0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) close(0xffffffffffffffff) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000005740)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000005980)=""/231, 0xf}, {&(0x7f0000005a80)=""/102400, 0x19000}], 0x2}}], 0x2, 0x0, 0x0) 18:05:36 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68}, [{0x0, 0x0, 0x5000000}]}, 0x78) 18:05:36 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0xc}]}, 0x78) 18:05:36 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000000000/0x1000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_RUN(r2, 0xae80, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r4 = syz_genetlink_get_family_id$nl80211(0x0) sendmsg$NL80211_CMD_GET_MPATH(r3, &(0x7f0000000180)={&(0x7f0000000000), 0xc, &(0x7f0000000140)={&(0x7f0000000080)={0x1c, r4, 0xf0a, 0x70bd2c, 0x4, {}, [@NL80211_ATTR_WIPHY={0x8, 0x1, 0x3}]}, 0x1c}}, 0x4000000) 18:05:36 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0xd}]}, 0x78) 18:05:36 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68}, [{0x0, 0x0, 0x6000000}]}, 0x78) 18:05:36 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='personality\x00') r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000240)={0x26, 'hash\x00', 0x0, 0x0, 'rmd320\x00'}, 0x58) r4 = accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendfile(r4, r2, 0x0, 0x20000000001000) 18:05:36 executing program 0: perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) close(0xffffffffffffffff) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000005740)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000005980)=""/231, 0xf}, {&(0x7f0000005a80)=""/102400, 0x19000}], 0x2}}], 0x2, 0x0, 0x0) 18:05:36 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68}, [{0x0, 0x0, 0x7000000}]}, 0x78) 18:05:36 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0xe}]}, 0x78) [ 854.158773] *** Guest State *** [ 854.162773] CR0: actual=0x0000000000000030, shadow=0x0000000060000010, gh_mask=fffffffffffffff7 [ 854.172493] CR4: actual=0x0000000000002040, shadow=0x0000000000000000, gh_mask=ffffffffffffe871 [ 854.187871] CR3 = 0x0000000000000000 [ 854.192108] RSP = 0x0000000000000000 RIP = 0x0000000000000231 [ 854.198783] RFLAGS=0x00000293 DR7 = 0x0000000000000400 [ 854.206163] Sysenter RSP=0000000000000000 CS:RIP=0000:0000000000000000 [ 854.213781] CS: sel=0x0000, attr=0x0009b, limit=0x0000ffff, base=0x0000000000000000 [ 854.222467] DS: sel=0x0000, attr=0x00093, limit=0x0000ffff, base=0x0000000000000000 [ 854.231314] SS: sel=0x0000, attr=0x00093, limit=0x0000ffff, base=0x0000000000000000 [ 854.240126] ES: sel=0x0000, attr=0x00093, limit=0x0000ffff, base=0x0000000000000000 [ 854.250139] FS: sel=0x0000, attr=0x00093, limit=0x0000ffff, base=0x0000000000000000 [ 854.259162] GS: sel=0x0000, attr=0x00093, limit=0x0000ffff, base=0x0000000000000000 [ 854.267643] GDTR: limit=0x0000ffff, base=0x0000000000000000 [ 854.276057] LDTR: sel=0x0000, attr=0x00082, limit=0x0000ffff, base=0x0000000000000000 [ 854.284662] IDTR: limit=0x0000ffff, base=0x0000000000000000 [ 854.293553] TR: sel=0x0000, attr=0x0008b, limit=0x0000ffff, base=0x0000000000000000 [ 854.302014] EFER = 0x0000000000000000 PAT = 0x0007040600070406 [ 854.308615] DebugCtl = 0x0000000000000000 DebugExceptions = 0x0000000000000000 [ 854.316393] Interruptibility = 00000001 ActivityState = 00000000 [ 854.323251] *** Host State *** [ 854.326578] RIP = 0xffffffff811affaf RSP = 0xffff88805c7178c0 [ 854.333064] CS=0010 SS=0018 DS=0000 ES=0000 FS=0000 GS=0000 TR=0040 [ 854.339523] FSBase=00007fd1a7bb0700 GSBase=ffff8880ae600000 TRBase=fffffe0000034000 [ 854.347619] GDTBase=fffffe0000032000 IDTBase=fffffe0000000000 [ 854.353850] CR0=0000000080050033 CR3=00000000863b3000 CR4=00000000001426f0 [ 854.361544] Sysenter RSP=fffffe0000034000 CS:RIP=0010:ffffffff874013e0 [ 854.368264] EFER = 0x0000000000000d01 PAT = 0x0407050600070106 [ 854.375281] *** Control State *** [ 854.378765] PinBased=0000003f CPUBased=b5986dfa SecondaryExec=000000e2 [ 854.385789] EntryControls=0000d1ff ExitControls=002fefff [ 854.391698] ExceptionBitmap=00060042 PFECmask=00000000 PFECmatch=00000000 [ 854.398672] VMEntry: intr_info=80000202 errcode=00000000 ilen=00000000 [ 854.405553] VMExit: intr_info=00000000 errcode=00000000 ilen=00000003 [ 854.412501] reason=80000021 qualification=0000000000000003 [ 854.418892] IDTVectoring: info=00000000 errcode=00000000 [ 854.424654] TSC Offset = 0xfffffe350f825f05 [ 854.429119] EPT pointer = 0x000000009570201e [ 854.434269] Virtual processor ID = 0x0001 18:05:39 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r0, &(0x7f0000000040)=""/244, 0xf4) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f0000000100)="6653960d0ec5d684fa9f017ef0d60a3c27bc33760036001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479810be2aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e6517e615607676f8f9fc0ebf8b0b16d6f2c59957ab35d05692e664ebf68734ca53366295f4ad6142134b62f11e92ead037c7fb53455560c8ef0f1c94fafa924edfe92175aaa1c4ecc7aeeb72e0d050feacee907f40888c96a65545e07422bc6ac79f4c2d6ee3dab47d06e764682c72d7f16542fcfd05d2813cc182d1595016c179e1717c160300ab1ab0ac397e91bd193c036feb66a9ad2ec5b7967e7f5ff957f8b085a2437c59a", 0xf8}], 0x3, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x19) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 18:05:39 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='personality\x00') r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000240)={0x26, 'hash\x00', 0x0, 0x0, 'rmd320\x00'}, 0x58) r4 = accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendfile(r4, r2, 0x0, 0x20000000001000) 18:05:39 executing program 0: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f00000000c0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x7ffffff5}]}) close(r0) 18:05:39 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68}, [{0x0, 0x0, 0x8000000}]}, 0x78) 18:05:39 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0xf}]}, 0x78) 18:05:39 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000000000/0x1000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_RUN(r2, 0xae80, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r4 = syz_genetlink_get_family_id$nl80211(0x0) sendmsg$NL80211_CMD_GET_MPATH(r3, &(0x7f0000000180)={&(0x7f0000000000), 0xc, &(0x7f0000000140)={&(0x7f0000000080)={0x1c, r4, 0xf0a, 0x70bd2c, 0x4, {}, [@NL80211_ATTR_WIPHY={0x8, 0x1, 0x3}]}, 0x1c}}, 0x4000000) 18:05:39 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r0, &(0x7f0000000040)=""/244, 0xf4) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="6653960d0ec5d684fa9f017ef0d60a3c27bc33760036001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479810be2aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e6517e615607676f8f9fc0ebf8b0b16d6f2c59957ab35d05692e664ebf68734ca53366295f4ad6142134b62f11e92ead037c7fb53455560c8ef0f1c94fafa924edfe92175aaa1c4ecc7aeeb72e0d050feacee907f40888c96a65545e07422bc6ac79f4c2d6ee3dab47d06e764682c72d7f16542fcfd05d2813cc182d1595016c179e1717c160300ab1ab0ac397e91bd193c036feb66a9ad2ec5b7967e7f5ff957f8b085a2437c5", 0xf7}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x19) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 18:05:39 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68}, [{0x0, 0x0, 0x9000000}]}, 0x78) 18:05:39 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x18}]}, 0x78) 18:05:39 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='personality\x00') r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000240)={0x26, 'hash\x00', 0x0, 0x0, 'rmd320\x00'}, 0x58) r4 = accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendfile(r4, r2, 0x0, 0x20000000001000) 18:05:39 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='personality\x00') r3 = socket$alg(0x26, 0x5, 0x0) r4 = accept4(r3, 0x0, 0x0, 0x0) r5 = accept4$alg(r4, 0x0, 0x0, 0x0) sendfile(r5, r2, 0x0, 0x20000000001000) 18:05:39 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x1a}]}, 0x78) [ 857.179794] *** Guest State *** [ 857.183383] CR0: actual=0x0000000000000030, shadow=0x0000000060000010, gh_mask=fffffffffffffff7 [ 857.194693] CR4: actual=0x0000000000002040, shadow=0x0000000000000000, gh_mask=ffffffffffffe871 [ 857.204653] CR3 = 0x0000000000000000 [ 857.208425] RSP = 0x0000000000000000 RIP = 0x0000000000000231 [ 857.215582] RFLAGS=0x00000292 DR7 = 0x0000000000000400 [ 857.222834] Sysenter RSP=0000000000000000 CS:RIP=0000:0000000000000000 [ 857.229562] CS: sel=0x0000, attr=0x0009b, limit=0x0000ffff, base=0x0000000000000000 [ 857.239558] DS: sel=0x0000, attr=0x00093, limit=0x0000ffff, base=0x0000000000000000 [ 857.247895] SS: sel=0x0000, attr=0x00093, limit=0x0000ffff, base=0x0000000000000000 [ 857.256201] ES: sel=0x0000, attr=0x00093, limit=0x0000ffff, base=0x0000000000000000 [ 857.264566] FS: sel=0x0000, attr=0x00093, limit=0x0000ffff, base=0x0000000000000000 [ 857.272756] GS: sel=0x0000, attr=0x00093, limit=0x0000ffff, base=0x0000000000000000 [ 857.281594] GDTR: limit=0x0000ffff, base=0x0000000000000000 [ 857.289718] LDTR: sel=0x0000, attr=0x00082, limit=0x0000ffff, base=0x0000000000000000 [ 857.298091] IDTR: limit=0x0000ffff, base=0x0000000000000000 [ 857.306449] TR: sel=0x0000, attr=0x0008b, limit=0x0000ffff, base=0x0000000000000000 [ 857.314973] EFER = 0x0000000000000000 PAT = 0x0007040600070406 [ 857.321791] DebugCtl = 0x0000000000000000 DebugExceptions = 0x0000000000000000 [ 857.329337] Interruptibility = 00000001 ActivityState = 00000000 [ 857.335729] *** Host State *** [ 857.338975] RIP = 0xffffffff811affaf RSP = 0xffff88805b2df8c0 [ 857.345516] CS=0010 SS=0018 DS=0000 ES=0000 FS=0000 GS=0000 TR=0040 [ 857.352684] FSBase=00007fd1a7bb0700 GSBase=ffff8880ae700000 TRBase=fffffe0000003000 [ 857.360750] GDTBase=fffffe0000001000 IDTBase=fffffe0000000000 [ 857.366732] CR0=0000000080050033 CR3=000000009e185000 CR4=00000000001426e0 [ 857.374230] Sysenter RSP=fffffe0000003000 CS:RIP=0010:ffffffff874013e0 [ 857.381588] EFER = 0x0000000000000d01 PAT = 0x0407050600070106 [ 857.387727] *** Control State *** [ 857.391418] PinBased=0000003f CPUBased=b5986dfa SecondaryExec=000000e2 [ 857.398158] EntryControls=0000d1ff ExitControls=002fefff [ 857.403961] ExceptionBitmap=00060042 PFECmask=00000000 PFECmatch=00000000 [ 857.411250] VMEntry: intr_info=80000202 errcode=00000000 ilen=00000000 [ 857.418013] VMExit: intr_info=00000000 errcode=00000000 ilen=00000003 [ 857.424801] reason=80000021 qualification=0000000000000003 [ 857.431821] IDTVectoring: info=00000000 errcode=00000000 [ 857.437354] TSC Offset = 0xfffffe3369363866 [ 857.442106] EPT pointer = 0x0000000090e7f01e [ 857.446572] Virtual processor ID = 0x0001 18:05:42 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r0, &(0x7f0000000040)=""/244, 0xf4) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f0000000100)="6653960d0ec5d684fa9f017ef0d60a3c27bc33760036001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479810be2aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e6517e615607676f8f9fc0ebf8b0b16d6f2c59957ab35d05692e664ebf68734ca53366295f4ad6142134b62f11e92ead037c7fb53455560c8ef0f1c94fafa924edfe92175aaa1c4ecc7aeeb72e0d050feacee907f40888c96a65545e07422bc6ac79f4c2d6ee3dab47d06e764682c72d7f16542fcfd05d2813cc182d1595016c179e1717c160300ab1ab0ac397e91bd193c036feb66a9ad2ec5b7967e7f5ff957f8b085a2437c59a", 0xf8}], 0x3, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x19) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 18:05:42 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68}, [{0x0, 0x0, 0xa000000}]}, 0x78) 18:05:42 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='personality\x00') r3 = socket$alg(0x26, 0x5, 0x0) r4 = accept4(r3, 0x0, 0x0, 0x0) r5 = accept4$alg(r4, 0x0, 0x0, 0x0) sendfile(r5, r2, 0x0, 0x20000000001000) 18:05:42 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x1b}]}, 0x78) 18:05:42 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000000000/0x1000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_RUN(r2, 0xae80, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r4 = syz_genetlink_get_family_id$nl80211(0x0) sendmsg$NL80211_CMD_GET_MPATH(r3, &(0x7f0000000180)={&(0x7f0000000000), 0xc, &(0x7f0000000140)={&(0x7f0000000080)={0x1c, r4, 0xf0a, 0x70bd2c, 0x4, {}, [@NL80211_ATTR_WIPHY={0x8, 0x1, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x14}, 0x0) 18:05:42 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x3e}]}, 0x78) 18:05:42 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r0, &(0x7f0000000040)=""/244, 0xf4) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="6653960d0ec5d684fa9f017ef0d60a3c27bc33760036001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479810be2aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e6517e615607676f8f9fc0ebf8b0b16d6f2c59957ab35d05692e664ebf68734ca53366295f4ad6142134b62f11e92ead037c7fb53455560c8ef0f1c94fafa924edfe92175aaa1c4ecc7aeeb72e0d050feacee907f40888c96a65545e07422bc6ac79f4c2d6ee3dab47d06e764682c72d7f16542fcfd05d2813cc182d1595016c179e1717c160300ab1ab0ac397e91bd193c036feb66a9ad2ec5b7967e7f5ff957f8b085a2437c5", 0xf7}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x19) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 18:05:42 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='personality\x00') r3 = socket$alg(0x26, 0x5, 0x0) r4 = accept4(r3, 0x0, 0x0, 0x0) r5 = accept4$alg(r4, 0x0, 0x0, 0x0) sendfile(r5, r2, 0x0, 0x20000000001000) 18:05:42 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68}, [{0x0, 0x0, 0xc000000}]}, 0x78) 18:05:42 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='personality\x00') bind$alg(0xffffffffffffffff, &(0x7f0000000240)={0x26, 'hash\x00', 0x0, 0x0, 'rmd320\x00'}, 0x58) r3 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r4 = accept4$alg(r3, 0x0, 0x0, 0x0) sendfile(r4, r2, 0x0, 0x20000000001000) 18:05:42 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x9b}]}, 0x78) 18:05:42 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68}, [{0x0, 0x0, 0xd000000}]}, 0x78) [ 860.267127] *** Guest State *** [ 860.271157] CR0: actual=0x0000000000000030, shadow=0x0000000060000010, gh_mask=fffffffffffffff7 [ 860.280137] CR4: actual=0x0000000000002040, shadow=0x0000000000000000, gh_mask=ffffffffffffe871 [ 860.290696] CR3 = 0x0000000000000000 [ 860.294570] RSP = 0x0000000000000000 RIP = 0x0000000000000231 [ 860.301773] RFLAGS=0x00000296 DR7 = 0x0000000000000400 [ 860.308166] Sysenter RSP=0000000000000000 CS:RIP=0000:0000000000000000 [ 860.315357] CS: sel=0x0000, attr=0x0009b, limit=0x0000ffff, base=0x0000000000000000 [ 860.323841] DS: sel=0x0000, attr=0x00093, limit=0x0000ffff, base=0x0000000000000000 [ 860.332326] SS: sel=0x0000, attr=0x00093, limit=0x0000ffff, base=0x0000000000000000 [ 860.340809] ES: sel=0x0000, attr=0x00093, limit=0x0000ffff, base=0x0000000000000000 [ 860.348977] FS: sel=0x0000, attr=0x00093, limit=0x0000ffff, base=0x0000000000000000 [ 860.358037] GS: sel=0x0000, attr=0x00093, limit=0x0000ffff, base=0x0000000000000000 [ 860.366519] GDTR: limit=0x0000ffff, base=0x0000000000000000 [ 860.374834] LDTR: sel=0x0000, attr=0x00082, limit=0x0000ffff, base=0x0000000000000000 [ 860.383470] IDTR: limit=0x0000ffff, base=0x0000000000000000 [ 860.391767] TR: sel=0x0000, attr=0x0008b, limit=0x0000ffff, base=0x0000000000000000 [ 860.399811] EFER = 0x0000000000000000 PAT = 0x0007040600070406 [ 860.406516] DebugCtl = 0x0000000000000000 DebugExceptions = 0x0000000000000000 [ 860.414336] Interruptibility = 00000001 ActivityState = 00000000 [ 860.420913] *** Host State *** [ 860.424281] RIP = 0xffffffff811affaf RSP = 0xffff888051d2f8c0 [ 860.430980] CS=0010 SS=0018 DS=0000 ES=0000 FS=0000 GS=0000 TR=0040 [ 860.437433] FSBase=00007fd1a7bb0700 GSBase=ffff8880ae600000 TRBase=fffffe0000034000 [ 860.445653] GDTBase=fffffe0000032000 IDTBase=fffffe0000000000 [ 860.451985] CR0=0000000080050033 CR3=000000009c45c000 CR4=00000000001426f0 [ 860.459032] Sysenter RSP=fffffe0000034000 CS:RIP=0010:ffffffff874013e0 [ 860.465955] EFER = 0x0000000000000d01 PAT = 0x0407050600070106 [ 860.472247] *** Control State *** [ 860.475742] PinBased=0000003f CPUBased=b5986dfa SecondaryExec=000000e2 [ 860.483589] EntryControls=0000d1ff ExitControls=002fefff [ 860.489139] ExceptionBitmap=00060042 PFECmask=00000000 PFECmatch=00000000 [ 860.496333] VMEntry: intr_info=80000202 errcode=00000000 ilen=00000000 [ 860.503523] VMExit: intr_info=00000000 errcode=00000000 ilen=00000003 [ 860.510896] reason=80000021 qualification=0000000000000003 [ 860.517288] IDTVectoring: info=00000000 errcode=00000000 [ 860.523116] TSC Offset = 0xfffffe31c7a726de [ 860.527486] EPT pointer = 0x0000000093f1d01e [ 860.532169] Virtual processor ID = 0x0001 18:05:45 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r0, &(0x7f0000000040)=""/244, 0xf4) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f0000000100)="6653960d0ec5d684fa9f017ef0d60a3c27bc33760036001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479810be2aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e6517e615607676f8f9fc0ebf8b0b16d6f2c59957ab35d05692e664ebf68734ca53366295f4ad6142134b62f11e92ead037c7fb53455560c8ef0f1c94fafa924edfe92175aaa1c4ecc7aeeb72e0d050feacee907f40888c96a65545e07422bc6ac79f4c2d6ee3dab47d06e764682c72d7f16542fcfd05d2813cc182d1595016c179e1717c160300ab1ab0ac397e91bd193c036feb66a9ad2ec5b7967e7f5ff957f8b085a2437c59a", 0xf8}], 0x3, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x19) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 18:05:45 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='personality\x00') bind$alg(0xffffffffffffffff, &(0x7f0000000240)={0x26, 'hash\x00', 0x0, 0x0, 'rmd320\x00'}, 0x58) r3 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r4 = accept4$alg(r3, 0x0, 0x0, 0x0) sendfile(r4, r2, 0x0, 0x20000000001000) 18:05:45 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0xf0}]}, 0x78) 18:05:45 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68}, [{0x0, 0x0, 0xe000000}]}, 0x78) 18:05:45 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000000000/0x1000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_RUN(r2, 0xae80, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r4 = syz_genetlink_get_family_id$nl80211(0x0) sendmsg$NL80211_CMD_GET_MPATH(r3, &(0x7f0000000180)={&(0x7f0000000000), 0xc, &(0x7f0000000140)={&(0x7f0000000080)={0x1c, r4, 0xf0a, 0x70bd2c, 0x4, {}, [@NL80211_ATTR_WIPHY={0x8, 0x1, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x14}, 0x0) 18:05:45 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x180}]}, 0x78) 18:05:45 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='personality\x00') bind$alg(0xffffffffffffffff, &(0x7f0000000240)={0x26, 'hash\x00', 0x0, 0x0, 'rmd320\x00'}, 0x58) r3 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r4 = accept4$alg(r3, 0x0, 0x0, 0x0) sendfile(r4, r2, 0x0, 0x20000000001000) 18:05:45 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68}, [{0x0, 0x0, 0xf000000}]}, 0x78) 18:05:45 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r0, &(0x7f0000000040)=""/244, 0xf4) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="6653960d0ec5d684fa9f017ef0d60a3c27bc33760036001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479810be2aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e6517e615607676f8f9fc0ebf8b0b16d6f2c59957ab35d05692e664ebf68734ca53366295f4ad6142134b62f11e92ead037c7fb53455560c8ef0f1c94fafa924edfe92175aaa1c4ecc7aeeb72e0d050feacee907f40888c96a65545e07422bc6ac79f4c2d6ee3dab47d06e764682c72d7f16542fcfd05d2813cc182d1595016c179e1717c160300ab1ab0ac397e91bd193c036feb66a9ad2ec5b7967e7f5ff957f8b085a2437c5", 0xf7}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x19) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 18:05:45 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x700}]}, 0x78) 18:05:45 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68}, [{0x0, 0x0, 0x18000000}]}, 0x78) 18:05:45 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000240)={0x26, 'hash\x00', 0x0, 0x0, 'rmd320\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = accept4$alg(r3, 0x0, 0x0, 0x0) sendfile(r4, 0xffffffffffffffff, 0x0, 0x20000000001000) [ 863.296980] *** Guest State *** [ 863.300471] CR0: actual=0x0000000000000030, shadow=0x0000000060000010, gh_mask=fffffffffffffff7 [ 863.309338] CR4: actual=0x0000000000002040, shadow=0x0000000000000000, gh_mask=ffffffffffffe871 [ 863.319704] CR3 = 0x0000000000000000 [ 863.324072] RSP = 0x0000000000000000 RIP = 0x0000000000000231 [ 863.331184] RFLAGS=0x00000296 DR7 = 0x0000000000000400 [ 863.337464] Sysenter RSP=0000000000000000 CS:RIP=0000:0000000000000000 [ 863.344999] CS: sel=0x0000, attr=0x0009b, limit=0x0000ffff, base=0x0000000000000000 [ 863.353465] DS: sel=0x0000, attr=0x00093, limit=0x0000ffff, base=0x0000000000000000 [ 863.361747] SS: sel=0x0000, attr=0x00093, limit=0x0000ffff, base=0x0000000000000000 [ 863.369883] ES: sel=0x0000, attr=0x00093, limit=0x0000ffff, base=0x0000000000000000 [ 863.378294] FS: sel=0x0000, attr=0x00093, limit=0x0000ffff, base=0x0000000000000000 [ 863.387133] GS: sel=0x0000, attr=0x00093, limit=0x0000ffff, base=0x0000000000000000 [ 863.395380] GDTR: limit=0x0000ffff, base=0x0000000000000000 [ 863.403742] LDTR: sel=0x0000, attr=0x00082, limit=0x0000ffff, base=0x0000000000000000 [ 863.412111] IDTR: limit=0x0000ffff, base=0x0000000000000000 [ 863.420201] TR: sel=0x0000, attr=0x0008b, limit=0x0000ffff, base=0x0000000000000000 [ 863.428427] EFER = 0x0000000000000000 PAT = 0x0007040600070406 [ 863.435204] DebugCtl = 0x0000000000000000 DebugExceptions = 0x0000000000000000 [ 863.443134] Interruptibility = 00000001 ActivityState = 00000000 [ 863.449448] *** Host State *** [ 863.453135] RIP = 0xffffffff811affaf RSP = 0xffff888053a678c0 [ 863.459242] CS=0010 SS=0018 DS=0000 ES=0000 FS=0000 GS=0000 TR=0040 [ 863.466448] FSBase=00007fd1a7bb0700 GSBase=ffff8880ae700000 TRBase=fffffe0000003000 [ 863.474847] GDTBase=fffffe0000001000 IDTBase=fffffe0000000000 [ 863.481103] CR0=0000000080050033 CR3=000000009fd42000 CR4=00000000001426e0 [ 863.488290] Sysenter RSP=fffffe0000003000 CS:RIP=0010:ffffffff874013e0 [ 863.495249] EFER = 0x0000000000000d01 PAT = 0x0407050600070106 [ 863.501725] *** Control State *** [ 863.505218] PinBased=0000003f CPUBased=b5986dfa SecondaryExec=000000e2 [ 863.512378] EntryControls=0000d1ff ExitControls=002fefff [ 863.517912] ExceptionBitmap=00060042 PFECmask=00000000 PFECmatch=00000000 [ 863.525657] VMEntry: intr_info=80000202 errcode=00000000 ilen=00000000 [ 863.532745] VMExit: intr_info=00000000 errcode=00000000 ilen=00000003 [ 863.539415] reason=80000021 qualification=0000000000000003 [ 863.546598] IDTVectoring: info=00000000 errcode=00000000 [ 863.552525] TSC Offset = 0xfffffe30276b085c [ 863.557103] EPT pointer = 0x000000009fdf601e [ 863.562019] Virtual processor ID = 0x0001 18:05:48 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r0, &(0x7f0000000040)=""/244, 0xf4) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f0000000100)="6653960d0ec5d684fa9f017ef0d60a3c27bc33760036001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479810be2aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e6517e615607676f8f9fc0ebf8b0b16d6f2c59957ab35d05692e664ebf68734ca53366295f4ad6142134b62f11e92ead037c7fb53455560c8ef0f1c94fafa924edfe92175aaa1c4ecc7aeeb72e0d050feacee907f40888c96a65545e07422bc6ac79f4c2d6ee3dab47d06e764682c72d7f16542fcfd05d2813cc182d1595016c179e1717c160300ab1ab0ac397e91bd193c036feb66a9ad2ec5b7967e7f5ff957f8b085a2437c59a", 0xf8}], 0x3, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x19) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 18:05:48 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x900}]}, 0x78) 18:05:48 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68}, [{0x0, 0x0, 0x19000000}]}, 0x78) 18:05:48 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000240)={0x26, 'hash\x00', 0x0, 0x0, 'rmd320\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = accept4$alg(r3, 0x0, 0x0, 0x0) sendfile(r4, 0xffffffffffffffff, 0x0, 0x20000000001000) 18:05:48 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000000000/0x1000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_RUN(r2, 0xae80, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r4 = syz_genetlink_get_family_id$nl80211(0x0) sendmsg$NL80211_CMD_GET_MPATH(r3, &(0x7f0000000180)={&(0x7f0000000000), 0xc, &(0x7f0000000140)={&(0x7f0000000080)={0x1c, r4, 0xf0a, 0x70bd2c, 0x4, {}, [@NL80211_ATTR_WIPHY={0x8, 0x1, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x14}, 0x0) 18:05:48 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0xa00}]}, 0x78) 18:05:48 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000240)={0x26, 'hash\x00', 0x0, 0x0, 'rmd320\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = accept4$alg(r3, 0x0, 0x0, 0x0) sendfile(r4, 0xffffffffffffffff, 0x0, 0x20000000001000) 18:05:48 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68}, [{0x0, 0x0, 0x1a000000}]}, 0x78) 18:05:48 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r0, &(0x7f0000000040)=""/244, 0xf4) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="6653960d0ec5d684fa9f017ef0d60a3c27bc33760036001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479810be2aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e6517e615607676f8f9fc0ebf8b0b16d6f2c59957ab35d05692e664ebf68734ca53366295f4ad6142134b62f11e92ead037c7fb53455560c8ef0f1c94fafa924edfe92175aaa1c4ecc7aeeb72e0d050feacee907f40888c96a65545e07422bc6ac79f4c2d6ee3dab47d06e764682c72d7f16542fcfd05d2813cc182d1595016c179e1717c160300ab1ab0ac397e91bd193c036feb66a9ad2ec5b7967e7f5ff957f8b085a2437c5", 0xf7}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x19) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$cont(0x9, r1, 0x0, 0x0) 18:05:48 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0xc00}]}, 0x78) 18:05:49 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68}, [{0x0, 0x0, 0x1b000000}]}, 0x78) 18:05:49 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0xd00}]}, 0x78) [ 866.517657] *** Guest State *** [ 866.521309] CR0: actual=0x0000000000000030, shadow=0x0000000060000010, gh_mask=fffffffffffffff7 [ 866.530401] CR4: actual=0x0000000000002040, shadow=0x0000000000000000, gh_mask=ffffffffffffe871 [ 866.539280] CR3 = 0x0000000000000000 [ 866.544409] RSP = 0x0000000000000000 RIP = 0x0000000000000231 [ 866.550645] RFLAGS=0x00000296 DR7 = 0x0000000000000400 [ 866.557142] Sysenter RSP=0000000000000000 CS:RIP=0000:0000000000000000 [ 866.570529] CS: sel=0x0000, attr=0x0009b, limit=0x0000ffff, base=0x0000000000000000 [ 866.578786] DS: sel=0x0000, attr=0x00093, limit=0x0000ffff, base=0x0000000000000000 [ 866.589003] SS: sel=0x0000, attr=0x00093, limit=0x0000ffff, base=0x0000000000000000 [ 866.598160] ES: sel=0x0000, attr=0x00093, limit=0x0000ffff, base=0x0000000000000000 [ 866.606871] FS: sel=0x0000, attr=0x00093, limit=0x0000ffff, base=0x0000000000000000 [ 866.615256] GS: sel=0x0000, attr=0x00093, limit=0x0000ffff, base=0x0000000000000000 [ 866.623694] GDTR: limit=0x0000ffff, base=0x0000000000000000 [ 866.632512] LDTR: sel=0x0000, attr=0x00082, limit=0x0000ffff, base=0x0000000000000000 [ 866.641193] IDTR: limit=0x0000ffff, base=0x0000000000000000 [ 866.649350] TR: sel=0x0000, attr=0x0008b, limit=0x0000ffff, base=0x0000000000000000 [ 866.658224] EFER = 0x0000000000000000 PAT = 0x0007040600070406 [ 866.665327] DebugCtl = 