aab84f47a6db364ae255fe7ab3932eaa83175c324d4844860ac25b133b332bcaed87466551232321f4b8073cfc19235df41058004a0193c422c2df8d2b494d36390938bc41645c70e8ccfb023bac4589a20caf55456bb312bef0aac3a0e6b7faac33cf31242500bdf3e827f316a9566d77189b869365577dc9754f4b09f96acb34986224ee2e8efcc23e2ac9d021402095b0e73de36d32c543509", 0xdc, 0xfffffffffffffff9) keyctl$describe(0x6, r1, &(0x7f00000003c0)=""/240, 0xf0) r2 = getpgid(0xffffffffffffffff) capget(&(0x7f00000001c0)={0x20071026, r2}, &(0x7f0000000200)={0x5, 0x7ff, 0x80000000, 0x1, 0xf33b}) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xff}, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(r0, r4, 0x0, 0x1) 09:41:24 executing program 2: keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000a80)={0x0, 0xc, 0xae}, &(0x7f0000000ac0)={'enc=', 'raw', ' hash=', {'sha384-avx2\x00'}}, &(0x7f0000000b40)="058f6a5fe2db85fa52baca0c", &(0x7f0000000c00)=""/174) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xff}, 0x0) getpid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x62e, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x10, 0x800000000000803, 0x0) ioctl$BLKSECTGET(r0, 0x1267, &(0x7f0000000580)) sendto(r1, &(0x7f0000000000)="120000001600e70d017b00000000008e1584", 0x12, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(r0, r2, 0x0, 0x1) 09:41:24 executing program 1: pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r0, &(0x7f0000000140)=ANY=[], 0xfffffc8f) fcntl$setpipe(r0, 0x407, 0x0) ioctl$TIOCSTI(r0, 0x5412, 0xeace) syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@fat=@dos1xfloppy='dos1xfloppy'}]}) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f0000000000)) ptrace(0x10, r1) ptrace$getregset(0x4204, r1, 0x1, &(0x7f0000001140)={0xffffffffffffffff}) sched_setaffinity(r1, 0x8, &(0x7f0000000000)) 09:41:24 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000]}, 0x45c) r1 = syz_open_dev$sndtimer(0x0, 0x0, 0x100) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000040)={{0x1}}) gettid() r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[@ANYBLOB="f75f9bf747594d0a1851415d989b48270bb03c9ef00b305cba0432a36b9310552b2e4de8c9de57a65146ad9194a585247c8d2a48e1311d4dd0e973234ea0a1a238326753d3da28e216663f91691b54351036cf18886cd3e555df4a1b907696264440c2e8407ed7160e8250e81157496310f16407a59d7e892d7ea55b9215d7eb723ff1b873c6af16ac27c40d2c4fe0c268984029a5c1adb5df4f4dd2"], 0xb) inotify_add_watch(r2, &(0x7f0000000180)='./file1\x00', 0x80000020) r3 = geteuid() getresgid(&(0x7f0000000140), 0x0, 0x0) fchown(r2, r3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r2) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={r1, 0x28, &(0x7f0000000240)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000002c0)={r4, 0xffffffff, 0xe6d3be648ff4b41c}, 0xc) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f00000001c0)='./file1\x00', 0x184) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x3, 0x0) ioctl$UI_DEV_DESTROY(r0, 0x5502) 09:41:24 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') ioctl(0xffffffffffffffff, 0x6, &(0x7f0000000040)="e77ba4af173c7a3f1f2fd475e367f847948f1e8dc7fbb1c9386ae595baad5f9ad66e52ddae4077fd33cc72dcb3aae0520888a392f512a7da929ae96702999abcdbe24dabb18cd8b3ae5acdca28792ccc1c572e6bffcdbf55b97f5e5d9e37711ff3195ff7f25affe7bc732bf05f68d2452c2eb705a8ffb56e432d802db0bb1309b8") sendfile(r0, r1, 0x0, 0x1) 09:41:24 executing program 0: keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000a80)={0x0, 0xc, 0xae}, &(0x7f0000000ac0)=ANY=[@ANYBLOB='enc=raw ha{h=sha384-avx2\x00'/77], &(0x7f0000000b40)="058f6a5fe2db85fa52baca0c", &(0x7f0000000c00)=""/174) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xff}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = getpid() rt_tgsigqueueinfo(r2, r2, 0x16, &(0x7f0000000000)) ptrace(0x10, r2) ptrace$getregset(0x4204, r2, 0x1, &(0x7f0000001140)={0xffffffffffffffff}) r3 = syz_open_procfs(r2, &(0x7f0000000080)='stat\x00') sendfile(r0, r3, 0x0, 0x1) 09:41:24 executing program 4: r0 = getpid() syz_open_procfs(r0, &(0x7f0000000000)='clear_refs\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000040)='stat\x00') pipe(&(0x7f0000000080)={0xffffffffffffffff}) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) splice(r2, 0x0, r3, 0x0, 0x100000000ffdc, 0x0) write$UHID_CREATE(r1, &(0x7f0000000280)={0x0, 'syz1\x00', 'syz1\x00', 'syz1\x00', &(0x7f0000000080), 0x0, 0x7ff, 0xe0, 0x0, 0x4, 0x80000001}, 0x120) ioctl$ASHMEM_GET_PIN_STATUS(r2, 0x7709, 0x0) 09:41:24 executing program 0: keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000a80)={0x0, 0xc, 0xae}, &(0x7f00000006c0)=ANY=[@ANYBLOB="656e633d72617720686173683d7368613338342d6176783200000000000000000000000000000000008b2f000000000000000000000000000000000000000000c77e6cfaa2143bde7157ad04a6514bc17a129d31f92b3ebd6babde17a96d19d75ae22c365ea7a26f2c13134acf2c213d98485aa5762def1052a13e534d5d38f895792eb0a339575a25f3c180748724577939f631d02b17009728acd940b81677a3a849be35f24cc569549f4605873d97bb16210c855cf38dd4bf9d9ad57b7fb6a920125f29bf61b80babbd7dd6008fb5b42fdfc29650dd98c81600"/231], &(0x7f0000000b40)="058f6a5fe2db85fa52baca0c", &(0x7f0000000c00)=""/174) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xff}, 0x0) r1 = getpid() r2 = getpid() rt_tgsigqueueinfo(r2, r2, 0x16, &(0x7f0000000000)) ptrace(0x10, r2) ptrace$getregset(0x4204, r2, 0x1, &(0x7f0000001140)={0xffffffffffffffff}) getpgid(r2) rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f0000000000)) ptrace(0x10, r1) pipe(&(0x7f0000000240)={0xffffffffffffffff}) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) splice(r3, 0x0, r4, 0x0, 0x100000000ffdc, 0x0) r5 = syz_genetlink_get_family_id$fou(&(0x7f0000000140)='fou\x00') pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000240)={0xffffffffffffffff}) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) splice(r8, 0x0, r9, 0x0, 0x100000000ffdc, 0x0) r10 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000340)='IPVS\x00') sendmsg$IPVS_CMD_DEL_SERVICE(r9, &(0x7f0000000680)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x240320}, 0xc, &(0x7f0000000380)={&(0x7f0000000580)={0xc8, r10, 0x100, 0x70bd26, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x4}, @IPVS_CMD_ATTR_DAEMON={0x14, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x4}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e22}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x3}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xe6}, @IPVS_CMD_ATTR_SERVICE={0x30, 0x1, [@IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x21}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@multicast2}]}, @IPVS_CMD_ATTR_SERVICE={0x58, 0x1, [@IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x1e}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x85315d8f4f86a908}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x20, 0x20}}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e24}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'sh\x00'}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x44}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'nq\x00'}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x2}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x4d}]}]}, 0xc8}, 0x1, 0x0, 0x0, 0x24020006}, 0x4040000) ioctl$SIOCGSTAMP(r6, 0x8906, &(0x7f00000003c0)) getsockopt$inet_IP_IPSEC_POLICY(r7, 0x0, 0x10, &(0x7f0000000400)={{{@in6=@local, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000500)=0xe8) ioctl$sock_inet6_SIOCDIFADDR(r6, 0x8936, &(0x7f0000000540)={@local, 0x7, r11}) sendmsg$FOU_CMD_GET(r4, &(0x7f00000002c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x800090}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)=ANY=[@ANYBLOB='T\x00\x00\x00', @ANYRES16=r5, @ANYBLOB="02002dbd7000fddbdf250300000008000b00", @ANYRES32=r11, @ANYBLOB="140009000000000000000000007400000000000114000900ff010000000000000000000000000001080008007f0000010400050004000500"], 0x54}, 0x1, 0x0, 0x0, 0x80}, 0x10) ptrace$getregset(0x4204, r1, 0x1, &(0x7f0000001140)={0xffffffffffffffff}) ptrace$setregs(0xf, r1, 0x2, &(0x7f0000000080)="76e00c3bc2ff09dcb7a3468de781cb719dde7656f12df5ea86eeb7423ecc0ed5589d901b8ad94a497f17aafbfd79055d640b5a0102396e79a784cfe4e289f5f6ccbf744eba9bc7b6e50c337debcf3ad9aa85ced2") r12 = getpid() sched_setattr(r12, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r13 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(r0, r13, 0x0, 0x1) 09:41:24 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfffffc8f) fcntl$setpipe(r1, 0x407, 0x0) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f00000000c0)) pipe(&(0x7f0000000240)={0xffffffffffffffff}) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) splice(r2, 0x0, r3, 0x0, 0x100000000ffdc, 0x0) r4 = fcntl$getown(r2, 0x9) r5 = syz_open_procfs(r4, &(0x7f0000000040)='stat\x00\xcdFN\x1d;\xa8\x9d\x85=%\xa2lU\xc8N\xfe\xabZ\xbd\xd9{\xca\xac\xfe\xa7\xa6\xf2T\xd1\xe2\xcbP\xf2\xa3\xe7\x82\xaf\xc9\xfb\xaa\x15K)\xbd<\xf7H\xff\xe7\xf8\x91\xf5\xdb\xa5\x8c\xab)&\xe2\xf1\xfd\xaag\x18\xc7\xb7\xeds\xebR?\xce\xc1\x95\xc3\x85\x8be\xb7\x93>\x1c\xd6y\xf5M\xb5\xf9\xd2=\x96') sendfile(r0, r5, 0x0, 0x1) 09:41:24 executing program 0: r0 = add_key$keyring(&(0x7f0000000200)='keyring\x00', &(0x7f0000000240)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) keyctl$restrict_keyring(0x1d, r0, &(0x7f0000000000)='keyring\x00', &(0x7f0000000040)='/\x00') keyctl$set_timeout(0xf, r0, 0x0) r1 = request_key(&(0x7f0000000080)='pkcs7_test\x00', &(0x7f00000000c0)={'syz', 0x3}, &(0x7f0000000100)='vboxnet1\xa5md5sum*\x00', r0) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000a80)={r1, 0xc, 0xae}, &(0x7f0000000ac0)={'enc=', 'raw', ' hash=', {'sha384-avx2\x00'}}, &(0x7f0000000b40)="058f6a5fe2db85fa52baca0c", &(0x7f0000000c00)=""/174) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xff}, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(r2, r4, 0x0, 0x1) 09:41:24 executing program 2: keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000a80)={0x0, 0xc, 0xae}, &(0x7f0000000ac0)={'enc=', 'raw', ' hash=', {'sha384-avx2\x00'}}, &(0x7f0000000b40)="058f6a5fe2db85fa52baca0c", &(0x7f0000000c00)=""/174) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xff}, 0x0) getpid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x62e, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1104}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket(0x10, 0x800000000000803, 0x0) ioctl$BLKSECTGET(r0, 0x1267, &(0x7f0000000580)) sendto(r1, &(0x7f0000000000)="120000001600e70d017b00000000008e1584", 0x12, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(r0, r2, 0x0, 0x1) [ 1114.352360] input: syz1 as /devices/virtual/input/input516 09:41:27 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x7c, 0x7c, 0x2, [@array, @restrict, @ptr, @func, @int, @int, @fwd, @enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x0, 0x9}]}]}}, 0x0, 0x96}, 0x20) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000240)=ANY=[@ANYBLOB="cd80"], 0x2}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x39) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) ptrace$cont(0x1f, r0, 0x5, 0x800000000000) 09:41:27 executing program 0: keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000a80)={0x0, 0xc, 0xae}, &(0x7f0000000ac0)={'enc=', 'raw', ' hash=', {'sha384-avx2\x00'}}, &(0x7f0000000b40)="058f6a5fe2db85fa52baca0c", &(0x7f0000000c00)=""/174) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xff}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuset.memory_pressure\x00', 0x0, 0x0) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f00000000c0), &(0x7f0000000100)=0x14) r3 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(r0, r3, 0x0, 0x1) 09:41:27 executing program 2: keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000a80)={0x0, 0xc, 0xae}, &(0x7f0000000ac0)={'enc=', 'raw', ' hash=', {'sha384-avx2\x00'}}, &(0x7f0000000b40)="058f6a5fe2db85fa52baca0c", &(0x7f0000000c00)=""/174) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xff}, 0x0) getpid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x62e, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1104}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket(0x10, 0x800000000000803, 0x0) ioctl$BLKSECTGET(r0, 0x1267, &(0x7f0000000580)) sendto(r1, &(0x7f0000000000)="120000001600e70d017b00000000008e1584", 0x12, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(r0, r2, 0x0, 0x1) 09:41:27 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000]}, 0x45c) r1 = syz_open_dev$sndtimer(0x0, 0x0, 0x100) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000040)={{0x1}}) gettid() r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[@ANYBLOB="f75f9bf747594d0a1851415d989bb03c9ef00b305cba0432a36b9310552b2e4de8c9de57a65146ad9194a585247c8d2a48e1311d4dd0e973234ea0a1a238326753d3da28e216683f91691b54351036c718886cd3e555df4a1b907696264440c2e8407ed7160e8250e81157496310f16407a59d7e89af16ac27c40d0101000068984029a5c1adb5df4f4dd200000000"], 0xb) inotify_add_watch(r2, &(0x7f0000000180)='./file1\x00', 0x80000020) r3 = geteuid() getresgid(&(0x7f0000000140), 0x0, 0x0) fchown(r2, r3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r2) r4 = openat$uinput(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/uinput\x00', 0x4, 0x0) fcntl$F_GET_RW_HINT(r4, 0x40b, &(0x7f0000000200)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={r1, 0x28, &(0x7f0000000240)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000002c0)={r5, 0xffffffff, 0xe6d3be648ff4b41c}, 0xc) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r6 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000003c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) write$selinux_load(r6, &(0x7f0000000880)={0xf97cff8c, 0x8, 'SE Linux', "7aa178cb5281ef95a496e231342648031d1919b27ecbf0d5f691095d2c19db383157224e66db7c77675cc25aed53e235feaeec9033aa186ada864276003b3e5a118879068502fa99720e23f9ce7e6f41dd0c7c27b0a1ffe51c106520c837bc9058e3c4638af79556eba3591028"}, 0x7d) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x3, 0x0) ioctl$UI_DEV_DESTROY(r0, 0x5502) 09:41:27 executing program 1: syz_mount_image$vfat(&(0x7f0000000140)='\x1a\r\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)) 09:41:27 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(r0, r1, 0x0, 0x1) open(&(0x7f0000000040)='./file0\x00', 0x400000, 0x100) 09:41:27 executing program 0: keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000a80)={0x0, 0xc, 0xae}, &(0x7f0000000ac0)={'enc=', 'raw', ' hash=', {'sha384-avx2\x00'}}, &(0x7f0000000b40)="058f6a5fe2db85fa52baca0c", &(0x7f0000000c00)=""/174) pipe(&(0x7f0000000240)={0xffffffffffffffff}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) splice(r0, 0x0, r1, 0x0, 0x100000000ffdc, 0x0) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000080)) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xff}, 0x0) getpid() r3 = getpid() rt_tgsigqueueinfo(r3, r3, 0x16, &(0x7f0000000000)) ptrace(0x10, r3) ptrace$getregset(0x4204, r3, 0x1, &(0x7f0000001140)={0xffffffffffffffff}) sched_setattr(r3, &(0x7f00000000c0)={0x30, 0x3, 0x1, 0x0, 0x5, 0x0, 0xffffffffffffffff}, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(r2, r4, 0x0, 0x1) 09:41:27 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') pipe(&(0x7f0000000240)={0xffffffffffffffff}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) splice(r1, 0x0, r2, 0x0, 0x100000000ffdc, 0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000040)={0x0, 0x0}) ptrace$setsig(0x4203, r3, 0x5e54, &(0x7f0000000080)={0x10, 0x8, 0x1000}) r4 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(r0, r4, 0x0, 0x1) 09:41:27 executing program 1: syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@fat=@dos1xfloppy='dos1xfloppy'}]}) lremovexattr(&(0x7f0000000000)='.