0x0000000000000000 DebugExceptions = 0x0000000000000000 [ 866.673121] Interruptibility = 00000001 ActivityState = 00000000 [ 866.679346] *** Host State *** [ 866.682603] RIP = 0xffffffff811affaf RSP = 0xffff88805c7178c0 [ 866.688585] CS=0010 SS=0018 DS=0000 ES=0000 FS=0000 GS=0000 TR=0040 [ 866.696052] FSBase=00007fd1a7bb0700 GSBase=ffff8880ae700000 TRBase=fffffe0000034000 [ 866.703948] GDTBase=fffffe0000032000 IDTBase=fffffe0000000000 [ 866.709841] CR0=0000000080050033 CR3=000000008e902000 CR4=00000000001426e0 [ 866.717067] Sysenter RSP=fffffe0000034000 CS:RIP=0010:ffffffff874013e0 [ 866.724207] EFER = 0x0000000000000d01 PAT = 0x0407050600070106 [ 866.730322] *** Control State *** [ 866.733781] PinBased=0000003f CPUBased=b5986dfa SecondaryExec=000000e2 [ 866.741097] EntryControls=0000d1ff ExitControls=002fefff [ 866.746591] ExceptionBitmap=00060042 PFECmask=00000000 PFECmatch=00000000 [ 866.753864] VMEntry: intr_info=80000202 errcode=00000000 ilen=00000000 [ 866.760650] VMExit: intr_info=00000000 errcode=00000000 ilen=00000003 [ 866.767718] reason=80000021 qualification=0000000000000003 [ 866.774156] IDTVectoring: info=00000000 errcode=00000000 [ 866.779630] TSC Offset = 0xfffffe2e86b1dba9 [ 866.784117] EPT pointer = 0x00000000a0db701e [ 866.788532] Virtual processor ID = 0x0001 18:05:51 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r0, &(0x7f0000000040)=""/244, 0xf4) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f0000000100)="6653960d0ec5d684fa9f017ef0d60a3c27bc33760036001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479810be2aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e6517e615607676f8f9fc0ebf8b0b16d6f2c59957ab35d05692e664ebf68734ca53366295f4ad6142134b62f11e92ead037c7fb53455560c8ef0f1c94fafa924edfe92175aaa1c4ecc7aeeb72e0d050feacee907f40888c96a65545e07422bc6ac79f4c2d6ee3dab47d06e764682c72d7f16542fcfd05d2813cc182d1595016c179e1717c160300ab1ab0ac397e91bd193c036feb66a9ad2ec5b7967e7f5ff957f8b085a2437c59a", 0xf8}], 0x3, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x19) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 18:05:51 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68}, [{0x0, 0x0, 0x1e000000}]}, 0x78) 18:05:51 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0xe00}]}, 0x78) 18:05:51 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='personality\x00') r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000240)={0x26, 'hash\x00', 0x0, 0x0, 'rmd320\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = accept4$alg(r3, 0x0, 0x0, 0x0) sendfile(r4, r1, 0x0, 0x20000000001000) 18:05:51 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000000000/0x1000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_RUN(r2, 0xae80, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r4 = syz_genetlink_get_family_id$nl80211(0x0) sendmsg$NL80211_CMD_GET_MPATH(r3, &(0x7f0000000180)={&(0x7f0000000000), 0xc, &(0x7f0000000140)={&(0x7f0000000080)={0x1c, r4, 0xf0a, 0x70bd2c, 0x4, {}, [@NL80211_ATTR_WIPHY={0x8, 0x1, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x14}, 0x0) 18:05:51 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='personality\x00') r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000240)={0x26, 'hash\x00', 0x0, 0x0, 'rmd320\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = accept4$alg(r3, 0x0, 0x0, 0x0) sendfile(r4, r1, 0x0, 0x20000000001000) 18:05:51 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68}, [{0x0, 0x0, 0x3e000000}]}, 0x78) 18:05:51 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0xf00}]}, 0x78) 18:05:51 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r0, &(0x7f0000000040)=""/244, 0xf4) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="6653960d0ec5d684fa9f017ef0d60a3c27bc33760036001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479810be2aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e6517e615607676f8f9fc0ebf8b0b16d6f2c59957ab35d05692e664ebf68734ca53366295f4ad6142134b62f11e92ead037c7fb53455560c8ef0f1c94fafa924edfe92175aaa1c4ecc7aeeb72e0d050feacee907f40888c96a65545e07422bc6ac79f4c2d6ee3dab47d06e764682c72d7f16542fcfd05d2813cc182d1595016c179e1717c160300ab1ab0ac397e91bd193c036feb66a9ad2ec5b7967e7f5ff957f8b085a2437c5", 0xf7}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x19) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$cont(0x9, r1, 0x0, 0x0) 18:05:51 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68}, [{0x0, 0x0, 0x3f000000}]}, 0x78) 18:05:51 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='personality\x00') r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000240)={0x26, 'hash\x00', 0x0, 0x0, 'rmd320\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = accept4$alg(r3, 0x0, 0x0, 0x0) sendfile(r4, r1, 0x0, 0x20000000001000) 18:05:52 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x1800}]}, 0x78) [ 869.417075] *** Guest State *** [ 869.420505] CR0: actual=0x0000000000000030, shadow=0x0000000060000010, gh_mask=fffffffffffffff7 [ 869.429406] CR4: actual=0x0000000000002040, shadow=0x0000000000000000, gh_mask=ffffffffffffe871 [ 869.438800] CR3 = 0x0000000000000000 [ 869.442943] RSP = 0x0000000000000000 RIP = 0x0000000000000231 [ 869.449640] RFLAGS=0x00000296 DR7 = 0x0000000000000400 [ 869.456731] Sysenter RSP=0000000000000000 CS:RIP=0000:0000000000000000 [ 869.465479] CS: sel=0x0000, attr=0x0009b, limit=0x0000ffff, base=0x0000000000000000 [ 869.474035] DS: sel=0x0000, attr=0x00093, limit=0x0000ffff, base=0x0000000000000000 [ 869.482710] SS: sel=0x0000, attr=0x00093, limit=0x0000ffff, base=0x0000000000000000 [ 869.491287] ES: sel=0x0000, attr=0x00093, limit=0x0000ffff, base=0x0000000000000000 [ 869.499379] FS: sel=0x0000, attr=0x00093, limit=0x0000ffff, base=0x0000000000000000 [ 869.507693] GS: sel=0x0000, attr=0x00093, limit=0x0000ffff, base=0x0000000000000000 [ 869.516080] GDTR: limit=0x0000ffff, base=0x0000000000000000 [ 869.524834] LDTR: sel=0x0000, attr=0x00082, limit=0x0000ffff, base=0x0000000000000000 [ 869.533131] IDTR: limit=0x0000ffff, base=0x0000000000000000 [ 869.541700] TR: sel=0x0000, attr=0x0008b, limit=0x0000ffff, base=0x0000000000000000 [ 869.549754] EFER = 0x0000000000000000 PAT = 0x0007040600070406 [ 869.556499] DebugCtl = 0x0000000000000000 DebugExceptions = 0x0000000000000000 [ 869.564456] Interruptibility = 00000001 ActivityState = 00000000 [ 869.571172] *** Host State *** [ 869.574560] RIP = 0xffffffff811affaf RSP = 0xffff888053a678c0 [ 869.581013] CS=0010 SS=0018 DS=0000 ES=0000 FS=0000 GS=0000 TR=0040 [ 869.587517] FSBase=00007fd1a7bb0700 GSBase=ffff8880ae700000 TRBase=fffffe0000003000 [ 869.595652] GDTBase=fffffe0000001000 IDTBase=fffffe0000000000 [ 869.602290] CR0=0000000080050033 CR3=000000009365d000 CR4=00000000001426e0 [ 869.610550] Sysenter RSP=fffffe0000003000 CS:RIP=0010:ffffffff874013e0 [ 869.617412] EFER = 0x0000000000000d01 PAT = 0x0407050600070106 [ 869.624201] *** Control State *** [ 869.627772] PinBased=0000003f CPUBased=b5986dfa SecondaryExec=000000e2 [ 869.634856] EntryControls=0000d1ff ExitControls=002fefff [ 869.640660] ExceptionBitmap=00060042 PFECmask=00000000 PFECmatch=00000000 [ 869.647740] VMEntry: intr_info=80000202 errcode=00000000 ilen=00000000 [ 869.654677] VMExit: intr_info=00000000 errcode=00000000 ilen=00000003 [ 869.661990] reason=80000021 qualification=0000000000000003 [ 869.668439] IDTVectoring: info=00000000 errcode=00000000 [ 869.674176] TSC Offset = 0xfffffe2cdf99b2b3 [ 869.678570] EPT pointer = 0x000000009ddb901e [ 869.683249] Virtual processor ID = 0x0001 18:05:54 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r0, &(0x7f0000000040)=""/244, 0xf4) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f0000000100)="6653960d0ec5d684fa9f017ef0d60a3c27bc33760036001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479810be2aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e6517e615607676f8f9fc0ebf8b0b16d6f2c59957ab35d05692e664ebf68734ca53366295f4ad6142134b62f11e92ead037c7fb53455560c8ef0f1c94fafa924edfe92175aaa1c4ecc7aeeb72e0d050feacee907f40888c96a65545e07422bc6ac79f4c2d6ee3dab47d06e764682c72d7f16542fcfd05d2813cc182d1595016c179e1717c160300ab1ab0ac397e91bd193c036feb66a9ad2ec5b7967e7f5ff957f8b085a2437c59a", 0xf8}], 0x3, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x19) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 18:05:54 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68}, [{0x0, 0x0, 0x7f000000}]}, 0x78) 18:05:54 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x1a00}]}, 0x78) 18:05:54 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='personality\x00') r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'hash\x00', 0x0, 0x0, 'rmd320\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = accept4$alg(r2, 0x0, 0x0, 0x0) sendfile(r3, r0, 0x0, 0x20000000001000) 18:05:54 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='personality\x00') r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000240)={0x26, 'hash\x00', 0x0, 0x0, 'rmd320\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = accept4$alg(r3, 0x0, 0x0, 0x0) sendfile(r4, r1, 0x0, 0x20000000001000) 18:05:54 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x1b00}]}, 0x78) 18:05:54 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68}, [{0x0, 0x0, 0x80ffffff}]}, 0x78) 18:05:54 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='personality\x00') r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'hash\x00', 0x0, 0x0, 'rmd320\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = accept4$alg(r2, 0x0, 0x0, 0x0) sendfile(r3, r0, 0x0, 0x20000000001000) 18:05:55 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r0, &(0x7f0000000040)=""/244, 0xf4) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="6653960d0ec5d684fa9f017ef0d60a3c27bc33760036001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479810be2aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e6517e615607676f8f9fc0ebf8b0b16d6f2c59957ab35d05692e664ebf68734ca53366295f4ad6142134b62f11e92ead037c7fb53455560c8ef0f1c94fafa924edfe92175aaa1c4ecc7aeeb72e0d050feacee907f40888c96a65545e07422bc6ac79f4c2d6ee3dab47d06e764682c72d7f16542fcfd05d2813cc182d1595016c179e1717c160300ab1ab0ac397e91bd193c036feb66a9ad2ec5b7967e7f5ff957f8b085a2437c5", 0xf7}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x19) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$cont(0x9, r1, 0x0, 0x0) 18:05:55 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='personality\x00') r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000240)={0x26, 'hash\x00', 0x0, 0x0, 'rmd320\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = accept4$alg(r3, 0x0, 0x0, 0x0) sendfile(r4, r1, 0x0, 0x20000000001000) 18:05:55 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x3e00}]}, 0x78) 18:05:55 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68}, [{0x0, 0x0, 0x9b000000}]}, 0x78) 18:05:57 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r0, &(0x7f0000000040)=""/244, 0xf4) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f0000000100)="6653960d0ec5d684fa9f017ef0d60a3c27bc33760036001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479810be2aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e6517e615607676f8f9fc0ebf8b0b16d6f2c59957ab35d05692e664ebf68734ca53366295f4ad6142134b62f11e92ead037c7fb53455560c8ef0f1c94fafa924edfe92175aaa1c4ecc7aeeb72e0d050feacee907f40888c96a65545e07422bc6ac79f4c2d6ee3dab47d06e764682c72d7f16542fcfd05d2813cc182d1595016c179e1717c160300ab1ab0ac397e91bd193c036feb66a9ad2ec5b7967e7f5ff957f8b085a2437c59a", 0xf8}], 0x3, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x19) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 18:05:57 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='personality\x00') r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'hash\x00', 0x0, 0x0, 'rmd320\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = accept4$alg(r2, 0x0, 0x0, 0x0) sendfile(r3, r0, 0x0, 0x20000000001000) 18:05:57 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='personality\x00') r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000240)={0x26, 'hash\x00', 0x0, 0x0, 'rmd320\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = accept4$alg(r3, 0x0, 0x0, 0x0) sendfile(r4, r1, 0x0, 0x20000000001000) 18:05:57 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x7f00}]}, 0x78) 18:05:57 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68}, [{0x0, 0x0, 0xe8030000}]}, 0x78) 18:05:57 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x9b00}]}, 0x78) 18:05:57 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='personality\x00') r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000240)={0x26, 'hash\x00', 0x0, 0x0, 'rmd320\x00'}, 0x58) accept4(r2, 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, r1, 0x0, 0x20000000001000) 18:05:57 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68}, [{0x0, 0x0, 0xffff0000}]}, 0x78) 18:05:58 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r0, &(0x7f0000000040)=""/244, 0xf4) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="6653960d0ec5d684fa9f017ef0d60a3c27bc33760036001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479810be2aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e6517e615607676f8f9fc0ebf8b0b16d6f2c59957ab35d05692e664ebf68734ca53366295f4ad6142134b62f11e92ead037c7fb53455560c8ef0f1c94fafa924edfe92175aaa1c4ecc7aeeb72e0d050feacee907f40888c96a65545e07422bc6ac79f4c2d6ee3dab47d06e764682c72d7f16542fcfd05d2813cc182d1595016c179e1717c160300ab1ab0ac397e91bd193c036feb66a9ad2ec5b7967e7f5ff957f8b085a2437c5", 0xf7}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x19) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 18:05:58 executing program 2: r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='personality\x00') r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000240)={0x26, 'hash\x00', 0x0, 0x0, 'rmd320\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = accept4$alg(r3, 0x0, 0x0, 0x0) sendfile(r4, r1, 0x0, 0x20000000001000) 18:05:58 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0xf000}]}, 0x78) 18:05:58 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68}, [{0x0, 0x0, 0xffffff80}]}, 0x78) 18:06:00 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r0, &(0x7f0000000040)=""/244, 0xf4) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f0000000100)="6653960d0ec5d684fa9f017ef0d60a3c27bc33760036001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479810be2aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e6517e615607676f8f9fc0ebf8b0b16d6f2c59957ab35d05692e664ebf68734ca53366295f4ad6142134b62f11e92ead037c7fb53455560c8ef0f1c94fafa924edfe92175aaa1c4ecc7aeeb72e0d050feacee907f40888c96a65545e07422bc6ac79f4c2d6ee3dab47d06e764682c72d7f16542fcfd05d2813cc182d1595016c179e1717c160300ab1ab0ac397e91bd193c036feb66a9ad2ec5b7967e7f5ff957f8b085a2437c59a", 0xf8}], 0x3, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x19) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 18:06:00 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='personality\x00') r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000240)={0x26, 'hash\x00', 0x0, 0x0, 'rmd320\x00'}, 0x58) accept4(r2, 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, r1, 0x0, 0x20000000001000) 18:06:00 executing program 2: r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='personality\x00') r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000240)={0x26, 'hash\x00', 0x0, 0x0, 'rmd320\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = accept4$alg(r3, 0x0, 0x0, 0x0) sendfile(r4, r1, 0x0, 0x20000000001000) 18:06:00 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0xf00000}]}, 0x78) 18:06:00 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68}, [{0x0, 0x0, 0xf0000000000000}]}, 0x78) 18:06:00 executing program 2: r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='personality\x00') r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000240)={0x26, 'hash\x00', 0x0, 0x0, 'rmd320\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = accept4$alg(r3, 0x0, 0x0, 0x0) sendfile(r4, r1, 0x0, 0x20000000001000) 18:06:00 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='personality\x00') r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000240)={0x26, 'hash\x00', 0x0, 0x0, 'rmd320\x00'}, 0x58) accept4(r2, 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, r1, 0x0, 0x20000000001000) 18:06:01 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68}, [{0x0, 0x0, 0x100000000000000}]}, 0x78) 18:06:01 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r0, &(0x7f0000000040)=""/244, 0xf4) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="6653960d0ec5d684fa9f017ef0d60a3c27bc33760036001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479810be2aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e6517e615607676f8f9fc0ebf8b0b16d6f2c59957ab35d05692e664ebf68734ca53366295f4ad6142134b62f11e92ead037c7fb53455560c8ef0f1c94fafa924edfe92175aaa1c4ecc7aeeb72e0d050feacee907f40888c96a65545e07422bc6ac79f4c2d6ee3dab47d06e764682c72d7f16542fcfd05d2813cc182d1595016c179e1717c160300ab1ab0ac397e91bd193c036feb66a9ad2ec5b7967e7f5ff957f8b085a2437c5", 0xf7}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x19) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 18:06:01 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000}]}, 0x78) 18:06:01 executing program 2: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='personality\x00') r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000240)={0x26, 'hash\x00', 0x0, 0x0, 'rmd320\x00'}, 0x58) r4 = accept4(r3, 0x0, 0x0, 0x0) r5 = accept4$alg(r4, 0x0, 0x0, 0x0) sendfile(r5, r2, 0x0, 0x20000000001000) 18:06:01 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='personality\x00') r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000240)={0x26, 'hash\x00', 0x0, 0x0, 'rmd320\x00'}, 0x58) r3 = accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendfile(r3, r1, 0x0, 0x20000000001000) 18:06:03 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r0, &(0x7f0000000040)=""/244, 0xf4) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x3d}, {0x0, 0x2a}, {0x0}, {&(0x7f0000000100)="6653960d0ec5d684fa9f017ef0d60a3c27bc33760036001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479810be2aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e6517e615607676f8f9fc0ebf8b0b16d6f2c59957ab35d05692e664ebf68734ca53366295f4ad6142134b62f11e92ead037c7fb53455560c8ef0f1c94fafa924edfe92175aaa1c4ecc7aeeb72e0d050feacee907f40888c96a65545e07422bc6ac79f4c2d6ee3dab47d06e764682c72d7f16542fcfd05d2813cc182d1595016c179e1717c160300ab1ab0ac397e91bd193c036feb66a9ad2ec5b7967e7f5ff957f8b085a2437c59a", 0xf8}], 0x4, 0x0) ptrace$setopts(0xffffffffffffffff, r1, 0x0, 0x0) tkill(r1, 0x19) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 18:06:03 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68}, [{0x0, 0x0, 0x180000000000000}]}, 0x78) 18:06:03 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x1800000}]}, 0x78) 18:06:03 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='personality\x00') r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000240)={0x26, 'hash\x00', 0x0, 0x0, 'rmd320\x00'}, 0x58) r3 = accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendfile(r3, r1, 0x0, 0x20000000001000) 18:06:03 executing program 2: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='personality\x00') r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000240)={0x26, 'hash\x00', 0x0, 0x0, 'rmd320\x00'}, 0x58) r4 = accept4(r3, 0x0, 0x0, 0x0) r5 = accept4$alg(r4, 0x0, 0x0, 0x0) sendfile(r5, r2, 0x0, 0x20000000001000) 18:06:04 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='personality\x00') r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000240)={0x26, 'hash\x00', 0x0, 0x0, 'rmd320\x00'}, 0x58) r3 = accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendfile(r3, r1, 0x0, 0x20000000001000) 18:06:04 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000}]}, 0x78) 18:06:04 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r0, &(0x7f0000000040)=""/244, 0xf4) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x3d}, {0x0, 0x2a}, {0x0}, {&(0x7f0000000100)="6653960d0ec5d684fa9f017ef0d60a3c27bc33760036001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479810be2aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e6517e615607676f8f9fc0ebf8b0b16d6f2c59957ab35d05692e664ebf68734ca53366295f4ad6142134b62f11e92ead037c7fb53455560c8ef0f1c94fafa924edfe92175aaa1c4ecc7aeeb72e0d050feacee907f40888c96a65545e07422bc6ac79f4c2d6ee3dab47d06e764682c72d7f16542fcfd05d2813cc182d1595016c179e1717c160300ab1ab0ac397e91bd193c036feb66a9ad2ec5b7967e7f5ff957f8b085a2437c59a", 0xf8}], 0x4, 0x0) ptrace$setopts(0xffffffffffffffff, r1, 0x0, 0x0) tkill(r1, 0x19) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 18:06:04 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r0, &(0x7f0000000040)=""/244, 0xf4) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="6653960d0ec5d684fa9f017ef0d60a3c27bc33760036001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479810be2aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e6517e615607676f8f9fc0ebf8b0b16d6f2c59957ab35d05692e664ebf68734ca53366295f4ad6142134b62f11e92ead037c7fb53455560c8ef0f1c94fafa924edfe92175aaa1c4ecc7aeeb72e0d050feacee907f40888c96a65545e07422bc6ac79f4c2d6ee3dab47d06e764682c72d7f16542fcfd05d2813cc182d1595016c179e1717c160300ab1ab0ac397e91bd193c036feb66a9ad2ec5b7967e7f5ff957f8b085a2437c5", 0xf7}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x19) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 18:06:04 executing program 2: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='personality\x00') r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000240)={0x26, 'hash\x00', 0x0, 0x0, 'rmd320\x00'}, 0x58) r4 = accept4(r3, 0x0, 0x0, 0x0) r5 = accept4$alg(r4, 0x0, 0x0, 0x0) sendfile(r5, r2, 0x0, 0x20000000001000) 18:06:04 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68}, [{0x0, 0x0, 0x200000000000000}]}, 0x78) 18:06:04 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r0, &(0x7f0000000040)=""/244, 0xf4) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x3d}, {0x0, 0x2a}, {0x0}, {&(0x7f0000000100)="6653960d0ec5d684fa9f017ef0d60a3c27bc33760036001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479810be2aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e6517e615607676f8f9fc0ebf8b0b16d6f2c59957ab35d05692e664ebf68734ca53366295f4ad6142134b62f11e92ead037c7fb53455560c8ef0f1c94fafa924edfe92175aaa1c4ecc7aeeb72e0d050feacee907f40888c96a65545e07422bc6ac79f4c2d6ee3dab47d06e764682c72d7f16542fcfd05d2813cc182d1595016c179e1717c160300ab1ab0ac397e91bd193c036feb66a9ad2ec5b7967e7f5ff957f8b085a2437c59a", 0xf8}], 0x4, 0x0) ptrace$setopts(0xffffffffffffffff, r1, 0x0, 0x0) tkill(r1, 0x19) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 18:06:04 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x7000000}]}, 0x78) 18:06:04 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='personality\x00') r2 = socket$alg(0x26, 0x5, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = accept4$alg(r3, 0x0, 0x0, 0x0) sendfile(r4, r1, 0x0, 0x20000000001000) 18:06:04 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000}]}, 0x78) 18:06:04 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r0, &(0x7f0000000040)=""/244, 0xf4) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x3d}, {0x0, 0x2a}, {0x0}, {&(0x7f0000000100)="6653960d0ec5d684fa9f017ef0d60a3c27bc33760036001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479810be2aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e6517e615607676f8f9fc0ebf8b0b16d6f2c59957ab35d05692e664ebf68734ca53366295f4ad6142134b62f11e92ead037c7fb53455560c8ef0f1c94fafa924edfe92175aaa1c4ecc7aeeb72e0d050feacee907f40888c96a65545e07422bc6ac79f4c2d6ee3dab47d06e764682c72d7f16542fcfd05d2813cc182d1595016c179e1717c160300ab1ab0ac397e91bd193c036feb66a9ad2ec5b7967e7f5ff957f8b085a2437c59a", 0xf8}], 0x4, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(r1, 0x19) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 18:06:04 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='personality\x00') r2 = socket$alg(0x26, 0x5, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = accept4$alg(r3, 0x0, 0x0, 0x0) sendfile(r4, r1, 0x0, 0x20000000001000) 18:06:04 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68}, [{0x0, 0x0, 0x500000000000000}]}, 0x78) 18:06:04 executing program 2: socketpair$unix(0x1, 0x2, 0x0, 0x0) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='personality\x00') r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000240)={0x26, 'hash\x00', 0x0, 0x0, 'rmd320\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = accept4$alg(r3, 0x0, 0x0, 0x0) sendfile(r4, r1, 0x0, 0x20000000001000) 18:06:04 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r0, &(0x7f0000000040)=""/244, 0xf4) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x3d}, {0x0, 0x2a}, {0x0}, {&(0x7f0000000100)="6653960d0ec5d684fa9f017ef0d60a3c27bc33760036001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479810be2aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e6517e615607676f8f9fc0ebf8b0b16d6f2c59957ab35d05692e664ebf68734ca53366295f4ad6142134b62f11e92ead037c7fb53455560c8ef0f1c94fafa924edfe92175aaa1c4ecc7aeeb72e0d050feacee907f40888c96a65545e07422bc6ac79f4c2d6ee3dab47d06e764682c72d7f16542fcfd05d2813cc182d1595016c179e1717c160300ab1ab0ac397e91bd193c036feb66a9ad2ec5b7967e7f5ff957f8b085a2437c59a", 0xf8}], 0x4, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(r1, 0x19) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 18:06:07 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r0, &(0x7f0000000040)=""/244, 0xf4) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="6653960d0ec5d684fa9f017ef0d60a3c27bc33760036001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479810be2aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e6517e615607676f8f9fc0ebf8b0b16d6f2c59957ab35d05692e664ebf68734ca53366295f4ad6142134b62f11e92ead037c7fb53455560c8ef0f1c94fafa924edfe92175aaa1c4ecc7aeeb72e0d050feacee907f40888c96a65545e07422bc6ac79f4c2d6ee3dab47d06e764682c72d7f16542fcfd05d2813cc182d1595016c179e1717c160300ab1ab0ac397e91bd193c036feb66a9ad2ec5b7967e7f5ff957f8b085a2437c5", 0xf7}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 18:06:07 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x9000000}]}, 0x78) 18:06:07 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='personality\x00') r2 = socket$alg(0x26, 0x5, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = accept4$alg(r3, 0x0, 0x0, 0x0) sendfile(r4, r1, 0x0, 0x20000000001000) 18:06:07 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68}, [{0x0, 0x0, 0x600000000000000}]}, 0x78) 18:06:07 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r0, &(0x7f0000000040)=""/244, 0xf4) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x3d}, {0x0, 0x2a}, {0x0}, {&(0x7f0000000100)="6653960d0ec5d684fa9f017ef0d60a3c27bc33760036001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479810be2aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e6517e615607676f8f9fc0ebf8b0b16d6f2c59957ab35d05692e664ebf68734ca53366295f4ad6142134b62f11e92ead037c7fb53455560c8ef0f1c94fafa924edfe92175aaa1c4ecc7aeeb72e0d050feacee907f40888c96a65545e07422bc6ac79f4c2d6ee3dab47d06e764682c72d7f16542fcfd05d2813cc182d1595016c179e1717c160300ab1ab0ac397e91bd193c036feb66a9ad2ec5b7967e7f5ff957f8b085a2437c59a", 0xf8}], 0x4, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(r1, 0x19) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 18:06:07 executing program 2: socketpair$unix(0x1, 0x2, 0x0, 0x0) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='personality\x00') r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000240)={0x26, 'hash\x00', 0x0, 0x0, 'rmd320\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = accept4$alg(r3, 0x0, 0x0, 0x0) sendfile(r4, r1, 0x0, 0x20000000001000) 18:06:07 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r0, &(0x7f0000000040)=""/244, 0xf4) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x3d}, {0x0, 0x2a}, {0x0}, {&(0x7f0000000100)="6653960d0ec5d684fa9f017ef0d60a3c27bc33760036001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479810be2aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e6517e615607676f8f9fc0ebf8b0b16d6f2c59957ab35d05692e664ebf68734ca53366295f4ad6142134b62f11e92ead037c7fb53455560c8ef0f1c94fafa924edfe92175aaa1c4ecc7aeeb72e0d050feacee907f40888c96a65545e07422bc6ac79f4c2d6ee3dab47d06e764682c72d7f16542fcfd05d2813cc182d1595016c179e1717c160300ab1ab0ac397e91bd193c036feb66a9ad2ec5b7967e7f5ff957f8b085a2437c59a", 0xf8}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(0x0, 0x19) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 18:06:07 executing program 2: socketpair$unix(0x1, 0x2, 0x0, 0x0) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='personality\x00') r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000240)={0x26, 'hash\x00', 0x0, 0x0, 'rmd320\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = accept4$alg(r3, 0x0, 0x0, 0x0) sendfile(r4, r1, 0x0, 0x20000000001000) 18:06:07 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68}, [{0x0, 0x0, 0x700000000000000}]}, 0x78) 18:06:07 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='personality\x00') bind$alg(0xffffffffffffffff, &(0x7f0000000240)={0x26, 'hash\x00', 0x0, 0x0, 'rmd320\x00'}, 0x58) r2 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = accept4$alg(r2, 0x0, 0x0, 0x0) sendfile(r3, r1, 0x0, 0x20000000001000) 18:06:07 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0xa000000}]}, 0x78) 18:06:07 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='personality\x00') bind$alg(0xffffffffffffffff, &(0x7f0000000240)={0x26, 'hash\x00', 0x0, 0x0, 'rmd320\x00'}, 0x58) r2 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = accept4$alg(r2, 0x0, 0x0, 0x0) sendfile(r3, r1, 0x0, 0x20000000001000) 18:06:10 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r0, &(0x7f0000000040)=""/244, 0xf4) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="6653960d0ec5d684fa9f017ef0d60a3c27bc33760036001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479810be2aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e6517e615607676f8f9fc0ebf8b0b16d6f2c59957ab35d05692e664ebf68734ca53366295f4ad6142134b62f11e92ead037c7fb53455560c8ef0f1c94fafa924edfe92175aaa1c4ecc7aeeb72e0d050feacee907f40888c96a65545e07422bc6ac79f4c2d6ee3dab47d06e764682c72d7f16542fcfd05d2813cc182d1595016c179e1717c160300ab1ab0ac397e91bd193c036feb66a9ad2ec5b7967e7f5ff957f8b085a2437c5", 0xf7}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 18:06:10 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0xc000000}]}, 0x78) 18:06:10 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68}, [{0x0, 0x0, 0x800000000000000}]}, 0x78) 18:06:10 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='personality\x00') r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000240)={0x26, 'hash\x00', 0x0, 0x0, 'rmd320\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = accept4$alg(r3, 0x0, 0x0, 0x0) sendfile(r4, r1, 0x0, 0x20000000001000) 18:06:10 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='personality\x00') bind$alg(0xffffffffffffffff, &(0x7f0000000240)={0x26, 'hash\x00', 0x0, 0x0, 'rmd320\x00'}, 0x58) r2 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = accept4$alg(r2, 0x0, 0x0, 0x0) sendfile(r3, r1, 0x0, 0x20000000001000) 18:06:10 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68}, [{0x0, 0x0, 0x900000000000000}]}, 0x78) 18:06:10 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0xd000000}]}, 0x78) 18:06:10 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r0, &(0x7f0000000040)=""/244, 0xf4) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x3d}, {0x0, 0x2a}, {0x0}, {&(0x7f0000000100)="6653960d0ec5d684fa9f017ef0d60a3c27bc33760036001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479810be2aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e6517e615607676f8f9fc0ebf8b0b16d6f2c59957ab35d05692e664ebf68734ca53366295f4ad6142134b62f11e92ead037c7fb53455560c8ef0f1c94fafa924edfe92175aaa1c4ecc7aeeb72e0d050feacee907f40888c96a65545e07422bc6ac79f4c2d6ee3dab47d06e764682c72d7f16542fcfd05d2813cc182d1595016c179e1717c160300ab1ab0ac397e91bd193c036feb66a9ad2ec5b7967e7f5ff957f8b085a2437c59a", 0xf8}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(0x0, 0x19) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 18:06:10 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='personality\x00') r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000240)={0x26, 'hash\x00', 0x0, 0x0, 'rmd320\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = accept4$alg(r3, 0x0, 0x0, 0x0) sendfile(r4, r1, 0x0, 0x20000000001000) 18:06:10 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'hash\x00', 0x0, 0x0, 'rmd320\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = accept4$alg(r2, 0x0, 0x0, 0x0) sendfile(r3, 0xffffffffffffffff, 0x0, 0x20000000001000) 18:06:10 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68}, [{0x0, 0x0, 0xa00000000000000}]}, 0x78) 18:06:10 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='personality\x00') r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000240)={0x26, 'hash\x00', 0x0, 0x0, 'rmd320\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = accept4$alg(r3, 0x0, 0x0, 0x0) sendfile(r4, r1, 0x0, 0x20000000001000) 18:06:13 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r0, &(0x7f0000000040)=""/244, 0xf4) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="6653960d0ec5d684fa9f017ef0d60a3c27bc33760036001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479810be2aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e6517e615607676f8f9fc0ebf8b0b16d6f2c59957ab35d05692e664ebf68734ca53366295f4ad6142134b62f11e92ead037c7fb53455560c8ef0f1c94fafa924edfe92175aaa1c4ecc7aeeb72e0d050feacee907f40888c96a65545e07422bc6ac79f4c2d6ee3dab47d06e764682c72d7f16542fcfd05d2813cc182d1595016c179e1717c160300ab1ab0ac397e91bd193c036feb66a9ad2ec5b7967e7f5ff957f8b085a2437c5", 0xf7}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 18:06:13 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0xe000000}]}, 0x78) 18:06:13 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'hash\x00', 0x0, 0x0, 'rmd320\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = accept4$alg(r2, 0x0, 0x0, 0x0) sendfile(r3, 0xffffffffffffffff, 0x0, 0x20000000001000) 18:06:13 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68}, [{0x0, 0x0, 0xc00000000000000}]}, 0x78) 18:06:13 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='personality\x00') r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000240)={0x26, 'hash\x00', 0x0, 0x0, 'rmd320\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = accept4$alg(r3, 0x0, 0x0, 0x0) sendfile(r4, r1, 0x0, 0x20000000001000) 18:06:13 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0xf000000}]}, 0x78) 18:06:13 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='personality\x00') r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000240)={0x26, 'hash\x00', 0x0, 0x0, 'rmd320\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = accept4$alg(r3, 0x0, 0x0, 0x0) sendfile(r4, r1, 0x0, 0x20000000001000) 18:06:13 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68}, [{0x0, 0x0, 0xd00000000000000}]}, 0x78) 18:06:13 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'hash\x00', 0x0, 0x0, 'rmd320\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = accept4$alg(r2, 0x0, 0x0, 0x0) sendfile(r3, 0xffffffffffffffff, 0x0, 0x20000000001000) 18:06:13 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r0, &(0x7f0000000040)=""/244, 0xf4) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x3d}, {0x0, 0x2a}, {0x0}, {&(0x7f0000000100)="6653960d0ec5d684fa9f017ef0d60a3c27bc33760036001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479810be2aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e6517e615607676f8f9fc0ebf8b0b16d6f2c59957ab35d05692e664ebf68734ca53366295f4ad6142134b62f11e92ead037c7fb53455560c8ef0f1c94fafa924edfe92175aaa1c4ecc7aeeb72e0d050feacee907f40888c96a65545e07422bc6ac79f4c2d6ee3dab47d06e764682c72d7f16542fcfd05d2813cc182d1595016c179e1717c160300ab1ab0ac397e91bd193c036feb66a9ad2ec5b7967e7f5ff957f8b085a2437c59a", 0xf8}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(0x0, 0x19) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 18:06:13 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='personality\x00') r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000240)={0x26, 'hash\x00', 0x0, 0x0, 'rmd320\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = accept4$alg(r3, 0x0, 0x0, 0x0) sendfile(r4, r1, 0x0, 0x20000000001000) 18:06:13 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='personality\x00') r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'hash\x00', 0x0, 0x0, 'rmd320\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = accept4$alg(r2, 0x0, 0x0, 0x0) sendfile(r3, r0, 0x0, 0x20000000001000) 18:06:16 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r0, &(0x7f0000000040)=""/244, 0xf4) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="6653960d0ec5d684fa9f017ef0d60a3c27bc33760036001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479810be2aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e6517e615607676f8f9fc0ebf8b0b16d6f2c59957ab35d05692e664ebf68734ca53366295f4ad6142134b62f11e92ead037c7fb53455560c8ef0f1c94fafa924edfe92175aaa1c4ecc7aeeb72e0d050feacee907f40888c96a65545e07422bc6ac79f4c2d6ee3dab47d06e764682c72d7f16542fcfd05d2813cc182d1595016c179e1717c160300ab1ab0ac397e91bd193c036feb66a9ad2ec5b7967e7f5ff957f8b085a2437c5", 0xf7}], 0x4, 0x0) tkill(r1, 0x19) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 18:06:16 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x18000000}]}, 0x78) 18:06:16 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68}, [{0x0, 0x0, 0xe00000000000000}]}, 0x78) 18:06:16 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='personality\x00') r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'hash\x00', 0x0, 0x0, 'rmd320\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = accept4$alg(r2, 0x0, 0x0, 0x0) sendfile(r3, r0, 0x0, 0x20000000001000) 18:06:16 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='personality\x00') r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000240)={0x26, 'hash\x00', 0x0, 0x0, 'rmd320\x00'}, 0x58) r4 = accept4(r3, 0x0, 0x0, 0x0) r5 = accept4$alg(r4, 0x0, 0x0, 0x0) sendfile(r5, r2, 0x0, 0x20000000001000) 18:06:16 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68}, [{0x0, 0x0, 0xf00000000000000}]}, 0x78) 18:06:16 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x1a000000}]}, 0x78) 18:06:16 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r0, &(0x7f0000000040)=""/244, 0xf4) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="6653960d0ec5d684fa9f017ef0d60a3c27bc33760036001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479810be2aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e6517e615607676f8f9fc0ebf8b0b16d6f2c59957ab35d05692e664ebf68734ca53366295f4ad6142134b62f11e92ead037c7fb53455560c8ef0f1c94fafa924edfe92175aaa1c4ecc7aeeb72e0d050feacee907f40888c96a65545e07422bc6ac79f4c2d6ee3dab47d06e764682c72d7f16542fcfd05d2813cc182d1595016c179e1717c160300ab1ab0ac397e91bd193c036feb66a9ad2ec5b7967e7f5ff957f8b085a2437c5", 0xf7}], 0x4, 0x0) tkill(r1, 0x19) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 18:06:16 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r0, &(0x7f0000000040)=""/244, 0xf4) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x3d}, {0x0, 0x2a}, {0x0}, {&(0x7f0000000100)="6653960d0ec5d684fa9f017ef0d60a3c27bc33760036001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479810be2aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e6517e615607676f8f9fc0ebf8b0b16d6f2c59957ab35d05692e664ebf68734ca53366295f4ad6142134b62f11e92ead037c7fb53455560c8ef0f1c94fafa924edfe92175aaa1c4ecc7aeeb72e0d050feacee907f40888c96a65545e07422bc6ac79f4c2d6ee3dab47d06e764682c72d7f16542fcfd05d2813cc182d1595016c179e1717c160300ab1ab0ac397e91bd193c036feb66a9ad2ec5b7967e7f5ff957f8b085a2437c59a", 0xf8}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x0) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 18:06:16 executing program 4: r0 = syz_open_procfs(0x0, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'hash\x00', 0x0, 0x0, 'rmd320\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = accept4$alg(r2, 0x0, 0x0, 0x0) sendfile(r3, r0, 0x0, 0x20000000001000) 18:06:16 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='personality\x00') r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000240)={0x26, 'hash\x00', 0x0, 0x0, 'rmd320\x00'}, 0x58) r4 = accept4(r3, 0x0, 0x0, 0x0) r5 = accept4$alg(r4, 0x0, 0x0, 0x0) sendfile(r5, r2, 0x0, 0x20000000001000) 18:06:16 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68}, [{0x0, 0x0, 0x1800000000000000}]}, 0x78) 18:06:16 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x1b000000}]}, 0x78) 18:06:16 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r0, &(0x7f0000000040)=""/244, 0xf4) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="6653960d0ec5d684fa9f017ef0d60a3c27bc33760036001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479810be2aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e6517e615607676f8f9fc0ebf8b0b16d6f2c59957ab35d05692e664ebf68734ca53366295f4ad6142134b62f11e92ead037c7fb53455560c8ef0f1c94fafa924edfe92175aaa1c4ecc7aeeb72e0d050feacee907f40888c96a65545e07422bc6ac79f4c2d6ee3dab47d06e764682c72d7f16542fcfd05d2813cc182d1595016c179e1717c160300ab1ab0ac397e91bd193c036feb66a9ad2ec5b7967e7f5ff957f8b085a2437c5", 0xf7}], 0x4, 0x0) tkill(r1, 0x19) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 18:06:16 executing program 4: r0 = syz_open_procfs(0x0, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'hash\x00', 0x0, 0x0, 'rmd320\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = accept4$alg(r2, 0x0, 0x0, 0x0) sendfile(r3, r0, 0x0, 0x20000000001000) 18:06:16 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='personality\x00') r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000240)={0x26, 'hash\x00', 0x0, 0x0, 'rmd320\x00'}, 0x58) r4 = accept4(r3, 0x0, 0x0, 0x0) r5 = accept4$alg(r4, 0x0, 0x0, 0x0) sendfile(r5, r2, 0x0, 0x20000000001000) 18:06:16 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x3e000000}]}, 0x78) 18:06:16 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68}, [{0x0, 0x0, 0x1900000000000000}]}, 0x78) 18:06:16 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r0, &(0x7f0000000040)=""/244, 0xf4) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x19) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 18:06:16 executing program 4: r0 = syz_open_procfs(0x0, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'hash\x00', 0x0, 0x0, 'rmd320\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = accept4$alg(r2, 0x0, 0x0, 0x0) sendfile(r3, r0, 0x0, 0x20000000001000) 18:06:19 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r0, &(0x7f0000000040)=""/244, 0xf4) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x3d}, {0x0, 0x2a}, {0x0}, {&(0x7f0000000100)="6653960d0ec5d684fa9f017ef0d60a3c27bc33760036001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479810be2aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e6517e615607676f8f9fc0ebf8b0b16d6f2c59957ab35d05692e664ebf68734ca53366295f4ad6142134b62f11e92ead037c7fb53455560c8ef0f1c94fafa924edfe92175aaa1c4ecc7aeeb72e0d050feacee907f40888c96a65545e07422bc6ac79f4c2d6ee3dab47d06e764682c72d7f16542fcfd05d2813cc182d1595016c179e1717c160300ab1ab0ac397e91bd193c036feb66a9ad2ec5b7967e7f5ff957f8b085a2437c59a", 0xf8}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x0) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 18:06:19 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x7f000000}]}, 0x78) 18:06:19 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_procfs(0x0, 0x0) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000240)={0x26, 'hash\x00', 0x0, 0x0, 'rmd320\x00'}, 0x58) r4 = accept4(r3, 0x0, 0x0, 0x0) r5 = accept4$alg(r4, 0x0, 0x0, 0x0) sendfile(r5, r2, 0x0, 0x20000000001000) 18:06:19 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68}, [{0x0, 0x0, 0x1a00000000000000}]}, 0x78) 18:06:19 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='personality\x00') r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000240)={0x26, 'hash\x00', 0x0, 0x0, 'rmd320\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = accept4$alg(r2, 0x0, 0x0, 0x0) sendfile(r3, r0, 0x0, 0x20000000001000) 18:06:19 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='personality\x00') r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000240)={0x26, 'hash\x00', 0x0, 0x0, 'rmd320\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = accept4$alg(r2, 0x0, 0x0, 0x0) sendfile(r3, r0, 0x0, 0x20000000001000) 18:06:19 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68}, [{0x0, 0x0, 0x1b00000000000000}]}, 0x78) 18:06:19 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x80ffffff}]}, 0x78) 18:06:19 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_procfs(0x0, 0x0) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000240)={0x26, 'hash\x00', 0x0, 0x0, 'rmd320\x00'}, 0x58) r4 = accept4(r3, 0x0, 0x0, 0x0) r5 = accept4$alg(r4, 0x0, 0x0, 0x0) sendfile(r5, r2, 0x0, 0x20000000001000) 18:06:19 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='personality\x00') r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000240)={0x26, 'hash\x00', 0x0, 0x0, 'rmd320\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = accept4$alg(r2, 0x0, 0x0, 0x0) sendfile(r3, r0, 0x0, 0x20000000001000) 18:06:19 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r0, &(0x7f0000000040)=""/244, 0xf4) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x19) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 18:06:19 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_procfs(0x0, 0x0) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000240)={0x26, 'hash\x00', 0x0, 0x0, 'rmd320\x00'}, 0x58) r4 = accept4(r3, 0x0, 0x0, 0x0) r5 = accept4$alg(r4, 0x0, 0x0, 0x0) sendfile(r5, r2, 0x0, 0x20000000001000) 18:06:22 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r0, &(0x7f0000000040)=""/244, 0xf4) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x3d}, {0x0, 0x2a}, {0x0}, {&(0x7f0000000100)="6653960d0ec5d684fa9f017ef0d60a3c27bc33760036001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479810be2aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e6517e615607676f8f9fc0ebf8b0b16d6f2c59957ab35d05692e664ebf68734ca53366295f4ad6142134b62f11e92ead037c7fb53455560c8ef0f1c94fafa924edfe92175aaa1c4ecc7aeeb72e0d050feacee907f40888c96a65545e07422bc6ac79f4c2d6ee3dab47d06e764682c72d7f16542fcfd05d2813cc182d1595016c179e1717c160300ab1ab0ac397e91bd193c036feb66a9ad2ec5b7967e7f5ff957f8b085a2437c59a", 0xf8}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x0) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 18:06:22 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x9b000000}]}, 0x78) 18:06:22 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68}, [{0x0, 0x0, 0x1e00000000000000}]}, 0x78) 18:06:22 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='personality\x00') r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, 0x0, 0x0) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = accept4$alg(r2, 0x0, 0x0, 0x0) sendfile(r3, r0, 0x0, 0x20000000001000) 18:06:22 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='personality\x00') r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000240)={0x26, 'hash\x00', 0x0, 0x0, 'rmd320\x00'}, 0x58) r4 = accept4(r3, 0x0, 0x0, 0x0) r5 = accept4$alg(r4, 0x0, 0x0, 0x0) sendfile(r5, r2, 0x0, 0x20000000001000) 18:06:22 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0xffff0000}]}, 0x78) 18:06:22 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='personality\x00') r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, 0x0, 0x0) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = accept4$alg(r2, 0x0, 0x0, 0x0) sendfile(r3, r0, 0x0, 0x20000000001000) 18:06:22 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68}, [{0x0, 0x0, 0x3e00000000000000}]}, 0x78) 18:06:22 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='personality\x00') r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000240)={0x26, 'hash\x00', 0x0, 0x0, 'rmd320\x00'}, 0x58) r4 = accept4(r3, 0x0, 0x0, 0x0) r5 = accept4$alg(r4, 0x0, 0x0, 0x0) sendfile(r5, r2, 0x0, 0x20000000001000) 18:06:22 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff80}]}, 0x78) 18:06:22 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r0, &(0x7f0000000040)=""/244, 0xf4) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x19) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 18:06:22 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0xf0000000000000}]}, 0x78) 18:06:25 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r0, &(0x7f0000000040)=""/244, 0xf4) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x3d}, {0x0, 0x2a}, {0x0}, {&(0x7f0000000100)="6653960d0ec5d684fa9f017ef0d60a3c27bc33760036001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479810be2aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e6517e615607676f8f9fc0ebf8b0b16d6f2c59957ab35d05692e664ebf68734ca53366295f4ad6142134b62f11e92ead037c7fb53455560c8ef0f1c94fafa924edfe92175aaa1c4ecc7aeeb72e0d050feacee907f40888c96a65545e07422bc6ac79f4c2d6ee3dab47d06e764682c72d7f16542fcfd05d2813cc182d1595016c179e1717c160300ab1ab0ac397e91bd193c036feb66a9ad2ec5b7967e7f5ff957f8b085a2437c59a", 0xf8}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x19) ptrace$cont(0xffffffffffffffff, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 18:06:25 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='personality\x00') r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000240)={0x26, 'hash\x00', 0x0, 0x0, 'rmd320\x00'}, 0x58) r4 = accept4(r3, 0x0, 0x0, 0x0) r5 = accept4$alg(r4, 0x0, 0x0, 0x0) sendfile(r5, r2, 0x0, 0x20000000001000) 18:06:25 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='personality\x00') r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, 0x0, 0x0) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = accept4$alg(r2, 0x0, 0x0, 0x0) sendfile(r3, r0, 0x0, 0x20000000001000) 18:06:25 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68}, [{0x0, 0x0, 0x3f00000000000000}]}, 0x78) 18:06:25 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000}]}, 0x78) 18:06:25 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='personality\x00') r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'hash\x00', 0x0, 0x0, 'rmd320\x00'}, 0x58) r2 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = accept4$alg(r2, 0x0, 0x0, 0x0) sendfile(r3, r0, 0x0, 0x20000000001000) 18:06:25 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68}, [{0x0, 0x0, 0x7f00000000000000}]}, 0x78) 18:06:25 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x180000000000000}]}, 0x78) 18:06:25 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='personality\x00') r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, 0x0, 0x0) r4 = accept4(r3, 0x0, 0x0, 0x0) r5 = accept4$alg(r4, 0x0, 0x0, 0x0) sendfile(r5, r2, 0x0, 0x20000000001000) 18:06:25 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='personality\x00') r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'hash\x00', 0x0, 0x0, 'rmd320\x00'}, 0x58) r2 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = accept4$alg(r2, 0x0, 0x0, 0x0) sendfile(r3, r0, 0x0, 0x20000000001000) 18:06:25 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r0, &(0x7f0000000040)=""/244, 0xf4) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="6653960d0ec5d684fa9f017ef0d60a3c27bc33760036001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479810be2aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e6517e615607676f8f9fc0ebf8b0b16d6f2c59957ab35d05692e664ebf68734ca53366295f4ad6142134b62f11e92ead037c7fb53455560c8ef0f1c94fafa924edfe92175aaa1c4ecc7aeeb72e0d050feacee907f40888c96a65545e07422bc6ac79f4c2d6ee3dab47d06e764682c72d7f16542fcfd05d2813cc182d1595016c179e1717c160300ab1ab0ac397e91bd193c036feb66a9ad2ec5b7967e7f5ff957f8b085a2437c5", 0xf7}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x19) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 18:06:25 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68}, [{0x0, 0x0, 0x80ffffff00000000}]}, 0x78) 18:06:28 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r0, &(0x7f0000000040)=""/244, 0xf4) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x3d}, {0x0, 0x2a}, {0x0}, {&(0x7f0000000100)="6653960d0ec5d684fa9f017ef0d60a3c27bc33760036001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479810be2aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e6517e615607676f8f9fc0ebf8b0b16d6f2c59957ab35d05692e664ebf68734ca53366295f4ad6142134b62f11e92ead037c7fb53455560c8ef0f1c94fafa924edfe92175aaa1c4ecc7aeeb72e0d050feacee907f40888c96a65545e07422bc6ac79f4c2d6ee3dab47d06e764682c72d7f16542fcfd05d2813cc182d1595016c179e1717c160300ab1ab0ac397e91bd193c036feb66a9ad2ec5b7967e7f5ff957f8b085a2437c59a", 0xf8}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x19) ptrace$cont(0xffffffffffffffff, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 18:06:28 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000}]}, 0x78) 18:06:28 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='personality\x00') r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, 0x0, 0x0) r4 = accept4(r3, 0x0, 0x0, 0x0) r5 = accept4$alg(r4, 0x0, 0x0, 0x0) sendfile(r5, r2, 0x0, 0x20000000001000) 18:06:28 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='personality\x00') r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'hash\x00', 0x0, 0x0, 'rmd320\x00'}, 0x58) r2 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = accept4$alg(r2, 0x0, 0x0, 0x0) sendfile(r3, r0, 0x0, 0x20000000001000) 18:06:28 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r0, &(0x7f0000000040)=""/244, 0xf4) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="6653960d0ec5d684fa9f017ef0d60a3c27bc33760036001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479810be2aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e6517e615607676f8f9fc0ebf8b0b16d6f2c59957ab35d05692e664ebf68734ca53366295f4ad6142134b62f11e92ead037c7fb53455560c8ef0f1c94fafa924edfe92175aaa1c4ecc7aeeb72e0d050feacee907f40888c96a65545e07422bc6ac79f4c2d6ee3dab47d06e764682c72d7f16542fcfd05d2813cc182d1595016c179e1717c160300ab1ab0ac397e91bd193c036feb66a9ad2ec5b7967e7f5ff957f8b085a2437c5", 0xf7}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x19) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 