\x00', &(0x7f0000000080)=@known='system.posix_acl_default\x00') keyctl$set_reqkey_keyring(0xe, 0x7) 09:41:27 executing program 4: pipe(&(0x7f0000000240)={0xffffffffffffffff}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) splice(r0, 0x0, r1, 0x0, 0x100000000ffdc, 0x0) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000100)={&(0x7f00000001c0)={0xe8, r2, 0x400, 0x70bd2d, 0x25dfdbff, {}, [@TIPC_NLA_BEARER={0xc, 0x1, [@TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x7}]}, @TIPC_NLA_MEDIA={0x58, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x34, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x3}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xf5}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x101}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x2}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfff}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}]}, @TIPC_NLA_MEDIA={0x38, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0x24, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xc}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}]}, @TIPC_NLA_NET={0x18, 0x7, [@TIPC_NLA_NET_ADDR={0x8, 0x2, 0x7}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x101}]}, @TIPC_NLA_NODE={0x20, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x3}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}]}]}, 0xe8}, 0x1, 0x0, 0x0, 0x20008000}, 0x4000) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') r4 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(r3, r4, 0x0, 0x1) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/hash_stats\x00', 0x0, 0x0) 09:41:27 executing program 0: keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000a80)={0x0, 0xc, 0xae}, &(0x7f0000000ac0)=ANY=[@ANYBLOB='enc=raw hasha384-avx2\x00'/74], &(0x7f0000000b40)="058f6a5fe2db85fa52baca0c", &(0x7f0000000c00)=""/174) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xff}, 0x0) r1 = getpid() pipe(&(0x7f0000000240)={0xffffffffffffffff}) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) splice(r2, 0x0, r3, 0x0, 0x100000000ffdc, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff}) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) splice(r4, 0x0, r5, 0x0, 0x100000000ffdc, 0x0) r6 = dup2(r2, r5) pipe(&(0x7f0000000240)={0xffffffffffffffff}) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) splice(r7, 0x0, r8, 0x0, 0x100000000ffdc, 0x0) ioctl$KDDELIO(r7, 0x4b35, 0x2) write$P9_RREMOVE(r6, &(0x7f00000001c0)={0x7, 0x7b, 0x1}, 0x7) sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r9 = getpid() rt_tgsigqueueinfo(r9, r9, 0x16, &(0x7f0000000000)) r10 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000300)='TIPCv2\x00') sendmsg$TIPC_NL_NAME_TABLE_GET(r5, &(0x7f00000004c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x42030720}, 0xc, &(0x7f0000000480)={&(0x7f0000000340)=ANY=[@ANYBLOB, @ANYRES16=r10, @ANYBLOB="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"], 0x104}, 0x1, 0x0, 0x0, 0x4044000}, 0x10000013) ptrace(0x10, r9) ptrace$getregset(0x4204, r9, 0x1, &(0x7f0000001140)={0xffffffffffffffff}) r11 = syz_open_procfs(r9, &(0x7f0000000180)='stat\x00') sendto$inet(r4, &(0x7f0000000500)="9366d44fd06b6b251f09734ade1f4f0ed4330584317ebe41801ceb24d3c0566133d74e7b2b1ebcf69c1d0cc0edecfecc30b495171c3630833cee7b67da60f2f6768c14d1d3ad3355dcdd2862d290abd4e4ff", 0x52, 0x480d0, &(0x7f0000000840)={0x2, 0x4e23, @multicast2}, 0x10) sendfile(r0, r11, 0x0, 0x1) read(0xffffffffffffffff, &(0x7f0000000880)=""/252, 0xfc) write$P9_RCREATE(r5, &(0x7f0000000200)={0x18, 0x73, 0x2, {{0x56, 0xfff, 0x5}, 0x2}}, 0x18) pipe(&(0x7f0000000240)={0xffffffffffffffff}) r13 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) splice(r12, 0x0, r13, 0x0, 0x100000000ffdc, 0x0) sendmsg$TIPC_NL_PEER_REMOVE(r13, &(0x7f0000000100)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000000c0)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="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"/321, @ANYRES16=0x0, @ANYBLOB="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"], 0x16c}}, 0x4034) 09:41:27 executing program 1: syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@fat=@dos1xfloppy='dos1xfloppy'}]}) r0 = geteuid() setreuid(0x0, r0) r1 = geteuid() r2 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f00000003c0)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff}) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) splice(r3, 0x0, r4, 0x0, 0x100000000ffdc, 0x0) sendmmsg$sock(r2, &(0x7f0000000780)=[{{&(0x7f0000000400)=@pppol2tpv3in6={0x18, 0x1, {0x0, r4, 0x1, 0x1, 0x3, 0x2, {0xa, 0x4e22, 0x9, @mcast2, 0xff}}}, 0x80, &(0x7f0000000640)=[{&(0x7f0000000480)="69044b6c45914044ac359f2aeee58e19c43e50a2f34bdd5f21f0079a7c92f8d58fe0dd109371be1e260624d634c44ca756ba0f0c739af0bb509641e9c63fb8850f0b8feeb1111ff42e2b3f85605e265631825bbad27553da2393be7ae0eeff55f08504177dee8e52befb6c5223cb64781017f091674e3819b8557d5e475dea1c63729f77c78a1aae0062bc280bdbead173c8f352952be5e64d3dea000fe6837b30ecbefd99d0b9be01b5bcfdd7f69a53a475dc", 0xb3}, {&(0x7f0000000540)="09150f91505bb510516cb6cb798b9fdc0f4ee389a2673cf52b687f103a6dfb9f0385d08db26e770005896765cecc27497fd63a7633bd7266adff16faed89872af041ae965c3231473459e889eee50f87730805007c3a43c02781eb29f6462059a53025089f67ce84f0e44f15c040689747bbda2348ad928a5c609f39cf8c5fd70aafb8c7f4d83ec2e690ede2f0e3352345e1f04f91e4e71fe8ac11f9f00b6d78242030d05b0af9ec193f2fe13eeb1bac1f9f01ee038884cf7e15a83b0cc39b733753f1ca0dc01f2e5d2f563030c27ac18f2ade0b021091fecba36a520863fb6e4cd2620f35c2d1d5d827364be97243", 0xef}], 0x2}}, {{&(0x7f0000000680)=@generic={0x4, "812af0e16cbd91bdf8efaf04250cf3201dcbc3aa1eb3d5f48c0a9981b19d26c94f8222fd24ec69ae0d764c58402f219abc04de882ebde40f1a280e25d4df73741858188efd5ac7de30940de6a5be8e39257133af74403e8bcf80640de15a9e5328cca716adb7c07524e88c0372d7ec5c1e8c3a277a8149a30319bad66607"}, 0x80, &(0x7f0000000700), 0x0, &(0x7f0000000740)=[@timestamping={{0x14, 0x1, 0x25, 0xffff}}], 0x18}}], 0x2, 0x4004080) setreuid(0x0, r1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000340)={0x0, 0x0}, &(0x7f0000000380)=0xc) r6 = getegid() syz_genetlink_get_family_id$tipc2(&(0x7f0000000700)='TIPCv2\x00') setresgid(r6, 0x0, 0x0) lchown(&(0x7f0000000300)='./file0\x00', r5, r6) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000080)='./file0\x00', 0x7, 0x1, &(0x7f00000001c0)=[{&(0x7f00000000c0)="ab8cbdd3840a20d6ed263e4091580553f173ce3c3876f53f4ab7df349eac0d0a3328c2f644d242a74812ee881a47f1024b93bc5e26e7f7528876e187c8b46d014ec6", 0x42, 0x1ae}], 0x20040, &(0x7f0000000200)={[{@shortname_winnt='shortname=winnt'}, {@shortname_winnt='shortname=winnt'}], [{@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}, {@pcr={'pcr', 0x3d, 0x38}}, {@dont_measure='dont_measure'}, {@fowner_gt={'fowner>', r0}}, {@fsuuid={'fsuuid', 0x3d, {[0x38, 0x30, 0x37, 0x33, 0x32, 0x61, 0x64, 0x64], 0x2d, [0x31, 0xcd, 0x39, 0x32], 0x2d, [0x32, 0x52, 0x0, 0x60], 0x2d, [0x57, 0x34, 0x32, 0x38], 0x2d, [0x63, 0x39, 0x30, 0x3f, 0x64, 0x33, 0x61, 0x64]}}}, {@fsname={'fsname', 0x3d, 'dos1xfloppy'}}, {@uid_lt={'uid<', r1}}, {@appraise_type='appraise_type=imasig'}]}) [ 1117.403743] input: syz1 as /devices/virtual/input/input517 [ 1117.530621] input: syz1 as /devices/virtual/input/input518 09:41:30 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(r0, r1, 0x0, 0x1) pipe(&(0x7f0000000240)={0xffffffffffffffff}) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) splice(r2, 0x0, r3, 0x0, 0x100000000ffdc, 0x0) getsockname$unix(r3, &(0x7f0000000040), &(0x7f00000000c0)=0x6e) 09:41:30 executing program 2: keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000a80)={0x0, 0xc, 0xae}, &(0x7f0000000ac0)={'enc=', 'raw', ' hash=', {'sha384-avx2\x00'}}, &(0x7f0000000b40)="058f6a5fe2db85fa52baca0c", &(0x7f0000000c00)=""/174) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xff}, 0x0) getpid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x62e, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1104}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket(0x10, 0x800000000000803, 0x0) ioctl$BLKSECTGET(r0, 0x1267, &(0x7f0000000580)) sendto(r1, &(0x7f0000000000)="120000001600e70d017b00000000008e1584", 0x12, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(r0, r2, 0x0, 0x1) 09:41:30 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x7c, 0x7c, 0x2, [@array, @restrict, @ptr, @func, @int, @int, @fwd, @enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x0, 0x9}]}]}}, 0x0, 0x96}, 0x20) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000240)=ANY=[@ANYBLOB="cd80"], 0x2}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x39) ptrace$setregs(0xd, r0, 0x0, 0x0) ptrace$cont(0x7, r0, 0x0, 0x0) ptrace$cont(0x1f, r0, 0x5, 0x800000000000) 09:41:30 executing program 1: syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="646fb05c663573317895000000"]) creat(&(0x7f0000000080)='./file0\x00', 0x8) creat(&(0x7f0000000000)='./file0\x00', 0x20) 09:41:30 executing program 0: keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000a80)={0x0, 0xc, 0xae}, &(0x7f0000000ac0)=ANY=[@ANYBLOB="6500000ee6870100686133342d617678320000fa00000000000000003b9709ead7d13a8cc4a930a694bd50008a6cfc3de0dc68f3a1b12afe235f5300"/76], &(0x7f0000000b40)="058f6a5fe2db85fa52baca0c", &(0x7f0000000c00)=""/174) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xff}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/relabel\x00', 0x2, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='trusted.overlay.nlink\x00', &(0x7f00000002c0)={'U+', 0xfffffffffffffffd}, 0x28, 0x6) fdatasync(r2) r3 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') pipe(&(0x7f0000000240)={0xffffffffffffffff}) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) splice(r4, 0x0, r5, 0x0, 0x100000000ffdc, 0x0) sendfile(r3, r4, &(0x7f0000000080)=0x29, 0x0) r6 = getpid() rt_tgsigqueueinfo(r6, r6, 0x16, &(0x7f0000000000)) ptrace(0x10, r6) ptrace$getregset(0x4204, r6, 0x1, &(0x7f0000001140)={0xffffffffffffffff}) sched_setscheduler(r6, 0x2, &(0x7f0000000100)=0x9) sendfile(r0, r3, 0x0, 0x1) 09:41:30 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000]}, 0x45c) r1 = syz_open_dev$sndtimer(0x0, 0x0, 0x100) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000040)={{0x1}}) gettid() r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[], 0xfffffd11) inotify_add_watch(r2, &(0x7f0000000180)='./file1\x00', 0x80000020) r3 = geteuid() getresgid(&(0x7f0000000140), 0x0, 0x0) fchown(r2, r3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r2) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={r1, 0x28, &(0x7f0000000240)={0x0, 0x0}}, 0x10) inotify_init() bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000002c0)={r4, 0xffffffff, 0xe6d3be648ff4b41c}, 0xc) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x3, 0x0) ioctl$UI_DEV_DESTROY(r0, 0x5502) 09:41:30 executing program 1: syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@utf8='utf8=1'}]}) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x484000, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000080)={@mcast2, 0x800, 0x1, 0x3, 0x8, 0x0, 0x6}, 0x20) 09:41:30 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='pagemap\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(r0, r1, 0x0, 0x1) 09:41:30 executing program 1: syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="646f7331783b3c6f0e5d2bf8706911ca9e58342b019462b05673b314a4314c05281e0c585aa361d655b25fb718"]) 09:41:30 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') r1 = dup(r0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) r3 = getpgid(0x0) fcntl$setown(r2, 0x8, r3) splice(r1, &(0x7f0000000040), 0xffffffffffffffff, &(0x7f0000000080)=0x3f, 0x7, 0xd) r4 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(r0, r4, 0x0, 0x1) ioctl$PIO_UNISCRNMAP(r1, 0x4b6a, &(0x7f00000001c0)="270b387d6651165b9c7fec5a5e1adc7d40deeb3884dd7ec4886080ddc4360569981944c67d6a3ebdcc19e17009e9fd0131c7ad9ac37c00d85c1db858025290b9c01ed1cb46013ffc502fd377bcf98ba3779679f8cb5bf1cd8a09ac4bcea492d35b928cbfac4c509075d1ad2e3cff0b5ae94caa96ae802a6db868287c6b2a588dd8acc9ef8da64a18a295ce1506413b2098b159e1cc109dc125feb39f098639a84fecc5f4fcddd439618d1b89d5e52a96079edfffa028431ecb77aabb8be8c3cd3c4e0332966c326e78aac4f414b4b9d068890c070b30cee8f88bb63a35e37063a1de120894d93b49c24a40709891ab33a49a0228400c7480808268fe51c07f07dc5f9a6b9afd96523b17b9b6a283499bc5daaf361115b97ef7d6a2254f431d109ebc360ce6f5b9caa51b79ef7726c30f244907d890313fbfefe1b738257a3ac49c7f667b92d731036277cfac66f54f25ccc98f426dfdd6bd6c01bf1b85db25833ed6cc21a25960c5a5f1eec61246dd713ee4983bce04f5dd9e8820a4927c56470207c8f98d120d980261342a797bbef6c1303130c28c06bd35445b116c8c7381ec2b608f5efb60eaad3eebfc963c9d1f1583f9ace8e4257d0c5e9046218ad374394219e3d1b87e98d95ef7134eb2eab87653d1673ef6c69c0e9c4a9c50a1ac14c6df81f1a97eecd013835ba1e538e9ed7c77a7dd5448896a2d90541ded65ae2ad591b44987a440e4f62de0a82b2e9546a683ddbe3694ca1b683f96e744d16657c2a6e1a4c37bf47768abe2b12873a51989ab30a3d1684c20dacd1626127d19cc32812dc78504b12d61a791ef3a03e44a134281272905bf2661503fad8b2d0776310447f6948359723c585c1d3561596562290f50fe201de82526cfb2fd17af758b83aa16a50cc1c2f77ff82a8e907d880eafa18b768eea69b5baba367c0a347e1593fb7731028856ed08bc180af82feb1766242bea4fc8ebf3598abaa1290ff8b2a243a6f838749b4fba8ccd462de5bcc0e4d8c763fb25370001db633da73fc2643f435e0e880e6831ddb150dd8bc145c520c14d01473f11cfc62364271fe138da416ba4bb2981ebf8491a290317fbb5c8b5905471cac20b5ca1e86b91effcd295a9b5732b690343c62d33aa9cfda2cee1ceaeedd49263ed021fe6179599d646f89bb3c47c0cb20f6b1b3dafb8bdb1bd6735a96ed4fa8431b0caa5e3b0ba0ac1aaadae1c24c058fb3e1b06e231d5c9cd51e03b590b4d015049df7eab615372f7229836f645b8ebc3049e1646d9c127d4be925c3a47e5ccb1a4aeb71ea5c8541a07752a3463a7914de08466202bcc300148a4d5687507bff458ac2441f32f7b6ec1e387c6854a146edde2209c007e9b4edd4bdd12aaee1613236f5f1f499c74e7c489dd66d970932899342c55defb9d01f3966f06ea144643ad8dee1edd510dad7025af1f486231ec50bbc2b9a1c43ff7bcd3ee5489e0a68e4a88903bb4d68b35f8e198610cf0639c6a54b4371d7ca872266611f469f10611e011ca834b481268ae62c0576cc16376705dc0cb507e8752bd9f79080d0677dfa0c0382b1466e7874e1c7e301214df7b5e9073d1114600b144876be5b1efdcc03ad4024bb3972d8c733385fed500c46afc2b91a71e066cfba2533c075e92d9c6901ac528c4f38e5955ec5ae23ff9122e59369ef1218913675c899d543a22cef39d2032f24e334361068f9a69ebce7afc4db4c95aa34d95dd97d03486e7a2333a94ac951db4b0f326d18861821f6cb00d931c9aedb0c7258396661454f4c4da49e2536aa85f137ab294ee0da108726b334c69a5f9160d3c241395519a6f114d2546da7563e3b0bdf299ff7ae68cfd7bf648d656d6699a934c19d0a8fc5c3227639d46b7f1de5c3f0db16ac41f7d775a38ee9161a80f0d8ed88870b0c19eabd3323d93c2e8eb31b76194294434318ff26f28baea3c43101cb03cdf70f0fbd4203b1c47fb04c00d19955afafa964fb433a2ed6d7f9e4956650e5a21215a9038edc78ae2422640f44c64965617b91411a245e1ceca7de575b1f58efe5a2edcc42bc3f8ff194fac2c4bbd150aa5c215921e0c0ea40263c81800944141e9a6b7ed1fc4dccb602aad1544b876cec67a3fd26538d9aaf36edfdb85b2b92dc3a967eb1d55bc4a3a3fb505e12cf8c19a78fc8611bbcd497496749015c2576a5683a9c867c3df70aa9929917bfe089b5bd6e5847f2b08677776e27efe9b3d761124d5a2119f66a7f69f73de8157d5f737826cf05ac098c99c96ed7c5e32a32170af34c3bb07c6ddaf3ff91cbafffd3890f824d09824ee004d63ad2a287435837dcd15d81d3cf8b8f69e12cf451491d5407de15e718b8fd07e1880687f3ffc6bee638855c513b3b7f1cbe75bbe14711a798e1cf4af5d254aae92a5c7470a04105e25bf8cf042051af9dee3cdfd00110d2f6d43bc3f89536bd02a96addd8f4481ef56b2f15358e110efb6faf5a474c8c740bea77c581cef6d727e311a11e70bb2d6250d1998f6539ed3b7626d35da9e131002a27a1a778b5b3c5bc9c96c3db69616d49bca7aafdb003cc2cab7f11b52f2d4425224c5b478a9ca4ee6be6f13cf3d22437918be13d89d842c27d6a5d0239ef9319186b0a4bb0095a666986118bdea4b2c4646393d140372fcaa682ef220b1c278219ff707716cd6c54c3641ce944fd2ff0972f6dffe646430146b1cc174af690acb91ce66134e8e5f38a61b5fe53ad19db008c20ed147c25d75c07531a9c18b6bdbe28db4a5155f01d87533478421dc183aef26edf1e83399c45d29dc33494490b4b2fc19fcf0573cefff7e39df82fe2a4263f85cd14f709038af4238893e173e0ae59441c661ae380c6004fe96ea21d1f69443e2fe3294b3737e7fa73e236beb37af5e7ac41d1cb92d1363c4d9f942edc6cd3e1276a5aae888148782485b582b67b9d68854de6304dacb4c335d3b998c2f72e8a180d8d477632b77e5e296b76115df5197becb0c6308ac885efde648601dafdb6deff53f4bab48c55ad9586247b2580207878899e78cbf2b865d76346b418963d7781c05ff57c8344a6af025b783899dfe4676db46af12065a3886d43faddc30340e09ee023dbafdf1561cbc3d8e0bc95ad86ddeb0d9d3f218531a70c02f96ea53915455591e93743180141a00e9d31315ed3e4be1c4ecd15e5fb1165a68d1eff4d1f38e690c35140f0e2000df89b3ee882c4f68f1f9b8ef3fa478a2a094d0f947f9b82c9694cb7575190f783dc5a6f2692dadc53a7bbb8883b79d482b7727f16495befbff862a1374d2086685a90557917e46d0409565a4cb0338b20a1cbb12b89943955efa7e3f15fa9ef94008888ed70ff357059274138298b8bbc57aaed5a43691836ed13d8727720ee8eadb372667c82b51091418867bf0ef2dfe112c08de08c34a649f7ddb7e7832b88790063ddb80426aecbec7dc03888c339fd0429c759bcba2021c54e229f931b765c55d81eb35a3af559a9fd2bbdca2480384c849dd5d4b6a881908c612c91592925f279e5cbf681aa18f5f61088052132472e0b21279516f5f4ce1ae460dc9bbe1eb363802436053c7102794f94adfbdb0e84bc2c0cfefadddb16ee999002fe47d8322859e5d59b9050bc713f996f528b22dec94e45160478997a498bcccfc2dfddd7340ee54ecfbebff0464f3f7d033a9e8a16228e1eed708f0d89d2d0a1b77bdf0b0fcd819477ca1bffe7dd5ff1c6ff0d54c6a8d0aa4a6cb84111c51a603a3f274d9289ac1524ab18134016021b5fbaeb8194a9c0c7314d91e9b9aced7491b94b7e8b55cbc6bc7252febb139b912bee8f978a8beb355bace1735adbe993fee487e21da5b41a82faaafa4b3e0104192d414a0ca70e174ee5a9d60f9ab133feafb5b87cfd065f732f648448f2489fe81d41bc3fe1778c568726ac4aacbf9a60a97ad10dff98954981e72523ce7cce10868be1c6b460c316390820e19eb15071d4bbbb1a69a2ead9f86b1a3873cb370ef13146e7516f2b2b2d79980f8930db1f61186410182229d410c766902f76de35795cfcd6812e2e356072013147313f7b0bc5cd7298e7849e0d1c0e01841a5adbb0b8ee9f8f59046de106c347496e5785a3597c7b5983acfde22860d95d4eeee2f1b1a663ebd58bd52d1dc95a9d369873aa4b40fabc8e3dcb4aa3ec2679d078a53384fc9a14ea051cac1a46e01abd7b352c6708750b7b10a5b4d432ab84576550468f753c510ecc51600e836cc26eef82c6d0b3a07939c327e037324dbea9b413dfc286465d893b05bd17324c20856428511da599e7f59e3b2263946c732582c45dbd949867bc52c57b473557c35188347cdc63f07a0e9bb87fe3054c9f58e5e0aa214048f03e69836b88f78b6515246024f3bb3ca357f0d544237fb8879e621d569f138547bd492fd8eed25af10c029c542cc07cfab7335ab662fb50d5f53d0a898081e97f97e25279140aa791871892a3f2d1387554e4a4ce9d8802e0b8c0d2b87212cab07f8825975c61ec962d11ceb0c8e5b5493aa54a851d64088a0a49c31234616388cb7bbe5a483dcef72b87e4744e84ca2ba961df38ac0224400c847a42813db145a5b58d6df5e5f7c5e491a48794220ed876237769834ea97eddbeaa7e58756d71406b00b9c9e0df3b333b6d6f4e4ddc021445bd68abd245d7c1a152b7e8a821751d514b1ca5ce70461724675c3fdb4a5c723f4d6065926358c77aa585b6e90b0e815d816255e2900dd3478596629e4d5f5fb188e7efd1e9d3f4fd41a1e1239ca43fbe77fbe06e1c78120f1b98279d032ddcf6cb16fe12a0c7bf2c991835e374ddbddd6c62d7448a02266701c644aaeb9c6a61eacd835c7e62d88619d3fada32a7a080121e569d1133cbc821eb1c923aecea43a8ed0dec916374528b1bad9f66e3677005bc865ebb39b9855598dfb6fa5b0d5978ca5859b1e951f748ad52de1423300742e60bf34b92979227c3cefc8734e2a397a5cecf3346a4d783563df81de4644b508522ddebe0075168f5cf5321fbaf0ba5b4a5e06abfa3d87ee26be862b61730e1d7bf9bed034306ddc9b06da3ac85c3061f4f5152c7bb777af6c17c3c4918c39f5bf3d254c2485a418649576244c1a93db894939149c1e717481ca8ebc68a557ea02a2c026f482d5e6f577b1b92426ad0eb905ce141fae65cc93ccff4bf709262024c55d5f24ff399657c366d7379764d4f6823e3e2e8170133069dab29f5edcd63c51eb1939738bb1d8f377d9a9875c4358e0f24bfa5d91eb10ea1d9e8260a1c97cf58edad7600b6a7dc2a9a2e16c22668a7d724a066c40ee61ac936924d6fc29cc4ffeb3901f4ab3b8e8b537917d4c5e06e0ed3f4536a5aa9e689bcf6cd183af417bb65605873985c4be3414889aec06df93b67e639ca639d5732dbfd676d55fde264e78647984cbd7726140c17e6799dd9d3dbf997cd495ef771a3496213310c05471747695fff0f18d054a27c903d22aa9d412280f2c899fba6d8a2afd262f7a973cec4752f566595e8bb000c47ce1a727003c4009ad5470778e038e39d8776ba0092f86652329c94771c76eebe02d7a4afaead7cf579504e8744fec0fad89321f821c72a7dad73d143ecfaeb8ed5bd45aee2b680d8ea9c412bdbad590071b4a3aa7746beb171365e11cfb6eee1211aaa60209cda0f28ec9b40f857fb83250dbd31e95b07789a4390f65590f4283d55e94362b3cf1bd89605c122f40929f32c7d8f429fcc8555674c1166a74a75f538e0b91ee9b2d38f45fba2d6b8b88f6b46cca465216") ioctl$SIOCGSTAMP(r1, 