18:06:28 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68}, [{0x0, 0x0, 0x9b00000000000000}]}, 0x78) 18:06:28 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r0, &(0x7f0000000040)=""/244, 0xf4) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="6653960d0ec5d684fa9f017ef0d60a3c27bc33760036001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479810be2aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e6517e615607676f8f9fc0ebf8b0b16d6f2c59957ab35d05692e664ebf68734ca53366295f4ad6142134b62f11e92ead037c7fb53455560c8ef0f1c94fafa924edfe92175aaa1c4ecc7aeeb72e0d050feacee907f40888c96a65545e07422bc6ac79f4c2d6ee3dab47d06e764682c72d7f16542fcfd05d2813cc182d1595016c179e1717c160300ab1ab0ac397e91bd193c036feb66a9ad2ec5b7967e7f5ff957f8b085a2437c5", 0xf7}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x19) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 18:06:28 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x700000000000000}]}, 0x78) 18:06:28 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='personality\x00') r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'hash\x00', 0x0, 0x0, 'rmd320\x00'}, 0x58) accept4(r1, 0x0, 0x0, 0x0) r2 = accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendfile(r2, r0, 0x0, 0x20000000001000) 18:06:28 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68}, [{0x0, 0x0, 0xe803000000000000}]}, 0x78) 18:06:28 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='personality\x00') r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, 0x0, 0x0) r4 = accept4(r3, 0x0, 0x0, 0x0) r5 = accept4$alg(r4, 0x0, 0x0, 0x0) sendfile(r5, r2, 0x0, 0x20000000001000) 18:06:28 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r0, &(0x7f0000000040)=""/244, 0xf4) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="6653960d0ec5d684fa9f017ef0d60a3c27bc33760036001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479810be2aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e6517e615607676f8f9fc0ebf8b0b16d6f2c59957ab35d05692e664ebf68734ca53366295f4ad6142134b62f11e92ead037c7fb53455560c8ef0f1c94fafa924edfe92175aaa1c4ecc7aeeb72e0d050feacee907f40888c96a65545e07422bc6ac79f4c2d6ee3dab47d06e764682c72d7f16542fcfd05d2813cc182d1595016c179e1717c160300ab1ab0ac397e91bd193c036feb66a9ad2ec5b7967e7f5ff957f8b085a2437c5", 0xf7}], 0x4, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(0x0, 0x19) ptrace$cont(0x18, 0x0, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, 0x0, 0x0, 0x0) 18:06:31 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r0, &(0x7f0000000040)=""/244, 0xf4) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x3d}, {0x0, 0x2a}, {0x0}, {&(0x7f0000000100)="6653960d0ec5d684fa9f017ef0d60a3c27bc33760036001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479810be2aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e6517e615607676f8f9fc0ebf8b0b16d6f2c59957ab35d05692e664ebf68734ca53366295f4ad6142134b62f11e92ead037c7fb53455560c8ef0f1c94fafa924edfe92175aaa1c4ecc7aeeb72e0d050feacee907f40888c96a65545e07422bc6ac79f4c2d6ee3dab47d06e764682c72d7f16542fcfd05d2813cc182d1595016c179e1717c160300ab1ab0ac397e91bd193c036feb66a9ad2ec5b7967e7f5ff957f8b085a2437c59a", 0xf8}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x19) ptrace$cont(0xffffffffffffffff, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 18:06:31 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000000000}]}, 0x78) 18:06:31 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68}, [{0x0, 0x0, 0xffff000000000000}]}, 0x78) 18:06:31 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='personality\x00') r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'hash\x00', 0x0, 0x0, 'rmd320\x00'}, 0x58) accept4(r1, 0x0, 0x0, 0x0) r2 = accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendfile(r2, r0, 0x0, 0x20000000001000) 18:06:31 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r0, &(0x7f0000000040)=""/244, 0xf4) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="6653960d0ec5d684fa9f017ef0d60a3c27bc33760036001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479810be2aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e6517e615607676f8f9fc0ebf8b0b16d6f2c59957ab35d05692e664ebf68734ca53366295f4ad6142134b62f11e92ead037c7fb53455560c8ef0f1c94fafa924edfe92175aaa1c4ecc7aeeb72e0d050feacee907f40888c96a65545e07422bc6ac79f4c2d6ee3dab47d06e764682c72d7f16542fcfd05d2813cc182d1595016c179e1717c160300ab1ab0ac397e91bd193c036feb66a9ad2ec5b7967e7f5ff957f8b085a2437c5", 0xf7}], 0x4, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(0x0, 0x19) ptrace$cont(0x18, 0x0, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, 0x0, 0x0, 0x0) 18:06:31 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='personality\x00') r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000240)={0x26, 'hash\x00', 0x0, 0x0, 'rmd320\x00'}, 0x58) r4 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r5 = accept4$alg(r4, 0x0, 0x0, 0x0) sendfile(r5, r2, 0x0, 0x20000000001000) 18:06:31 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r0, &(0x7f0000000040)=""/244, 0xf4) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="6653960d0ec5d684fa9f017ef0d60a3c27bc33760036001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479810be2aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e6517e615607676f8f9fc0ebf8b0b16d6f2c59957ab35d05692e664ebf68734ca53366295f4ad6142134b62f11e92ead037c7fb53455560c8ef0f1c94fafa924edfe92175aaa1c4ecc7aeeb72e0d050feacee907f40888c96a65545e07422bc6ac79f4c2d6ee3dab47d06e764682c72d7f16542fcfd05d2813cc182d1595016c179e1717c160300ab1ab0ac397e91bd193c036feb66a9ad2ec5b7967e7f5ff957f8b085a2437c5", 0xf7}], 0x4, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(0x0, 0x19) ptrace$cont(0x18, 0x0, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, 0x0, 0x0, 0x0) 18:06:31 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='personality\x00') r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'hash\x00', 0x0, 0x0, 'rmd320\x00'}, 0x58) accept4(r1, 0x0, 0x0, 0x0) r2 = accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendfile(r2, r0, 0x0, 0x20000000001000) 18:06:31 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x900000000000000}]}, 0x78) 18:06:31 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='personality\x00') r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000240)={0x26, 'hash\x00', 0x0, 0x0, 'rmd320\x00'}, 0x58) r4 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r5 = accept4$alg(r4, 0x0, 0x0, 0x0) sendfile(r5, r2, 0x0, 0x20000000001000) 18:06:31 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68}, [{0x0, 0x0, 0x0, 0x2}]}, 0x78) 18:06:31 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r0, &(0x7f0000000040)=""/244, 0xf4) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="6653960d0ec5d684fa9f017ef0d60a3c27bc33760036001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479810be2aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e6517e615607676f8f9fc0ebf8b0b16d6f2c59957ab35d05692e664ebf68734ca53366295f4ad6142134b62f11e92ead037c7fb53455560c8ef0f1c94fafa924edfe92175aaa1c4ecc7aeeb72e0d050feacee907f40888c96a65545e07422bc6ac79f4c2d6ee3dab47d06e764682c72d7f16542fcfd05d2813cc182d1595016c179e1717c160300ab1ab0ac397e91bd193c036feb66a9ad2ec5b7967e7f5ff957f8b085a2437c5", 0xf7}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x19) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 18:06:34 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r0, &(0x7f0000000040)=""/244, 0xf4) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x3d}, {0x0, 0x2a}, {0x0}, {&(0x7f0000000100)="6653960d0ec5d684fa9f017ef0d60a3c27bc33760036001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479810be2aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e6517e615607676f8f9fc0ebf8b0b16d6f2c59957ab35d05692e664ebf68734ca53366295f4ad6142134b62f11e92ead037c7fb53455560c8ef0f1c94fafa924edfe92175aaa1c4ecc7aeeb72e0d050feacee907f40888c96a65545e07422bc6ac79f4c2d6ee3dab47d06e764682c72d7f16542fcfd05d2813cc182d1595016c179e1717c160300ab1ab0ac397e91bd193c036feb66a9ad2ec5b7967e7f5ff957f8b085a2437c59a", 0xf8}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x19) ptrace$cont(0x18, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 18:06:34 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='personality\x00') r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'hash\x00', 0x0, 0x0, 'rmd320\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) accept4$alg(r2, 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0x20000000001000) 18:06:34 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68}, [{0x0, 0x0, 0x0, 0x5}]}, 0x78) 18:06:34 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0xa00000000000000}]}, 0x78) 18:06:34 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='personality\x00') r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000240)={0x26, 'hash\x00', 0x0, 0x0, 'rmd320\x00'}, 0x58) r4 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r5 = accept4$alg(r4, 0x0, 0x0, 0x0) sendfile(r5, r2, 0x0, 0x20000000001000) 18:06:34 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r0, &(0x7f0000000040)=""/244, 0xf4) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="6653960d0ec5d684fa9f017ef0d60a3c27bc33760036001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479810be2aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e6517e615607676f8f9fc0ebf8b0b16d6f2c59957ab35d05692e664ebf68734ca53366295f4ad6142134b62f11e92ead037c7fb53455560c8ef0f1c94fafa924edfe92175aaa1c4ecc7aeeb72e0d050feacee907f40888c96a65545e07422bc6ac79f4c2d6ee3dab47d06e764682c72d7f16542fcfd05d2813cc182d1595016c179e1717c160300ab1ab0ac397e91bd193c036feb66a9ad2ec5b7967e7f5ff957f8b085a2437c5", 0xf7}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x19) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 18:06:34 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0xc00000000000000}]}, 0x78) 18:06:34 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='personality\x00') r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000240)={0x26, 'hash\x00', 0x0, 0x0, 'rmd320\x00'}, 0x58) accept4(r3, 0x0, 0x0, 0x0) r4 = accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendfile(r4, r2, 0x0, 0x20000000001000) 18:06:34 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68}, [{0x0, 0x0, 0x0, 0x6}]}, 0x78) 18:06:34 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='personality\x00') r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'hash\x00', 0x0, 0x0, 'rmd320\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) accept4$alg(r2, 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0x20000000001000) 18:06:34 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r0, &(0x7f0000000040)=""/244, 0xf4) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="6653960d0ec5d684fa9f017ef0d60a3c27bc33760036001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479810be2aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e6517e615607676f8f9fc0ebf8b0b16d6f2c59957ab35d05692e664ebf68734ca53366295f4ad6142134b62f11e92ead037c7fb53455560c8ef0f1c94fafa924edfe92175aaa1c4ecc7aeeb72e0d050feacee907f40888c96a65545e07422bc6ac79f4c2d6ee3dab47d06e764682c72d7f16542fcfd05d2813cc182d1595016c179e1717c160300ab1ab0ac397e91bd193c036feb66a9ad2ec5b7967e7f5ff957f8b085a2437c5", 0xf7}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x19) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 18:06:34 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0xd00000000000000}]}, 0x78) 18:06:37 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r0, &(0x7f0000000040)=""/244, 0xf4) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x3d}, {0x0, 0x2a}, {0x0}, {&(0x7f0000000100)="6653960d0ec5d684fa9f017ef0d60a3c27bc33760036001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479810be2aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e6517e615607676f8f9fc0ebf8b0b16d6f2c59957ab35d05692e664ebf68734ca53366295f4ad6142134b62f11e92ead037c7fb53455560c8ef0f1c94fafa924edfe92175aaa1c4ecc7aeeb72e0d050feacee907f40888c96a65545e07422bc6ac79f4c2d6ee3dab47d06e764682c72d7f16542fcfd05d2813cc182d1595016c179e1717c160300ab1ab0ac397e91bd193c036feb66a9ad2ec5b7967e7f5ff957f8b085a2437c59a", 0xf8}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x19) ptrace$cont(0x18, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 18:06:37 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68}, [{0x0, 0x0, 0x0, 0x7}]}, 0x78) 18:06:37 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='personality\x00') r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'hash\x00', 0x0, 0x0, 'rmd320\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) accept4$alg(r2, 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0x20000000001000) 18:06:37 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0xe00000000000000}]}, 0x78) 18:06:37 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='personality\x00') r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000240)={0x26, 'hash\x00', 0x0, 0x0, 'rmd320\x00'}, 0x58) accept4(r3, 0x0, 0x0, 0x0) r4 = accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendfile(r4, r2, 0x0, 0x20000000001000) 18:06:37 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r0, &(0x7f0000000040)=""/244, 0xf4) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="6653960d0ec5d684fa9f017ef0d60a3c27bc33760036001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479810be2aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e6517e615607676f8f9fc0ebf8b0b16d6f2c59957ab35d05692e664ebf68734ca53366295f4ad6142134b62f11e92ead037c7fb53455560c8ef0f1c94fafa924edfe92175aaa1c4ecc7aeeb72e0d050feacee907f40888c96a65545e07422bc6ac79f4c2d6ee3dab47d06e764682c72d7f16542fcfd05d2813cc182d1595016c179e1717c160300ab1ab0ac397e91bd193c036feb66a9ad2ec5b7967e7f5ff957f8b085a2437c5", 0xf7}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x19) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 18:06:37 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='personality\x00') r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000240)={0x26, 'hash\x00', 0x0, 0x0, 'rmd320\x00'}, 0x58) accept4(r3, 0x0, 0x0, 0x0) r4 = accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendfile(r4, r2, 0x0, 0x20000000001000) 18:06:37 executing program 4: syz_open_procfs(0x0, &(0x7f00000000c0)='personality\x00') r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'hash\x00', 0x0, 0x0, 'rmd320\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = accept4$alg(r1, 0x0, 0x0, 0x0) sendfile(r2, 0xffffffffffffffff, 0x0, 0x20000000001000) 18:06:37 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68}, [{0x0, 0x0, 0x0, 0x8}]}, 0x78) 18:06:37 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0xf00000000000000}]}, 0x78) [ 915.009928] ptrace attach of "/root/syz-executor.0"[7123] was attempted by "/root/syz-executor.0"[7125] 18:06:37 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r0, &(0x7f0000000040)=""/244, 0xf4) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="6653960d0ec5d684fa9f017ef0d60a3c27bc33760036001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479810be2aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e6517e615607676f8f9fc0ebf8b0b16d6f2c59957ab35d05692e664ebf68734ca53366295f4ad6142134b62f11e92ead037c7fb53455560c8ef0f1c94fafa924edfe92175aaa1c4ecc7aeeb72e0d050feacee907f40888c96a65545e07422bc6ac79f4c2d6ee3dab47d06e764682c72d7f16542fcfd05d2813cc182d1595016c179e1717c160300ab1ab0ac397e91bd193c036feb66a9ad2ec5b7967e7f5ff957f8b085a2437c5", 0xf7}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x19) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 18:06:38 executing program 4: syz_open_procfs(0x0, &(0x7f00000000c0)='personality\x00') r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'hash\x00', 0x0, 0x0, 'rmd320\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = accept4$alg(r1, 0x0, 0x0, 0x0) sendfile(r2, 0xffffffffffffffff, 0x0, 0x20000000001000) [ 915.168958] ptrace attach of "/root/syz-executor.0"[7140] was attempted by "/root/syz-executor.0"[7143] 18:06:40 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r0, &(0x7f0000000040)=""/244, 0xf4) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x3d}, {0x0, 0x2a}, {0x0}, {&(0x7f0000000100)="6653960d0ec5d684fa9f017ef0d60a3c27bc33760036001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479810be2aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e6517e615607676f8f9fc0ebf8b0b16d6f2c59957ab35d05692e664ebf68734ca53366295f4ad6142134b62f11e92ead037c7fb53455560c8ef0f1c94fafa924edfe92175aaa1c4ecc7aeeb72e0d050feacee907f40888c96a65545e07422bc6ac79f4c2d6ee3dab47d06e764682c72d7f16542fcfd05d2813cc182d1595016c179e1717c160300ab1ab0ac397e91bd193c036feb66a9ad2ec5b7967e7f5ff957f8b085a2437c59a", 0xf8}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x19) ptrace$cont(0x18, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 18:06:40 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='personality\x00') r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000240)={0x26, 'hash\x00', 0x0, 0x0, 'rmd320\x00'}, 0x58) r4 = accept4(r3, 0x0, 0x0, 0x0) accept4$alg(r4, 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, r2, 0x0, 0x20000000001000) 18:06:40 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68}, [{0x0, 0x0, 0x0, 0x9}]}, 0x78) 18:06:40 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x1800000000000000}]}, 0x78) 18:06:40 executing program 4: syz_open_procfs(0x0, &(0x7f00000000c0)='personality\x00') r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'hash\x00', 0x0, 0x0, 'rmd320\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = accept4$alg(r1, 0x0, 0x0, 0x0) sendfile(r2, 0xffffffffffffffff, 0x0, 0x20000000001000) 18:06:40 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r0, &(0x7f0000000040)=""/244, 0xf4) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="6653960d0ec5d684fa9f017ef0d60a3c27bc33760036001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479810be2aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e6517e615607676f8f9fc0ebf8b0b16d6f2c59957ab35d05692e664ebf68734ca53366295f4ad6142134b62f11e92ead037c7fb53455560c8ef0f1c94fafa924edfe92175aaa1c4ecc7aeeb72e0d050feacee907f40888c96a65545e07422bc6ac79f4c2d6ee3dab47d06e764682c72d7f16542fcfd05d2813cc182d1595016c179e1717c160300ab1ab0ac397e91bd193c036feb66a9ad2ec5b7967e7f5ff957f8b085a2437c5", 0xf7}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x19) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 18:06:40 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68}, [{0x0, 0x0, 0x0, 0xa}]}, 0x78) 18:06:40 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x1a00000000000000}]}, 0x78) 18:06:40 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='personality\x00') r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'hash\x00', 0x0, 0x0, 'rmd320\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = accept4$alg(r2, 0x0, 0x0, 0x0) sendfile(r3, r0, 0x0, 0x0) 18:06:41 executing program 0: syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="6653960d0ec5d684fa9f017ef0d60a3c27bc33760036001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479810be2aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e6517e615607676f8f9fc0ebf8b0b16d6f2c59957ab35d05692e664ebf68734ca53366295f4ad6142134b62f11e92ead037c7fb53455560c8ef0f1c94fafa924edfe92175aaa1c4ecc7aeeb72e0d050feacee907f40888c96a65545e07422bc6ac79f4c2d6ee3dab47d06e764682c72d7f16542fcfd05d2813cc182d1595016c179e1717c160300ab1ab0ac397e91bd193c036feb66a9ad2ec5b7967e7f5ff957f8b085a2437c5", 0xf7}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x19) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) [ 918.098261] ptrace attach of "/root/syz-executor.0"[7157] was attempted by "/root/syz-executor.0"[7161] 18:06:41 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='personality\x00') r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000240)={0x26, 'hash\x00', 0x0, 0x0, 'rmd320\x00'}, 0x58) r4 = accept4(r3, 0x0, 0x0, 0x0) accept4$alg(r4, 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, r2, 0x0, 0x20000000001000) 18:06:41 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68}, [{0x0, 0x0, 0x0, 0xc}]}, 0x78) 18:06:43 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r0, &(0x7f0000000040)=""/244, 0xf4) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x3d}, {0x0, 0x2a}, {0x0}, {&(0x7f0000000100)="6653960d0ec5d684fa9f017ef0d60a3c27bc33760036001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479810be2aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e6517e615607676f8f9fc0ebf8b0b16d6f2c59957ab35d05692e664ebf68734ca53366295f4ad6142134b62f11e92ead037c7fb53455560c8ef0f1c94fafa924edfe92175aaa1c4ecc7aeeb72e0d050feacee907f40888c96a65545e07422bc6ac79f4c2d6ee3dab47d06e764682c72d7f16542fcfd05d2813cc182d1595016c179e1717c160300ab1ab0ac397e91bd193c036feb66a9ad2ec5b7967e7f5ff957f8b085a2437c59a", 0xf8}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x19) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xffffffffffffffff, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 18:06:43 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x1b00000000000000}]}, 0x78) 18:06:43 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='personality\x00') r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'hash\x00', 0x0, 0x0, 'rmd320\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = accept4$alg(r2, 0x0, 0x0, 0x0) sendfile(r3, r0, 0x0, 0x0) 18:06:43 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='personality\x00') r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000240)={0x26, 'hash\x00', 0x0, 0x0, 'rmd320\x00'}, 0x58) r4 = accept4(r3, 0x0, 0x0, 0x0) accept4$alg(r4, 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, r2, 0x0, 0x20000000001000) 18:06:43 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68}, [{0x0, 0x0, 0x0, 0xd}]}, 0x78) 18:06:44 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68}, [{0x0, 0x0, 0x0, 0xe}]}, 0x78) 18:06:44 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_open_procfs(0x0, &(0x7f00000000c0)='personality\x00') r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000240)={0x26, 'hash\x00', 0x0, 0x0, 'rmd320\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = accept4$alg(r3, 0x0, 0x0, 0x0) sendfile(r4, 0xffffffffffffffff, 0x0, 0x20000000001000) 18:06:44 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x3e00000000000000}]}, 0x78) 18:06:44 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='personality\x00') r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'hash\x00', 0x0, 0x0, 'rmd320\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = accept4$alg(r2, 0x0, 0x0, 0x0) sendfile(r3, r0, 0x0, 0x0) 18:06:44 executing program 0: syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="6653960d0ec5d684fa9f017ef0d60a3c27bc33760036001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479810be2aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e6517e615607676f8f9fc0ebf8b0b16d6f2c59957ab35d05692e664ebf68734ca53366295f4ad6142134b62f11e92ead037c7fb53455560c8ef0f1c94fafa924edfe92175aaa1c4ecc7aeeb72e0d050feacee907f40888c96a65545e07422bc6ac79f4c2d6ee3dab47d06e764682c72d7f16542fcfd05d2813cc182d1595016c179e1717c160300ab1ab0ac397e91bd193c036feb66a9ad2ec5b7967e7f5ff957f8b085a2437c5", 0xf7}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x19) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 18:06:44 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68}, [{0x0, 0x0, 0x0, 0xf}]}, 0x78) 18:06:44 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_open_procfs(0x0, &(0x7f00000000c0)='personality\x00') r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000240)={0x26, 'hash\x00', 0x0, 0x0, 'rmd320\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = accept4$alg(r3, 0x0, 0x0, 0x0) sendfile(r4, 0xffffffffffffffff, 0x0, 0x20000000001000) 18:06:46 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r0, &(0x7f0000000040)=""/244, 0xf4) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x3d}, {0x0, 0x2a}, {0x0}, {&(0x7f0000000100)="6653960d0ec5d684fa9f017ef0d60a3c27bc33760036001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479810be2aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e6517e615607676f8f9fc0ebf8b0b16d6f2c59957ab35d05692e664ebf68734ca53366295f4ad6142134b62f11e92ead037c7fb53455560c8ef0f1c94fafa924edfe92175aaa1c4ecc7aeeb72e0d050feacee907f40888c96a65545e07422bc6ac79f4c2d6ee3dab47d06e764682c72d7f16542fcfd05d2813cc182d1595016c179e1717c160300ab1ab0ac397e91bd193c036feb66a9ad2ec5b7967e7f5ff957f8b085a2437c59a", 0xf8}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x19) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xffffffffffffffff, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 18:06:46 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000000000/0x1000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_RUN(r2, 0xae80, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r4 = syz_genetlink_get_family_id$nl80211(0x0) sendmsg$NL80211_CMD_GET_MPATH(r3, &(0x7f0000000180)={&(0x7f0000000000), 0xc, &(0x7f0000000140)={&(0x7f0000000080)={0x1c, r4, 0xf0a, 0x70bd2c, 0x4, {}, [@NL80211_ATTR_WIPHY={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x14}, 0x4000000) 18:06:46 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x7f00000000000000}]}, 0x78) 18:06:46 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68}, [{0x0, 0x0, 0x0, 0x18}]}, 0x78) 18:06:46 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_open_procfs(0x0, &(0x7f00000000c0)='personality\x00') r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000240)={0x26, 'hash\x00', 0x0, 0x0, 'rmd320\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = accept4$alg(r3, 0x0, 0x0, 0x0) sendfile(r4, 0xffffffffffffffff, 0x0, 0x20000000001000) 18:06:47 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x80ffffff00000000}]}, 0x78) 18:06:47 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68}, [{0x0, 0x0, 0x0, 0x19}]}, 0x78) 18:06:47 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='personality\x00') r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000240)={0x26, 'hash\x00', 0x0, 0x0, 'rmd320\x00'}, 0x58) r4 = accept4(r3, 0x0, 0x0, 0x0) r5 = accept4$alg(r4, 0x0, 0x0, 0x0) sendfile(r5, r2, 0x0, 0x0) 18:06:47 executing program 0: syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="6653960d0ec5d684fa9f017ef0d60a3c27bc33760036001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479810be2aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e6517e615607676f8f9fc0ebf8b0b16d6f2c59957ab35d05692e664ebf68734ca53366295f4ad6142134b62f11e92ead037c7fb53455560c8ef0f1c94fafa924edfe92175aaa1c4ecc7aeeb72e0d050feacee907f40888c96a65545e07422bc6ac79f4c2d6ee3dab47d06e764682c72d7f16542fcfd05d2813cc182d1595016c179e1717c160300ab1ab0ac397e91bd193c036feb66a9ad2ec5b7967e7f5ff957f8b085a2437c5", 0xf7}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x19) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 18:06:47 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68}, [{0x0, 0x0, 0x0, 0x1a}]}, 0x78) 18:06:47 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x9b00000000000000}]}, 0x78) 18:06:47 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='personality\x00') r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000240)={0x26, 'hash\x00', 0x0, 0x0, 'rmd320\x00'}, 0x58) r4 = accept4(r3, 0x0, 0x0, 0x0) r5 = accept4$alg(r4, 0x0, 0x0, 0x0) sendfile(r5, r2, 0x0, 0x0) [ 924.638739] *** Guest State *** [ 924.642446] CR0: actual=0x0000000000000030, shadow=0x0000000060000010, gh_mask=fffffffffffffff7 [ 924.652185] CR4: actual=0x0000000000002040, shadow=0x0000000000000000, gh_mask=ffffffffffffe871 [ 924.662717] CR3 = 0x0000000000000000 [ 924.666544] RSP = 0x0000000000000000 RIP = 0x0000000000000231 [ 924.673174] RFLAGS=0x00000296 DR7 = 0x0000000000000400 [ 924.679281] Sysenter RSP=0000000000000000 CS:RIP=0000:0000000000000000 [ 924.686527] CS: sel=0x0000, attr=0x0009b, limit=0x0000ffff, base=0x0000000000000000 [ 924.695281] DS: sel=0x0000, attr=0x00093, limit=0x0000ffff, base=0x0000000000000000 [ 924.703578] SS: sel=0x0000, attr=0x00093, limit=0x0000ffff, base=0x0000000000000000 [ 924.712138] ES: sel=0x0000, attr=0x00093, limit=0x0000ffff, base=0x0000000000000000 [ 924.721590] FS: sel=0x0000, attr=0x00093, limit=0x0000ffff, base=0x0000000000000000 [ 924.729676] GS: sel=0x0000, attr=0x00093, limit=0x0000ffff, base=0x0000000000000000 [ 924.746774] GDTR: limit=0x0000ffff, base=0x0000000000000000 [ 924.755173] LDTR: sel=0x0000, attr=0x00082, limit=0x0000ffff, base=0x0000000000000000 [ 924.763792] IDTR: limit=0x0000ffff, base=0x0000000000000000 [ 924.772631] TR: sel=0x0000, attr=0x0008b, limit=0x0000ffff, base=0x0000000000000000 [ 924.781953] EFER = 0x0000000000000000 PAT = 0x0007040600070406 [ 924.789133] DebugCtl = 0x0000000000000000 DebugExceptions = 0x0000000000000000 [ 924.796890] Interruptibility = 00000001 ActivityState = 00000000 [ 924.803622] *** Host State *** [ 924.806921] RIP = 0xffffffff811affaf RSP = 0xffff8880544d78c0 [ 924.813224] CS=0010 SS=0018 DS=0000 ES=0000 FS=0000 GS=0000 TR=0040 [ 924.819681] FSBase=00007fd1a7bb0700 GSBase=ffff8880ae700000 TRBase=fffffe0000034000 [ 924.828201] GDTBase=fffffe0000032000 IDTBase=fffffe0000000000 [ 924.834780] CR0=0000000080050033 CR3=0000000095fe4000 CR4=00000000001426e0 [ 924.842373] Sysenter RSP=fffffe0000034000 CS:RIP=0010:ffffffff874013e0 [ 924.849084] EFER = 0x0000000000000d01 PAT = 0x0407050600070106 [ 924.856327] *** Control State *** [ 924.859840] PinBased=0000003f CPUBased=b5986dfa SecondaryExec=000000e2 [ 924.866755] EntryControls=0000d1ff ExitControls=002fefff [ 924.872697] ExceptionBitmap=00060042 PFECmask=00000000 PFECmatch=00000000 [ 924.879685] VMEntry: intr_info=80000202 errcode=00000000 ilen=00000000 [ 924.886821] VMExit: intr_info=00000000 errcode=00000000 ilen=00000003 [ 924.893703] reason=80000021 qualification=0000000000000003 [ 924.900100] IDTVectoring: info=00000000 errcode=00000000 [ 924.906244] TSC Offset = 0xfffffe0f4d404c77 [ 924.911094] EPT pointer = 0x00000000a098b01e [ 924.915527] Virtual processor ID = 0x0001 18:06:50 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r0, &(0x7f0000000040)=""/244, 0xf4) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x3d}, {0x0, 0x2a}, {0x0}, {&(0x7f0000000100)="6653960d0ec5d684fa9f017ef0d60a3c27bc33760036001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479810be2aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e6517e615607676f8f9fc0ebf8b0b16d6f2c59957ab35d05692e664ebf68734ca53366295f4ad6142134b62f11e92ead037c7fb53455560c8ef0f1c94fafa924edfe92175aaa1c4ecc7aeeb72e0d050feacee907f40888c96a65545e07422bc6ac79f4c2d6ee3dab47d06e764682c72d7f16542fcfd05d2813cc182d1595016c179e1717c160300ab1ab0ac397e91bd193c036feb66a9ad2ec5b7967e7f5ff957f8b085a2437c59a", 0xf8}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x19) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xffffffffffffffff, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 18:06:50 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68}, [{0x0, 0x0, 0x0, 0x1b}]}, 0x78) 18:06:50 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0xffff000000000000}]}, 0x78) 18:06:50 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='personality\x00') r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000240)={0x26, 'hash\x00', 0x0, 0x0, 'rmd320\x00'}, 0x58) r4 = accept4(r3, 0x0, 0x0, 0x0) r5 = accept4$alg(r4, 0x0, 0x0, 0x0) sendfile(r5, r2, 0x0, 0x0) 18:06:50 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000000000/0x1000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_RUN(r2, 0xae80, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r4 = syz_genetlink_get_family_id$nl80211(0x0) sendmsg$NL80211_CMD_GET_MPATH(r3, &(0x7f0000000180)={&(0x7f0000000000), 0xc, &(0x7f0000000140)={&(0x7f0000000080)={0x1c, r4, 0xf0a, 0x70bd2c, 0x0, {}, [@NL80211_ATTR_WIPHY={0x8, 0x1, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x14}, 0x4000000) 18:06:50 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68}, [{0x0, 0xffffff80}]}, 0x78) 18:06:50 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}]}, 0x78) 18:06:50 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68}, [{0x0, 0x0, 0x0, 0x1e}]}, 0x78) 18:06:50 executing program 0: getdents(0xffffffffffffffff, &(0x7f0000000040)=""/244, 0xf4) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="6653960d0ec5d684fa9f017ef0d60a3c27bc33760036001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479810be2aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e6517e615607676f8f9fc0ebf8b0b16d6f2c59957ab35d05692e664ebf68734ca53366295f4ad6142134b62f11e92ead037c7fb53455560c8ef0f1c94fafa924edfe92175aaa1c4ecc7aeeb72e0d050feacee907f40888c96a65545e07422bc6ac79f4c2d6ee3dab47d06e764682c72d7f16542fcfd05d2813cc182d1595016c179e1717c160300ab1ab0ac397e91bd193c036feb66a9ad2ec5b7967e7f5ff957f8b085a2437c5", 0xf7}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x19) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 18:06:50 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000000000/0x1000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_RUN(r2, 0xae80, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) r4 = syz_genetlink_get_family_id$nl80211(0x0) sendmsg$NL80211_CMD_GET_MPATH(r3, &(0x7f0000000180)={&(0x7f0000000000), 0xc, &(0x7f0000000140)={&(0x7f0000000080)={0x1c, r4, 0xf0a, 0x70bd2c, 0x4, {}, [@NL80211_ATTR_WIPHY={0x8, 0x1, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x14}, 0x4000000) 18:06:50 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68}, [{0x0, 0x0, 0x0, 0x3e}]}, 0x78) 18:06:50 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}]}, 0x78) [ 927.952730] *** Guest State *** [ 927.956236] CR0: actual=0x0000000000000030, shadow=0x0000000060000010, gh_mask=fffffffffffffff7 [ 927.965857] CR4: actual=0x0000000000002040, shadow=0x0000000000000000, gh_mask=ffffffffffffe871 [ 927.975381] CR3 = 0x0000000000000000 [ 927.979273] RSP = 0x0000000000000000 RIP = 0x0000000000000231 [ 927.985985] RFLAGS=0x00000296 DR7 = 0x0000000000000400 [ 927.992817] Sysenter RSP=0000000000000000 CS:RIP=0000:0000000000000000 [ 927.999773] CS: sel=0x0000, attr=0x0009b, limit=0x0000ffff, base=0x0000000000000000 [ 928.008744] DS: sel=0x0000, attr=0x00093, limit=0x0000ffff, base=0x0000000000000000 [ 928.017842] SS: sel=0x0000, attr=0x00093, limit=0x0000ffff, base=0x0000000000000000 [ 928.026802] ES: sel=0x0000, attr=0x00093, limit=0x0000ffff, base=0x0000000000000000 [ 928.035873] FS: sel=0x0000, attr=0x00093, limit=0x0000ffff, base=0x0000000000000000 [ 928.044856] GS: sel=0x0000, attr=0x00093, limit=0x0000ffff, base=0x0000000000000000 [ 928.053548] GDTR: limit=0x0000ffff, base=0x0000000000000000 [ 928.062904] LDTR: sel=0x0000, attr=0x00082, limit=0x0000ffff, base=0x0000000000000000 [ 928.072724] IDTR: limit=0x0000ffff, base=0x0000000000000000 [ 928.089262] TR: sel=0x0000, attr=0x0008b, limit=0x0000ffff, base=0x0000000000000000 [ 928.100735] EFER = 0x0000000000000000 PAT = 0x0007040600070406 [ 928.107793] DebugCtl = 0x0000000000000000 DebugExceptions = 0x0000000000000000 [ 928.117851] Interruptibility = 00000001 ActivityState = 00000000 [ 928.124830] *** Host State *** [ 928.128904] RIP = 0xffffffff811affaf RSP = 0xffff888051ecf8c0 [ 928.136375] CS=0010 SS=0018 DS=0000 ES=0000 FS=0000 GS=0000 TR=0040 [ 928.145142] FSBase=00007f2c48306700 GSBase=ffff8880ae600000 TRBase=fffffe0000003000 [ 928.153505] GDTBase=fffffe0000001000 IDTBase=fffffe0000000000 [ 928.159477] CR0=0000000080050033 CR3=00000000a8984000 CR4=00000000001426f0 [ 928.167244] Sysenter RSP=fffffe0000003000 CS:RIP=0010:ffffffff874013e0 [ 928.174277] EFER = 0x0000000000000d01 PAT = 0x0407050600070106 [ 928.181042] *** Control State *** [ 928.184579] PinBased=0000003f CPUBased=b5986dfa SecondaryExec=000000e2 [ 928.191567] EntryControls=0000d1ff ExitControls=002fefff [ 928.197103] ExceptionBitmap=00060042 PFECmask=00000000 PFECmatch=00000000 [ 928.204311] VMEntry: intr_info=80000202 errcode=00000000 ilen=00000000 [ 928.211296] VMExit: intr_info=00000000 errcode=00000000 ilen=00000003 [ 928.217986] reason=80000021 qualification=0000000000000003 [ 928.224982] IDTVectoring: info=00000000 errcode=00000000 [ 928.230739] TSC Offset = 0xfffffe0d8a9cab3f [ 928.235197] EPT pointer = 0x00000000a071901e [ 928.239743] Virtual processor ID = 0x0002 18:06:53 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r0, &(0x7f0000000040)=""/244, 0xf4) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x3d}, {0x0, 0x2a}, {0x0}, {&(0x7f0000000100)="6653960d0ec5d684fa9f017ef0d60a3c27bc33760036001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479810be2aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e6517e615607676f8f9fc0ebf8b0b16d6f2c59957ab35d05692e664ebf68734ca53366295f4ad6142134b62f11e92ead037c7fb53455560c8ef0f1c94fafa924edfe92175aaa1c4ecc7aeeb72e0d050feacee907f40888c96a65545e07422bc6ac79f4c2d6ee3dab47d06e764682c72d7f16542fcfd05d2813cc182d1595016c179e1717c160300ab1ab0ac397e91bd193c036feb66a9ad2ec5b7967e7f5ff957f8b085a2437c59a", 0xf8}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x19) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 18:06:53 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}]}, 0x78) 18:06:53 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68}, [{0x0, 0x0, 0x0, 0x9b}]}, 0x78) 18:06:53 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000000000/0x1000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_RUN(r2, 0xae80, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r4 = syz_genetlink_get_family_id$nl80211(0x0) sendmsg$NL80211_CMD_GET_MPATH(r3, &(0x7f0000000180)={&(0x7f0000000000), 0xc, &(0x7f0000000140)={&(0x7f0000000080)={0x1c, r4, 0xf0a, 0x70bd2c, 0x0, {}, [@NL80211_ATTR_WIPHY={0x8, 0x1, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x14}, 0x4000000) 18:06:53 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000000000/0x1000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_RUN(r2, 0xae80, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) r4 = syz_genetlink_get_family_id$nl80211(0x0) sendmsg$NL80211_CMD_GET_MPATH(r3, &(0x7f0000000180)={&(0x7f0000000000), 0xc, &(0x7f0000000140)={&(0x7f0000000080)={0x1c, r4, 0xf0a, 0x70bd2c, 0x4, {}, [@NL80211_ATTR_WIPHY={0x8, 0x1, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x14}, 0x4000000) 18:06:53 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68}, [{0x0, 0x0, 0x0, 0xf0}]}, 0x78) 18:06:53 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}]}, 0x78) 18:06:53 executing program 0: getdents(0xffffffffffffffff, &(0x7f0000000040)=""/244, 0xf4) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="6653960d0ec5d684fa9f017ef0d60a3c27bc33760036001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479810be2aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e6517e615607676f8f9fc0ebf8b0b16d6f2c59957ab35d05692e664ebf68734ca53366295f4ad6142134b62f11e92ead037c7fb53455560c8ef0f1c94fafa924edfe92175aaa1c4ecc7aeeb72e0d050feacee907f40888c96a65545e07422bc6ac79f4c2d6ee3dab47d06e764682c72d7f16542fcfd05d2813cc182d1595016c179e1717c160300ab1ab0ac397e91bd193c036feb66a9ad2ec5b7967e7f5ff957f8b085a2437c5", 0xf7}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x19) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 18:06:53 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa}]}, 0x78) 18:06:53 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68}, [{0x0, 0x0, 0x0, 0x180}]}, 0x78) 18:06:53 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68}, [{0x0, 0x0, 0x0, 0x3e8}]}, 0x78) 18:06:53 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc}]}, 0x78) 18:06:56 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r0, &(0x7f0000000040)=""/244, 0xf4) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x3d}, {0x0, 0x2a}, {0x0}, {&(0x7f0000000100)="6653960d0ec5d684fa9f017ef0d60a3c27bc33760036001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479810be2aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e6517e615607676f8f9fc0ebf8b0b16d6f2c59957ab35d05692e664ebf68734ca53366295f4ad6142134b62f11e92ead037c7fb53455560c8ef0f1c94fafa924edfe92175aaa1c4ecc7aeeb72e0d050feacee907f40888c96a65545e07422bc6ac79f4c2d6ee3dab47d06e764682c72d7f16542fcfd05d2813cc182d1595016c179e1717c160300ab1ab0ac397e91bd193c036feb66a9ad2ec5b7967e7f5ff957f8b085a2437c59a", 0xf8}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x19) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 18:06:56 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68}, [{0x0, 0x0, 0x0, 0x500}]}, 0x78) 18:06:56 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd}]}, 0x78) 18:06:56 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000000000/0x1000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_RUN(r2, 0xae80, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) r4 = syz_genetlink_get_family_id$nl80211(0x0) sendmsg$NL80211_CMD_GET_MPATH(r3, &(0x7f0000000180)={&(0x7f0000000000), 0xc, &(0x7f0000000140)={&(0x7f0000000080)={0x1c, r4, 0xf0a, 0x70bd2c, 0x4, {}, [@NL80211_ATTR_WIPHY={0x8, 0x1, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x14}, 0x4000000) 18:06:56 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000000000/0x1000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_RUN(r2, 0xae80, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000000), 0x0, 0x0) r4 = syz_genetlink_get_family_id$nl80211(0x0) sendmsg$NL80211_CMD_GET_MPATH(r3, &(0x7f0000000180)={&(0x7f0000000000), 0xc, &(0x7f0000000140)={&(0x7f0000000080)={0x1c, r4, 0xf0a, 0x70bd2c, 0x4, {}, [@NL80211_ATTR_WIPHY={0x8, 0x1, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x14}, 0x4000000) 18:06:56 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68}, [{0x0, 0x0, 0x0, 0x600}]}, 0x78) 18:06:56 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe}]}, 0x78) 18:06:56 executing program 0: getdents(0xffffffffffffffff, &(0x7f0000000040)=""/244, 0xf4) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="6653960d0ec5d684fa9f017ef0d60a3c27bc33760036001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479810be2aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e6517e615607676f8f9fc0ebf8b0b16d6f2c59957ab35d05692e664ebf68734ca53366295f4ad6142134b62f11e92ead037c7fb53455560c8ef0f1c94fafa924edfe92175aaa1c4ecc7aeeb72e0d050feacee907f40888c96a65545e07422bc6ac79f4c2d6ee3dab47d06e764682c72d7f16542fcfd05d2813cc182d1595016c179e1717c160300ab1ab0ac397e91bd193c036feb66a9ad2ec5b7967e7f5ff957f8b085a2437c5", 0xf7}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x19) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 18:06:56 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf}]}, 0x78) 18:06:56 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68}, [{0x0, 0x0, 0x0, 0x700}]}, 0x78) 18:06:56 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18}]}, 0x78) 18:06:56 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68}, [{0x0, 0x0, 0x0, 0x900}]}, 0x78) [ 934.108390] *** Guest State *** [ 934.111879] CR0: actual=0x0000000000000030, shadow=0x0000000060000010, gh_mask=fffffffffffffff7 [ 934.122041] CR4: actual=0x0000000000002040, shadow=0x0000000000000000, gh_mask=ffffffffffffe871 [ 934.131098] CR3 = 0x0000000000000000 [ 934.134898] RSP = 0x0000000000000000 RIP = 0x0000000000000231 [ 934.141211] RFLAGS=0x00000296 DR7 = 0x0000000000000400 [ 934.147273] Sysenter RSP=0000000000000000 CS:RIP=0000:0000000000000000 [ 934.154261] CS: sel=0x0000, attr=0x0009b, limit=0x0000ffff, base=0x0000000000000000 [ 934.167565] DS: sel=0x0000, attr=0x00093, limit=0x0000ffff, base=0x0000000000000000 [ 934.175637] SS: sel=0x0000, attr=0x00093, limit=0x0000ffff, base=0x0000000000000000 [ 934.190323] ES: sel=0x0000, attr=0x00093, limit=0x0000ffff, base=0x0000000000000000 [ 934.198773] FS: sel=0x0000, attr=0x00093, limit=0x0000ffff, base=0x0000000000000000 [ 934.208324] GS: sel=0x0000, attr=0x00093, limit=0x0000ffff, base=0x0000000000000000 [ 934.216818] GDTR: limit=0x0000ffff, base=0x0000000000000000 [ 934.225119] LDTR: sel=0x0000, attr=0x00082, limit=0x0000ffff, base=0x0000000000000000 [ 934.234282] IDTR: limit=0x0000ffff, base=0x0000000000000000 [ 934.242846] TR: sel=0x0000, attr=0x0008b, limit=0x0000ffff, base=0x0000000000000000 [ 934.252198] EFER = 0x0000000000000000 PAT = 0x0007040600070406 [ 934.258608] DebugCtl = 0x0000000000000000 DebugExceptions = 0x0000000000000000 [ 934.268378] Interruptibility = 00000001 ActivityState = 00000000 [ 934.275387] *** Host State *** [ 934.278587] RIP = 0xffffffff811affaf RSP = 0xffff888055d378c0 [ 934.285315] CS=0010 SS=0018 DS=0000 ES=0000 FS=0000 GS=0000 TR=0040 [ 934.292380] FSBase=00007f2c48306700 GSBase=ffff8880ae700000 TRBase=fffffe0000034000 [ 934.300752] GDTBase=fffffe0000032000 IDTBase=fffffe0000000000 [ 934.306648] CR0=0000000080050033 CR3=000000009f9d9000 CR4=00000000001426e0 [ 934.314579] Sysenter RSP=fffffe0000034000 CS:RIP=0010:ffffffff874013e0 [ 934.321887] EFER = 0x0000000000000d01 PAT = 0x0407050600070106 [ 934.327940] *** Control State *** [ 934.332263] PinBased=0000003f CPUBased=b5986dfa SecondaryExec=000000e2 [ 934.339264] EntryControls=0000d1ff ExitControls=002fefff [ 934.345887] ExceptionBitmap=00060042 PFECmask=00000000 PFECmatch=00000000 [ 934.353682] VMEntry: intr_info=80000202 errcode=00000000 ilen=00000000 [ 934.361395] VMExit: intr_info=00000000 errcode=00000000 ilen=00000003 [ 934.367989] reason=80000021 qualification=0000000000000003 [ 934.375206] IDTVectoring: info=00000000 errcode=00000000 [ 934.382047] TSC Offset = 0xfffffe0a68f9b5c1 [ 934.386370] EPT pointer = 0x000000009e1ba01e [ 934.392794] Virtual processor ID = 0x0001 18:06:59 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r0, &(0x7f0000000040)=""/244, 0xf4) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x3d}, {0x0, 0x2a}, {0x0}, {&(0x7f0000000100)="6653960d0ec5d684fa9f017ef0d60a3c27bc33760036001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479810be2aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e6517e615607676f8f9fc0ebf8b0b16d6f2c59957ab35d05692e664ebf68734ca53366295f4ad6142134b62f11e92ead037c7fb53455560c8ef0f1c94fafa924edfe92175aaa1c4ecc7aeeb72e0d050feacee907f40888c96a65545e07422bc6ac79f4c2d6ee3dab47d06e764682c72d7f16542fcfd05d2813cc182d1595016c179e1717c160300ab1ab0ac397e91bd193c036feb66a9ad2ec5b7967e7f5ff957f8b085a2437c59a", 0xf8}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x19) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 18:06:59 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1a}]}, 0x78) 18:06:59 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68}, [{0x0, 0x0, 0x0, 0xa00}]}, 0x78) 18:06:59 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000000000/0x1000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_RUN(r2, 0xae80, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000000), 0x0, 0x0) r4 = syz_genetlink_get_family_id$nl80211(0x0) sendmsg$NL80211_CMD_GET_MPATH(r3, &(0x7f0000000180)={&(0x7f0000000000), 0xc, &(0x7f0000000140)={&(0x7f0000000080)={0x1c, r4, 0xf0a, 0x70bd2c, 0x4, {}, [@NL80211_ATTR_WIPHY={0x8, 0x1, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x14}, 0x4000000) 18:06:59 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000000000/0x1000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_RUN(r2, 0xae80, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) r4 = syz_genetlink_get_family_id$nl80211(0x0) sendmsg$NL80211_CMD_GET_MPATH(r3, &(0x7f0000000180)={&(0x7f0000000000), 0xc, &(0x7f0000000140)={&(0x7f0000000080)={0x1c, r4, 0xf0a, 0x70bd2c, 0x4, {}, [@NL80211_ATTR_WIPHY={0x8, 0x1, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x14}, 0x4000000) 18:06:59 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68}, [{0x0, 0x0, 0x0, 0xc00}]}, 0x78) 18:06:59 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1b}]}, 0x78) 18:06:59 executing program 0: r0 = syz_open_procfs(0x0, 0x0) getdents(r0, &(0x7f0000000040)=""/244, 0xf4) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="6653960d0ec5d684fa9f017ef0d60a3c27bc33760036001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479810be2aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e6517e615607676f8f9fc0ebf8b0b16d6f2c59957ab35d05692e664ebf68734ca53366295f4ad6142134b62f11e92ead037c7fb53455560c8ef0f1c94fafa924edfe92175aaa1c4ecc7aeeb72e0d050feacee907f40888c96a65545e07422bc6ac79f4c2d6ee3dab47d06e764682c72d7f16542fcfd05d2813cc182d1595016c179e1717c160300ab1ab0ac397e91bd193c036feb66a9ad2ec5b7967e7f5ff957f8b085a2437c5", 0xf7}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x19) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 18:06:59 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68}, [{0x0, 0x0, 0x0, 0xd00}]}, 0x78) 18:06:59 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3e}]}, 0x78) 18:06:59 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68}, [{0x0, 0x0, 0x0, 0xe00}]}, 0x78) 18:06:59 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b}]}, 0x78) [ 937.168413] *** Guest State *** [ 937.186679] CR0: actual=0x0000000000000030, shadow=0x0000000060000010, gh_mask=fffffffffffffff7 [ 937.199420] CR4: actual=0x0000000000002040, shadow=0x0000000000000000, gh_mask=ffffffffffffe871 [ 937.209324] CR3 = 0x0000000000000000 [ 937.213931] RSP = 0x0000000000000000 RIP = 0x0000000000000231 [ 937.219969] RFLAGS=0x00000296 DR7 = 0x0000000000000400 [ 937.227454] Sysenter RSP=0000000000000000 CS:RIP=0000:0000000000000000 [ 937.234578] CS: sel=0x0000, attr=0x0009b, limit=0x0000ffff, base=0x0000000000000000 [ 937.242934] DS: sel=0x0000, attr=0x00093, limit=0x0000ffff, base=0x0000000000000000 [ 937.252185] SS: sel=0x0000, attr=0x00093, limit=0x0000ffff, base=0x0000000000000000 [ 937.260592] ES: sel=0x0000, attr=0x00093, limit=0x0000ffff, base=0x0000000000000000 [ 937.268663] FS: sel=0x0000, attr=0x00093, limit=0x0000ffff, base=0x0000000000000000 [ 937.277567] GS: sel=0x0000, attr=0x00093, limit=0x0000ffff, base=0x0000000000000000 [ 937.287068] GDTR: limit=0x0000ffff, base=0x0000000000000000 [ 937.295343] LDTR: sel=0x0000, attr=0x00082, limit=0x0000ffff, base=0x0000000000000000 [ 937.303964] IDTR: limit=0x0000ffff, base=0x0000000000000000 [ 937.312747] TR: sel=0x0000, attr=0x0008b, limit=0x0000ffff, base=0x0000000000000000 [ 937.321122] EFER = 0x0000000000000000 PAT = 0x0007040600070406 [ 937.327612] DebugCtl = 0x0000000000000000 DebugExceptions = 0x0000000000000000 [ 937.335369] Interruptibility = 00000001 ActivityState = 00000000 [ 937.341918] *** Host State *** [ 937.345129] RIP = 0xffffffff811affaf RSP = 0xffff888053f778c0 [ 937.351378] CS=0010 SS=0018 DS=0000 ES=0000 FS=0000 GS=0000 TR=0040 [ 937.357805] FSBase=00007f2c48306700 GSBase=ffff8880ae700000 TRBase=fffffe0000034000 [ 937.365886] GDTBase=fffffe0000032000 IDTBase=fffffe0000000000 [ 937.374889] CR0=0000000080050033 CR3=00000000a7fe9000 CR4=00000000001426e0 [ 937.382127] Sysenter RSP=fffffe0000034000 CS:RIP=0010:ffffffff874013e0 [ 937.388801] EFER = 0x0000000000000d01 PAT = 0x0407050600070106 [ 937.394956] *** Control State *** [ 937.398457] PinBased=0000003f CPUBased=b5986dfa SecondaryExec=000000e2 [ 937.405968] EntryControls=0000d1ff ExitControls=002fefff [ 937.412659] ExceptionBitmap=00060042 PFECmask=00000000 PFECmatch=00000000 [ 937.419600] VMEntry: intr_info=80000202 errcode=00000000 ilen=00000000 [ 937.426362] VMExit: intr_info=00000000 errcode=00000000 ilen=00000003 [ 937.433062] reason=80000021 qualification=0000000000000003 [ 937.439393] IDTVectoring: info=00000000 errcode=00000000 [ 937.444930] TSC Offset = 0xfffffe08c74b51f8 [ 937.449247] EPT pointer = 0x0000000089e5201e [ 937.453740] Virtual processor ID = 0x0001 18:07:02 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r0, &(0x7f0000000040)=""/244, 0xf4) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x3d}, {0x0, 0x2a}, {0x0}, {&(0x7f0000000100)="6653960d0ec5d684fa9f017ef0d60a3c27bc33760036001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479810be2aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e6517e615607676f8f9fc0ebf8b0b16d6f2c59957ab35d05692e664ebf68734ca53366295f4ad6142134b62f11e92ead037c7fb53455560c8ef0f1c94fafa924edfe92175aaa1c4ecc7aeeb72e0d050feacee907f40888c96a65545e07422bc6ac79f4c2d6ee3dab47d06e764682c72d7f16542fcfd05d2813cc182d1595016c179e1717c160300ab1ab0ac397e91bd193c036feb66a9ad2ec5b7967e7f5ff957f8b085a2437c59a", 0xf8}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x19) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, 0x0) ptrace$cont(0x9, r1, 0x0, 0x0) 18:07:02 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68}, [{0x0, 0x0, 0x0, 0xf00}]}, 0x78) 18:07:02 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf0}]}, 0x78) 18:07:02 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000000000/0x1000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_RUN(r2, 0xae80, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000000), 0x0, 0x0) r4 = syz_genetlink_get_family_id$nl80211(0x0) sendmsg$NL80211_CMD_GET_MPATH(r3, &(0x7f0000000180)={&(0x7f0000000000), 0xc, &(0x7f0000000140)={&(0x7f0000000080)={0x1c, r4, 0xf0a, 0x70bd2c, 0x4, {}, [@NL80211_ATTR_WIPHY={0x8, 0x1, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x14}, 0x4000000) 18:07:02 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000000000/0x1000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_RUN(r2, 0xae80, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff}) vmsplice(r3, 0x0, 0x0, 0x0) r4 = syz_genetlink_get_family_id$nl80211(0x0) sendmsg$NL80211_CMD_GET_MPATH(r3, &(0x7f0000000180)={&(0x7f0000000000), 0xc, &(0x7f0000000140)={&(0x7f0000000080)={0x1c, r4, 0xf0a, 0x70bd2c, 0x4, {}, [@NL80211_ATTR_WIPHY={0x8, 0x1, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x14}, 0x4000000) 18:07:02 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68}, [{0x0, 0x0, 0x0, 0x1800}]}, 0x78) 18:07:02 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x180}]}, 0x78) 18:07:02 executing program 0: r0 = syz_open_procfs(0x0, 0x0) getdents(r0, &(0x7f0000000040)=""/244, 0xf4) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="6653960d0ec5d684fa9f017ef0d60a3c27bc33760036001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479810be2aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e6517e615607676f8f9fc0ebf8b0b16d6f2c59957ab35d05692e664ebf68734ca53366295f4ad6142134b62f11e92ead037c7fb53455560c8ef0f1c94fafa924edfe92175aaa1c4ecc7aeeb72e0d050feacee907f40888c96a65545e07422bc6ac79f4c2d6ee3dab47d06e764682c72d7f16542fcfd05d2813cc182d1595016c179e1717c160300ab1ab0ac397e91bd193c036feb66a9ad2ec5b7967e7f5ff957f8b085a2437c5", 0xf7}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x19) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 18:07:02 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68}, [{0x0, 0x0, 0x0, 0x1900}]}, 0x78) 18:07:02 