0x8906, &(0x7f00000000c0)) 09:41:30 executing program 1: pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r0, &(0x7f0000000140)=ANY=[], 0xfffffc8f) fcntl$setpipe(r0, 0x407, 0x0) mknodat(r0, &(0x7f0000000000)='./file0\x00', 0x100, 0x5) syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@fat=@dos1xfloppy='dos1xfloppy'}]}) 09:41:30 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') timerfd_gettime(0xffffffffffffffff, &(0x7f00000000c0)) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(r0, r1, 0x0, 0x1) r2 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/enforce\x00', 0x44200, 0x0) ioctl$SIOCGSTAMP(r2, 0x8906, &(0x7f0000000080)) 09:41:30 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='clear_refs\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(r0, r1, 0x0, 0x1) ioctl$sock_SIOCOUTQNSD(r0, 0x894b, &(0x7f0000000000)) [ 1120.485998] input: syz1 as /devices/virtual/input/input519 09:41:30 executing program 2: keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000a80)={0x0, 0xc, 0xae}, &(0x7f0000000ac0)={'enc=', 'raw', ' hash=', {'sha384-avx2\x00'}}, &(0x7f0000000b40)="058f6a5fe2db85fa52baca0c", &(0x7f0000000c00)=""/174) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xff}, 0x0) getpid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x62e, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1104}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x0, 0x800000000000803, 0x0) ioctl$BLKSECTGET(r0, 0x1267, &(0x7f0000000580)) sendto(r1, &(0x7f0000000000)="120000001600e70d017b00000000008e1584", 0x12, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(r0, r2, 0x0, 0x1) [ 1121.005214] input: syz1 as /devices/virtual/input/input520 09:41:33 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x7c, 0x7c, 0x2, [@array, @restrict, @ptr, @func, @int, @int, @fwd, @enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x0, 0x9}]}]}}, 0x0, 0x96}, 0x20) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000240)=ANY=[@ANYBLOB="cd80"], 0x2}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x39) ptrace$setregs(0xd, r0, 0x0, 0x0) ptrace$cont(0x7, r0, 0x0, 0x0) ptrace$cont(0x1f, r0, 0x5, 0x800000000000) 09:41:33 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') pipe(&(0x7f0000000240)={0xffffffffffffffff}) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$UI_SET_PROPBIT(r3, 0x4004556e, 0x0) splice(r2, 0x0, r3, 0x0, 0x100000000ffdc, 0x0) ioctl$BLKROGET(r3, 0x125e, &(0x7f0000000040)) sendfile(r0, r1, 0x0, 0x1) 09:41:33 executing program 2: keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000a80)={0x0, 0xc, 0xae}, &(0x7f0000000ac0)={'enc=', 'raw', ' hash=', {'sha384-avx2\x00'}}, &(0x7f0000000b40)="058f6a5fe2db85fa52baca0c", &(0x7f0000000c00)=""/174) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xff}, 0x0) getpid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x62e, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1104}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x0, 0x800000000000803, 0x0) ioctl$BLKSECTGET(r0, 0x1267, &(0x7f0000000580)) sendto(r1, &(0x7f0000000000)="120000001600e70d017b00000000008e1584", 0x12, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(r0, r2, 0x0, 0x1) 09:41:33 executing program 0: keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000a80)={0x0, 0xc, 0xae}, &(0x7f0000000340)=ANY=[@ANYBLOB="656e633d72617720686173683d7368613338342d617678320000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a649b0da8e6fac6d5770000000"], &(0x7f0000000b40)="058f6a5fe2db85fa52baca0c", &(0x7f0000000c00)=""/174) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xff}, 0x0) getsockopt$inet6_udp_int(r0, 0x11, 0x1, &(0x7f00000001c0), &(0x7f0000000200)=0x4) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(r0, r2, 0x0, 0x1) pipe(&(0x7f0000000240)={0xffffffffffffffff}) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) splice(r3, 0x0, r4, 0x0, 0x100000000ffdc, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff}) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) open$dir(&(0x7f00000003c0)='./file0\x00', 0x40, 0x106) splice(r5, 0x0, r6, 0x0, 0x100000000ffdc, 0x0) r7 = ioctl$TUNGETDEVNETNS(r6, 0x54e3, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r4, 0xc028660f, &(0x7f00000002c0)={0x0, r7, 0x9, 0x6, 0x7, 0x8}) r8 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000540)='NET_DM\x00') r9 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000400)='NET_DM\x00') sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1102080}, 0xc, &(0x7f00000005c0)={&(0x7f0000000580)={0x14, r9, 0x100, 0x70bd2a, 0x25dfdbfe, {}, ["", ""]}, 0x33}, 0x1, 0x0, 0x0, 0x800}, 0x800) sendmsg$NET_DM_CMD_STOP(r2, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x100100}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, r8, 0x4, 0x70bd2c, 0x25dfdbfb, {}, ["", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/mls\x00', 0x0, 0x0) 09:41:33 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000]}, 0x45c) r1 = syz_open_dev$sndtimer(0x0, 0x0, 0x100) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000040)={{0x1}}) gettid() geteuid() r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x1) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r3, &(0x7f0000000140)=ANY=[], 0xfffffc8f) fcntl$setpipe(r3, 0x407, 0x0) write$binfmt_script(r3, &(0x7f0000000880)=ANY=[@ANYBLOB="f75f9bf747594daf0245d149483406f850ae3681330a1851415d989b48270bb03c9ef00b305cba0432a36b9310552b2e4de8c9de57a65146ad9194a585247c8d2a48e1311d4dd0e973234ea0a1a238326753d3da28e216683f91691b54351036cf18886cd3e555df4a1b907696264440c2e8407ed7160e8250e81157496310f16407a59d7e892d7ea55b9215d7eb183ff1b873c6af16ac27c40d2c4fe0c268984029a5c1adb5df4f4dd2"], 0xaa) inotify_add_watch(r2, &(0x7f0000000180)='./file1\x00', 0x80000020) r4 = geteuid() getresgid(&(0x7f0000000140), 0x0, 0x0) fchown(r2, r4, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r2) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={r1, 0x28, &(0x7f0000000240)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000002c0)={r5, 0xffffffff, 0xe6d3be648ff4b41c}, 0xc) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x3, 0x0) ioctl$UI_DEV_DESTROY(r0, 0x5502) 09:41:33 executing program 1: pipe(&(0x7f0000000240)={0xffffffffffffffff}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) splice(r0, 0x0, r1, 0x0, 0x100000000ffdc, 0x0) ioctl$EVIOCSKEYCODE(r0, 0x40084504, &(0x7f0000000000)=[0x2f02127b, 0x3]) syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@fat=@dos1xfloppy='dos1xfloppy'}]}) 09:41:33 executing program 1: syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="640000000008000000000000000ee546d6f739518b77629c8115bfcb0edd8a890074e3f5a63db96eee4f9a97698b1c1fadac5396a09f9721c06f71a21779313ef9418286fa1f47f7cf1fae578f6fe2c5fe33199e93e34440c8b5f24afce67825ae1223ff04810d21"]) execve(&(0x7f0000000000)='./file0\x00', &(0x7f0000000240)=[&(0x7f0000000300)='s1\x00\x10\x00\xa5\xd9\x95\xdaEQN\a\xfc\xeb\x05\xe8\x1d\xb9\xef\xf6\xf5\x10\x91J\nz)\xdf\x9f\xac!t&\xb1\x1f\xfe\xa6\xe4.5\xf5\x92\x7fM7\xee\xb7\xd7M@u\xc8y3\x10u\x02\xcf\x125n\x887', &(0x7f00000000c0)='dos1xfloppy', &(0x7f0000000100)='-proc\x00', &(0x7f00000001c0)='posix_acl_access-$\x00', &(0x7f0000000200)='vfat\x00'], &(0x7f00000002c0)=[&(0x7f0000000280)='GPLem1vmnet0}\'*-\x00']) fcntl$addseals(0xffffffffffffffff, 0x409, 0x4) pipe(&(0x7f0000000240)={0xffffffffffffffff}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = socket(0x5, 0x2, 0x3f) fsetxattr$trusted_overlay_origin(r2, &(0x7f0000000040)='trusted.overlay.origin\x00', &(0x7f00000003c0)='y\x00', 0x2, 0x2) splice(r0, 0x0, r1, 0x0, 0x100000000ffdc, 0x0) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000080)=0x0) sched_setattr(r3, &(0x7f0000000340)={0x30, 0x2, 0x0, 0xf03, 0x5, 0x5, 0xfff, 0xffff}, 0x0) 09:41:33 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6d, &(0x7f0000000040)=0x6, 0x4) r1 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/avc/hash_stats\x00', 0x0, 0x0) r2 = getpid() rt_tgsigqueueinfo(r2, r2, 0x16, &(0x7f0000000000)) ptrace(0x10, r2) ptrace$getregset(0x4204, r2, 0x1, &(0x7f0000001140)={0xffffffffffffffff}) sendmsg$nl_generic(r1, &(0x7f0000000140)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x5df27f954136af9c}, 0xc, &(0x7f0000000100)={&(0x7f00000001c0)={0x5d0, 0x30, 0x8, 0x70bd2d, 0x25dfdbff, {0xd}, [@typed={0x8, 0x41, @u32=0x5899}, @typed={0xc, 0x4a, @u64=0x7}, @typed={0x14, 0x26, @ipv6=@initdev={0xfe, 0x88, [], 0x1, 0x0}}, @nested={0x1ec, 0x61, [@generic="05dee7296a9ca20d238ffaff13ea2aa016a6b7ff8d21bdf42c7694dd4d245c97e96e1f56364a51f899626452a9906295ddc00811b0a8a4c38c8cf3f991a365c2fb5715a5b6867df31faa", @typed={0x1c, 0x8e, @str='-*trusted.systemmd5sum\x00'}, @generic="92ce5b9d291d54df1ed8480ccc4e8ba19f085a9dfb3122779ff6ec90ced3c2851d33f168442c5574bb4d744722fc4e9679d67706cccf9c0f1b161f3ee7aa6f8270cbe92602d0fc1276c4c21cfc9860bc0eca1101d962aaee826322f37105a5dc577a0c261f0c9b51fbad66d1", @generic="b3c7f30c68cdd89ba15b22190ea27a5dd7af4639d545e84a667f05fac45909c4057b91deeef10b4ea28b2147abc484084444f03d875d1696234f782a34f5efac9be63292e7a0795e8ddea0316fd1a4604eb1c6bed76710c8b9be545c45587e0584526a4afcf7ad332e21b31e056ef0f688", @generic="6d153f73db1c54a1ca3a57376c1d463717b0c9147757118a3772d761bd2d952a43bf6c741741d00a007ac2218b184e53ae9f01e4aba4a0ba4d1484c11278eb775dabb9b416cf651b3ad33d4502cb9559e8d1b87a91a9b4b14c092e8f50dfb1ace4da43941be5b59a9ba7738ceb5a2704f945ac3b97f8be29b081fdeb794dc07abd0647f5b851ea50c767552fbea99e5619f7ffc2b602824f", @typed={0xc, 0x6c, @str='stat\x00'}]}, @nested={0x194, 0x42, [@typed={0x8, 0x93, @ipv4=@multicast1}, @typed={0x8, 0x5d, @pid=r2}, @generic="b64430122865a6ea64bcb403fb1d01568fc620c1dbb7ed5e758f89e734e8791111dc0adb2bb45463204ca4a327feefe7c3fdefb0d43c2daabafac31ab96ac84da13fffaaa1b8d30bdb262c8faca7c4d2ba00158c5d8f828add3ff06e1ee2c8bf00050531e4c02399554d533e09e26c1f32f08c5b4c1721b3a0ef2381", @generic="39cd8afece19e342cd8ac6ecc55ba75b1196b5a4821c93b5b26574162e588d6b903f48ab4ab5f35539cbd02e4457cc", @generic="71392c6fa824ce3088d986aa501dc45d326095cbb6c9a9f490a5a4e54f0d6fb43c794dba627e4305", @typed={0x8, 0x37, @ipv4=@multicast2}, @typed={0x34, 0x8c, @binary="5d56887ca38d84284676ada147fb43bfacbd8f514ab107ce70f68584a24184d79ad7303f66c28d665e44d9cbd2dd"}, @generic="91d7c5484febfb50cc95ddba7bbd0e5bde1f00e4df88b4e95597d2b588f12b1f70fa25fdd059496aa5ef8816236f8c63bbf426567b61e1942b3209548470d448560b2089ef6c68ce3b779c13984cd5f1da0a510d133ddc3d11d9eb2913543409eddc29a9c9620a8d17e3412aec", @typed={0x4, 0x5a}]}, @generic="3dfffce05c2e3dd227a572bba881a48f15da238a8089b7be64b04d2eb1dcd55c9297029b3182a5af26642aa70eb03449ab4babe9a0bd5817db2fae73d9d9f3bb8a5ba12a68986f3fb48c47ae2a00538b4bcc1456fa71dd54c12668cbd182684bcf04a6e8f6c6a6fdd408db72fedc338568211a76f995b17336f8c01b2f8bda316c6f7bb07997e2414160bb34cf91ef3fe332a5aba566d1e1fd4220d3a250cf0f4ae4b3be9ce54ce73354cebbf33d6d05742441d3840abd35581e45c4d8009352e468c4ac38aa6b868d89463a", @nested={0x148, 0x74, [@typed={0x14, 0x2a, @ipv6=@ipv4={[], [], @empty}}, @typed={0xc, 0x49, @u64=0x254}, @generic, @generic="98793747bac29d3ced0719fdadce6d5db2d460ecc18d95e96c5ce9a6c1b3172f535e8435f54585", @generic="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"]}]}, 0x5d0}, 0x1, 0x0, 0x0, 0x4000000}, 0x20000000) timer_create(0x1, &(0x7f0000000900)={0x0, 0x3d, 0x4, @thr={&(0x7f0000000840)="8bd477cbb38030", &(0x7f0000000880)="c75f2c79d175b8348bc87d051f8a44dd2ed9089ef81f38eda5cb9adaf9e52f91c1025d1ace5f4454ebbfaf75781058b6fc12f5936da341b8748862b8dfa6db777b27218e6d88e9d6aaed3acb60ee17ddc40f95dc09fa5a6293817b222cfa1ee48f3002e13d47d8eaecc85891c0a0d2df97db66d643f2bdc3e4455623adaf"}}, &(0x7f0000000940)) r3 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') ioctl$ION_IOC_HEAP_QUERY(r1, 0xc0184908, &(0x7f0000000800)={0x34, 0x0, &(0x7f00000007c0)}) sendfile(r0, r3, 0x0, 0x1) 09:41:33 executing program 0: keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000a80)={0x0, 0xc, 0xae}, &(0x7f0000000ac0)={'enc=', 'raw', ' hash=', {'sha384-avx2\x00'}}, &(0x7f0000000b40)="058f6a5fe2db85fa52baca0c", &(0x7f0000000c00)=""/174) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f0000000000)) ptrace(0x10, r0) ptrace$getregset(0x4204, r0, 0x1, &(0x7f0000001140)={0xffffffffffffffff}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={r0, 0xffffffffffffffff, 0x0, 0x5, &(0x7f0000000100)='stat\x00'}, 0x30) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfffffc8f) fcntl$setpipe(r1, 0x407, 0x0) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000200)=0x0) bind$unix(r1, &(0x7f00000002c0)=@abs={0x94ba061fefef58e0, 0x0, 0x4e24}, 0x6e) r3 = syz_open_procfs(r2, &(0x7f00000001c0)='net/icmp\x00') sendmsg$TIPC_CMD_SET_NODE_ADDR(r1, &(0x7f00000003c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x24, 0x0, 0x300, 0x70bd2d, 0x25dfdbfc, {{}, 0x0, 0x8001, 0x0, {0x8, 0x11, 0x8}}, ["", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x4000000}, 0x80) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xff}, 0x0) r4 = getpid() sched_setattr(r4, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r5 = socket$unix(0x1, 0x5, 0x0) setsockopt$SO_TIMESTAMPING(r5, 0x1, 0x25, &(0x7f0000000080)=0x2451, 0x4) r6 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') socket$unix(0x1, 0x1, 0x0) sendfile(r3, r6, 0x0, 0x1) 09:41:33 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') r2 = add_key(&(0x7f0000000100)='asymmetric\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f00000002c0)="69c634e15ac747dc8ce0d759924ab5e4e4f7fdc0d45f46b215ff6ff6bfaf3445f640bcb7d4df69155f750211d597a95ee25add4348e7cbb66309a908ae66887f4a9f61049cbe0a86dd1f1f0d7830562a9e3064b090e8c76b46fe686653db4136d3ab2cdd771386ca6b85e1a2f57774b1c0f79a2da34322e371aacaa0e3785b73f5527225fc5bd338b7a8620e540482922f164eee", 0x94, 0xfffffffffffffff8) r3 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000240)={'syz', 0x2}, 0x0, 0x0, r2) fchmod(r1, 0x2) keyctl$restrict_keyring(0x1d, r3, &(0x7f0000000000)='keyring\x00', &(0x7f0000000040)='/\x00') keyctl$set_timeout(0xf, r3, 0x0) r4 = add_key(&(0x7f0000000040)='syzkaller\x00', &(0x7f0000000080)={'syz', 0x1}, &(0x7f00000001c0)="5e99fbc2b7b82e0b9a93b166d12ff84d3ba97137dc07c99f28a8b537d72ba5153e170c9d3fab7647daa3a1b691eaa0c531eeec4dc8e6b6e2dbe85999bcf69d8d285afae36c7082342abfcf4593c0d1fa909e5df6c0fca60c83534cfcca71a318e85da0df54886d67779504609dec8cc6863f7a765bcc2ff9ee2ad14e3e9b1dbd01c9785a975ae868a95e6dd2c4029481a8017c66cf4cd9d3c0a0466e4fce4360fe911f813dea539853a9b4ec0299618cdd74b7266fa22f5809d30c7eaf341a92705cab494f65a9707320981ece", 0xcd, r3) keyctl$setperm(0x5, r4, 0x10018808) socketpair$unix(0x1, 0xb, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$FIGETBSZ(r5, 0x2, &(0x7f00000003c0)) sendfile(r0, r0, 0x0, 0x1) socket$nl_generic(0x10, 0x3, 0x10) 09:41:33 executing program 1: pipe(&(0x7f0000000240)={0xffffffffffffffff}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) splice(r0, 0x0, r1, 0x0, 0x100000000ffdc, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff}) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) splice(r2, 0x0, r3, 0x0, 0x100000000ffdc, 0x0) r4 = fcntl$dupfd(r1, 0x406, r3) ioctl$RTC_WKALM_SET(r4, 0x4028700f, &(0x7f0000000080)={0x0, 0x0, {0x22, 0x25, 0x4, 0x9, 0x2, 0x800000000000, 0x1, 0x2b, 0xffffffffffffffff}}) syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@fat=@dos1xfloppy='dos1xfloppy'}]}) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r5, &(0x7f0000000100)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRES64=0x0]], 0xfffffffffffffe24) fcntl$setpipe(r5, 0x407, 0x0) inotify_add_watch(r5, &(0x7f0000000000)='./file0\x00', 0x80000000) 09:41:33 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000280)={'W\n8', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$unlink(0x9, r2, 0xfffffffffffffffd) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r3, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="b9ff0300000d698cb89e40f02cea", 0x0, 0x44a}, 0x28) r4 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(r0, r4, 0x0, 0x1) [ 1123.460534] audit: type=1400 audit(1569058893.425:65): avc: denied { prog_load } for pid=731 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 [ 1123.539784] audit: type=1400 audit(1569058893.505:66): avc: denied { prog_run } for pid=731 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 [ 1123.598811] input: syz1 as /devices/virtual/input/input521 09:41:36 executing program 1: syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@fat=@dos1xfloppy='dos1xfloppy'}]}) openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x800, 0x0) 09:41:36 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x7c, 0x7c, 0x2, [@array, @restrict, @ptr, @func, @int, @int, @fwd, @enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x0, 0x9}]}]}}, 0x0, 0x96}, 0x20) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000240)=ANY=[@ANYBLOB="cd80"], 0x2}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x39) ptrace$setregs(0xd, r0, 0x0, 0x0) ptrace$cont(0x7, r0, 0x0, 0x0) ptrace$cont(0x1f, r0, 0x5, 0x800000000000) 09:41:36 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') pipe(&(0x7f0000000240)={0xffffffffffffffff}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) splice(r1, 0x0, r2, 0x0, 0x100000000ffdc, 0x0) sendfile(r0, r1, 0x0, 0x1) 09:41:36 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000]}, 0x45c) r1 = syz_open_dev$sndtimer(0x0, 0x0, 0x100) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000040)={{0x1}}) gettid() r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[@ANYBLOB="f75f9bf747594d0a1851415d989b48270bb03c9ef00b305cba0432a36b9310552b2e4de8c9de57a65146ad9194a585247c8d2a48e1311d4dd0e973234ea0a1a238326753d3da28e216683f91691b54351036cf18886cd3e555df4a1b907696264440c2e8407ed7160e8250e81157496310f16407a59d7e892d7ea55b9215d7eb723ff1b873c6af16ac27c40d2c4fe0c268984029a5c1adb5df4f4dd2"], 0xb) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r3, &(0x7f0000000140)=ANY=[], 0xfffffc8f) fcntl$setpipe(r3, 0x407, 0x0) r4 = accept(r3, &(0x7f00000001c0)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast1}}}, &(0x7f00000003c0)=0x80) fstat(r4, &(0x7f0000000880)) inotify_add_watch(r2, &(0x7f0000000180)='./file1\x00', 0x80000020) r5 = geteuid() getresgid(&(0x7f0000000140), 0x0, 0x0) fchown(r2, r5, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r2) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={r1, 0x28, &(0x7f0000000240)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000002c0)={r6, 0xffffffff, 0xe6d3be648ff4b41c}, 0xc) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x3, 0x0) ioctl$UI_DEV_DESTROY(r0, 0x5502) 09:41:36 executing program 0: keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000a80)={0x0, 0xc, 0xae}, &(0x7f0000000ac0)={'enc=', 'raw', ' hash=', {'sha384-avx2\x00'}}, &(0x7f0000000b40)="058f6a5fe2db85fa52baca0c", &(0x7f0000000c00)=""/174) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xff}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfffffc8f) fcntl$setpipe(r1, 0x407, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r2, 0x5421, 0xfffffffffffffffe) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f00000004c0)='IPVS\x00') sendmsg$IPVS_CMD_SET_DEST(r2, &(0x7f0000000640)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x28000000}, 0xc, &(0x7f0000000600)={&(0x7f0000000500)={0xa4, r3, 0x8, 0x70bd29, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_SERVICE={0x28, 0x1, [@IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e24}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x1}}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x14}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x400}, @IPVS_CMD_ATTR_DEST={0x4}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x10001}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x4}, @IPVS_CMD_ATTR_DEST={0x4c, 0x2, [@IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@mcast2}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x100}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x2}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x3a}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@empty}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x3}]}]}, 0xa4}, 0x1, 0x0, 0x0, 0x40}, 0x0) sendmsg$IPVS_CMD_DEL_DEST(r1, &(0x7f00000002c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x110821}, 0xc, &(0x7f0000000100)={&(0x7f00000001c0)={0x74, r3, 0xa10, 0x70bd2c, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x9}, @IPVS_CMD_ATTR_DEST={0x20, 0x2, [@IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x2d04812c}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@multicast2}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x2}, @IPVS_CMD_ATTR_SERVICE={0x28, 0x1, [@IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e23}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@loopback}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x9}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8}]}, 0x74}, 0x1, 0x0, 0x0, 0x20000000}, 0x4008040) r4 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x3188a3, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff}) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) splice(r5, 0x0, r6, 0x0, 0x100000000ffdc, 0x0) sendfile(r4, r5, 0x0, 0x1) 09:41:36 executing program 2: keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000a80)={0x0, 0xc, 0xae}, &(0x7f0000000ac0)={'enc=', 'raw', ' hash=', {'sha384-avx2\x00'}}, &(0x7f0000000b40)="058f6a5fe2db85fa52baca0c", &(0x7f0000000c00)=""/174) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xff}, 0x0) getpid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x62e, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1104}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x0, 0x800000000000803, 0x0) ioctl$BLKSECTGET(r0, 0x1267, &(0x7f0000000580)) sendto(r1, &(0x7f0000000000)="120000001600e70d017b00000000008e1584", 0x12, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(r0, r2, 0x0, 0x1) 09:41:36 executing program 1: syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="646f733178666c6f70701425792c00"]) 09:41:36 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(r0, r1, 0x0, 0x1) ioctl$TIOCMSET(r0, 0x5418, &(0x7f0000000040)=0xc) 09:41:36 executing program 1: syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x808bb20f874ee0fa, 0x0, 0xa0000, &(0x7f00000000c0)={[{@utf8='utf8=1'}, {@utf8='utf8=1'}, {@utf8no='utf8=0'}, {@utf8='\xfc\x00'}]}) syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f0000000080)='./file0\x00', 0xf4ba, 0x1, &(0x7f0000000100)=[{&(0x7f0000000180)="dc4e3c521e63178400dbcdff9b56c823e4047196a233572c7f783416892c02c11d14f1804f47ff11ed5a4a2c9b986a88fff0a2e9ea91410ced2fefdb2b28386351fb678155fee598eb5fe8281c4c6fc92d4da6ba2f8bde0a259fb5607bef411c49fda3449d186a9eb4bb34902e85f685b851c5205aef217f637670df270178b0d4bb4063404658c7e74eae8de623998c89abbcf6d9cdbb", 0x97, 0x5}], 0x2002001, &(0x7f0000000340)=ANY=[@ANYBLOB="6572726f7273a3143d636f6e74696e75652c6e6f64e0416f74732c646f74732c646f74732c636f6465706167653d313235302c646d61736b3d30300600303030303030303030303030303030303031302c6e6f646f74732c6e6f646f74732c6e6f646f74732c646f74732c646f6e745f686173682c7063723d30303030303030303030303030303030303031392c61756469742c66756e633d4649524d574152455f434845434b2c6f626a5f726f6c653dfc002c66736e616d653d75003837fc562d303268302d386561312d623162302d656438f55bc3f11e14470300"/233]) 09:41:36 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') pipe(&(0x7f0000000240)={0xffffffffffffffff}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0), &(0x7f0000000200)=0x4) splice(r1, 0x0, r2, 0x0, 0x100000000ffdc, 0x0) ioctl$TCGETS2(r1, 0x802c542a, &(0x7f0000000040)) r3 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(r0, r3, 0x0, 0x1) 09:41:36 executing program 1: pipe(&(0x7f0000000240)={0xffffffffffffffff}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$PPPIOCCONNECT(r0, 0x4004743a, &(0x7f00000001c0)=0x3) splice(r0, 0x0, r1, 0x0, 0x100000000ffdc, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(r1, 0x0, 0x482, &(0x7f0000000080)=""/163, &(0x7f0000000000)=0xa3) syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="ff00"]) 09:41:36 executing program 1: syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="646f730578665d6f7070792c00553bf9da6e2a7e8e22d99a2c0ebe2e155e746123dec1151dab5d"]) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) splice(r0, 0x0, r2, 0x0, 0x100000000ffdc, 0x0) bind(r1, &(0x7f0000000280)=@in6={0xa, 0x4e24, 0x8, @dev={0xfe, 0x80, [], 0xf}, 0x400}, 0x80) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000300)={{{@in6=@loopback, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f0000000040)=0xe8) r4 = getegid() fchown(0xffffffffffffffff, r3, r4) bind$unix(r0, &(0x7f00000001c0)=@file={0x0, './file0\x00'}, 0x6e) lsetxattr$security_smack_entry(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='security.SMACK64EXEC\x00', &(0x7f00000000c0)='vfat\x00', 0x5, 0x1) 09:41:36 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') pipe(&(0x7f0000000240)={0xffffffffffffffff}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) splice(r1, 0x0, r2, 0x0, 0x100000000ffdc, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCGSTAMP(r3, 0x8906, &(0x7f00000003c0)) getsockopt$inet_IP_IPSEC_POLICY(r4, 0x0, 0x10, &(0x7f0000000400)={{{@in6=@local, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000500)=0xe8) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f0000000540)={@local, 0x7, r5}) r6 = geteuid() setreuid(0x0, r6) setsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000040)={{{@in=@loopback, @in=@rand_addr=0xfb14, 0x4e20, 0x6, 0x4e23, 0x0, 0x2, 0x20, 0xdfb51d1bd9190e12, 0x2e, r5, r6}, {0x6, 0xffffffffffffffff, 0x7, 0x8, 0x41, 0x2, 0x0, 0xfffffffffffffffc}, {0x4, 0x3f, 0x3, 0x9}, 0x80000000, 0x6e6bb9, 0x2, 0x1, 0x1, 0x1}, {{@in6=@mcast2, 0x4d4, 0x6c}, 0xb, @in6=@ipv4={[], [], @remote}, 0x3500, 0x8, 0x2, 0x100000001, 0x1, 0x5, 0xffffffffffffffe0}}, 0xe8) r7 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(r0, r7, 0x0, 0x1) [ 1126.511144] input: syz1 as /devices/virtual/input/input522 09:41:39 executing program 2: keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000a80)={0x0, 0xc, 0xae}, &(0x7f0000000ac0)={'enc=', 'raw', ' hash=', {'sha384-avx2\x00'}}, &(0x7f0000000b40)="058f6a5fe2db85fa52baca0c", &(0x7f0000000c00)=""/174) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xff}, 0x0) getpid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x62e, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1104}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x10, 0x0, 0x0) ioctl$BLKSECTGET(r0, 0x1267, &(0x7f0000000580)) sendto(r1, &(0x7f0000000000)="120000001600e70d017b00000000008e1584", 0x12, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(r0, r2, 0x0, 0x1) 09:41:39 executing program 1: syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@fat=@dos1xfloppy='dos1xfloppy'}]}) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000000)=""/49) 09:41:39 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x7c, 0x7c, 0x2, [@array, @restrict, @ptr, @func, @int, @int, @fwd, @enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x0, 0x9}]}]}}, 0x0, 0x96}, 0x20) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000240)=ANY=[@ANYBLOB="cd80"], 0x2}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x39) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x0) ptrace$cont(0x1f, r0, 0x5, 0x800000000000) 09:41:39 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x8000001000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r2 = socket$inet(0x10, 0x2, 0x0) sendmsg(r2, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000780)="24000000190007041dfffd946f61050002000300fe02000000020800080015000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(r0, r3, 0x0, 0x1) 09:41:39 executing program 0: keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000a80)={0x0, 0xc, 0xae}, &(0x7f0000000ac0)={'enc=', 'raw', ' hash=', {'sha384-avx2\x00'}}, &(0x7f0000000b40)="058f6a5fe2db85fa52baca0c", &(0x7f0000000c00)=""/174) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xff}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(r0, r2, 0x0, 0x1) r3 = syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r2, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x43000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000100)={0x6c, r3, 0x800, 0x70bd27, 0x8, {}, [@SEG6_ATTR_SECRET={0x8, 0x4, [0x879]}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x8}, @SEG6_ATTR_SECRET={0x14, 0x4, [0x5, 0x100, 0x10000, 0x2]}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x3}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x6}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0xb3b}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x4}, @SEG6_ATTR_DST={0x14, 0x1, @loopback}]}, 0x6c}, 0x1, 0x0, 0x0, 0x28000080}, 0x4804) 09:41:39 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000]}, 0x45c) r1 = syz_open_dev$sndtimer(0x0, 0x0, 0x100) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000040)={{0x1}}) gettid() r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[@ANYBLOB="f75f9bf747594d0a1851415d989b48270bb03c9ef00b305cba0432a36b9310552b2e4de8c9de57a65146ad9194a585247c8d2a48e1311d4dd0e973234ea0a1a238326753d3da28e216683f91691b54351042fcb1c50d7d0d8fdf4a1b907696264440c2e8407ed7160e8250e81157496310f16407a59d7e892d7ea55b9215d7eb723ff1b873c6af16ac27c40d2c4fe0c268984029a5c1adb5df4f4dd2"], 0xb) inotify_add_watch(r2, &(0x7f0000000180)='./file1\x00', 0x80000020) r3 = geteuid() getresgid(&(0x7f0000000140), 0x0, 0x0) fchown(r2, r3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r2) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={r1, 0x28, &(0x7f0000000240)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000002c0)={r4, 0xffffffff, 0xe6d3be648ff4b41c}, 0xc) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r5 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000880)='/selinux/policy\x00', 0x0, 0x0) setsockopt$inet_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000008c0)='tls\x00', 0x4) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x3, 0x0) ioctl$UI_DEV_DESTROY(r0, 0x5502) pipe(&(0x7f0000000240)={0xffffffffffffffff}) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) splice(r6, 0x0, r7, 0x0, 0x100000000ffdc, 0x0) ioctl$PIO_UNISCRNMAP(r6, 0x4b6a, &(0x7f00000001c0)="06a3756c4e944e1095db8100dab550a3c6cad595dd1407ac07") 09:41:39 executing program 1: syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@fat=@showexec='showexec'}, {@shortname_lower='shortname=lower'}, {@numtail='nonumtail=0'}, {@fat=@quiet='quiet'}, {@uni_xlateno='uni_xlate=0'}]}) 09:41:39 executing program 0: keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000a80)={0x0, 0xc, 0xae}, &(0x7f0000000440)=ANY=[@ANYRESDEC=0x0], &(0x7f0000000b40)="058f6a5fe2db85fa52baca0c", &(0x7f0000000c00)=""/174) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xff}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0xc, 0x6, 0x1, 0x0, 0x5}, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') pipe(&(0x7f0000000240)={0xffffffffffffffff}) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) splice(r3, 0x0, r5, 0x0, 0x2, 0x4) read(r4, &(0x7f0000000080)=""/31, 0x1f) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r6, &(0x7f0000000140)=ANY=[], 0xfffffc8f) fcntl$setpipe(r6, 0x407, 0x0) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r8 = getegid() setresgid(r8, 0x0, 0x0) fchown(r6, r7, r8) sendfile(r0, r2, 0x0, 0x1) 09:41:39 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(r0, r1, 0x0, 0x1) pipe(&(0x7f0000000240)={0xffffffffffffffff}) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) splice(r2, 0x0, r3, 0x0, 0x100000000ffdc, 0x0) ioctl$TCSETS2(r2, 0x402c542b, &(0x7f0000000040)={0x7, 0xfc7f, 0x1, 0x0, 0x200, "a2ff062ec9437a03ba554294af11b7dfcc7f44", 0x7fff, 0x1000}) [ 1129.349079] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1129.369713] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. 