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x700}]}, 0x78) 18:07:02 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68}, [{0x0, 0x0, 0x0, 0x1a00}]}, 0x78) 18:07:02 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x900}]}, 0x78) [ 940.149328] *** Guest State *** [ 940.157214] CR0: actual=0x0000000000000030, shadow=0x0000000060000010, gh_mask=fffffffffffffff7 [ 940.167244] CR4: actual=0x0000000000002040, shadow=0x0000000000000000, gh_mask=ffffffffffffe871 [ 940.177205] CR3 = 0x0000000000000000 [ 940.184102] RSP = 0x0000000000000000 RIP = 0x0000000000000231 [ 940.191392] RFLAGS=0x00000293 DR7 = 0x0000000000000400 [ 940.197764] Sysenter RSP=0000000000000000 CS:RIP=0000:0000000000000000 [ 940.205236] CS: sel=0x0000, attr=0x0009b, limit=0x0000ffff, base=0x0000000000000000 [ 940.214123] DS: sel=0x0000, attr=0x00093, limit=0x0000ffff, base=0x0000000000000000 [ 940.223428] SS: sel=0x0000, attr=0x00093, limit=0x0000ffff, base=0x0000000000000000 [ 940.253866] ES: sel=0x0000, attr=0x00093, limit=0x0000ffff, base=0x0000000000000000 [ 940.270364] FS: sel=0x0000, attr=0x00093, limit=0x0000ffff, base=0x0000000000000000 [ 940.282048] GS: sel=0x0000, attr=0x00093, limit=0x0000ffff, base=0x0000000000000000 [ 940.291210] GDTR: limit=0x0000ffff, base=0x0000000000000000 [ 940.299425] LDTR: sel=0x0000, attr=0x00082, limit=0x0000ffff, base=0x0000000000000000 [ 940.308118] IDTR: limit=0x0000ffff, base=0x0000000000000000 [ 940.316577] TR: sel=0x0000, attr=0x0008b, limit=0x0000ffff, base=0x0000000000000000 [ 940.324826] EFER = 0x0000000000000000 PAT = 0x0007040600070406 [ 940.331447] DebugCtl = 0x0000000000000000 DebugExceptions = 0x0000000000000000 [ 940.339134] Interruptibility = 00000001 ActivityState = 00000000 [ 940.345488] *** Host State *** [ 940.348712] RIP = 0xffffffff811affaf RSP = 0xffff88809f9878c0 [ 940.354884] CS=0010 SS=0018 DS=0000 ES=0000 FS=0000 GS=0000 TR=0040 [ 940.361458] FSBase=00007f2c48306700 GSBase=ffff8880ae600000 TRBase=fffffe0000003000 [ 940.369327] GDTBase=fffffe0000001000 IDTBase=fffffe0000000000 [ 940.376864] CR0=0000000080050033 CR3=00000000a7d64000 CR4=00000000001426f0 [ 940.384045] Sysenter RSP=fffffe0000003000 CS:RIP=0010:ffffffff874013e0 [ 940.391003] EFER = 0x0000000000000d01 PAT = 0x0407050600070106 [ 940.397232] *** Control State *** [ 940.400836] PinBased=0000003f CPUBased=b5986dfa SecondaryExec=000000e2 [ 940.407559] EntryControls=0000d1ff ExitControls=002fefff [ 940.413139] ExceptionBitmap=00060042 PFECmask=00000000 PFECmatch=00000000 [ 940.420109] VMEntry: intr_info=80000202 errcode=00000000 ilen=00000000 [ 940.426960] VMExit: intr_info=00000000 errcode=00000000 ilen=00000003 [ 940.433681] reason=80000021 qualification=0000000000000003 [ 940.440066] IDTVectoring: info=00000000 errcode=00000000 [ 940.445695] TSC Offset = 0xfffffe071e058f51 [ 940.450047] EPT pointer = 0x000000009b02d01e [ 940.454560] Virtual processor ID = 0x0002 18:07:05 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r0, &(0x7f0000000040)=""/244, 0xf4) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x3d}, {0x0, 0x2a}, {0x0}, {&(0x7f0000000100)="6653960d0ec5d684fa9f017ef0d60a3c27bc33760036001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479810be2aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e6517e615607676f8f9fc0ebf8b0b16d6f2c59957ab35d05692e664ebf68734ca53366295f4ad6142134b62f11e92ead037c7fb53455560c8ef0f1c94fafa924edfe92175aaa1c4ecc7aeeb72e0d050feacee907f40888c96a65545e07422bc6ac79f4c2d6ee3dab47d06e764682c72d7f16542fcfd05d2813cc182d1595016c179e1717c160300ab1ab0ac397e91bd193c036feb66a9ad2ec5b7967e7f5ff957f8b085a2437c59a", 0xf8}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x19) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, 0x0) ptrace$cont(0x9, r1, 0x0, 0x0) 18:07:05 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa00}]}, 0x78) 18:07:05 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68}, [{0x0, 0x0, 0x0, 0x1b00}]}, 0x78) 18:07:05 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000000000/0x1000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_RUN(r2, 0xae80, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff}) vmsplice(r3, 0x0, 0x0, 0x0) r4 = syz_genetlink_get_family_id$nl80211(0x0) sendmsg$NL80211_CMD_GET_MPATH(r3, &(0x7f0000000180)={&(0x7f0000000000), 0xc, &(0x7f0000000140)={&(0x7f0000000080)={0x1c, r4, 0xf0a, 0x70bd2c, 0x4, {}, [@NL80211_ATTR_WIPHY={0x8, 0x1, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x14}, 0x4000000) 18:07:05 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000000000/0x1000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_RUN(r2, 0xae80, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff}) vmsplice(r3, 0x0, 0x0, 0x0) r4 = syz_genetlink_get_family_id$nl80211(0x0) sendmsg$NL80211_CMD_GET_MPATH(r3, &(0x7f0000000180)={&(0x7f0000000000), 0xc, &(0x7f0000000140)={&(0x7f0000000080)={0x1c, r4, 0xf0a, 0x70bd2c, 0x4, {}, [@NL80211_ATTR_WIPHY={0x8, 0x1, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x14}, 0x4000000) 18:07:05 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68}, [{0x0, 0x0, 0x0, 0x1e00}]}, 0x78) 18:07:05 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc00}]}, 0x78) 18:07:05 executing program 0: r0 = syz_open_procfs(0x0, 0x0) getdents(r0, &(0x7f0000000040)=""/244, 0xf4) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="6653960d0ec5d684fa9f017ef0d60a3c27bc33760036001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479810be2aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e6517e615607676f8f9fc0ebf8b0b16d6f2c59957ab35d05692e664ebf68734ca53366295f4ad6142134b62f11e92ead037c7fb53455560c8ef0f1c94fafa924edfe92175aaa1c4ecc7aeeb72e0d050feacee907f40888c96a65545e07422bc6ac79f4c2d6ee3dab47d06e764682c72d7f16542fcfd05d2813cc182d1595016c179e1717c160300ab1ab0ac397e91bd193c036feb66a9ad2ec5b7967e7f5ff957f8b085a2437c5", 0xf7}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x19) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 18:07:05 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68}, [{0x0, 0x0, 0x0, 0x3e00}]}, 0x78) 18:07:05 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd00}]}, 0x78) 18:07:05 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68}, [{0x0, 0x0, 0x0, 0x3f00}]}, 0x78) 18:07:05 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe00}]}, 0x78) [ 943.200746] *** Guest State *** [ 943.204714] CR0: actual=0x0000000000000030, shadow=0x0000000060000010, gh_mask=fffffffffffffff7 [ 943.221756] CR4: actual=0x0000000000002040, shadow=0x0000000000000000, gh_mask=ffffffffffffe871 [ 943.231661] CR3 = 0x0000000000000000 [ 943.235749] RSP = 0x0000000000000000 RIP = 0x0000000000000231 [ 943.244006] RFLAGS=0x00000296 DR7 = 0x0000000000000400 [ 943.251065] Sysenter RSP=0000000000000000 CS:RIP=0000:0000000000000000 [ 943.258180] CS: sel=0x0000, attr=0x0009b, limit=0x0000ffff, base=0x0000000000000000 [ 943.268055] DS: sel=0x0000, attr=0x00093, limit=0x0000ffff, base=0x0000000000000000 [ 943.284629] SS: sel=0x0000, attr=0x00093, limit=0x0000ffff, base=0x0000000000000000 [ 943.304058] ES: sel=0x0000, attr=0x00093, limit=0x0000ffff, base=0x0000000000000000 [ 943.321900] FS: sel=0x0000, attr=0x00093, limit=0x0000ffff, base=0x0000000000000000 [ 943.340098] GS: sel=0x0000, attr=0x00093, limit=0x0000ffff, base=0x0000000000000000 [ 943.371723] GDTR: limit=0x0000ffff, base=0x0000000000000000 [ 943.381223] LDTR: sel=0x0000, attr=0x00082, limit=0x0000ffff, base=0x0000000000000000 [ 943.389399] IDTR: limit=0x0000ffff, base=0x0000000000000000 [ 943.399391] TR: sel=0x0000, attr=0x0008b, limit=0x0000ffff, base=0x0000000000000000 [ 943.407942] EFER = 0x0000000000000000 PAT = 0x0007040600070406 [ 943.414901] DebugCtl = 0x0000000000000000 DebugExceptions = 0x0000000000000000 [ 943.423069] Interruptibility = 00000001 ActivityState = 00000000 [ 943.429338] *** Host State *** [ 943.433369] RIP = 0xffffffff811affaf RSP = 0xffff888053c978c0 [ 943.439389] CS=0010 SS=0018 DS=0000 ES=0000 FS=0000 GS=0000 TR=0040 [ 943.446615] FSBase=00007f2c48306700 GSBase=ffff8880ae600000 TRBase=fffffe0000003000 [ 943.454997] GDTBase=fffffe0000001000 IDTBase=fffffe0000000000 [ 943.461738] CR0=0000000080050033 CR3=0000000095c33000 CR4=00000000001426f0 [ 943.475324] Sysenter RSP=fffffe0000003000 CS:RIP=0010:ffffffff874013e0 [ 943.482762] EFER = 0x0000000000000d01 PAT = 0x0407050600070106 [ 943.488858] *** Control State *** [ 943.493214] PinBased=0000003f CPUBased=b5986dfa SecondaryExec=000000e2 [ 943.499934] EntryControls=0000d1ff ExitControls=002fefff [ 943.506263] ExceptionBitmap=00060042 PFECmask=00000000 PFECmatch=00000000 [ 943.513865] VMEntry: intr_info=80000202 errcode=00000000 ilen=00000000 [ 943.521198] VMExit: intr_info=00000000 errcode=00000000 ilen=00000003 [ 943.527835] reason=80000021 qualification=0000000000000003 [ 943.535089] IDTVectoring: info=00000000 errcode=00000000 [ 943.541216] TSC Offset = 0xfffffe057d7868c6 [ 943.545957] EPT pointer = 0x000000009ffb301e [ 943.551566] Virtual processor ID = 0x0002 18:07:08 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r0, &(0x7f0000000040)=""/244, 0xf4) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x3d}, {0x0, 0x2a}, {0x0}, {&(0x7f0000000100)="6653960d0ec5d684fa9f017ef0d60a3c27bc33760036001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479810be2aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e6517e615607676f8f9fc0ebf8b0b16d6f2c59957ab35d05692e664ebf68734ca53366295f4ad6142134b62f11e92ead037c7fb53455560c8ef0f1c94fafa924edfe92175aaa1c4ecc7aeeb72e0d050feacee907f40888c96a65545e07422bc6ac79f4c2d6ee3dab47d06e764682c72d7f16542fcfd05d2813cc182d1595016c179e1717c160300ab1ab0ac397e91bd193c036feb66a9ad2ec5b7967e7f5ff957f8b085a2437c59a", 0xf8}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x19) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, 0x0) ptrace$cont(0x9, r1, 0x0, 0x0) 18:07:08 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68}, [{0x0, 0x0, 0x0, 0x7f00}]}, 0x78) 18:07:08 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf00}]}, 0x78) 18:07:08 executing program 4: getdents(0xffffffffffffffff, &(0x7f0000000040)=""/244, 0xf4) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x3d}, {0x0, 0x2a}, {0x0}, {&(0x7f0000000100)="6653960d0ec5d684fa9f017ef0d60a3c27bc33760036001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479810be2aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e6517e615607676f8f9fc0ebf8b0b16d6f2c59957ab35d05692e664ebf68734ca53366295f4ad6142134b62f11e92ead037c7fb53455560c8ef0f1c94fafa924edfe92175aaa1c4ecc7aeeb72e0d050feacee907f40888c96a65545e07422bc6ac79f4c2d6ee3dab47d06e764682c72d7f16542fcfd05d2813cc182d1595016c179e1717c160300ab1ab0ac397e91bd193c036feb66a9ad2ec5b7967e7f5ff957f8b085a2437c59a", 0xf8}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x19) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 18:07:08 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68}, [{0x1b000000}]}, 0x78) 18:07:08 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63}, [{0x0, 0x0, 0xffffff80}]}, 0x78) 18:07:08 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68}, [{0x0, 0x0, 0x0, 0x9b00}]}, 0x78) 18:07:08 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1800}]}, 0x78) 18:07:08 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_SETSEL(r0, 0x541c, &(0x7f0000000040)={0x2, {0x3, 0x3, 0x0, 0x400}}) 18:07:08 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68}, [{0x0, 0x0, 0x0, 0xe803}]}, 0x78) 18:07:08 executing program 0: syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(0xffffffffffffffff, &(0x7f0000000040)=""/244, 0xf4) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="6653960d0ec5d684fa9f017ef0d60a3c27bc33760036001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479810be2aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e6517e615607676f8f9fc0ebf8b0b16d6f2c59957ab35d05692e664ebf68734ca53366295f4ad6142134b62f11e92ead037c7fb53455560c8ef0f1c94fafa924edfe92175aaa1c4ecc7aeeb72e0d050feacee907f40888c96a65545e07422bc6ac79f4c2d6ee3dab47d06e764682c72d7f16542fcfd05d2813cc182d1595016c179e1717c160300ab1ab0ac397e91bd193c036feb66a9ad2ec5b7967e7f5ff957f8b085a2437c5", 0xf7}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x19) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 18:07:08 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68}, [{0x0, 0x0, 0x0, 0xf000}]}, 0x78) 18:07:11 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r0, &(0x7f0000000040)=""/244, 0xf4) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x3d}, {0x0, 0x2a}, {0x0}, {&(0x7f0000000100)="6653960d0ec5d684fa9f017ef0d60a3c27bc33760036001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479810be2aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e6517e615607676f8f9fc0ebf8b0b16d6f2c59957ab35d05692e664ebf68734ca53366295f4ad6142134b62f11e92ead037c7fb53455560c8ef0f1c94fafa924edfe92175aaa1c4ecc7aeeb72e0d050feacee907f40888c96a65545e07422bc6ac79f4c2d6ee3dab47d06e764682c72d7f16542fcfd05d2813cc182d1595016c179e1717c160300ab1ab0ac397e91bd193c036feb66a9ad2ec5b7967e7f5ff957f8b085a2437c59a", 0xf8}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x19) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0xffffffffffffffff, r1, 0x0, 0x0) 18:07:11 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1a00}]}, 0x78) 18:07:11 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63}, [{0x0, 0x0, 0xc}]}, 0x78) 18:07:11 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68}, [{0x0, 0x0, 0x0, 0xf00000}]}, 0x78) 18:07:11 executing program 4: getdents(0xffffffffffffffff, &(0x7f0000000040)=""/244, 0xf4) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x3d}, {0x0, 0x2a}, {0x0}, {&(0x7f0000000100)="6653960d0ec5d684fa9f017ef0d60a3c27bc33760036001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479810be2aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e6517e615607676f8f9fc0ebf8b0b16d6f2c59957ab35d05692e664ebf68734ca53366295f4ad6142134b62f11e92ead037c7fb53455560c8ef0f1c94fafa924edfe92175aaa1c4ecc7aeeb72e0d050feacee907f40888c96a65545e07422bc6ac79f4c2d6ee3dab47d06e764682c72d7f16542fcfd05d2813cc182d1595016c179e1717c160300ab1ab0ac397e91bd193c036feb66a9ad2ec5b7967e7f5ff957f8b085a2437c59a", 0xf8}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x19) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 18:07:11 executing program 2: clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) dup(r0) rt_sigtimedwait(&(0x7f0000000200)={[0x7]}, &(0x7f0000000380), 0x0, 0x8) r1 = memfd_create(&(0x7f0000000440)='systemem0md5sum$\x00', 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r1, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0x0, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000)) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000280)='net/route\x00') 18:07:11 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68}, [{0x0, 0x0, 0x0, 0x1000000}]}, 0x78) 18:07:11 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1b00}]}, 0x78) 18:07:11 executing program 2: clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) dup(r0) rt_sigtimedwait(&(0x7f0000000200)={[0x7]}, &(0x7f0000000380), 0x0, 0x8) r1 = memfd_create(&(0x7f0000000440)='systemem0md5sum$\x00', 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r1, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0x0, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000)) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000280)='net/route\x00') 18:07:11 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68}, [{0x0, 0x0, 0x0, 0x1800000}]}, 0x78) 18:07:11 executing program 0: syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(0xffffffffffffffff, &(0x7f0000000040)=""/244, 0xf4) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="6653960d0ec5d684fa9f017ef0d60a3c27bc33760036001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479810be2aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e6517e615607676f8f9fc0ebf8b0b16d6f2c59957ab35d05692e664ebf68734ca53366295f4ad6142134b62f11e92ead037c7fb53455560c8ef0f1c94fafa924edfe92175aaa1c4ecc7aeeb72e0d050feacee907f40888c96a65545e07422bc6ac79f4c2d6ee3dab47d06e764682c72d7f16542fcfd05d2813cc182d1595016c179e1717c160300ab1ab0ac397e91bd193c036feb66a9ad2ec5b7967e7f5ff957f8b085a2437c5", 0xf7}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x19) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 18:07:11 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3e00}]}, 0x78) 18:07:14 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r0, &(0x7f0000000040)=""/244, 0xf4) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x3d}, {0x0, 0x2a}, {0x0}, {&(0x7f0000000100)="6653960d0ec5d684fa9f017ef0d60a3c27bc33760036001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479810be2aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e6517e615607676f8f9fc0ebf8b0b16d6f2c59957ab35d05692e664ebf68734ca53366295f4ad6142134b62f11e92ead037c7fb53455560c8ef0f1c94fafa924edfe92175aaa1c4ecc7aeeb72e0d050feacee907f40888c96a65545e07422bc6ac79f4c2d6ee3dab47d06e764682c72d7f16542fcfd05d2813cc182d1595016c179e1717c160300ab1ab0ac397e91bd193c036feb66a9ad2ec5b7967e7f5ff957f8b085a2437c59a", 0xf8}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x19) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0xffffffffffffffff, r1, 0x0, 0x0) 18:07:14 executing program 2: clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) dup(r0) rt_sigtimedwait(&(0x7f0000000200)={[0x7]}, &(0x7f0000000380), 0x0, 0x8) r1 = memfd_create(&(0x7f0000000440)='systemem0md5sum$\x00', 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r1, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0x0, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000)) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000280)='net/route\x00') 18:07:14 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68}, [{0x0, 0x0, 0x0, 0x2000000}]}, 0x78) 18:07:14 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f00}]}, 0x78) 18:07:14 executing program 4: getdents(0xffffffffffffffff, &(0x7f0000000040)=""/244, 0xf4) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x3d}, {0x0, 0x2a}, {0x0}, {&(0x7f0000000100)="6653960d0ec5d684fa9f017ef0d60a3c27bc33760036001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479810be2aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e6517e615607676f8f9fc0ebf8b0b16d6f2c59957ab35d05692e664ebf68734ca53366295f4ad6142134b62f11e92ead037c7fb53455560c8ef0f1c94fafa924edfe92175aaa1c4ecc7aeeb72e0d050feacee907f40888c96a65545e07422bc6ac79f4c2d6ee3dab47d06e764682c72d7f16542fcfd05d2813cc182d1595016c179e1717c160300ab1ab0ac397e91bd193c036feb66a9ad2ec5b7967e7f5ff957f8b085a2437c59a", 0xf8}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x19) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 18:07:14 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b00}]}, 0x78) 18:07:14 executing program 2: clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) dup(r0) rt_sigtimedwait(&(0x7f0000000200)={[0x7]}, &(0x7f0000000380), 0x0, 0x8) r1 = memfd_create(&(0x7f0000000440)='systemem0md5sum$\x00', 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r1, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0x0, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000)) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000280)='net/route\x00') 18:07:14 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68}, [{0x0, 0x0, 0x0, 0x5000000}]}, 0x78) 18:07:14 executing program 2: clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) dup(r0) rt_sigtimedwait(&(0x7f0000000200)={[0x7]}, &(0x7f0000000380), 0x0, 0x8) r1 = memfd_create(&(0x7f0000000440)='systemem0md5sum$\x00', 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r1, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0x0, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000)) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000280)='net/route\x00') 18:07:14 executing program 2: clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) dup(r0) rt_sigtimedwait(&(0x7f0000000200)={[0x7]}, &(0x7f0000000380), 0x0, 0x8) r1 = memfd_create(&(0x7f0000000440)='systemem0md5sum$\x00', 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r1, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0x0, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000)) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000280)='net/route\x00') 18:07:14 executing program 0: syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(0xffffffffffffffff, &(0x7f0000000040)=""/244, 0xf4) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="6653960d0ec5d684fa9f017ef0d60a3c27bc33760036001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479810be2aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e6517e615607676f8f9fc0ebf8b0b16d6f2c59957ab35d05692e664ebf68734ca53366295f4ad6142134b62f11e92ead037c7fb53455560c8ef0f1c94fafa924edfe92175aaa1c4ecc7aeeb72e0d050feacee907f40888c96a65545e07422bc6ac79f4c2d6ee3dab47d06e764682c72d7f16542fcfd05d2813cc182d1595016c179e1717c160300ab1ab0ac397e91bd193c036feb66a9ad2ec5b7967e7f5ff957f8b085a2437c5", 0xf7}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x19) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 18:07:14 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf000}]}, 0x78) 18:07:17 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r0, &(0x7f0000000040)=""/244, 0xf4) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x3d}, {0x0, 0x2a}, {0x0}, {&(0x7f0000000100)="6653960d0ec5d684fa9f017ef0d60a3c27bc33760036001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479810be2aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e6517e615607676f8f9fc0ebf8b0b16d6f2c59957ab35d05692e664ebf68734ca53366295f4ad6142134b62f11e92ead037c7fb53455560c8ef0f1c94fafa924edfe92175aaa1c4ecc7aeeb72e0d050feacee907f40888c96a65545e07422bc6ac79f4c2d6ee3dab47d06e764682c72d7f16542fcfd05d2813cc182d1595016c179e1717c160300ab1ab0ac397e91bd193c036feb66a9ad2ec5b7967e7f5ff957f8b085a2437c59a", 0xf8}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x19) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0xffffffffffffffff, r1, 0x0, 0x0) 18:07:17 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68}, [{0x0, 0x0, 0x0, 0x6000000}]}, 0x78) 18:07:17 executing program 2: clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) dup(r0) rt_sigtimedwait(&(0x7f0000000200)={[0x7]}, &(0x7f0000000380), 0x0, 0x8) r1 = memfd_create(&(0x7f0000000440)='systemem0md5sum$\x00', 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r1, 0x0) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000280)='net/route\x00') 18:07:17 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf00000}]}, 0x78) 18:07:17 executing program 4: getdents(0xffffffffffffffff, &(0x7f0000000040)=""/244, 0xf4) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x3d}, {0x0, 0x2a}, {0x0}, {&(0x7f0000000100)="6653960d0ec5d684fa9f017ef0d60a3c27bc33760036001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479810be2aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e6517e615607676f8f9fc0ebf8b0b16d6f2c59957ab35d05692e664ebf68734ca53366295f4ad6142134b62f11e92ead037c7fb53455560c8ef0f1c94fafa924edfe92175aaa1c4ecc7aeeb72e0d050feacee907f40888c96a65545e07422bc6ac79f4c2d6ee3dab47d06e764682c72d7f16542fcfd05d2813cc182d1595016c179e1717c160300ab1ab0ac397e91bd193c036feb66a9ad2ec5b7967e7f5ff957f8b085a2437c59a", 0xf8}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x19) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$cont(0x9, r0, 0x0, 0x0) 18:07:17 executing program 2: clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) dup(r0) rt_sigtimedwait(&(0x7f0000000200)={[0x7]}, &(0x7f0000000380), 0x0, 0x8) r1 = memfd_create(&(0x7f0000000440)='systemem0md5sum$\x00', 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r1, 0x0) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000280)='net/route\x00') 18:07:17 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000}]}, 0x78) 18:07:17 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68}, [{0x0, 0x0, 0x0, 0x7000000}]}, 0x78) 18:07:17 executing program 2: clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) dup(r0) rt_sigtimedwait(&(0x7f0000000200)={[0x7]}, &(0x7f0000000380), 0x0, 0x8) r1 = memfd_create(&(0x7f0000000440)='systemem0md5sum$\x00', 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r1, 0x0) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000280)='net/route\x00') 18:07:17 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1800000}]}, 0x78) 18:07:17 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r0, 0x0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="6653960d0ec5d684fa9f017ef0d60a3c27bc33760036001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479810be2aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e6517e615607676f8f9fc0ebf8b0b16d6f2c59957ab35d05692e664ebf68734ca53366295f4ad6142134b62f11e92ead037c7fb53455560c8ef0f1c94fafa924edfe92175aaa1c4ecc7aeeb72e0d050feacee907f40888c96a65545e07422bc6ac79f4c2d6ee3dab47d06e764682c72d7f16542fcfd05d2813cc182d1595016c179e1717c160300ab1ab0ac397e91bd193c036feb66a9ad2ec5b7967e7f5ff957f8b085a2437c5", 0xf7}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x19) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 18:07:17 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68}, [{0x0, 0x0, 0x0, 0x8000000}]}, 0x78) 18:07:20 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r0, &(0x7f0000000040)=""/244, 0xf4) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x3d}, {0x0, 0x2a}, {0x0}, {&(0x7f0000000100)="6653960d0ec5d684fa9f017ef0d60a3c27bc33760036001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479810be2aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e6517e615607676f8f9fc0ebf8b0b16d6f2c59957ab35d05692e664ebf68734ca53366295f4ad6142134b62f11e92ead037c7fb53455560c8ef0f1c94fafa924edfe92175aaa1c4ecc7aeeb72e0d050feacee907f40888c96a65545e07422bc6ac79f4c2d6ee3dab47d06e764682c72d7f16542fcfd05d2813cc182d1595016c179e1717c160300ab1ab0ac397e91bd193c036feb66a9ad2ec5b7967e7f5ff957f8b085a2437c59a", 0xf8}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x19) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, 0x0, 0x0, 0x0) 18:07:20 executing program 2: clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) dup(r0) rt_sigtimedwait(&(0x7f0000000200)={[0x7]}, &(0x7f0000000380), 0x0, 0x8) memfd_create(&(0x7f0000000440)='systemem0md5sum$\x00', 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0x0, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000)) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000280)='net/route\x00') 18:07:20 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000}]}, 0x78) 18:07:20 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68}, [{0x0, 0x0, 0x0, 0x9000000}]}, 0x78) 18:07:20 executing program 4: getdents(0xffffffffffffffff, &(0x7f0000000040)=""/244, 0xf4) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x3d}, {0x0, 0x2a}, {0x0}, {&(0x7f0000000100)="6653960d0ec5d684fa9f017ef0d60a3c27bc33760036001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479810be2aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e6517e615607676f8f9fc0ebf8b0b16d6f2c59957ab35d05692e664ebf68734ca53366295f4ad6142134b62f11e92ead037c7fb53455560c8ef0f1c94fafa924edfe92175aaa1c4ecc7aeeb72e0d050feacee907f40888c96a65545e07422bc6ac79f4c2d6ee3dab47d06e764682c72d7f16542fcfd05d2813cc182d1595016c179e1717c160300ab1ab0ac397e91bd193c036feb66a9ad2ec5b7967e7f5ff957f8b085a2437c59a", 