09:41:39 executing program 1: syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="646f1cefa7716c6f7070792c00ea671cdcd734f69b22cf5a1922dea58a54b4e9f9bc8237558d68b0f110f8a1f548effe55a018ce91bb8e2e30"]) r0 = socket$netlink(0x10, 0x3, 0xe) r1 = perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8250, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(&(0x7f00000000c0)=[{r1}, {0xffffffffffffffff, 0xb61c61993eae8e64}], 0x2, &(0x7f0000000100)={0x77359400}, 0x0, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) r2 = dup2(r1, 0xffffffffffffffff) pipe(&(0x7f0000000240)={0xffffffffffffffff}) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) splice(r3, 0x0, r4, 0x0, 0x100000000ffdc, 0x0) connect(r4, &(0x7f00000001c0)=@ax25={{0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, 0x5}, [@null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @null, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}]}, 0x80) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000300)='TIPCv2\x00') r6 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) r7 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') sendmsg$TIPC_CMD_GET_NETID(r6, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x1c, r7, 0x200, 0x70bd25, 0x25dfdbfe, {}, ["", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x80}, 0x800) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000880)=ANY=[@ANYRES16=r7, @ANYRESHEX=r6, @ANYRESDEC=r7, @ANYRES64=r6, @ANYBLOB=',\aQ', @ANYRESDEC=r7, @ANYPTR=&(0x7f0000000540)=ANY=[@ANYPTR=&(0x7f0000000500)=ANY=[@ANYRES32=r7], @ANYRESDEC=r7, @ANYBLOB="a653e30d2dba2c82589ca8486af3fe5f9455145e4ad24f38b808cfe6b71f3c8989a78e828c44121fb9ac3776b4e704e3bbdb713b0ad3dd1086529acad16674d33a35c492393d3a14ae326530230b5362376ad3299d3b10098b403a8664a1e0f410c52333ee96189be1fff4ab10744d73734f19d02c9d20c49e02ae658a6b1c665987ea2645832c3998bc4c4ccf13ab265c5e52b3bf6c3d9747ae7d512302452e8545fa4a9b78404acb72856e664f279fcd433bfffeaa827959c2108d7e1b2b55703d5208aea66af9711aee59669a3dc6c3d4f7fcb9c41cc631c4fcf7fdd97cb472d3dfa292c507b9"]], 0x4f) sendmsg$TIPC_CMD_SHOW_LINK_STATS(r0, &(0x7f0000000480)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000440)={&(0x7f0000000400)={0x30, r7, 0x800, 0x70bd2d, 0x4da, {{}, 0x0, 0xb, 0x0, {0x14, 0x14, 'broadcast-link\x00'}}, ["", "", "", "", "", "", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x8880}, 0x4) sendmsg$TIPC_NL_LINK_SET(r2, &(0x7f0000000580)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000540)={&(0x7f00000004c0)=ANY=[@ANYBLOB='t\x00\x00\x00', @ANYRES16=r5, @ANYBLOB="100028bd7000ffdbdf2509000000100006000400020008000100050000005000070008000100040000000c00040001000000010000000c00030002000000000000000c000300070010000000000008000200080000000c00040001000000000000000c0003000200000000000000"], 0x74}, 0x1, 0x0, 0x0, 0x80}, 0x800) sendmsg$TIPC_NL_BEARER_GET(r0, &(0x7f0000000600)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x4200010}, 0xc, &(0x7f00000005c0)={&(0x7f0000000540)={0x74, r5, 0x300, 0x70bd2b, 0x25dfdbfb, {}, [@TIPC_NLA_NODE={0x8, 0x6, [@TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_MON={0x14, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x3a}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x604b}]}, @TIPC_NLA_LINK={0x44, 0x4, [@TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}]}]}, 0x74}, 0x1, 0x0, 0x0, 0x40004087}, 0x8004) add_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz', 0x3}, &(0x7f0000000340)="af1b72934e869a83323261697339b55fe211fb0ff0722109ae406ac114a5483f5f7a68dc5183ed6a720c9ea5e29f595fa86c37731dce0f6d1d29e7b7902aad7656008fffbac7da26f8ff2cb071a2ec7ab3dd3f3412be4eefe69e49528630b57502de9857061f9e807d89897495cc453322ce24997d6bc3ee80ac6f4fbc4488295b2850ad9ab5400268335af73b", 0x8d, 0xfffffffffffffff8) 09:41:39 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') fallocate(r0, 0x0, 0xffffffffffff8b73, 0x1) sendfile(r0, r1, 0x0, 0x1) 09:41:39 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(r0, r1, 0x0, 0x1) r2 = add_key$keyring(&(0x7f0000000200)='keyring\x00', &(0x7f0000000240)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r3, &(0x7f0000000140)=ANY=[], 0xfffffc8f) fcntl$setpipe(r3, 0x407, 0x0) fstat(r3, &(0x7f00000000c0)) keyctl$restrict_keyring(0x1d, r2, &(0x7f0000000000)='keyring\x00', &(0x7f0000000040)='/\x00') keyctl$set_timeout(0xf, r2, 0x0) r4 = add_key$keyring(&(0x7f0000000200)='keyring\x00', &(0x7f0000000240)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) keyctl$restrict_keyring(0x1d, r4, &(0x7f0000000000)='keyring\x00', &(0x7f0000000040)='/\x00') keyctl$set_timeout(0xf, r4, 0x0) keyctl$search(0xa, r2, &(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz', 0x1}, r4) 09:41:39 executing program 2: keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000a80)={0x0, 0xc, 0xae}, &(0x7f0000000ac0)={'enc=', 'raw', ' hash=', {'sha384-avx2\x00'}}, &(0x7f0000000b40)="058f6a5fe2db85fa52baca0c", &(0x7f0000000c00)=""/174) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xff}, 0x0) getpid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x62e, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1104}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x10, 0x0, 0x0) ioctl$BLKSECTGET(r0, 0x1267, &(0x7f0000000580)) sendto(r1, &(0x7f0000000000)="120000001600e70d017b00000000008e1584", 0x12, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(r0, r2, 0x0, 0x1) 09:41:39 executing program 1: setxattr$trusted_overlay_nlink(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='trusted.overlay.nlink\x00', &(0x7f0000000340)={'L+', 0xcb}, 0x28, 0x1) clone(0x7a014400, &(0x7f0000000080)="274c8c5d3f8c3413683abd4a52b1b5c107f3b2bf351e9c3b8eb6a85c845761383d9c3cc4ff011d5cc25e9059782144ab968bf1bcccb533cf286d8d4d446ac9d62de4c79490da54f3fa0178930fb03c9a5951a3be6d433e049d4da8db6101977235c587e5ad1c59e839c5391c435ae32d4e3940485b99b1c29864f32f5f874e664f152da161374a53a8543871858b45047b7dd51b05d11cf32762f1560a30260679d371885610d3c8b3c422d534cbe76233b038af83387ae9fd782b89f41621", &(0x7f0000000000), &(0x7f00000001c0), &(0x7f0000000200)="233297baa3d4678d603788a0035df8d9e5de1d26a5a648ad13b1a25c5f3565e15998e9bd295f15188fa5b3112b82be05792622215adcfb1a57983db8961cead74bfdb3c2fc7ba33d11aa7bf1a0e3ba7f122faaa6fff0e15835e7f722c7a49bccff76bc5104a512452153ab68721c7a2723bb064a82ed702053a797de8df698c3dae2e74bc6c21610f9e00df28e") syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@fat=@dos1xfloppy='dos1xfloppy'}]}) [ 1129.547452] input: syz1 as /devices/virtual/input/input523 09:41:42 executing program 2: keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000a80)={0x0, 0xc, 0xae}, &(0x7f0000000ac0)={'enc=', 'raw', ' hash=', {'sha384-avx2\x00'}}, &(0x7f0000000b40)="058f6a5fe2db85fa52baca0c", &(0x7f0000000c00)=""/174) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xff}, 0x0) getpid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x62e, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1104}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x10, 0x0, 0x0) ioctl$BLKSECTGET(r0, 0x1267, &(0x7f0000000580)) sendto(r1, &(0x7f0000000000)="120000001600e70d017b00000000008e1584", 0x12, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(r0, r2, 0x0, 0x1) 09:41:42 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x7c, 0x7c, 0x2, [@array, @restrict, @ptr, @func, @int, @int, @fwd, @enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x0, 0x9}]}]}}, 0x0, 0x96}, 0x20) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000240)=ANY=[@ANYBLOB="cd80"], 0x2}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x39) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x0) ptrace$cont(0x1f, r0, 0x5, 0x800000000000) 09:41:42 executing program 1: syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="006770a507ebcc851cabb0fb28d191cdbeb3166c2748b50697a6656727442cce486a1b3f89d30c7b32a9a8baf1588ebf09bb4457301b8e427593665e7844d25be2c89722a6c77ab96d1ba62d42240c33997b7d7207d654cebe01acfebd054df7152c2c477228577623e27a824c3c3f15d56033a30d5f1a91d09a9392a0c804c5d75374faa834cc19c4df3e72c3474a61c70d11d7a4d30f757694efafbae25b15bc5ef8"]) 09:41:42 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000]}, 0x45c) r1 = syz_open_dev$sndtimer(0x0, 0x0, 0x100) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000040)={{0x1}}) gettid() r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[@ANYBLOB="f75f9bf747594d0a1851415d989b48270bb03c9ef00b305cba0432a36b9310552b2e4de8c9de57a65146ad9194a585247c8d2a48e1311d4dd0e973234ea0a1a238326753d3da28e216683f91691b54351036cf18886cd3e555df4a1b907696264440c2e8407ed7160e8250e81157496310f16407a59d7e892d7ea55b9215d7eb723ff1b873c6af16ac27c40d2c4fe0c268984029a5c1adb5df4f4dd2"], 0xb) inotify_add_watch(r2, &(0x7f0000000180)='./file1\x00', 0x80000020) r3 = geteuid() getresgid(&(0x7f0000000140), 0x0, 0x0) fchown(r2, r3, 0x0) ioctl$PPPIOCSMRRU(r2, 0x4004743b, &(0x7f00000001c0)=0x2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r2) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={r1, 0x28, &(0x7f0000000240)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000002c0)={r4, 0xffffffff, 0xe6d3be648ff4b41c}, 0xc) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x3, 0x0) ioctl$UI_DEV_DESTROY(r0, 0x5502) 09:41:42 executing program 0: keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000a80)={0x0, 0xc, 0xae}, &(0x7f0000000ac0)={'enc=', 'raw', ' hash=', {'sha384-avx2\x00'}}, &(0x7f0000000b40)="058f6a5fe2db85fa52baca0c", &(0x7f0000000c00)=""/174) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') getdents64(0xffffffffffffffff, &(0x7f0000000080)=""/54, 0x36) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xff}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(r0, r2, 0x0, 0x1) 09:41:42 executing program 4: pipe(&(0x7f0000000240)={0xffffffffffffffff}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) write$binfmt_misc(r3, &(0x7f0000000140)=ANY=[], 0x4240a2a0) ioctl$sock_inet6_tcp_SIOCATMARK(r2, 0x8905, &(0x7f00000007c0)) socket$inet(0x2, 0x3, 0x2a) r5 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r5, 0x107, 0x12, &(0x7f0000001440)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) bind$inet(r4, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) connect$inet(r4, &(0x7f0000000100)={0x2, 0x0, @multicast1}, 0x10) splice(r2, 0x0, r4, 0x0, 0x19404, 0x0) r6 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r6, 0x1, 0x19, &(0x7f00000000c0)='ip_vti0\x00', 0x10) connect$inet(r6, &(0x7f0000000100)={0x2, 0x0, @rand_addr=0x7fffffff}, 0x10) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg(r6, &(0x7f0000007fc0), 0x400000000000030, 0x0) setsockopt$packet_tx_ring(r3, 0x107, 0xd, &(0x7f0000000200)=@req={0x8, 0x3, 0x9, 0x6}, 0x10) fgetxattr(r3, &(0x7f0000000180)=@known='user.syz\x00', &(0x7f00000005c0)=""/81, 0x51) splice(r0, 0x0, r1, 0x0, 0x100000000ffdc, 0x0) r7 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400000}, 0xfffffffffffffec8, &(0x7f0000000140)={&(0x7f00000003c0)={0x5c, r7, 0x800, 0x70bd28, 0x25dfdbff, {}, [@TIPC_NLA_LINK={0x1c, 0x4, [@TIPC_NLA_LINK_PROP={0x0, 0x7, [@TIPC_NLA_PROP_MTU={0x0, 0x4, 0x5}]}, @TIPC_NLA_LINK_NAME={0x0, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x0, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x0, 0x1, 'syz1\x00'}]}, @TIPC_NLA_MON={0x14, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0xffffffffffffffed, 0x1, 0x49491417}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x3}]}, @TIPC_NLA_BEARER={0x18, 0x1, [@TIPC_NLA_BEARER_PROP={0x14, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}, @TIPC_NLA_PROP_MTU={0xffffff8d}]}]}]}, 0x5c}, 0x1, 0x0, 0x0, 0x1}, 0x801) pipe(&(0x7f0000000240)={0xffffffffffffffff}) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) splice(r8, 0x0, r9, 0x0, 0x100000000ffdc, 0x0) ioctl$BLKPG(r9, 0x1269, &(0x7f0000000040)={0x8, 0x8001, 0xb9, &(0x7f0000000280)="4f526f59bf150b1d657502e0e6c760be93406b2d2d72a002fff0985f265d6111aee084ceda74fdb45fd307f6c4a28b0a320abdda1c987c9db9e93786fdc147b1cb4e73a0c482b753381b5b53436d574eef902f504afa5f2f07282454f25ba053cf344a90bfb71020ae398794048ef0e15d44c6b6b4839c88ff34ee12df94bde09718692a12403efba0b891d39c66ab5d5d810a40ebac421efb8d23fed1a2e6480fc72d1bcf4a95f0f92c0927c51947ec3414ee847396c7f0f0"}) ioctl$INOTIFY_IOC_SETNEXTWD(0xffffffffffffffff, 0x40044900, 0x7) r10 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(0xffffffffffffffff, r10, 0x0, 0x1) 09:41:42 executing program 1: syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="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"]) keyctl$get_security(0x11, 0x0, &(0x7f0000000080)=""/85, 0x55) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000001300)='/dev/null\x00', 0xc0000, 0x0) recvfrom$unix(r0, &(0x7f0000001340)=""/12, 0xc, 0xa93a0f91b5ba4ead, &(0x7f0000001380)=@file={0x0, './file0\x00'}, 0x6e) 09:41:42 executing program 0: keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000a80)={0x0, 0xc, 0xae}, &(0x7f0000000ac0)={'enc=', 'raw', ' hash=', {'sha384-avx2\x00'}}, &(0x7f0000000b40)="058f6a5fe2db85fa52baca0c", &(0x7f0000000c00)=""/174) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xff}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/commit_pending_bools\x00', 0x1, 0x0) sendfile(r0, r2, 0x0, 0x1) 09:41:42 executing program 1: ioctl$KDADDIO(0xffffffffffffffff, 0x4b34, 0x7) syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@fat=@dos1xfloppy='dos1xfloppy'}]}) r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$PPPIOCCONNECT(r0, 0x4004743a, &(0x7f0000000080)=0x4) 09:41:42 executing program 0: keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000a80)={0x0, 0xc, 0xae}, &(0x7f0000000ac0)=ANY=[@ANYBLOB='enc=raw hash=sha384-avx2\x00'/63], &(0x7f0000000b40)="058f6a5fe2db85fa52baca0c", &(0x7f0000000c00)=""/174) prctl$PR_GET_FPEMU(0x9, &(0x7f0000000080)) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000000c0)={0x0, @empty, @empty}, &(0x7f0000000100)=0xc) ioctl$TUNSETIFINDEX(r0, 0x400454da, &(0x7f0000000140)=r1) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xff}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff}) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) splice(r3, 0x0, r4, 0x0, 0x100000000ffdc, 0x0) ioctl$KDSETKEYCODE(r3, 0x4b4d, &(0x7f00000001c0)={0x9, 0x25c3}) r5 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(r0, r5, 0x0, 0x1) 09:41:42 executing program 2: keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000a80)={0x0, 0xc, 0xae}, &(0x7f0000000ac0)={'enc=', 'raw', ' hash=', {'sha384-avx2\x00'}}, &(0x7f0000000b40)="058f6a5fe2db85fa52baca0c", &(0x7f0000000c00)=""/174) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xff}, 0x0) getpid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x62e, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1104}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x10, 0x800000000000803, 0x0) ioctl$BLKSECTGET(0xffffffffffffffff, 0x1267, &(0x7f0000000580)) sendto(r1, &(0x7f0000000000)="120000001600e70d017b00000000008e1584", 0x12, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(r0, r2, 0x0, 0x1) 09:41:42 executing program 1: syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xffffffd8, 0x0, 0x20, &(0x7f0000000040)) 09:41:42 executing program 0: keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000a80)={0x0, 0xc, 0xae}, &(0x7f0000000ac0)={'enc=', 'raw', ' hash=', {'sha384-avx2\x00'}}, &(0x7f0000000b40)="058f6a5fe2db85fa52baca0c", &(0x7f0000000c00)=""/174) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xff}, 0x0) r1 = getpid() r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000280)='/dev/uinput\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x40, 0x0) open$dir(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) dup(r2) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000200), 0x0) sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(r0, r3, 0x0, 0x1) 09:41:45 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x7c, 0x7c, 0x2, [@array, @restrict, @ptr, @func, @int, @int, @fwd, @enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x0, 0x9}]}]}}, 0x0, 0x96}, 0x20) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000240)=ANY=[@ANYBLOB="cd80"], 0x2}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x39) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x0) ptrace$cont(0x1f, r0, 0x5, 0x800000000000) 09:41:45 executing program 1: syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@fat=@dos1xfloppy='dos1xfloppy'}]}) pipe(&(0x7f0000000240)={0xffffffffffffffff}) pipe(&(0x7f0000000240)={0xffffffffffffffff}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) splice(r1, 0x0, r2, 0x0, 0x100000000ffdc, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r3, &(0x7f0000000140)=ANY=[], 0xfffffc8f) fcntl$setpipe(r3, 0x407, 0x0) r4 = openat$cgroup_ro(r3, &(0x7f0000000140)='memory.stat\x00', 0x7a05, 0x1700) splice(r0, 0x0, r4, 0x0, 0x100000000ffdc, 0x0) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r4, 0x6, 0x16, &(0x7f0000000080)=[@sack_perm, @timestamp, @timestamp, @sack_perm, @sack_perm, @mss={0x2, 0xac}, @window={0x3, 0x40, 0x7}, @sack_perm, @sack_perm, @mss={0x2, 0x800}], 0xa) 09:41:45 executing program 0: keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000a80)={0x0, 0xc, 0xae}, &(0x7f0000000080)=ANY=[@ANYBLOB="656e633d72617720686173683d7368613338342d617678320000000000000000000000000000000000000000000000000000000000000000000000689f6065ac4e8c33fadd1a346716f300000000000000"], &(0x7f0000000b40)="058f6a5fe2db85fa52baca0c", &(0x7f0000000c00)=""/174) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xff}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') pipe(&(0x7f0000000240)={0xffffffffffffffff}) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) splice(r3, 0x0, r4, 0x0, 0x100000000ffdc, 0x0) r5 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) sendmsg$TIPC_NL_PUBL_GET(r5, &(0x7f0000000400)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000003c0)={&(0x7f00000002c0)={0xec, 0x0, 0x20, 0x70bd26, 0x25dfdbfb, {}, [@TIPC_NLA_MON={0x44, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x2}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x1}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x20}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xfa13}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x8}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x6}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x7}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x1}]}, @TIPC_NLA_NET={0x10, 0x7, [@TIPC_NLA_NET_NODEID={0xc, 0x3, 0xfffffffffffff681}]}, @TIPC_NLA_NODE={0x14, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x9}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_SOCK={0x40, 0x2, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0x7}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x5}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0xee}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x6f}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x7}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x1}]}, @TIPC_NLA_NODE={0x30, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0xffffffffffff2a8b}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x3}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x7f}, @TIPC_NLA_NODE_UP={0x4}]}]}, 0xec}}, 0xeac0fffe5c33d70b) write$P9_RREADLINK(r4, &(0x7f0000000100)={0x10, 0x17, 0x1, {0x7, './file0'}}, 0x10) sendfile(r0, r2, 0x0, 0x1) 09:41:45 executing program 2: keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000a80)={0x0, 0xc, 0xae}, &(0x7f0000000ac0)={'enc=', 'raw', ' hash=', {'sha384-avx2\x00'}}, &(0x7f0000000b40)="058f6a5fe2db85fa52baca0c", &(0x7f0000000c00)=""/174) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xff}, 0x0) getpid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x62e, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1104}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x10, 0x800000000000803, 0x0) ioctl$BLKSECTGET(0xffffffffffffffff, 0x1267, &(0x7f0000000580)) sendto(r1, &(0x7f0000000000)="120000001600e70d017b00000000008e1584", 0x12, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(r0, r2, 0x0, 0x1) 09:41:45 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000]}, 0x45c) r1 = syz_open_dev$sndtimer(0x0, 0x0, 0x100) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000040)={{0x1}}) gettid() r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[@ANYBLOB="f75f9bf747594d0a1851415d989b48270bb03c9ef00b305cba0432a36b9310552b2e4de8c9de57a65146ad9194a585247c8d2a48e1311d4dd0e973234ea0a1a238326753d3da28e216683f91691b54351036cf18886cd3e555df4a1b907696264440c2e8407ed7160e8250e81157496310f16407a59d7e892d7ea55b9215d7eb723ff1b873c6af16ac27c40d2c4fe0c268984029a5c1adb5df4f4dd2"], 0xb) inotify_add_watch(r2, &(0x7f0000000180)='./file1\x00', 0x80000020) r3 = geteuid() getresgid(&(0x7f0000000140), 0x0, 0x0) fchown(r2, r3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r4, &(0x7f0000000140)=ANY=[], 0xfffffc8f) fcntl$setpipe(r4, 0x407, 0x0) ioctl$sock_FIOGETOWN(r4, 0x8903, &(0x7f00000001c0)=0x0) prlimit64(r5, 0xe, &(0x7f0000000200)={0x5, 0x1000}, &(0x7f00000003c0)) close(r2) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={r1, 0x28, &(0x7f0000000240)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000002c0)={r6, 0xffffffff, 0xe6d3be648ff4b41c}, 0xc) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x3, 0x0) ioctl$UI_DEV_DESTROY(r0, 0x5502) 09:41:45 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(0xffffffffffffffff, r0, 0x0, 0x1) 09:41:45 executing program 0: keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000a80)={0x0, 0xc, 0xae}, &(0x7f0000000080)=ANY=[@ANYBLOB="656e633d72053a617720686173689a7368613338342d6176783200"/79], &(0x7f0000000b40)="058f6a5fe2db85fa52baca0c", &(0x7f0000000c00)=""/174) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xff}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xfffffc8f) fcntl$setpipe(r2, 0x407, 0x0) sendfile(r0, r2, 0x0, 0x4) 09:41:45 executing program 4: ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080)={0x0}, &(0x7f00000000c0)=0xc) r1 = syz_open_procfs(r0, &(0x7f0000000040)='clear_refs\x00') r2 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(r1, r2, 0x0, 0x1) 09:41:45 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(r0, r1, 0x0, 0x1) pipe(&(0x7f0000000240)={0xffffffffffffffff}) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) splice(r2, 0x0, r3, 0x0, 0x100000000ffdc, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_KEY_STATUS(r3, 0xc080661a, &(0x7f0000000040)={{0x0, 0x0, @reserved="7235214beca47d9a010b75ec54bebeffd05ff69de2c698782fbda390384b3ec9"}}) 09:41:45 executing program 2: keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000a80)={0x0, 0xc, 0xae}, &(0x7f0000000ac0)={'enc=', 'raw', ' hash=', {'sha384-avx2\x00'}}, &(0x7f0000000b40)="058f6a5fe2db85fa52baca0c", &(0x7f0000000c00)=""/174) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xff}, 0x0) getpid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x62e, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1104}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x10, 0x800000000000803, 0x0) ioctl$BLKSECTGET(0xffffffffffffffff, 0x1267, &(0x7f0000000580)) sendto(r1, &(0x7f0000000000)="120000001600e70d017b00000000008e1584", 0x12, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(r0, r2, 0x0, 0x1) 09:41:45 executing program 4: pipe(&(0x7f0000000240)={0xffffffffffffffff}) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xfffffc8f) r3 = syz_genetlink_get_family_id$SEG6(&(0x7f00000001c0)='SEG6\x00') sendmsg$SEG6_CMD_DUMPHMAC(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000280)={&(0x7f00000003c0)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="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"], 0x24}, 0x1, 0x0, 0x0, 0x80}, 0x20000040) fcntl$setpipe(r2, 0x407, 0x0) ioctl$EVIOCGABS2F(r2, 0x8018456f, &(0x7f0000000040)=""/84) r4 = openat$cgroup_ro(r0, &(0x7f0000000100)='cpuacct.usage_percpu\x00?e\xe7\xe1x\x00\x00\x00\x00\x00\x00\t,|\xfb\x82\xee\xf0\xc8\x92\xf76\x9f\x90', 0x7a05, 0x1700) splice(r0, 0x0, r4, 0x0, 0x100000000ffdc, 0x0) r5 = getpid() finit_module(r0, &(0x7f0000000580)='clear_refs\x00', 0x0) r6 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000380)='/proc/thread-self/attr/current\x00', 0x2, 0x0) fcntl$getown(r6, 0x9) rt_tgsigqueueinfo(r5, r5, 0x16, &(0x7f0000000000)) read$char_usb(r1, &(0x7f00000005c0)=""/195, 0xc3) ptrace(0x10, r5) ptrace$getregset(0x4204, r5, 0x1, &(0x7f0000001140)={0xffffffffffffffff}) prlimit64(r5, 0xa, &(0x7f00000000c0)={0x2890, 0x5eb3}, 0x0) ioctl$TIOCEXCL(r4, 0x540c) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') r8 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') ioctl$sock_inet_SIOCRTMSG(0xffffffffffffffff, 0x890d, &(0x7f0000000300)={0x0, {0x2, 0x4e20, @broadcast}, {0x2, 0x4e20, @local}, {0x2, 0x4e24, @broadcast}, 0x22, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)='veth0\x00', 0x6, 0x2, 0x5}) sendfile(r7, r8, 0x0, 0x1) 09:41:45 executing program 2: keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000a80)={0x0, 0xc, 0xae}, &(0x7f0000000ac0)={'enc=', 'raw', ' hash=', {'sha384-avx2\x00'}}, &(0x7f0000000b40)="058f6a5fe2db85fa52baca0c", &(0x7f0000000c00)=""/174) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xff}, 0x0) getpid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x62e, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1104}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x10, 0x800000000000803, 0x0) ioctl$BLKSECTGET(r0, 0x1267, 0x0) sendto(r1, &(0x7f0000000000)="120000001600e70d017b00000000008e1584", 0x12, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(r0, r2, 0x0, 0x1) [ 1135.591884] input: syz1 as /devices/virtual/input/input527 09:41:48 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x7c, 0x7c, 0x2, [@array, @restrict, @ptr, @func, @int, @int, @fwd, @enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x0, 0x9}]}]}}, 0x0, 0x96}, 0x20) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000240)=ANY=[@ANYBLOB="cd80"], 0x2}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x39) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, 0x0, 0x0, 0x0) ptrace$cont(0x1f, r0, 0x5, 0x800000000000) 09:41:48 executing program 2: keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000a80)={0x0, 0xc, 0xae}, &(0x7f0000000ac0)={'enc=', 'raw', ' hash=', {'sha384-avx2\x00'}}, &(0x7f0000000b40)="058f6a5fe2db85fa52baca0c", &(0x7f0000000c00)=""/174) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xff}, 0x0) getpid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x62e, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1104}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x10, 0x800000000000803, 0x0) ioctl$BLKSECTGET(r0, 0x1267, 0x0) sendto(r1, &(0x7f0000000000)="120000001600e70d017b00000000008e1584", 0x12, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(r0, r2, 0x0, 0x1) 09:41:48 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000]}, 0x45c) r1 = syz_open_dev$sndtimer(0x0, 0x0, 0x100) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000040)={{0x1}}) gettid() r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[@ANYBLOB="f75f9bf747594d0a1851415d989b48270bb03c9ef00b305cba0432a36b9310552b2e4de8c9de57a65146ad9194a585247c8d2a48e1311d4dd0e973234ea0a1a238326753d3da28e216683f91691b54351036cf18886cd3e5557f4a264440c2e8407ed7160e8250e81157496310f16407a59d7e892d7ea55b9215d7eb723ff1b873c6af16ac27c40d2c4fe0c268984029a5c1adb5df4f4dd2"], 0xb) inotify_add_watch(r2, &(0x7f0000000180)='./file1\x00', 0x80000020) r3 = geteuid() getresgid(&(0x7f0000000140), 0x0, 0x0) fchown(r2, r3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r2) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={r1, 0x28, &(0x7f0000000240)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000002c0)={r4, 0xffffffff, 0xe6d3be648ff4b41c}, 0xc) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x3, 0x0) ioctl$UI_DEV_DESTROY(r0, 0x5502) 09:41:48 executing program 1: syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="61877012ab11e5c4ac13f1bf8e0aaa0688dd5bb8591374afd0732f80cf013eeaa8879d1ae7cfba1078b9678063c207cfbb2e2dad9ef2892ad6e0f0c42addbcacea8a7110175dc5d21b06cf679db20efdcf8640082e031f3858de854fc696d3d5ac1eed66b6b810b85d9e0b828e4b9225b32fa222edc5cb8030fea2d0e47350260cd71734093537a0c6d7d59b8166a897c2312500"/163]) 09:41:48 executing program 0: keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000a80)={0x0, 0xc, 0xae}, &(0x7f0000000ac0)={'enc=', 'raw', ' hash=', {'sha384-avx2\x00'}}, &(0x7f0000000b40)="018000000000000052baca0c", &(0x7f0000000c00)=""/174) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xff}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(r0, r2, 0x0, 0x1) 09:41:48 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') bind$unix(0xffffffffffffffff, &(0x7f0000000040)=@abs={0x1, 0x0, 0x4e23}, 0x6e) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(r0, r1, 0x0, 0x1) 09:41:48 executing program 0: ioctl$IOC_PR_RESERVE(0xffffffffffffffff, 0x401070c9, &(0x7f0000000100)={0x101, 0x1ff}) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000a80)={0x0, 0xc, 0xae}, &(0x7f0000000ac0)={'enc=', 'raw', ' hash=', {'sha384-avx2\x00'}}, &(0x7f0000000b40)="058f6a5fe2db85fa52baca0c", &(0x7f0000000c00)=""/174) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') getitimer(0x6, &(0x7f00000001c0)) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xff}, 0x0) r1 = getpid() pipe(&(0x7f0000000240)={0xffffffffffffffff}) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) splice(r2, 0x0, r3, 0x0, 0x100000000ffdc, 0x0) ioctl$PIO_UNIMAP(r2, 0x4b67, &(0x7f00000000c0)={0x1, &(0x7f0000000080)=[{0xd69ec77, 0x3}]}) sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(r0, r4, 0x0, 0x1) 09:41:48 executing program 4: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x3, [@func={0x5, 0x0, 0x0, 0xc, 0x1}, @var={0x8, 0x0, 0x0, 0xe, 0x1}, @volatile={0x5}]}, {0x0, [0x30]}}, &(0x7f00000001c0)=""/222, 0x43, 0xde}, 0x20) pwritev(r0, &(0x7f0000001580)=[{&(0x7f0000000140)="56345ee957b3a955e50d03424e5d58c8064fda6314da51141b3170820c0cede99ab16f73d0041e51", 0x28}, {&(0x7f00000002c0)="2d55018787f00206391e4f158e26fac21b602e5060824f8ce3ef48a65468d1b284f61cb83f78e6590d6db74480d1104606b93a711828f10edcb9fea29e6dd031cca3cf47f4cec2aec60688e2a180a9203af109ff39", 0x55}, {&(0x7f0000000340)="f506a99505c4a7aa29", 0x9}, {&(0x7f0000000380)="d28228cfa11f76bb18ff6a2bc88bec6f359802fc1d9ae267dc262408945b439ad9be948c6ead9299223c29bf324538ba5638614fad120d90f289816e2f9efa21ae77aa3ffe3c911f6d575ca99d555f0ccc6dd3489433e56aedf2085073b0b3d446349cdebcc94aba5bba8a050b5b56b829ce8d5a2b7c06034da54e1ccd4f8dd8a87e75808f9d87977d7f7920e5413810de3e2c9337d21fcf06bcb50eea", 0x9d}, {&(0x7f0000000440)="50f31adc4f5ac0c3287b9106241f3fffe7bb14fa1a5ac2fe6f1d9694d56fdfa812ccbbed8e302cdf01da04a46a3165e1f7f701eeacd3524789809ecf74239ffbdf4cfd2a6e6b7dbb3e418c365c774c6de2057da885c64ef08b77a1de0e352df0f9ce6a6f2c37949b21b3221d9e8ca9edcede1ac299e4ab863be42a3171b545259c4601ba1837375dfd4bd96c74a81108b74bbabda2c5b0965c50ff44f78272bd6debd7c4695d8f0ac22dffc6110733104a592a12d6673d50c375f7986705c6ab9d4bfa309d70a84e9394", 0xca}, {&(0x7f0000000540)="78892ca1e26a45a3a6efb3d8d611668426a098e469243ec35f200c9f6144faa34b3af2f1cb07a28cbeed670d00d7e3a2ac", 0x31}, {&(0x7f0000000580)="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", 0x1000}], 0x7, 0x0) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000040)=0xfffffffffffffff9, 0x4) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='status\x00') readahead(0xffffffffffffffff, 0x4000000, 0x5) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(r1, r2, 0x0, 0x1) 09:41:48 executing program 1: r0 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/status\x00', 0x0, 0x0) ioctl$EVIOCGUNIQ(r0, 0x80404508, &(0x7f0000000140)=""/203) ioctl$EVIOCGBITSND(r0, 0x80404532, &(0x7f0000000040)=""/216) 09:41:48 executing program 0: keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000a80)={0x0, 0xc, 0xae}, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000b40)="058f6a5fe2db85fa52baca0c", &(0x7f0000000c00)=""/174) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='cgroup\x00') prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xff}, 0x0) r1 = getpid() fadvise64(r0, 0x0, 0xf6, 0xe) sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='stat\x00') 09:41:48 executing program 1: syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000000)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)={[{@utf8='utf8=1'}, {@rodir='rodir'}, {@fat=@dmask={'dmask', 0x3d, 0x938e}}, {@shortname_winnt='shortname=winnt'}, {@utf8='utf8=1'}, {@shortname_mixed='shortname=mixed'}, {@shortname_mixed='shortname=mixed'}]}) munmap(&(0x7f0000ffb000/0x2000)=nil, 0x2000) 09:41:48 executing program 0: keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000a80)={0x0, 0xaf, 0xae}, &(0x7f00000001c0)={'\x02\x00\x06\x00', 'pkcs1', ' hash=', {'sha384-avx2\x00'}}, &(0x7f0000000100)="00e3ffffffffffffff00000011dabe0e71b9e2deadfdf53c3e38c8771468826f70ad9ba7ee56496ec8f1834e63b6dd8f642fa6431aaa2ad2b11b492b26b10f14c7373bf59ea0abc06bcda2f25db85bb542aad05c000753b043b736b9b00794ed3151a54d628fe653e8cff18918398af2aaf9641e30e587e8abaa54270a91c6c1cbf0d056ddf0ba40bde91d7c21adc027f037c90430d7533afcffffffffd48df9a9f5ef7812e2a52c44a320f60c5a06", &(0x7f0000000c00)=""/174) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xff}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) getpid() r2 = syz_open_procfs(r1, &(0x7f00000000c0)='net/sockstat6\x00') r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000680)=0x14, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f00000006c0)={'veth0_to_bond\x00', r4}) sendfile(r0, r2, 0x0, 0x1) 09:41:51 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x7c, 0x7c, 0x2, [@array, @restrict, @ptr, @func, @int, @int, @fwd, @enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x0, 0x9}]}]}}, 0x0, 0x96}, 0x20) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000240)=ANY=[@ANYBLOB="cd80"], 0x2}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x39) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, 0x0, 0x0, 0x0) ptrace$cont(0x1f, r0, 0x5, 0x800000000000) 09:41:51 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') pipe(&(0x7f0000000240)={0xffffffffffffffff}) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) splice(r2, 0x0, r3, 0x0, 0x100000000ffdc, 0x0) write$binfmt_script(r3, &(0x7f0000000040)={'#! ', './file0', [{0x20, ':'}, {0x20, 'stat\x00'}, {0x20, '&+'}, {0x20, 'clear_refs\x00'}, {0x20, 'clear_refs\x00'}], 0xa, "a126f8193c266c2c51b5f977fde01a45a52d32411c545bcdb264a941ff9ce4ec7cdbb6bd99b7a8ee611d4d98e5cf48ff988045f0fca2ec3ba6d6"}, 0x68) sendfile(r0, r1, 0x0, 0x1) 09:41:51 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000]}, 0x45c) r1 = syz_open_dev$sndtimer(0x0, 0x0, 0x100) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000040)={{0x1, 0x0, 0x2}}) gettid() r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[@ANYBLOB="f75f9bf747594d0a1851415d989b48270bb03c9ef00b305cba0432a36b9310552b2e4de8c9de57a65146ad9194a585247c8d2a48e1311d4dd0e973234ea0a1a238326753d3da28e216683f91691b54351036cf18886cd3e555df4a1b907696264440c2e8407ed7160e8250e81157496310f16407a59d7e892d7ea55b9215d7eb723ff1b873c6af16ac27c40d2c4fe0c268984029a5c1adb5df4f4dd2"], 0xb) inotify_add_watch(r2, &(0x7f0000000180)='./file1\x00', 0x80000020) r3 = geteuid() getresgid(&(0x7f0000000140), 0x0, 0x0) fchown(r2, r3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r2) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={r1, 0x28, &(0x7f0000000240)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000002c0)={r4, 0xffffffff, 0xe6d3be648ff4b41c}, 0xc) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x3, 0x0) ioctl$UI_DEV_DESTROY(r0, 0x5502) 09:41:51 executing program 1: syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)={[{@fat=@dos1xfloppy='doy\x00'}], [{@obj_type={'obj_type', 0x3d, '-md5sum'}}, {@audit='audit'}, {@appraise_type='appraise_type=imasig'}, {@context={'context', 0x3d, 'system_u'}}, {@func={'func', 0x3d, 'KEXEC_KERNEL_CHECK'}}]}) r0 = socket$unix(0x1, 0x3, 0x0) sendmmsg(r0, &(0x7f00000054c0)=[{{&(0x7f0000001240)=@in={0x2, 0x4e20, @empty}, 0x80, &(0x7f0000001740)=[{&(0x7f00000012c0)="91be8646ed2cb2e2346a49a7ee3edd0d94171356633fb29ac3100eab8014bd9e4a879d161c83e1cd82e83a3babc15c9c54ef6f31b0b2e1194ef424457f76b141e6", 0x41}, {&(0x7f0000000040)="c952449f127006e360dca0307999754e62f6c15df17c8f6a0ae0cc5a420a374d12af89eb956d773182", 