0xf8}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x19) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$cont(0x9, r0, 0x0, 0x0) 18:07:20 executing program 2: clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) dup(r0) rt_sigtimedwait(&(0x7f0000000200)={[0x7]}, &(0x7f0000000380), 0x0, 0x8) memfd_create(&(0x7f0000000440)='systemem0md5sum$\x00', 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0x0, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000)) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000280)='net/route\x00') 18:07:20 executing program 2: clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) dup(r0) rt_sigtimedwait(&(0x7f0000000200)={[0x7]}, &(0x7f0000000380), 0x0, 0x8) memfd_create(&(0x7f0000000440)='systemem0md5sum$\x00', 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0x0, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000)) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000280)='net/route\x00') 18:07:20 executing program 2: clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) dup(r0) rt_sigtimedwait(&(0x7f0000000200)={[0x7]}, &(0x7f0000000380), 0x0, 0x8) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, 0xffffffffffffffff, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0x0, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000)) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000280)='net/route\x00') 18:07:20 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7000000}]}, 0x78) 18:07:20 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68}, [{0x0, 0x0, 0x0, 0xa000000}]}, 0x78) 18:07:20 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68}, [{0x0, 0x0, 0x0, 0xc000000}]}, 0x78) 18:07:20 executing program 2: clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) dup(r0) rt_sigtimedwait(&(0x7f0000000200)={[0x7]}, &(0x7f0000000380), 0x0, 0x8) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, 0xffffffffffffffff, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0x0, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000)) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000280)='net/route\x00') 18:07:23 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r0, &(0x7f0000000040)=""/244, 0xf4) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x3d}, {0x0, 0x2a}, {0x0}, {&(0x7f0000000100)="6653960d0ec5d684fa9f017ef0d60a3c27bc33760036001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479810be2aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e6517e615607676f8f9fc0ebf8b0b16d6f2c59957ab35d05692e664ebf68734ca53366295f4ad6142134b62f11e92ead037c7fb53455560c8ef0f1c94fafa924edfe92175aaa1c4ecc7aeeb72e0d050feacee907f40888c96a65545e07422bc6ac79f4c2d6ee3dab47d06e764682c72d7f16542fcfd05d2813cc182d1595016c179e1717c160300ab1ab0ac397e91bd193c036feb66a9ad2ec5b7967e7f5ff957f8b085a2437c59a", 0xf8}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x19) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, 0x0, 0x0, 0x0) 18:07:23 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r0, 0x0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="6653960d0ec5d684fa9f017ef0d60a3c27bc33760036001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479810be2aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e6517e615607676f8f9fc0ebf8b0b16d6f2c59957ab35d05692e664ebf68734ca53366295f4ad6142134b62f11e92ead037c7fb53455560c8ef0f1c94fafa924edfe92175aaa1c4ecc7aeeb72e0d050feacee907f40888c96a65545e07422bc6ac79f4c2d6ee3dab47d06e764682c72d7f16542fcfd05d2813cc182d1595016c179e1717c160300ab1ab0ac397e91bd193c036feb66a9ad2ec5b7967e7f5ff957f8b085a2437c5", 0xf7}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x19) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 18:07:23 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000}]}, 0x78) 18:07:23 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68}, [{0x0, 0x0, 0x0, 0xd000000}]}, 0x78) 18:07:23 executing program 2: clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) dup(r0) rt_sigtimedwait(&(0x7f0000000200)={[0x7]}, &(0x7f0000000380), 0x0, 0x8) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, 0xffffffffffffffff, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0x0, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000)) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000280)='net/route\x00') 18:07:23 executing program 4: getdents(0xffffffffffffffff, &(0x7f0000000040)=""/244, 0xf4) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x3d}, {0x0, 0x2a}, {0x0}, {&(0x7f0000000100)="6653960d0ec5d684fa9f017ef0d60a3c27bc33760036001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479810be2aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e6517e615607676f8f9fc0ebf8b0b16d6f2c59957ab35d05692e664ebf68734ca53366295f4ad6142134b62f11e92ead037c7fb53455560c8ef0f1c94fafa924edfe92175aaa1c4ecc7aeeb72e0d050feacee907f40888c96a65545e07422bc6ac79f4c2d6ee3dab47d06e764682c72d7f16542fcfd05d2813cc182d1595016c179e1717c160300ab1ab0ac397e91bd193c036feb66a9ad2ec5b7967e7f5ff957f8b085a2437c59a", 0xf8}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x19) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$cont(0x9, r0, 0x0, 0x0) 18:07:23 executing program 2: clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) dup(r0) r1 = memfd_create(&(0x7f0000000440)='systemem0md5sum$\x00', 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r1, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0x0, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000)) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000280)='net/route\x00') 18:07:23 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9000000}]}, 0x78) 18:07:23 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68}, [{0x0, 0x0, 0x0, 0xe000000}]}, 0x78) 18:07:23 executing program 2: clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) dup(r0) r1 = memfd_create(&(0x7f0000000440)='systemem0md5sum$\x00', 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r1, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0x0, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000)) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000280)='net/route\x00') 18:07:23 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa000000}]}, 0x78) 18:07:23 executing program 2: clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) dup(r0) r1 = memfd_create(&(0x7f0000000440)='systemem0md5sum$\x00', 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r1, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0x0, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000)) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000280)='net/route\x00') 18:07:26 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r0, &(0x7f0000000040)=""/244, 0xf4) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x3d}, {0x0, 0x2a}, {0x0}, {&(0x7f0000000100)="6653960d0ec5d684fa9f017ef0d60a3c27bc33760036001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479810be2aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e6517e615607676f8f9fc0ebf8b0b16d6f2c59957ab35d05692e664ebf68734ca53366295f4ad6142134b62f11e92ead037c7fb53455560c8ef0f1c94fafa924edfe92175aaa1c4ecc7aeeb72e0d050feacee907f40888c96a65545e07422bc6ac79f4c2d6ee3dab47d06e764682c72d7f16542fcfd05d2813cc182d1595016c179e1717c160300ab1ab0ac397e91bd193c036feb66a9ad2ec5b7967e7f5ff957f8b085a2437c59a", 0xf8}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x19) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, 0x0, 0x0, 0x0) 18:07:26 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68}, [{0x0, 0x0, 0x0, 0xf000000}]}, 0x78) 18:07:26 executing program 2: clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$inet_udplite(0x2, 0x2, 0x88) rt_sigtimedwait(&(0x7f0000000200)={[0x7]}, &(0x7f0000000380), 0x0, 0x8) r0 = memfd_create(&(0x7f0000000440)='systemem0md5sum$\x00', 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r0, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0x0, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000)) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000280)='net/route\x00') 18:07:26 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000000}]}, 0x78) 18:07:26 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r0, 0x0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="6653960d0ec5d684fa9f017ef0d60a3c27bc33760036001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479810be2aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e6517e615607676f8f9fc0ebf8b0b16d6f2c59957ab35d05692e664ebf68734ca53366295f4ad6142134b62f11e92ead037c7fb53455560c8ef0f1c94fafa924edfe92175aaa1c4ecc7aeeb72e0d050feacee907f40888c96a65545e07422bc6ac79f4c2d6ee3dab47d06e764682c72d7f16542fcfd05d2813cc182d1595016c179e1717c160300ab1ab0ac397e91bd193c036feb66a9ad2ec5b7967e7f5ff957f8b085a2437c5", 0xf7}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x19) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 18:07:26 executing program 4: getdents(0xffffffffffffffff, &(0x7f0000000040)=""/244, 0xf4) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x3d}, {0x0, 0x2a}, {0x0}, {&(0x7f0000000100)="6653960d0ec5d684fa9f017ef0d60a3c27bc33760036001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479810be2aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e6517e615607676f8f9fc0ebf8b0b16d6f2c59957ab35d05692e664ebf68734ca53366295f4ad6142134b62f11e92ead037c7fb53455560c8ef0f1c94fafa924edfe92175aaa1c4ecc7aeeb72e0d050feacee907f40888c96a65545e07422bc6ac79f4c2d6ee3dab47d06e764682c72d7f16542fcfd05d2813cc182d1595016c179e1717c160300ab1ab0ac397e91bd193c036feb66a9ad2ec5b7967e7f5ff957f8b085a2437c59a", 0xf8}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x19) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 18:07:26 executing program 2: clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000200)={[0x7]}, &(0x7f0000000380), 0x0, 0x8) r0 = memfd_create(&(0x7f0000000440)='systemem0md5sum$\x00', 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r0, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0x0, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000)) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000280)='net/route\x00') 18:07:26 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd000000}]}, 0x78) 18:07:26 executing program 4: getdents(0xffffffffffffffff, &(0x7f0000000040)=""/244, 0xf4) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x3d}, {0x0, 0x2a}, {0x0}, {&(0x7f0000000100)="6653960d0ec5d684fa9f017ef0d60a3c27bc33760036001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479810be2aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e6517e615607676f8f9fc0ebf8b0b16d6f2c59957ab35d05692e664ebf68734ca53366295f4ad6142134b62f11e92ead037c7fb53455560c8ef0f1c94fafa924edfe92175aaa1c4ecc7aeeb72e0d050feacee907f40888c96a65545e07422bc6ac79f4c2d6ee3dab47d06e764682c72d7f16542fcfd05d2813cc182d1595016c179e1717c160300ab1ab0ac397e91bd193c036feb66a9ad2ec5b7967e7f5ff957f8b085a2437c59a", 0xf8}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x19) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 18:07:26 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68}, [{0x0, 0x0, 0x0, 0x18000000}]}, 0x78) 18:07:26 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68}, [{0x0, 0x0, 0x0, 0x19000000}]}, 0x78) 18:07:26 executing program 2: clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000200)={[0x7]}, &(0x7f0000000380), 0x0, 0x8) r0 = memfd_create(&(0x7f0000000440)='systemem0md5sum$\x00', 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r0, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0x0, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000)) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000280)='net/route\x00') 18:07:29 executing program 2: rt_sigtimedwait(&(0x7f0000000200)={[0x7]}, &(0x7f0000000380), 0x0, 0x8) r0 = memfd_create(&(0x7f0000000440)='systemem0md5sum$\x00', 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r0, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0x0, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000)) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000280)='net/route\x00') 18:07:29 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe000000}]}, 0x78) 18:07:29 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68}, [{0x0, 0x0, 0x0, 0x1a000000}]}, 0x78) 18:07:29 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63}, [{0x0, 0x18000000}]}, 0x78) 18:07:29 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r0, &(0x7f0000000040)=""/244, 0xf4) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="6653960d0ec5d684fa9f017ef0d60a3c27bc33760036001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479810be2aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e6517e615607676f8f9fc0ebf8b0b16d6f2c59957ab35d05692e664ebf68734ca53366295f4ad6142134b62f11e92ead037c7fb53455560c8ef0f1c94fafa924edfe92175aaa1c4ecc7aeeb72e0d050feacee907f40888c96a65545e07422bc6ac79f4c2d6ee3dab47d06e764682c72d7f16542fcfd05d2813cc182d1595016c179e1717c160300ab1ab0ac397e91bd193c036feb66a9ad2ec5b7967e7f5ff957f8b085a2437c5", 0xf7}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x19) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 18:07:29 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf000000}]}, 0x78) 18:07:29 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68}, [{0x0, 0x0, 0x0, 0x1b000000}]}, 0x78) 18:07:29 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000000000/0x1000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_RUN(r2, 0xae80, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r4 = syz_genetlink_get_family_id$nl80211(0x0) sendmsg$NL80211_CMD_GET_MPATH(r3, &(0x7f0000000180)={&(0x7f0000000000), 0xc, &(0x7f0000000140)={&(0x7f0000000080)={0x1c, r4, 0xf0a, 0x70bd2c, 0x4, {}, [@NL80211_ATTR_WIPHY={0x8, 0x1, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x14}, 0x4000000) 18:07:29 executing program 4: getdents(0xffffffffffffffff, &(0x7f0000000040)=""/244, 0xf4) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x3d}, {0x0, 0x2a}, {0x0}, {&(0x7f0000000100)="6653960d0ec5d684fa9f017ef0d60a3c27bc33760036001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479810be2aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e6517e615607676f8f9fc0ebf8b0b16d6f2c59957ab35d05692e664ebf68734ca53366295f4ad6142134b62f11e92ead037c7fb53455560c8ef0f1c94fafa924edfe92175aaa1c4ecc7aeeb72e0d050feacee907f40888c96a65545e07422bc6ac79f4c2d6ee3dab47d06e764682c72d7f16542fcfd05d2813cc182d1595016c179e1717c160300ab1ab0ac397e91bd193c036feb66a9ad2ec5b7967e7f5ff957f8b085a2437c59a", 0xf8}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x19) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 18:07:29 executing program 2: rt_sigtimedwait(&(0x7f0000000200)={[0x7]}, &(0x7f0000000380), 0x0, 0x8) r0 = memfd_create(&(0x7f0000000440)='systemem0md5sum$\x00', 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r0, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0x0, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000)) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000280)='net/route\x00') 18:07:29 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68}, [{0x0, 0x0, 0x0, 0x1e000000}]}, 0x78) 18:07:29 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18000000}]}, 0x78) 18:07:30 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r0, &(0x7f0000000040)=""/244, 0xf4) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="6653960d0ec5d684fa9f017ef0d60a3c27bc33760036001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479810be2aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e6517e615607676f8f9fc0ebf8b0b16d6f2c59957ab35d05692e664ebf68734ca53366295f4ad6142134b62f11e92ead037c7fb53455560c8ef0f1c94fafa924edfe92175aaa1c4ecc7aeeb72e0d050feacee907f40888c96a65545e07422bc6ac79f4c2d6ee3dab47d06e764682c72d7f16542fcfd05d2813cc182d1595016c179e1717c160300ab1ab0ac397e91bd193c036feb66a9ad2ec5b7967e7f5ff957f8b085a2437c5", 0xf7}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x19) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 18:07:30 executing program 2: rt_sigtimedwait(&(0x7f0000000200)={[0x7]}, &(0x7f0000000380), 0x0, 0x8) r0 = memfd_create(&(0x7f0000000440)='systemem0md5sum$\x00', 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r0, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0x0, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000)) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000280)='net/route\x00') 18:07:30 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68}, [{0x0, 0x0, 0x0, 0x3e000000}]}, 0x78) 18:07:30 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1a000000}]}, 0x78) 18:07:30 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68}, [{0x0, 0x0, 0x0, 0x3f000000}]}, 0x78) 18:07:30 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1b000000}]}, 0x78) 18:07:30 executing program 2: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000200)={[0x7]}, &(0x7f0000000380), 0x0, 0x8) r0 = memfd_create(&(0x7f0000000440)='systemem0md5sum$\x00', 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r0, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0x0, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000)) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000280)='net/route\x00') 18:07:30 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63}, [{0x0, 0x3e00}]}, 0x78) 18:07:32 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r0, &(0x7f0000000040)=""/244, 0xf4) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="6653960d0ec5d684fa9f017ef0d60a3c27bc33760036001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479810be2aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e6517e615607676f8f9fc0ebf8b0b16d6f2c59957ab35d05692e664ebf68734ca53366295f4ad6142134b62f11e92ead037c7fb53455560c8ef0f1c94fafa924edfe92175aaa1c4ecc7aeeb72e0d050feacee907f40888c96a65545e07422bc6ac79f4c2d6ee3dab47d06e764682c72d7f16542fcfd05d2813cc182d1595016c179e1717c160300ab1ab0ac397e91bd193c036feb66a9ad2ec5b7967e7f5ff957f8b085a2437c5", 0xf7}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x19) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 18:07:32 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68}, [{0x0, 0x0, 0x0, 0x7f000000}]}, 0x78) 18:07:32 executing program 4: getdents(0xffffffffffffffff, &(0x7f0000000040)=""/244, 0xf4) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x3d}, {0x0, 0x2a}, {0x0}, {&(0x7f0000000100)="6653960d0ec5d684fa9f017ef0d60a3c27bc33760036001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479810be2aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e6517e615607676f8f9fc0ebf8b0b16d6f2c59957ab35d05692e664ebf68734ca53366295f4ad6142134b62f11e92ead037c7fb53455560c8ef0f1c94fafa924edfe92175aaa1c4ecc7aeeb72e0d050feacee907f40888c96a65545e07422bc6ac79f4c2d6ee3dab47d06e764682c72d7f16542fcfd05d2813cc182d1595016c179e1717c160300ab1ab0ac397e91bd193c036feb66a9ad2ec5b7967e7f5ff957f8b085a2437c59a", 0xf8}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 18:07:32 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3e000000}]}, 0x78) 18:07:32 executing program 2: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000200)={[0x7]}, &(0x7f0000000380), 0x0, 0x8) r0 = memfd_create(&(0x7f0000000440)='systemem0md5sum$\x00', 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r0, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0x0, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000)) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000280)='net/route\x00') 18:07:32 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000740)={0x3, 0x0, 0xf000, 0x1000, &(0x7f0000000000/0x1000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_RUN(r2, 0xae80, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r4 = syz_genetlink_get_family_id$nl80211(0x0) sendmsg$NL80211_CMD_GET_MPATH(r3, &(0x7f0000000180)={&(0x7f0000000000), 0xc, &(0x7f0000000140)={&(0x7f0000000080)={0x1c, r4, 0xf0a, 0x70bd2c, 0x4, {}, [@NL80211_ATTR_WIPHY={0x8, 0x1, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x14}, 0x4000000) 18:07:33 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68}, [{0x0, 0x0, 0x0, 0x80ffffff}]}, 0x78) 18:07:33 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f000000}]}, 0x78) 18:07:33 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r0, &(0x7f0000000040)=""/244, 0xf4) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="6653960d0ec5d684fa9f017ef0d60a3c27bc33760036001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479810be2aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e6517e615607676f8f9fc0ebf8b0b16d6f2c59957ab35d05692e664ebf68734ca53366295f4ad6142134b62f11e92ead037c7fb53455560c8ef0f1c94fafa924edfe92175aaa1c4ecc7aeeb72e0d050feacee907f40888c96a65545e07422bc6ac79f4c2d6ee3dab47d06e764682c72d7f16542fcfd05d2813cc182d1595016c179e1717c160300ab1ab0ac397e91bd193c036feb66a9ad2ec5b7967e7f5ff957f8b085a2437c5", 0xf7}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x19) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 18:07:33 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80ffffff}]}, 0x78) 18:07:33 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68}, [{0x0, 0x0, 0x0, 0x9b000000}]}, 0x78) 18:07:33 executing program 2: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000200)={[0x7]}, &(0x7f0000000380), 0x0, 0x8) r0 = memfd_create(&(0x7f0000000440)='systemem0md5sum$\x00', 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r0, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0x0, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000)) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000280)='net/route\x00') 18:07:33 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r0, &(0x7f0000000040)=""/244, 0xf4) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="6653960d0ec5d684fa9f017ef0d60a3c27bc33760036001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479810be2aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e6517e615607676f8f9fc0ebf8b0b16d6f2c59957ab35d05692e664ebf68734ca53366295f4ad6142134b62f11e92ead037c7fb53455560c8ef0f1c94fafa924edfe92175aaa1c4ecc7aeeb72e0d050feacee907f40888c96a65545e07422bc6ac79f4c2d6ee3dab47d06e764682c72d7f16542fcfd05d2813cc182d1595016c179e1717c160300ab1ab0ac397e91bd193c036feb66a9ad2ec5b7967e7f5ff957f8b085a2437c5", 0xf7}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x19) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 18:07:33 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68}, [{0x0, 0x0, 0x0, 0xe8030000}]}, 0x78) 18:07:35 executing program 4: getdents(0xffffffffffffffff, &(0x7f0000000040)=""/244, 0xf4) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x3d}, {0x0, 0x2a}, {0x0}, {&(0x7f0000000100)="6653960d0ec5d684fa9f017ef0d60a3c27bc33760036001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479810be2aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e6517e615607676f8f9fc0ebf8b0b16d6f2c59957ab35d05692e664ebf68734ca53366295f4ad6142134b62f11e92ead037c7fb53455560c8ef0f1c94fafa924edfe92175aaa1c4ecc7aeeb72e0d050feacee907f40888c96a65545e07422bc6ac79f4c2d6ee3dab47d06e764682c72d7f16542fcfd05d2813cc182d1595016c179e1717c160300ab1ab0ac397e91bd193c036feb66a9ad2ec5b7967e7f5ff957f8b085a2437c59a", 0xf8}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 18:07:35 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b000000}]}, 0x78) 18:07:35 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r0, &(0x7f0000000040)=""/244, 0xf4) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="6653960d0ec5d684fa9f017ef0d60a3c27bc33760036001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479810be2aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e6517e615607676f8f9fc0ebf8b0b16d6f2c59957ab35d05692e664ebf68734ca53366295f4ad6142134b62f11e92ead037c7fb53455560c8ef0f1c94fafa924edfe92175aaa1c4ecc7aeeb72e0d050feacee907f40888c96a65545e07422bc6ac79f4c2d6ee3dab47d06e764682c72d7f16542fcfd05d2813cc182d1595016c179e1717c160300ab1ab0ac397e91bd193c036feb66a9ad2ec5b7967e7f5ff957f8b085a2437c5", 0xf7}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x19) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 18:07:35 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68}, [{0x0, 0x0, 0x0, 0xffff0000}]}, 0x78) 18:07:35 executing program 2: clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) rt_sigtimedwait(0x0, &(0x7f0000000380), 0x0, 0x0) r0 = memfd_create(&(0x7f0000000440)='systemem0md5sum$\x00', 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r0, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0x0, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000)) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000280)='net/route\x00') 18:07:35 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_RUN(r2, 0xae80, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r4 = syz_genetlink_get_family_id$nl80211(0x0) sendmsg$NL80211_CMD_GET_MPATH(r3, &(0x7f0000000180)={&(0x7f0000000000), 0xc, &(0x7f0000000140)={&(0x7f0000000080)={0x1c, r4, 0xf0a, 0x70bd2c, 0x4, {}, [@NL80211_ATTR_WIPHY={0x8, 0x1, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x14}, 0x4000000) 18:07:36 executing program 2: clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) rt_sigtimedwait(0x0, &(0x7f0000000380), 0x0, 0x0) r0 = memfd_create(&(0x7f0000000440)='systemem0md5sum$\x00', 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r0, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0x0, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000)) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000280)='net/route\x00') 18:07:36 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r0, &(0x7f0000000040)=""/244, 0xf4) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x19) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 18:07:36 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff0000}]}, 0x78) 18:07:36 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68}, [{0x0, 0x0, 0x0, 0xffffff80}]}, 0x78) 18:07:36 executing program 2: clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) rt_sigtimedwait(0x0, &(0x7f0000000380), 0x0, 0x0) r0 = memfd_create(&(0x7f0000000440)='systemem0md5sum$\x00', 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r0, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0x0, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000)) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000280)='net/route\x00') 18:07:36 executing program 2: clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000200), &(0x7f0000000380), 0x0, 0x8) r0 = memfd_create(&(0x7f0000000440)='systemem0md5sum$\x00', 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r0, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0x0, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000)) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000280)='net/route\x00') 18:07:39 executing program 4: getdents(0xffffffffffffffff, &(0x7f0000000040)=""/244, 0xf4) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x3d}, {0x0, 0x2a}, {0x0}, {&(0x7f0000000100)="6653960d0ec5d684fa9f017ef0d60a3c27bc33760036001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479810be2aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e6517e615607676f8f9fc0ebf8b0b16d6f2c59957ab35d05692e664ebf68734ca53366295f4ad6142134b62f11e92ead037c7fb53455560c8ef0f1c94fafa924edfe92175aaa1c4ecc7aeeb72e0d050feacee907f40888c96a65545e07422bc6ac79f4c2d6ee3dab47d06e764682c72d7f16542fcfd05d2813cc182d1595016c179e1717c160300ab1ab0ac397e91bd193c036feb66a9ad2ec5b7967e7f5ff957f8b085a2437c59a", 