0x29}, {&(0x7f0000001340)="7ed2cca12ce5634e3cb9f653766cdace3b323776e976971217e1141ec3e37f22d8451d336fb80f434fccf3474cfd6329ca0741329c57c93726fecdedb136300e424647dff59ac4e32f7834f4a85d6bd3d07994735ce418084a7091599b035d066322c7e61b1a5f214c0c2c5a8658a531875b9327790f358fdbeb48c03688fc18e935807cbd2eb9bb2bdde06d072fc8b73b793831650300b4a7b9b46ddfa05b1fc15ba6998603fed3acfbeb5a3f82b97a47c3e08adac3e62bd4c80254b4a4a7da4b0395e3dd97e0284759a3b821879adf03d1", 0xd2}, {&(0x7f0000000100)}, {&(0x7f0000001440)="35f689b998035c5d2b3d231862928ea97981f8fd8efc17ebfa313a15e4eaa7b142536927e3233dcdb094d1d17e45b3231b5029c16dc8905b8380fea4b6e96f1cedbf404c10214239e6ca41d1915cb59beadb3eef1d9d3337fabefea3403aee738520087265d728f33013bd", 0x6b}, {&(0x7f00000014c0)="582a01ec3855de92c2cb4775341b352e7c3c34f765e03f2fa4", 0x19}, {&(0x7f0000001500)="430ea48dc9019dadd8adf2bb8c6fdda11970e9a7e15613c6dc5af83f8c1854f70f5827a3ad86bfa3583aa4462dc69470d2a99ad024f9c9a9dcb284ac6a952f0fccae99d1d962d9773d580fa35f", 0x4d}, {&(0x7f0000001580)="39572494dda65e11f487c41440ea750cff035a4fadf6000ea544741851b8add73e7231874249e20ad93a26c4b285a3dcc21ff35ec77adf5e706082ce44ed1bb18410451474c314c229e63c6c09ac030d879e5496856bc251ffea3ca0c188554daaee555f12360c568bd583c964e54af2b2ae579803bd111104c0c3c263299f0df40a24d5fbc70bf1bf9fcbbeceadd06f0d619a0197e0f0158a135331316bfd6861d07ebb05ed97791dba417d65419e13176001997db9f62b4adb4d19fee0f901c42d", 0xc2}, {&(0x7f0000001680)="e0e3b1cb9c9071de64b4fbd48929f8ea3022070e29575c695620962aabaff1dbd3848c910971d4546f0ddc50c8445eb35371fe9d840ff07f3a0ec3832992b1d924d36bd1d85b6da9c248dea8557183b629b38a6b7be06a45c8450833781290de88e148cfdbcd71303aed2e53fca0eb436e26c377e16aef7ceeffdb0e2823f4136e3393cb5000deee0648c14b0b1344e820beff1c6868f5e65170e49762623a", 0x9f}], 0x9, &(0x7f0000001800)=[{0x1010, 0x116, 0x2, "888636885a8faf0fac5d1ea968b612e7b36fa70338b49acb9dc31f1f8e66c226579cb27e744903ee4d9ce2aac8de0b85f14b41b3da34593c6e3691ffe2ffcf39e01531df213ec13a8a82d1d8e8c29cb8cd4a70b56a7837785bfd8f53e4ab3ad3558a3ad78abc21a0e93ac4a9d923b39f15c3186c6f512b7a7401804f996add645dc5071bddbfbce1709c34a09be541f785f6c09be74ad7deddb4b4b7498852d227b65cb277d1ac18c394e7dc8764624f91fc52dacaf090e564ba6c839abf54615b1cbf169d2b39837321fa38c5aac0d7eeccc5e40c170375fb8ed484abfecb8aa7f9fd57ece671ebdbf3600404c882196fa0f1eb4631b386e17da9df5b5d6fe7f2b10f30c268d8081acce09b28e3cb5d630fc9806b6469ea35710fa34d457932db113721e29624fb4d6b080d3a40ebd26b6b1076933672ea2ab9a58fadd666aad987d0ad752c3343790ff8195430a9be8f402767eb77c997be54e7b723da744a0f664d2ec67c7df73b1d60b8f2f29f45f72a8501e37b7bc16ca808717949301439175af95c85dc3ecda532eb4d01cbaee219caf5b356dd7622ed01753eaefca2f81f747a911295b32bf7b294b14b4c7f5763563c96299d48a935734b918239eb798ae683fdd2ffb93cc023c3a330ea00104cf7939a29bd43f548756a45a1fb881b4c8018560ab58784ec0e0f936f81f51d58d3212b58b74946499d234de371d78af3561b9ed19d2e674cc271256491e7f9829097120b37b4d68cfd1a895737c8fe4e5237a72edb4a5424edfea32853a156d024a555766274fc2c590e56fc8cf6e6b05431359253db53209ff7ff916dc80c14492ae03ad2e7d25c8b05a640623244c6c882f69b8675f4dcfe506e36c227bab76a85e261471aba5b3cef1fb418f6e1aaa9fa4be769c85d4f52d14f85ce215f7acb352eb6c14a755ea515eb1d3bacc314f8eb33759168f9f4c6e937da67caec69d4def2c88af1b0bb4a973feb1ea209923ae0f8b7ca87836dde4c6f44214fae92f656d4284c73babd10bd2d819547c61868d552570b2ddf29e9104f8698807fdce868632de9933c39a35797e541a9ac790b4bf3d7717bde2d252588b03302d4ddcd210c2fb701e9d3cf5c317ac6ed03b9982dc34b8fabd6d0c4c2c5492e2595c3335f4eaaa3d7d929a998fc6fb2fa9b5327118cc6613e685c315ed7d915fc96d79b9b63e8193558fcfffb556e79607a1c450c92b943edb4b2f8b4e9729ec5410d4633e65f86bce704804b95e8699d38f1d84c1c075c9585c36977300a878462f2203c30bed1948203deffa7b62fa8a93028416162f93b5a6e78f94595dbcbeceb7ce463fd0c50bce1ace9c4ab2577303a979b5b70c0c60f10743c89df3116cc8f941e5b7378362f8bdf58959f595b66098c53dbb0671919eda85ebff92f7860910e1c2b30cd2d1ae19e27bf4b29919ff3567a7bf8e0158aefcd54a3e365990c02b6a17491201ab15179b7a8c29bad8dba60cbf30be8f3c20d97738d1c7ad639fb4c3357818f84f44b3a0963c0d24a7215dc896a043228c3e7383c087e64d0536f7552694410a88706807f4249b0a0efedf33a6d001780821b6e2560e75572e20ab35718ca6e1979b2cd810b203a9c139444ed61c2aadae1d4022374e989bf6e5d972dc37e7c58c1dfd2bf74bc016d35b72355cf849a24b421fadd91147e3bbcf35a097b334acc97e5731f3aa7c71f91b46d737fea73002cbb311b2086d2df2e9abf7afca38a7b224bff93f1a2d612c07689df05c53cd685825d2fdd63c1b9d5323eba099dfbdc78be02947bfaa5f28c587d4192bd98c722e1cbd602261516fa74d1494305ea90d0d5860d40c2866f2b47e3ae593e18a3888f9de8fcca114a3f831135f33f7fa3b0d3cac4f4226341efa2d09f8a62ae6faedd5c8a90fc4151275a7d3fb654976e61673fcf22492810495eba682adabfeed5ad2b082f754b857dbd0eff69240201545178a09f26d4592c7b3877a3a77544ea3d7493ca3a46cf6046f49398059a83038b6dff9327e42512956e23f424bce5b5f23ea9988ab89845d052863ee8baf221b41d504b0a75f9570200edc2be20fe7e8f995c91d86d092dd8e854d306a65a04ac06c70389240bd106e7db825838103e8bc32f9e78273805e0b3ba9dd75abed9638204e50c0c6ae9fe739f1c02d8554bf1b8482957c592de083de03f9f0d55a8ceca8f81279d4650920f2db903ccf9a1441110ec71d852fec0653e22d274482f67e7338855257854cbd6ece65a59999159318abe239bc3d2fdbffccf588fc9504d051bd5ba8de1447dd4f9389769225e2fbbe2b387e2341300002ef94af5703f4f64d3cbca22d83fde88020b5217c50eebc506bc1afd0d5578af8ff8332c6a902547d8539c85b9e53cd05f97ca2d5d6a3bc7757ef7f7379487e8d86804cc44eb357180f2492aa885380abf8755693c0e90d97d37a17d58040b5a18b731d899b04c11a57dcb74819d71c64a177de0872f07d07bb08d4892686934aa5afeb1f9f0104b37eca0e55cef2836823f37fb0fe0d44113196448c85e4407eed366ce6f3bbe10f2f0f07657464c7cbdcab2a03910dae9ea165407cce0100d0bd0447eef44a1d802b2c28498c9889f6a045fa8faca8c97c596490efbaa9286e08ae137d25794edac846416271c4f3f52b9671fb2aa1b230742ebd0885516c718fe22283af7e43cfca439f70e7cf6af596d12ee7d00dd38609ddc15625c51137b428af5c898d9b0b929205becb0261739f1a7a2db47ecafd7d595eeac13637b87b32f398fc5a90beabfa60841964ff012b228f3a2f1163ea1f63ecea865943773e38a57be8d873078a30bfba9d43c83fec02d75c2d725dfdbdfc49bd5c792045e4fb101e4129c0763a294b35b28d78d29cf17e366ec2ebae3c1a4382b2c42af746bf92a1dc4fe248c1e8e5da0cb5e31c9adf4654dffd41ba2cb5df9a42f2fa14fc3710da4e617a1ed743b60d9d2c8ec8f640855bc7a08d0777bdafb89797d423d415f1e815e4c907cd2a2b4f8f91d32a2e2623782c310dc17034af6f53059307ff1c7bdc88075aba42ee031211b6543811bcb1bc97f09f5296d7c8cf5cee135d22ce25a1de5e810c0b6c255692e333df9d69c248722c9636eddc4e42dea7022e6928171f3284c0884926376322ae85cb41e1d5197bf818cbf72a2db1b41967eea5da79933f156ea096b19170e86ee9742c5fb5065a9538ded93a019502183cb7c31ed9705e71efe3278647d801198f19c287d0f6c1fda12855b99cc47e311aff52e9c5bce9c5eafad2dec4dbe63370137cad53539ad9d7b5c2e9ce661ac2576e8fb858d15991079996d40de9715f679b8cca3f93cacb792527abccec9420772468d160245ccc53fbd176036ebb1b0ff81753d6fff569f60aae11b6b133c000c0609b1d27241d403cc077aa23d41ac16fa319101cea26a60c1f936ac1131287114c699ba606a580ca8ecf115567d6e4c3a31d4dc25aa7cada70ac4befffcb413c7db0e6e7b1b1076e8d3f4ec007d2ac2dc4eb2331c0e4b534b6f62ebcc48f2005bd64657487cfb7d30f869b05711f0f0ebfc4b25991129b787e5817b745f9a69d9cdbbc4e83f5a0cb60dee8dca7639bdbc24d4c8dff296f6d3c8671191e38d1fa4cc620dd4162bc5d12b64db6297d424621d213e4de5daffa5ebfc94b2529baae5c22193c3c0de161f672a45ba9e302437167048653b78ec595d0915a6291a54c96ace870cd8b31b35e72d18f6a0d030425d717cef7487a901624f8c632e61256b7a9f5b33fd7a2c7e383ebb37716dcabafa6effd2475d76ce2a011ed26ce3fbd96b3e36e7e54457d4fc5a0f7fda1db7d61c1b5635683bcf8782e87b8ed3c0ab8d9950563a713bf97f4abfbdb71d2f56f62a1291328cf8277a33c9e91c5aada9b3a30b7ab391b9f0822ba08406318c731c26f110d7527125eaad855e7f3847c31dcd57690b8122ea6d4a3beaa9a79d944075f142e6b2a3c9ea7bf21c773a991f4f3e96c7f02bfa1b89363e993b7a40423ec11df9cc55a2ea377307801df915be810ab65530a4cfe36bbe030b1ba0eade70e012873d164eccaabf817a673e69ad5524ad76308439ab65bedb89273e1ab77d46793ba7e6eb3877cfb375fc0850c65edeb940184e2334d7edaf0df09a2f98ef40afd908d179d75a1b1fa0685de856c53f888499e2c1f6e40e089834c8e59bc87d647be29f7896d291ca2352864d6445ec1f6123fba8f8e6e8b8d42d3fd34121cb084facd9d2e5da9ab6d2f9b72a355fa8fc85d3068fc52ef5d5062bc971a8da44a4d91c1ef27beab8d8b2b52ea3a039b6e1527b2f5e1912dcc2dbdcee8481f4f1aa7c13882fc9f432083ae75ebb656f4fe46d5ef7288c9cde67f39aa1fc756e0171b2d63c7f458beb220be22d7b9b1885196675c8d3d3e3a1245e920eea01bacd2f50665a5b57c9ec3a776ab50ac3ac2ba5fac7972305da984d4bf1a1fb26d129ec8c68c77b0d73cccf6c6db55ebf83df534e51d2acbc64dbaa160cd02cb2e4801c0726f24dc81fd38262608b45155b11d47399e7e7983e8561da3e99811f6c3588edbf11cf1b54ed24afc24f1caf069704705496baad7d00aac1c422b78fc1b7680fd5aaa5aa5b36741c028e643ebcc0263b4d2706501e1956ed436782e42fcda7cecd307c5def3014a7730ec54b13197b8cbf6076c77744c7588dd3e679bd550c17bbb6fee59cfb5751af9c9a121a4548e4ee4f81af14b3efc05816b4b18f82e016f9571ea3bf65c8834d474ab0197a7c2544902c02712c70283d6ea197c20a95f1b8e7edbe8168ffa496d9d107ce11363ad28844c9a204d7e41f084a4b399d6e8cad6b600d80ccb5c4858bc04a6467f1ddb862e20443b2660be7adf79c81a1d91fa4f4bde4306b5bc70f228eaebd9bd54dabf5d6b98723de9d024a69b5f66d991189e8b39258c0ffc818a846d6441aabb872f9bd34d92f774beedd069af57fd2ac573fcf317c3175a6c914e8166d7bf7815df8de7c980a4464b73227547f6c992f0dc6fe616c3dbabf4a2cbe4724b75240b18e27606cf8c8487059aa8ec878955d2b37f7485842671adfda372c65ddb6301263afe5cd55cf859082ddbbdd2394f5bec0345c49cb86e978824b14598c07b31c891d4d98956cf44dbfef25f4bd539843360b16ba4adf2557e00fdb4ea35c10201601009b4344dc921b5ac6f9788e4ac2015239fcab3fbe42da6db99a1e0bcd83d6f7fdece7bf4f6682002f4cd61ac71938a86df065be483862490f219b074fe778c8a08555caedd5fa23497beceb3ca7064da0a5c19b49530d0e15e09b6761a9aced8d2aa50bf16913ce170030a7147fed063101a89ce4014c9c8a7a49ce237f03fc330d27478277f6c7cc968a821d74abc0fe501a6ca5effc47826553df3316f45f3de6cd17f858cb4c2a7daca5125280a97b4e90a88b988d08b025cde8e9f3e6e5754802032b3c9669f9e3ceec8cdab80e0a1c4171d113f4c19a7b045fe21cc5115275a0b8ca51fa667be2015bd4e499e70d7dac3ddf02130a033f6f4913f9bafd835b82a26cf93e59cc305abb17c71ffb9dfbf395f3782c2e750b425d7d9944b066edeb6c97d4f78cfd3b7b340524a279b763b46b0c97b13219a9c8fb5e57463a1a99608efbb7dafa0b1ab78cc036d536490984f961c6a702f25ab127bdc4ecd0f0a47da6ba519d5848b34f2715cc09ba6d59e06a917c2a5e337ff10e5f7662f14ae467b48392f8e91e2b536973183ce82c9f69ef57a505a485686cd72e134b6448222fb86fef"}, {0x98, 0x102, 0x2, "b8fee69630a19ea290452965170b10b583aac5dc96689f27fd30f8794028c31862a6bea9cd4025add675db4f4a84b935a61560a628043b49400615336ca91b267d902f5f03f60f418a3334420c630bfa540546f5ad38ada1d37bd5cd754bf10356c5c29c8246316abea9e78ace7b7605c9f2ca78267656e70c989f371c3dcea0fa3173d5e41a"}, {0x100, 0x10f, 0x0, "124ccfa8b8cc86d727d7fd613f94625df4647886e5dbc6b548af76c8add738d6d18d4e618b7c216dfb6be9fceabf1626cc9be43be995bf57f366bf1cabebc407a7541930d1137d59aa0999b927981fcfe2afa2afece5db080aba33a251ebe0dd6d816956c551c84e1f7153a87f3561eb0a0abd790c7cfe6f92d957600e150958b15d09d7004470b6a3c1ec3de5051241b62b47aadde20529a147ff1cf94424f6268aed4120c308f24361f8f9c4f545b786c1820595244cbeae94e5494a6108590c4aa828b7cf433abe37d946958d0d8648e5aed18d3a405dc7a064bec15c31664c59c9eed919af2a4e8c9673658689"}, {0x78, 0x11, 0x6, "10f88254e24f21169aea3d26de809ceee7e41813eb764e6dbf8aafabcbd689179620105bf992e5b87707e57f243593e6a36a8e8fcdd3d5d1c42242d9b8aa96783ec966962e707d13b8077b10e021bc936e9bc5414d647b6a5bbf26c7824596037305f7"}, {0xd8, 0x109, 0x5, "e0e722c246f4d9272129e7f27bca1d6c53baa9d199116c6c05518f88b078cbaad54623e1016c2c18d076b292c89b542aa2a33595d04cb447f75c261edfca3dd6cc2355f5b07234352c51968f7944e626678d5aaf39260c0f5a8dd9b57af2f5efd68aadaefa4e6515e8c057f2e0d8c95672d47fe79cf052a54290310ec144392c623e8ebf1aa5e78474930c0a02962fffc686a029dce0f81ebb309782b18ca1c76478f77944642b7008ccb145faee33351f0bcf2229f17b1fe5ca54b3b437e7586da905ec64965b"}, {0xa0, 0x10d, 0x0, "f43dcd2d380a06d29cc89c3c49b830a0b72e1875e5a464cf6aaf868dec9530ec0746d69eec54833c77c8390478f24e5a6c6d00d4448c73cac79ee2c8237a2d7c2896998af4cb11fdf3b6355307473fd94f2692cd83d08392d1ed74c3990e8a01c8ade3feac58f11f77cacbc299aed1844cadcf4ef7e4d317d90cc9cdccb019dfd6dd8997015e141399d3ffe63e95"}, {0x40, 0x42c9fdae2ca50921, 0x55, "866ff35f6864050e08646e6d9a1e61cae01c390c15956c2581f564e7f9bc78b89f273e5604868ddb13e90c7b9a1dfa"}], 0x13d8}}, {{&(0x7f0000002c00)=@nfc_llcp={0x27, 0x0, 0x0, 0x7, 0x7fffffff, 0x6, "43a869bf7e88a52eaf0284427228b6344a6aab26f28cb249427469eea3dbdcdc81d34193bf9488f4a72c38c864ef2003c7269acac7f385e5059ac3b4ca16cd", 0x23}, 0x80, &(0x7f0000003d40)=[{&(0x7f0000002c80)="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", 0x1000}, {&(0x7f0000003c80)="d3e5f32d103dc574e775373f8c80a23bc0737e511efbbab4de76fa09eea06578a312a12af1e36f0a0300e660a30588970417575b865f4cdc102169939f75dde3f95ecabbd1553c99babd1a3b86dc3fb4581e04c98b363378626f39a6a2513ea1ada264555a6e03f225dde298a76f", 0x6e}, {&(0x7f0000003d00)="45ec106a0dc9a7cd928f3e9bab7b0ea7b5a9e10646d86812ab", 0x19}], 0x3}}, {{&(0x7f0000003d80)=@nl=@unspec, 0x80, &(0x7f0000005400)=[{&(0x7f0000003e00)="b72e5fae844e34ac50280329c852e00ca4e42de3b3a9bc17e963a4cc20c2abcb41b06414aa2cfb274f7c312975404d1c64de3946372ef89739513b622c37ad547c60cc8f51a0ef59eb0ff5202e1597881935604529719b572c8cda2048a74fdb6a71d9a56c2986f3902f84959d9cf96289fd1eea05308592e49a2f33d94d30245464047a037e921a83a97ee28eee67de92b513be1f8458ada6722cab9388842d614dd6cda4750ec567250765c386b76e09d57e33f5defd66ec5d859844b81fe604d58328cf75920a8bea85da5c868498e3572b1ed7cd9d42c68ee42c8baaa627fcf7bd7c3483329a7f0217607e5177176a2663732d3629ef64", 0xf9}, {&(0x7f0000003f00)="f2feebc29de01613217e7c6e09afa9c9703364d65d4bad57aab7fd25e58fca8ce832c6845a852205b9c845b77922cf34c9f7b89e6a8d16a917a946b7f868ef03c221f781d92d34dbe2b86d4043bc770b1e", 0x51}, {&(0x7f0000003f80)="632196f9d16fa44f3eb0bb406c302cd8de0551a3c217e7b642d20f5024f760e2bb7a7551ba56013157ae98224b2d7561c7473af5ce3dccfdc0107fc679b4264b99cbd2794ff554f2d42940787d6c4e4aa33cb90c0e5b4a623f0bd487d0aa2e1b9e9dfc78e2edcd7ace27b6ebc4ef9d7a0d58abae0508a2963c69cc587d37e63023c9496b9d07b41f8a2e26454edad8a2949e0c0a95d2d78ce32b06883f2dd5970b6b02c17d1be4d6a0079a1c77d5adfd76b602749497c9c96441d1ffafbdbabd18da79d1d13bba024b496402e775fdf00d91c40fc6e45d9f762430782f4d8720f35e7747e39c60ed27af00e879", 0xed}, {&(0x7f0000004080)="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", 0x1000}, {&(0x7f0000005080)="8561a2acf8edbb029c84d6398f5e5ef1bba0be823514ddf44790edea69b831fe41f4d2c95c0883e51efc69ea5368cfeeb002f81cf4172f3029a653102a570860d2b145d30fb78aa4306971218d4ae12416e000926e5e9c924b70c3aaead65254e5a8f7c95f33c2a0ba2c89dec277dd7c7abbadf9337fd86d04a92314b5592d433fc7c46bb6bec6271b4c653b7725d75730f44107164f2bbec8f5e0528fdf7f61966c3bd967cf02c17fb7cffe68420d1747a498e0b635741417a246487c20091d63b6cf8179e41f52c33d84b0e5086b83f58746d90f1736405ec8cead43a45ca7", 0xe0}, {&(0x7f0000005180)="59e9f6491416cc27dbdd5fc275e174be0fd64464b51e5f55e2b1ed791d8e", 0x1e}, {&(0x7f00000051c0)="7ff82fc4986c65541f88446cc98768c50714083499aaf0c7", 0x18}, {&(0x7f0000005200)="84e66a5eb7a4b266a4d3997a65a9050029a29dcf2e0a2a3eca949b8b2b7c5b20d3e6c9713559e74f12d9d9fbd556242010936cb887e318491e2e2332eb021f2f3a91f0cc01f385a78c0cf953570e945abac3a53382d3efadf9a8b6f3823a08c9c11712273900dc68df85f77b6d1086c867f6ab0a485e04ace5ac6a95223415dcc4e73e6a2aebb6371f0f5d91ca73214dc69b723de26e", 0x96}, {&(0x7f00000052c0)="727b25c2c3a8c43fb40b7749fe058b5f9a1c7bcfcfa7801ecdb6b5dd6f624a4573b7309fd4df7a806dc0a206ec05a47856dbca3f9b8ab2f176575251c687b7d6433afe301b2680662918edcbc02ee2c433de21d0f034471ec8cb67ade3201efac9fa9aad553427f2a2b65a071306283abdfeea91b34c224002768a8169fc9591189ce6c6e0339c3d678afbb2fcd0ed87027f802b65514dbead51b545ff3593", 0x9f}, {&(0x7f0000005380)="9c58430104a5723618b0749f1be5a3055cc2496111eadb4f730216d079ef1cf9e3bd0f3f929bae956e908a56d5ccf611a046ea09f67ac30f2f1b512f0c9285d808a6c519e69b193c7f19ffe8a8dc4e1d8b226c1539f3a4e8d0d9888848828fd2087ba1c575336e933c9d153004cdccfb59e83aa0253efb6105abc9d7", 0x7c}], 0xa}}], 0x3, 0x20000000) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff}) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) splice(r2, 0x0, r3, 0x0, 0x100000000ffdc, 0x0) recvfrom$unix(r3, &(0x7f00000001c0)=""/4096, 0x1000, 0x40012000, &(0x7f00000011c0)=@file={0x1, './file0\x00'}, 0x6e) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r1, 0x6, 0x15, &(0x7f0000000000)=0x3ff, 0x4) 09:41:51 executing program 0: keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000a80)={0x0, 0xc, 0xae}, &(0x7f0000000ac0)={'enc=', 'raw', ' hash=', {'sha384-avx2\x00'}}, &(0x7f0000000b40)="058f6a5fe2db85fa52baca0c", &(0x7f0000000c00)=""/174) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xff}, 0x0) r1 = getpid() setsockopt$inet_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, &(0x7f0000000080), 0x4) sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = syz_open_procfs(r1, &(0x7f0000000180)='stat\x00') sendfile(r0, r2, 0x0, 0x1) 09:41:51 executing program 2: keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000a80)={0x0, 0xc, 0xae}, &(0x7f0000000ac0)={'enc=', 'raw', ' hash=', {'sha384-avx2\x00'}}, &(0x7f0000000b40)="058f6a5fe2db85fa52baca0c", &(0x7f0000000c00)=""/174) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xff}, 0x0) getpid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x62e, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1104}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x10, 0x800000000000803, 0x0) ioctl$BLKSECTGET(r0, 0x1267, 0x0) sendto(r1, &(0x7f0000000000)="120000001600e70d017b00000000008e1584", 0x12, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(r0, r2, 0x0, 0x1) 09:41:51 executing program 0: keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000a80)={0x0, 0xc, 0xae}, &(0x7f0000000ac0)={'enc=', 'raw', ' hash=', {'sha384-avx2\x00'}}, &(0x7f0000000b40)="058f6a5fe2db85fa52baca0c", &(0x7f0000000c00)=""/174) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') prlimit64(0x0, 0xe, &(0x7f0000000080)={0x3f, 0xff}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(r0, r2, 0x0, 0x1) 09:41:51 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') prctl$PR_GET_TSC(0x19, &(0x7f0000000080)) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') openat$selinux_create(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/create\x00', 0x2, 0x0) sendfile(r0, r1, 0x0, 0x1) 09:41:51 executing program 1: syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000c00)=ANY=[@ANYBLOB="646f733178666c6f7070792c0081cdfb0bd0a01139d4273a5a0060dd8fea7f5d234e869e42d164cdd3a1f7a8897b0ebd022ffdb235314ba587f578214b33660e88cc0b78ccf89acf3be9145784ddb2bd3a705e589b18afc825db0000cd8b101f08535da94c32832b27dac6678bf8f2ba5925ad616a2d941e5e3a65e81c6ea6a2"]) pipe(&(0x7f0000000240)={0xffffffffffffffff}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) splice(r0, 0x0, r1, 0x0, 0x100000000ffdc, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r3, &(0x7f0000000140)=ANY=[], 0xfffffc8f) fcntl$setpipe(r3, 0x407, 0x0) getsockopt$inet6_mreq(r0, 0x29, 0x15, &(0x7f0000000200)={@local, 0x0}, &(0x7f0000000b80)=0x14) setsockopt$packet_add_memb(r3, 0x107, 0x1, &(0x7f0000000bc0)={r4, 0x1, 0x6, @local}, 0x10) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='\xa7l\b\x01\x00\x00\x88\x00\x00\x99', 0x2000, 0x0) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x10100, 0x0) ioctl$RTC_SET_TIME(r5, 0x4024700a, &(0x7f0000000080)={0x3c, 0x1b, 0x12, 0x1c, 0xb, 0x200000000000, 0x4, 0x104, 0xffffffffffffffff}) r6 = openat$cgroup_ro(r1, &(0x7f00000000c0)='memory.stat\x00', 0x0, 0x0) fcntl$getflags(r6, 0x40a) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0xfffffc8f) pipe(&(0x7f0000000240)={0xffffffffffffffff}) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) splice(r7, 0x0, r8, 0x0, 0x100000000ffdc, 0x0) close(r8) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r9, &(0x7f0000000140)=ANY=[], 0xfffffc8f) fcntl$setpipe(r9, 0x407, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff}) r11 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) splice(r10, 0x0, r11, 0x0, 0x100000000ffdc, 0x0) dup2(r9, r10) fcntl$setpipe(r2, 0x407, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff}) r13 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) splice(r12, 0x0, r13, 0x0, 0x100000000ffdc, 0x0) write$binfmt_elf64(r12, &(0x7f0000000280)=ANY=[@ANYBLOB="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"/2288], 0x8f0) dup2(r0, r2) 09:41:51 executing program 0: keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000a80)={0x0, 0xc, 0xae}, &(0x7f0000000ac0)={'enc=', 'raw', ' hash=', {'sha384-avx2\x00'}}, &(0x7f0000000b40)="058f6a5fe2db85fa52baca0c", &(0x7f0000000c00)=""/174) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') prlimit64(0x0, 0xd, &(0x7f0000000280)={0x9, 0xff}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) sendmsg$IPVS_CMD_NEW_SERVICE(r0, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000001c0)={&(0x7f00000000c0)={0x84, 0x0, 0x1, 0x70bd29, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0xcd72}, @IPVS_CMD_ATTR_DAEMON={0x54, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x4}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'teql0\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x1}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x1ff}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x8001}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'erspan0\x00'}]}, @IPVS_CMD_ATTR_DEST={0xc, 0x2, [@IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0xe61e}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x8}]}, 0x84}, 0x1, 0x0, 0x0, 0x40}, 0xfefd57de569aea7b) pivot_root(&(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='./file0\x00') r2 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(r0, r2, 0x0, 0x1) 09:41:51 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000040)=@gcm_128={{0x304}, "7ccf34ea939b85c7", "39643c07338d2800000000002d81d0aa", "bf0a8625", "233117a154f41f13"}, 0x28) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfffffc8f) fcntl$setpipe(r1, 0x407, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f00000001c0)={0x0, 0x2, 0x3ff, 0x5}) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(r0, r2, 0x0, 0x1) ioctl$int_out(r1, 0x2, &(0x7f00000000c0)) pipe(&(0x7f0000000240)={0xffffffffffffffff}) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) splice(r3, 0x0, r4, 0x0, 0x100000000ffdc, 0x0) write$P9_RUNLINKAT(r4, &(0x7f0000000100)={0x7, 0x4d, 0x1}, 0x7) 09:41:51 executing program 0: keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000a80)={0x0, 0xc, 0xae}, &(0x7f0000000ac0)={'enc=', 'raw', ' hash=', {'sha384-avx2\x00'}}, &(0x7f0000000b40)="058f6a5fe2db85fa52baca0c", &(0x7f0000000c00)=""/174) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') prlimit64(0x0, 0x3, &(0x7f0000000280)={0x30f9a652, 0x100000000}, 0x0) chdir(&(0x7f0000000200)='./file0\x00') r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') socket$key(0xf, 0x3, 0x2) r3 = getpid() rt_tgsigqueueinfo(r3, r3, 0x16, &(0x7f0000000000)) ptrace(0x10, r3) ptrace$getregset(0x4204, r3, 0x1, &(0x7f0000001140)={0xffffffffffffffff}) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_SIOCETHTOOL(r4, 0x8946, &(0x7f00000001c0)={'nr0\x00', &(0x7f00000000c0)=@ethtool_rx_ntuple={0x35, {0x1, @usr_ip4_spec={@loopback, @initdev={0xac, 0x1e, 0x1, 0x0}, 0xf0, 0x200000, 0x1, 0x8}, @hdata="c8b45d689cf2a5d4ff2a51be3e08f19a96a83e3e35cd44a34be6b8d78caddd08d6e2e6b5cf1d9a250cb8f24a3d142574c29d0170eaca360ab27ac19f5a47ac16f8d95f477f01c49a", 0x81, 0x7, 0xf1d8, 0x0, 0xffffffffffffffff}}}) sched_getattr(r3, &(0x7f0000000080)={0x30}, 0x30, 0x0) sendfile(r0, r2, 0x0, 0x1) r5 = getpid() rt_tgsigqueueinfo(r5, r5, 0x16, &(0x7f0000000000)) ptrace(0x10, r5) ptrace$getregset(0x4204, r5, 0x1, &(0x7f0000001140)={0xffffffffffffffff}) capset(&(0x7f0000000240)={0x20071026, r5}, &(0x7f00000002c0)={0xcbcf, 0x80, 0xe, 0x400, 0x7, 0x7f}) [ 1141.675746] input: syz1 as /devices/virtual/input/input529 09:41:54 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x7c, 0x7c, 0x2, [@array, @restrict, @ptr, @func, @int, @int, @fwd, @enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x0, 0x9}]}]}}, 0x0, 0x96}, 0x20) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000240)=ANY=[@ANYBLOB="cd80"], 0x2}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x39) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, 0x0, 0x0, 0x0) ptrace$cont(0x1f, r0, 0x5, 0x800000000000) 09:41:54 executing program 2: keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000a80)={0x0, 0xc, 0xae}, &(0x7f0000000ac0)={'enc=', 'raw', ' hash=', {'sha384-avx2\x00'}}, &(0x7f0000000b40)="058f6a5fe2db85fa52baca0c", &(0x7f0000000c00)=""/174) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xff}, 0x0) getpid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x62e, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1104}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket(0x10, 0x800000000000803, 0x0) ioctl$BLKSECTGET(r0, 0x1267, &(0x7f0000000580)) sendto(0xffffffffffffffff, &(0x7f0000000000)="120000001600e70d017b00000000008e1584", 0x12, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(r0, r1, 0x0, 0x1) 09:41:54 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1]}, 0x45c) r1 = syz_open_dev$sndtimer(0x0, 0x0, 0x100) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000040)={{0x1}}) gettid() r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[@ANYBLOB="f75f9bf747594d0a1851415d989b48270bb03c9ef00b305cba0432a36b9310552b2e4de8c9de57a65146ad9194a585247c8d2a48e1311d4dd0e973234ea0a1a238326753d3da28e216683f91691b54351036cf18886cd3e555df4a1b907696264440c2e8407ed7160e8250e81157496310f16407a59d7e892d7ea55b9215d7eb723ff1b873c6af16ac27c40d2c4fe0c268984029a5c1adb5df4f4dd2"], 0xb) inotify_add_watch(r2, &(0x7f0000000180)='./file1\x00', 0x80000020) r3 = geteuid() getresgid(&(0x7f0000000140), 0x0, 0x0) fchown(r2, r3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r2) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={r1, 0x28, &(0x7f0000000240)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000002c0)={r4, 0xffffffff, 0xe6d3be648ff4b41c}, 0xc) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x3, 0x0) ioctl$UI_DEV_DESTROY(r0, 0x5502) 09:41:54 executing program 0: add_key(&(0x7f0000000400)='logon\x00', &(0x7f0000000440)={'syz', 0x1}, &(0x7f0000000480)="b221f3baddfcc2b4ce5ae7a922976cd9e7aeb07961ec007cbdd45872add5fbe098a4b5b63d476b4c1b8ecdaae0ce778c2766ebbe0e95f31ac08d3e0c4b9845998ee9403258cd52f20d8041d7b381b0eea30e", 0x52, 0xffffffffffffffff) r0 = add_key$keyring(&(0x7f0000000500)='keyring\x00', &(0x7f0000000540)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000a80)={r0, 0xfe6b, 0xffffffffffffff8e}, &(0x7f0000000380)=ANY=[@ANYBLOB="050000006f61657020686173683d7368613338342d617678320000000000000000000000000000000000000000000000000000000000001000"/78], &(0x7f0000000b40)="058fe2db95fa520c", &(0x7f0000000c00)=""/174) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xff}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r3, &(0x7f0000000140)=ANY=[], 0xfffffc8f) socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = getpid() rt_tgsigqueueinfo(r4, r4, 0x16, &(0x7f0000000000)) clone(0x10904200, &(0x7f00000000c0)="e3b4d57af054b211231a3fc54fafb538ed96e68599a4cea4be409b0a7d3a0ae72629fda2dc176985c8fd3dcd516cef20a67df44a96646644848339e396c0b814334b8634b7c57c9a17fa809358f679012fe2bb8933ab2d8fa4822527ce2acc3cb0f4d369f28d6465dc6d8bd423739f405328f789da057658a06c79ef1f40b951bb21bdf7eed8645fa37897d547ad58fd5983dc7d8d", &(0x7f00000001c0), &(0x7f0000000580), &(0x7f00000002c0)="d2c64ff9723627dad12d95a1c796c52801da637a49e808f84dc961cfb54269b45ad2eaef6959b0f5977ca3289a6210ef9edbb9be596a6a792f39d0b8bcee3fb867bd6d686d77c4572d8fcfa4574e0f8d6c38648873a681e6d38a922f991742c9624b372036ac86927cc7325837d02478591164f0ab7a1052a47fb3ecb2210f3952dc") ptrace(0x10, r4) ptrace$getregset(0x4204, r4, 0x1, &(0x7f0000001140)={0xffffffffffffffff}) ptrace$peekuser(0x3, r4, 0x8000) fcntl$setpipe(r3, 0x407, 0x0) ioctl$sock_SIOCGSKNS(r3, 0x894c, &(0x7f0000000080)=0x1) syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') inotify_init() sendfile(0xffffffffffffffff, r1, 0x0, 0x5) getpeername$inet6(r1, &(0x7f0000000200)={0xa, 0x0, 0x0, @initdev}, &(0x7f00000005c0)=0x1c) 09:41:54 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000580)='/dev/net/tun\x00', 0x0, 0x0) sendmsg$unix(r1, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=[@rights={{0x14, 0x1, 0x1, [r0, r2]}}], 0x14}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r1, r0) dup2(r4, r3) 09:41:54 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000040)='stat\x00') sendfile(r0, r1, 0x0, 0x1) 09:41:54 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000300)={0xa, 0x8000002}, 0x1c) sendto$inet6(r0, 0x0, 0x283, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000200)={'lo\x00'}) r2 = socket$inet6_udp(0xa, 0x2, 0x0) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4}, 0x1c) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000140)={'lo\x00\x00\xe7\xff\x03\x00\x00\x00\x00\x06\x00', 0xfd}) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='yeah\x00', 0x5) sendto$packet(r0, &(0x7f0000000340), 0xfffffffffffffd72, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) 09:41:54 executing program 4: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') r0 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') recvmsg(r0, &(0x7f00000003c0)={&(0x7f0000000040)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @initdev}}}, 0x80, &(0x7f0000000140)=[{&(0x7f00000000c0)=""/127, 0x7f}, {&(0x7f00000001c0)=""/195, 0xc3}, {&(0x7f00000002c0)=""/196, 0xc4}], 0x3}, 0x2000) openat$zero(0xffffffffffffff9c, &(0x7f0000000400)='/dev/zero\x00', 0x8000, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff}) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) splice(r2, 0x0, r3, 0x0, 0x100000000ffdc, 0x0) sendfile(r2, r1, 0x0, 0x200) 09:41:54 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfffffc8f) fcntl$setpipe(r1, 0x407, 0x0) r2 = getpid() r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IP_VS_SO_SET_EDITDEST(r3, 0x0, 0x489, &(0x7f00000000c0)={{0xe, @broadcast, 0x4e21, 0x4, 'lblcr\x00', 0x8, 0xffffffffffffff4a, 0x71}, {@local, 0x4e21, 0x0, 0x5, 0x6, 0x7}}, 0x44) rt_tgsigqueueinfo(r2, r2, 0x16, &(0x7f0000000000)) r4 = getpid() pipe(&(0x7f0000000240)={0xffffffffffffffff}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r6 = socket$inet6_udplite(0xa, 0x2, 0x88) splice(r6, 0x0, 0xffffffffffffffff, 0x0, 0x100000000ffdc, 0x0) write$UHID_INPUT(r5, &(0x7f0000001180)={0x8, "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", 0x1000}, 0x1006) rt_tgsigqueueinfo(r4, r4, 0x16, &(0x7f0000000000)) pipe(&(0x7f0000000240)={0xffffffffffffffff}) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) splice(r7, 0x0, r8, 0x0, 0x100000000ffdc, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r7, 0x29, 0x22, &(0x7f0000000280)={{{@in=@initdev, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}}}, &(0x7f0000000080)=0xe8) setuid(r9) ptrace(0x10, r4) ptrace$getregset(0x4204, r4, 0x1, &(0x7f0000001140)={0xffffffffffffffff}) ptrace(0x4208, 0x0) ptrace$getregset(0x4204, r2, 0x1, &(0x7f0000001140)={0xffffffffffffffff}) ioctl$sock_FIOSETOWN(r1, 0x8901, &(0x7f0000000040)=r2) syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') pipe(&(0x7f0000000240)={0xffffffffffffffff}) r11 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) splice(r10, 0x0, r11, 0x0, 0x100000000ffdc, 0x0) sendfile(r0, r11, 0x0, 0x2) [ 1144.664886] input: syz1 as /devices/virtual/input/input531 [ 1144.664888] kasan: CONFIG_KASAN_INLINE enabled [ 1144.664912] kasan: GPF could be caused by NULL-ptr deref or user memory access [ 1144.686682] general protection fault: 0000 [#1] PREEMPT SMP KASAN NOPTI [ 1144.693650] Modules linked in: [ 1144.696859] CPU: 1 PID: 1078 Comm: syz-executor.1 Not tainted 4.14.145+ #0 [ 1144.703885] task: 00000000f0d4d097 task.stack: 00000000d6948a7b [ 1144.709968] RIP: 0010:tcp_sendmsg_locked+0x509/0x2f50 [ 1144.715155] RSP: 0018:ffff8881a7097ae8 EFLAGS: 00010206 [ 1144.720618] RAX: 0000000000000011 RBX: ffff8881c73a3180 RCX: 00000000000000e0 [ 1144.727876] RDX: ffffffff8252ea80 RSI: ffffc90001b9c000 RDI: 0000000000000088 [ 1144.735133] RBP: ffff8881a0318b12 R08: 0000000000000001 R09: 0000000000000001 [ 1144.742410] R10: fffffbfff45c5b9d R11: 0000000000000000 R12: ffff8881a7097d90 [ 1144.749679] R13: 0000000000000000 R14: ffff8881a0318b00 R15: dffffc0000000000 [ 1144.756954] FS: 00007f137d0b5700(0000) GS:ffff8881dbb00000(0000) knlGS:0000000000000000 [ 1144.765177] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1144.771044] CR2: 0000000000625208 CR3: 00000001c6d74001 CR4: 00000000001606a0 [ 1144.778316] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 1144.785586] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 1144.792854] Call Trace: [ 1144.795455] ? tcp_sendpage+0x60/0x60 [ 1144.799255] ? __local_bh_enable_ip+0x65/0xc0 [ 1144.803742] tcp_sendmsg+0x2b/0x40 [ 1144.807271] inet_sendmsg+0x15b/0x520 [ 1144.811057] ? inet_recvmsg+0x550/0x550 [ 1144.815020] sock_sendmsg+0xb7/0x100 [ 1144.818720] SyS_sendto+0x1de/0x2f0 [ 1144.822331] ? SyS_getpeername+0x250/0x250 [ 1144.826583] ? put_timespec64+0xbe/0x110 [ 1144.830631] ? nsecs_to_jiffies+0x30/0x30 [ 1144.834788] ? SyS_clock_gettime+0x7d/0xe0 [ 1144.839020] ? do_clock_gettime+0xd0/0xd0 [ 1144.843157] ? do_syscall_64+0x43/0x520 [ 1144.847128] ? SyS_getpeername+0x250/0x250 [ 1144.851357] do_syscall_64+0x19b/0x520 [ 1144.855248] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1144.860422] RIP: 0033:0x459a09 [ 1144.863602] RSP: 002b:00007f137d0b4c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 1144.871471] RAX: ffffffffffffffda RBX: 0000000000000006 RCX: 0000000000459a09 [ 1144.878726] RDX: fffffffffffffd72 RSI: 0000000020000340 RDI: 0000000000000003 [ 1144.885994] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1144.893283] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f137d0b56d4 [ 1144.900641] R13: 00000000004c79f5 R14: 00000000004dd490 R15: 00000000ffffffff 09:41:54 executing program 2: keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000a80)={0x0, 0xc, 0xae}, &(0x7f0000000ac0)={'enc=', 'raw', ' hash=', {'sha384-avx2\x00'}}, &(0x7f0000000b40)="058f6a5fe2db85fa52baca0c", &(0x7f0000000c00)=""/174) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xff}, 0x0) getpid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x62e, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1104}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket(0x10, 0x800000000000803, 0x0) ioctl$BLKSECTGET(r0, 0x1267, &(0x7f0000000580)) sendto(0xffffffffffffffff, &(0x7f0000000000)="120000001600e70d017b00000000008e1584", 0x12, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(r0, r1, 0x0, 0x1) [ 1144.907915] Code: ee 2b de fe 48 85 db 0f 84 12 08 00 00 e8 e0 2b de fe 8b 84 24 08 01 00 00 49 8d bd 88 00 00 00 89 44 24 08 48 89 f8 48 c1 e8 03 <42> 0f b6 04 38 84 c0 74 06 0f 8e 07 24 00 00 41 f6 85 88 00 00 [ 1144.927110] RIP: tcp_sendmsg_locked+0x509/0x2f50 RSP: ffff8881a7097ae8 [ 1144.936885] ---[ end trace a7ca8f534b0e02aa ]--- [ 1144.942589] Kernel panic - not syncing: Fatal exception [ 1144.948591] Kernel Offset: 0x1f600000 from 0xffffffff81000000 (relocation range: 0xffffffff80000000-0xffffffffbfffffff) [ 1144.959518] Rebooting in 86400 seconds..