0xf8}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 18:07:39 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff80}]}, 0x78) 18:07:39 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68}, [{0x0, 0x0, 0x0, 0xf0000000000000}]}, 0x78) 18:07:39 executing program 2: clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000200), &(0x7f0000000380), 0x0, 0x8) r0 = memfd_create(&(0x7f0000000440)='systemem0md5sum$\x00', 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r0, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0x0, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000)) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000280)='net/route\x00') 18:07:39 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000000000/0x1000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_RUN(r2, 0xae80, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r4 = syz_genetlink_get_family_id$nl80211(0x0) sendmsg$NL80211_CMD_GET_MPATH(r3, &(0x7f0000000180)={&(0x7f0000000000), 0xc, &(0x7f0000000140)={&(0x7f0000000080)={0x1c, r4, 0xf0a, 0x70bd2c, 0x4, {}, [@NL80211_ATTR_WIPHY={0x8, 0x1, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x14}, 0x4000000) 18:07:39 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68}, [{0x0, 0x0, 0x0, 0x100000000000000}]}, 0x78) 18:07:39 executing program 2: clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000200), &(0x7f0000000380), 0x0, 0x8) r0 = memfd_create(&(0x7f0000000440)='systemem0md5sum$\x00', 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r0, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0x0, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000)) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000280)='net/route\x00') 18:07:39 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r0, &(0x7f0000000040)=""/244, 0xf4) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x19) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 18:07:39 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf0000000000000}]}, 0x78) 18:07:39 executing program 4: getdents(0xffffffffffffffff, &(0x7f0000000040)=""/244, 0xf4) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x3d}, {0x0, 0x2a}, {0x0}, {&(0x7f0000000100)="6653960d0ec5d684fa9f017ef0d60a3c27bc33760036001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479810be2aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e6517e615607676f8f9fc0ebf8b0b16d6f2c59957ab35d05692e664ebf68734ca53366295f4ad6142134b62f11e92ead037c7fb53455560c8ef0f1c94fafa924edfe92175aaa1c4ecc7aeeb72e0d050feacee907f40888c96a65545e07422bc6ac79f4c2d6ee3dab47d06e764682c72d7f16542fcfd05d2813cc182d1595016c179e1717c160300ab1ab0ac397e91bd193c036feb66a9ad2ec5b7967e7f5ff957f8b085a2437c59a", 0xf8}], 0x4, 0x0) tkill(r0, 0x19) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 18:07:39 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000}]}, 0x78) 18:07:39 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68}, [{0x0, 0x0, 0x0, 0x180000000000000}]}, 0x78) 18:07:39 executing program 2: clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000200)={[0x7]}, 0x0, 0x0, 0x8) r0 = memfd_create(&(0x7f0000000440)='systemem0md5sum$\x00', 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r0, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0x0, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000)) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000280)='net/route\x00') 18:07:39 executing program 4: getdents(0xffffffffffffffff, &(0x7f0000000040)=""/244, 0xf4) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x3d}, {0x0, 0x2a}, {0x0}, {&(0x7f0000000100)="6653960d0ec5d684fa9f017ef0d60a3c27bc33760036001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479810be2aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e6517e615607676f8f9fc0ebf8b0b16d6f2c59957ab35d05692e664ebf68734ca53366295f4ad6142134b62f11e92ead037c7fb53455560c8ef0f1c94fafa924edfe92175aaa1c4ecc7aeeb72e0d050feacee907f40888c96a65545e07422bc6ac79f4c2d6ee3dab47d06e764682c72d7f16542fcfd05d2813cc182d1595016c179e1717c160300ab1ab0ac397e91bd193c036feb66a9ad2ec5b7967e7f5ff957f8b085a2437c59a", 0xf8}], 0x4, 0x0) tkill(r0, 0x19) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 18:07:39 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68}, [{0x0, 0x0, 0x0, 0x200000000000000}]}, 0x78) 18:07:39 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x180000000000000}]}, 0x78) [ 976.863156] *** Guest State *** [ 976.866571] CR0: actual=0x0000000000000030, shadow=0x0000000060000010, gh_mask=fffffffffffffff7 [ 976.877044] CR4: actual=0x0000000000002040, shadow=0x0000000000000000, gh_mask=ffffffffffffe871 [ 976.886275] CR3 = 0x0000000000000000 [ 976.890061] RSP = 0x0000000000000000 RIP = 0x0000000000000231 [ 976.896652] RFLAGS=0x00000296 DR7 = 0x0000000000000400 [ 976.910639] Sysenter RSP=0000000000000000 CS:RIP=0000:0000000000000000 [ 976.917526] CS: sel=0x0000, attr=0x0009b, limit=0x0000ffff, base=0x0000000000000000 [ 976.926415] DS: sel=0x0000, attr=0x00093, limit=0x0000ffff, base=0x0000000000000000 [ 976.934695] SS: sel=0x0000, attr=0x00093, limit=0x0000ffff, base=0x0000000000000000 [ 976.943182] ES: sel=0x0000, attr=0x00093, limit=0x0000ffff, base=0x0000000000000000 [ 976.952648] FS: sel=0x0000, attr=0x00093, limit=0x0000ffff, base=0x0000000000000000 [ 976.961410] GS: sel=0x0000, attr=0x00093, limit=0x0000ffff, base=0x0000000000000000 [ 976.969665] GDTR: limit=0x0000ffff, base=0x0000000000000000 [ 976.978326] LDTR: sel=0x0000, attr=0x00082, limit=0x0000ffff, base=0x0000000000000000 [ 976.986978] IDTR: limit=0x0000ffff, base=0x0000000000000000 [ 976.995463] TR: sel=0x0000, attr=0x0008b, limit=0x0000ffff, base=0x0000000000000000 [ 977.003861] EFER = 0x0000000000000000 PAT = 0x0007040600070406 [ 977.010658] DebugCtl = 0x0000000000000000 DebugExceptions = 0x0000000000000000 [ 977.018304] Interruptibility = 00000001 ActivityState = 00000000 [ 977.024916] *** Host State *** [ 977.028319] RIP = 0xffffffff811affaf RSP = 0xffff888051f678c0 [ 977.034672] CS=0010 SS=0018 DS=0000 ES=0000 FS=0000 GS=0000 TR=0040 [ 977.041296] FSBase=00007f91e15c9700 GSBase=ffff8880ae600000 TRBase=fffffe0000003000 [ 977.049696] GDTBase=fffffe0000001000 IDTBase=fffffe0000000000 [ 977.055724] CR0=0000000080050033 CR3=000000008c24d000 CR4=00000000001426f0 [ 977.063006] Sysenter RSP=fffffe0000003000 CS:RIP=0010:ffffffff874013e0 [ 977.069727] EFER = 0x0000000000000d01 PAT = 0x0407050600070106 [ 977.076003] *** Control State *** [ 977.079484] PinBased=0000003f CPUBased=b5986dfa SecondaryExec=000000e2 [ 977.086738] EntryControls=0000d1ff ExitControls=002fefff [ 977.092320] ExceptionBitmap=00060042 PFECmask=00000000 PFECmatch=00000000 [ 977.099290] VMEntry: intr_info=80000202 errcode=00000000 ilen=00000000 [ 977.106099] VMExit: intr_info=00000000 errcode=00000000 ilen=00000003 18:07:40 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000000000/0x1000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_RUN(r2, 0xae80, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r4 = syz_genetlink_get_family_id$nl80211(0x0) sendmsg$NL80211_CMD_GET_MPATH(r3, &(0x7f0000000180)={&(0x7f0000000000), 0xc, &(0x7f0000000140)={&(0x7f0000000080)={0x1c, r4, 0xf0a, 0x70bd2c, 0x4, {}, [@NL80211_ATTR_WIPHY={0x8, 0x1, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x14}, 0x4000000) 18:07:40 executing program 2: clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000200)={[0x7]}, 0x0, 0x0, 0x8) r0 = memfd_create(&(0x7f0000000440)='systemem0md5sum$\x00', 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r0, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0x0, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000)) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000280)='net/route\x00') 18:07:40 executing program 4: getdents(0xffffffffffffffff, &(0x7f0000000040)=""/244, 0xf4) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x3d}, {0x0, 0x2a}, {0x0}, {&(0x7f0000000100)="6653960d0ec5d684fa9f017ef0d60a3c27bc33760036001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479810be2aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e6517e615607676f8f9fc0ebf8b0b16d6f2c59957ab35d05692e664ebf68734ca53366295f4ad6142134b62f11e92ead037c7fb53455560c8ef0f1c94fafa924edfe92175aaa1c4ecc7aeeb72e0d050feacee907f40888c96a65545e07422bc6ac79f4c2d6ee3dab47d06e764682c72d7f16542fcfd05d2813cc182d1595016c179e1717c160300ab1ab0ac397e91bd193c036feb66a9ad2ec5b7967e7f5ff957f8b085a2437c59a", 0xf8}], 0x4, 0x0) tkill(r0, 0x19) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) [ 977.112872] reason=80000021 qualification=0000000000000003 [ 977.119241] IDTVectoring: info=00000000 errcode=00000000 [ 977.124827] TSC Offset = 0xfffffdf36f303060 [ 977.129207] EPT pointer = 0x000000009f59e01e [ 977.133782] Virtual processor ID = 0x0001 [ 977.366779] *** Guest State *** [ 977.370545] CR0: actual=0x0000000000000030, shadow=0x0000000060000010, gh_mask=fffffffffffffff7 [ 977.379565] CR4: actual=0x0000000000002040, shadow=0x0000000000000000, gh_mask=ffffffffffffe871 [ 977.390864] CR3 = 0x0000000000000000 [ 977.394935] RSP = 0x0000000000000000 RIP = 0x0000000000000231 [ 977.401526] RFLAGS=0x00000246 DR7 = 0x0000000000000400 [ 977.407985] Sysenter RSP=0000000000000000 CS:RIP=0000:0000000000000000 [ 977.418209] CS: sel=0x0000, attr=0x0009b, limit=0x0000ffff, base=0x0000000000000000 [ 977.426918] DS: sel=0x0000, attr=0x00093, limit=0x0000ffff, base=0x0000000000000000 [ 977.438107] SS: sel=0x0000, attr=0x00093, limit=0x0000ffff, base=0x0000000000000000 [ 977.446564] ES: sel=0x0000, attr=0x00093, limit=0x0000ffff, base=0x0000000000000000 [ 977.455605] FS: sel=0x0000, attr=0x00093, limit=0x0000ffff, base=0x0000000000000000 [ 977.465179] GS: sel=0x0000, attr=0x00093, limit=0x0000ffff, base=0x0000000000000000 [ 977.473768] GDTR: limit=0x0000ffff, base=0x0000000000000000 [ 977.482052] LDTR: sel=0x0000, attr=0x00082, limit=0x0000ffff, base=0x0000000000000000 [ 977.490070] IDTR: limit=0x0000ffff, base=0x0000000000000000 [ 977.498398] TR: sel=0x0000, attr=0x0008b, limit=0x0000ffff, base=0x0000000000000000 [ 977.506828] EFER = 0x0000000000000000 PAT = 0x0007040600070406 [ 977.513898] DebugCtl = 0x0000000000000000 DebugExceptions = 0x0000000000000000 [ 977.522541] Interruptibility = 00000001 ActivityState = 00000000 [ 977.528786] *** Host State *** [ 977.532259] RIP = 0xffffffff811affaf RSP = 0xffff888051ecf8c0 [ 977.538317] CS=0010 SS=0018 DS=0000 ES=0000 FS=0000 GS=0000 TR=0040 [ 977.545979] FSBase=00007f91e15c9700 GSBase=ffff8880ae600000 TRBase=fffffe0000034000 [ 977.554102] GDTBase=fffffe0000032000 IDTBase=fffffe0000000000 [ 977.560029] CR0=0000000080050033 CR3=000000008c24d000 CR4=00000000001426f0 [ 977.568051] Sysenter RSP=fffffe0000034000 CS:RIP=0010:ffffffff874013e0 [ 977.575031] EFER = 0x0000000000000d01 PAT = 0x0407050600070106 [ 977.581528] *** Control State *** [ 977.585102] PinBased=0000003f CPUBased=b5986dfa SecondaryExec=000000e2 [ 977.591969] EntryControls=0000d1ff ExitControls=002fefff [ 977.597473] ExceptionBitmap=00060042 PFECmask=00000000 PFECmatch=00000000 [ 977.605278] VMEntry: intr_info=80000202 errcode=00000000 ilen=00000000 [ 977.612695] VMExit: intr_info=00000000 errcode=00000000 ilen=00000003 [ 977.619337] reason=80000021 qualification=0000000000000003 [ 977.626771] IDTVectoring: info=00000000 errcode=00000000 [ 977.632691] TSC Offset = 0xfffffdf2e721be8b [ 977.637063] EPT pointer = 0x000000008621801e [ 977.641914] Virtual processor ID = 0x0001 18:07:42 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r0, &(0x7f0000000040)=""/244, 0xf4) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x19) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 18:07:42 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68}, [{0x0, 0x0, 0x0, 0x500000000000000}]}, 0x78) 18:07:42 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000}]}, 0x78) 18:07:42 executing program 4: getdents(0xffffffffffffffff, &(0x7f0000000040)=""/244, 0xf4) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x19) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 18:07:42 executing program 2: clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000200)={[0x7]}, 0x0, 0x0, 0x8) r0 = memfd_create(&(0x7f0000000440)='systemem0md5sum$\x00', 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r0, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0x0, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000)) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000280)='net/route\x00') 18:07:42 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000000000/0x1000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_RUN(r2, 0xae80, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r4 = syz_genetlink_get_family_id$nl80211(0x0) sendmsg$NL80211_CMD_GET_MPATH(r3, &(0x7f0000000180)={&(0x7f0000000000), 0xc, &(0x7f0000000140)={&(0x7f0000000080)={0x1c, r4, 0xf0a, 0x70bd2c, 0x4, {}, [@NL80211_ATTR_WIPHY={0x8, 0x1, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x14}, 0x4000000) 18:07:42 executing program 2: clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000200)={[0x7]}, &(0x7f0000000380), 0x0, 0x8) r0 = memfd_create(0x0, 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r0, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0x0, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000)) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000280)='net/route\x00') 18:07:42 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x700000000000000}]}, 0x78) 18:07:42 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68}, [{0x0, 0x0, 0x0, 0x600000000000000}]}, 0x78) 18:07:42 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000000000}]}, 0x78) 18:07:42 executing program 2: clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000200)={[0x7]}, &(0x7f0000000380), 0x0, 0x8) r0 = memfd_create(0x0, 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r0, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0x0, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000)) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000280)='net/route\x00') 18:07:42 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68}, [{0x0, 0x0, 0x0, 0x700000000000000}]}, 0x78) 18:07:45 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r0, &(0x7f0000000040)=""/244, 0xf4) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}], 0x3, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x19) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 18:07:45 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x900000000000000}]}, 0x78) 18:07:45 executing program 2: clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000200)={[0x7]}, &(0x7f0000000380), 0x0, 0x8) r0 = memfd_create(0x0, 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r0, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0x0, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000)) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000280)='net/route\x00') 18:07:45 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68}, [{0x0, 0x0, 0x0, 0x800000000000000}]}, 0x78) 18:07:45 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000000000/0x1000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_RUN(r2, 0xae80, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r4 = syz_genetlink_get_family_id$nl80211(0x0) sendmsg$NL80211_CMD_GET_MPATH(r3, &(0x7f0000000180)={&(0x7f0000000000), 0xc, &(0x7f0000000140)={&(0x7f0000000080)={0x1c, r4, 0xf0a, 0x70bd2c, 0x4, {}, [@NL80211_ATTR_WIPHY={0x8, 0x1, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x14}, 0x4000000) 18:07:45 executing program 4: getdents(0xffffffffffffffff, &(0x7f0000000040)=""/244, 0xf4) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x19) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 18:07:45 executing program 2: clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000200)={[0x7]}, &(0x7f0000000380), 0x0, 0x8) r0 = memfd_create(&(0x7f0000000440)='systemem0md5sum$\x00', 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x0, 0x11, r0, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0x0, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000)) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000280)='net/route\x00') 18:07:45 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa00000000000000}]}, 0x78) 18:07:45 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68}, [{0x0, 0x0, 0x0, 0x900000000000000}]}, 0x78) 18:07:45 executing program 2: clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000200)={[0x7]}, &(0x7f0000000380), 0x0, 0x8) r0 = memfd_create(&(0x7f0000000440)='systemem0md5sum$\x00', 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x0, 0x11, r0, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0x0, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000)) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000280)='net/route\x00') 18:07:45 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc00000000000000}]}, 0x78) 18:07:45 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68}, [{0x0, 0x0, 0x0, 0xa00000000000000}]}, 0x78) 18:07:48 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r0, &(0x7f0000000040)=""/244, 0xf4) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}], 0x3, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x19) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 18:07:48 executing program 2: clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000200)={[0x7]}, &(0x7f0000000380), 0x0, 0x8) r0 = memfd_create(&(0x7f0000000440)='systemem0md5sum$\x00', 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x0, 0x11, r0, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0x0, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000)) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000280)='net/route\x00') 18:07:48 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68}, [{0x0, 0x0, 0x0, 0xc00000000000000}]}, 0x78) 18:07:48 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd00000000000000}]}, 0x78) 18:07:48 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000000000/0x1000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_RUN(r2, 0xae80, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r3 = syz_genetlink_get_family_id$nl80211(0x0) sendmsg$NL80211_CMD_GET_MPATH(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000), 0xc, &(0x7f0000000140)={&(0x7f0000000080)={0x1c, r3, 0xf0a, 0x70bd2c, 0x4, {}, [@NL80211_ATTR_WIPHY={0x8, 0x1, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x14}, 0x4000000) 18:07:48 executing program 4: getdents(0xffffffffffffffff, &(0x7f0000000040)=""/244, 0xf4) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x19) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 18:07:48 executing program 2: clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000200)={[0x7]}, &(0x7f0000000380), 0x0, 0x8) r0 = memfd_create(&(0x7f0000000440)='systemem0md5sum$\x00', 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x10, r0, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0x0, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000)) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000280)='net/route\x00') 18:07:48 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe00000000000000}]}, 0x78) 18:07:48 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68}, [{0x0, 0x0, 0x0, 0xd00000000000000}]}, 0x78) 18:07:48 executing program 2: clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000200)={[0x7]}, &(0x7f0000000380), 0x0, 0x8) r0 = memfd_create(&(0x7f0000000440)='systemem0md5sum$\x00', 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x10, r0, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0x0, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000)) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000280)='net/route\x00') 18:07:48 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf00000000000000}]}, 0x78) 18:07:48 executing program 2: clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000200)={[0x7]}, &(0x7f0000000380), 0x0, 0x8) r0 = memfd_create(&(0x7f0000000440)='systemem0md5sum$\x00', 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x10, r0, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0x0, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000)) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000280)='net/route\x00') [ 985.938266] *** Guest State *** [ 985.942501] CR0: actual=0x0000000000000030, shadow=0x0000000060000010, gh_mask=fffffffffffffff7 [ 985.954058] CR4: actual=0x0000000000002040, shadow=0x0000000000000000, gh_mask=ffffffffffffe871 [ 985.964053] CR3 = 0x0000000000000000 [ 985.967824] RSP = 0x0000000000000000 RIP = 0x0000000000000231 [ 985.975092] RFLAGS=0x00000296 DR7 = 0x0000000000000400 [ 985.983612] Sysenter RSP=0000000000000000 CS:RIP=0000:0000000000000000 [ 985.991883] CS: sel=0x0000, attr=0x0009b, limit=0x0000ffff, base=0x0000000000000000 [ 985.999895] DS: sel=0x0000, attr=0x00093, limit=0x0000ffff, base=0x0000000000000000 [ 986.009125] SS: sel=0x0000, attr=0x00093, limit=0x0000ffff, base=0x0000000000000000 [ 986.018077] ES: sel=0x0000, attr=0x00093, limit=0x0000ffff, base=0x0000000000000000 [ 986.026929] FS: sel=0x0000, attr=0x00093, limit=0x0000ffff, base=0x0000000000000000 [ 986.036302] GS: sel=0x0000, attr=0x00093, limit=0x0000ffff, base=0x0000000000000000 [ 986.045309] GDTR: limit=0x0000ffff, base=0x0000000000000000 [ 986.054189] LDTR: sel=0x0000, attr=0x00082, limit=0x0000ffff, base=0x0000000000000000 [ 986.063432] IDTR: limit=0x0000ffff, base=0x0000000000000000 [ 986.072875] TR: sel=0x0000, attr=0x0008b, limit=0x0000ffff, base=0x0000000000000000 [ 986.082662] EFER = 0x0000000000000000 PAT = 0x0007040600070406 [ 986.089139] DebugCtl = 0x0000000000000000 DebugExceptions = 0x0000000000000000 [ 986.097957] Interruptibility = 00000001 ActivityState = 00000000 [ 986.104975] *** Host State *** [ 986.108214] RIP = 0xffffffff811affaf RSP = 0xffff88809ebff8c0 [ 986.115904] CS=0010 SS=0018 DS=0000 ES=0000 FS=0000 GS=0000 TR=0040 [ 986.123397] FSBase=00007f91e15c9700 GSBase=ffff8880ae700000 TRBase=fffffe0000034000 [ 986.132053] GDTBase=fffffe0000032000 IDTBase=fffffe0000000000 [ 986.138012] CR0=0000000080050033 CR3=000000009e409000 CR4=00000000001426e0 [ 986.146383] Sysenter RSP=fffffe0000034000 CS:RIP=0010:ffffffff874013e0 [ 986.153930] EFER = 0x0000000000000d01 PAT = 0x0407050600070106 [ 986.160058] *** Control State *** [ 986.165567] PinBased=0000003f CPUBased=b5986dfa SecondaryExec=000000e2 [ 986.173171] EntryControls=0000d1ff ExitControls=002fefff [ 986.178843] ExceptionBitmap=00060042 PFECmask=00000000 PFECmatch=00000000 [ 986.187177] VMEntry: intr_info=80000202 errcode=00000000 ilen=00000000 [ 986.194887] VMExit: intr_info=00000000 errcode=00000000 ilen=00000003 [ 986.203071] reason=80000021 qualification=0000000000000003 [ 986.209436] IDTVectoring: info=00000000 errcode=00000000 [ 986.217454] TSC Offset = 0xfffffdee81a1e997 [ 986.223185] EPT pointer = 0x000000005277c01e [ 986.227747] Virtual processor ID = 0x0001 18:07:51 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r0, &(0x7f0000000040)=""/244, 0xf4) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}], 0x3, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x19) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 18:07:51 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68}, [{0x0, 0x0, 0x0, 0xe00000000000000}]}, 0x78) 18:07:51 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1800000000000000}]}, 0x78) 18:07:51 executing program 2: clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000200)={[0x7]}, &(0x7f0000000380), 0x0, 0x8) memfd_create(&(0x7f0000000440)='systemem0md5sum$\x00', 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, 0xffffffffffffffff, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0x0, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000)) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000280)='net/route\x00') 18:07:51 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) keyctl$chown(0x4, 0x0, r3, 0x0) r4 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) write$uinput_user_dev(r4, 0x0, 0x0) write$uinput_user_dev(r4, &(0x7f0000000480)={'syz0\x00', {0xa65b, 0x1000, 0xfffb, 0x80}, 0x32, [0x4, 0x631, 0xaf, 0x2, 0x1b, 0x1, 0x10001, 0x1, 0x8, 0x3ff, 0x800, 0x7859, 0x7, 0x5, 0x7fff, 0xc05, 0xa4, 0x3, 0x4, 0xfffff800, 0x6, 0x7c, 0x6, 0xff, 0x2, 0x771, 0x5, 0xfffffff8, 0x81, 0x0, 0x6, 0x7, 0x6, 0x9, 0x3, 0x0, 0x282d298e, 0x7, 0x6, 0x3, 0xfaf9, 0x7, 0x2, 0xf9, 0xc2, 0x0, 0x8, 0x8, 0x9, 0x4, 0x8eb1, 0x0, 0x8, 0x9, 0x7d, 0x8, 0x9, 0x4, 0x3, 0x10000, 0xfab, 0x39, 0x7, 0x4], [0x0, 0x7ff, 0x1f, 0x1, 0x7, 0x2, 0x6, 0xd594, 0x3, 0x2a, 0x1c9b4fd4, 0x0, 0xfff, 0x5, 0xfffff801, 0x9, 0x3f, 0x8, 0x80, 0x6, 0x401, 0x8000, 0x1, 0xcb, 0x1, 0x6, 0x4, 0x92, 0x800000, 0x7, 0x1f, 0x140, 0x7ff, 0xabbc, 0x401, 0x0, 0x3, 0x20, 0x48, 0x12000, 0xfa, 0x1, 0xfffff6fe, 0x0, 0x7, 0x8818, 0x8000, 0x6, 0x1f, 0x8, 0x4, 0xff, 0x101, 0xd7, 0x8, 0x5, 0xffff8001, 0x5, 0xb621, 0x1, 0x9, 0x1395db38, 0x0, 0x3], [0x6, 0x6, 0x401, 0x2d5, 0xc08, 0x3, 0x7f, 0x7, 0x8, 0x4, 0xbe1a, 0x5, 0x3, 0x93c, 0x9, 0x80, 0x800, 0x7fff, 0x6, 0x1, 0x5, 0x2, 0x9, 0x7fff, 0x0, 0x8000, 0x4, 0x6, 0x2, 0x4, 0x6, 0xa2ec, 0x7, 0x100, 0x1, 0x3, 0x1f, 0x81, 0x10000, 0xc5, 0x7ff, 0x2aae236d, 0x4, 0x2000, 0x1c, 0x3, 0x2, 0x735c, 0x7fffffff, 0x6, 0xfffffffd, 0x4, 0x3ff, 0x7fffffff, 0x8, 0x224, 0x261, 0x8b8a, 0x100, 0xffffffff, 0x7fff, 0x41, 0x401, 0x200], [0x7, 0x4, 0x2, 0x5, 0x7, 0x1, 0x8, 0x0, 0x8, 0xffffff7b, 0x0, 0x5, 0x6, 0xcc9, 0x1, 0x5, 0x2, 0xfffffffe, 0xfffffff9, 0x0, 0x5, 0x101, 0x401, 0x2, 0x3, 0x3, 0x7f76, 0x3ff, 0x9, 0xc14, 0x3, 0x7, 0x5, 0x100, 0x6, 0x8, 0x2, 0xe0, 0x3f, 0x200, 0x3, 0x9, 0x3, 0x5, 0x95c6, 0x2, 0x6, 0x20, 0x3, 0x8, 0x9, 0x7, 0x9, 0x0, 0xffffd671, 0x1, 0x0, 0x853d, 0x7, 0x3ff, 0x0, 0xfde7, 0x1, 0x5]}, 0x45c) r5 = openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ocfs2_control\x00', 0x20200, 0x0) connect$x25(r5, &(0x7f0000000080)={0x9, @remote={[], 0x1}}, 0x12) syz_mount_image$tmpfs(&(0x7f0000000280)='tmpfs\x00', &(0x7f0000000000)='./file0\x00', 0x1f, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="6e725f626c6f636b733d2c6e725f696e6f6465733d2d6b376d32702c7375626a5f726f6c653d2fcc2a2b1d2e2c2c666f776e65723c", @ANYRESDEC=r3, @ANYBLOB="1c736d61576b6673726f6f1f0074c27f74a2002c00"]) 18:07:51 executing program 4: getdents(0xffffffffffffffff, &(0x7f0000000040)=""/244, 0xf4) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x3d}, {0x0, 0x2a}, {0x0}, {&(0x7f0000000100)="6653960d0ec5d684fa9f017ef0d60a3c27bc33760036001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479810be2aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e6517e615607676f8f9fc0ebf8b0b16d6f2c59957ab35d05692e664ebf68734ca53366295f4ad6142134b62f11e92ead037c7fb53455560c8ef0f1c94fafa924edfe92175aaa1c4ecc7aeeb72e0d050feacee907f40888c96a65545e07422bc6ac79f4c2d6ee3dab47d06e764682c72d7f16542fcfd05d2813cc182d1595016c179e1717c160300ab1ab0ac397e91bd193c036feb66a9ad2ec5b7967e7f5ff957f8b085a2437c59a", 0xf8}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x19) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 18:07:51 executing program 2: clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000200)={[0x7]}, &(0x7f0000000380), 0x0, 0x8) memfd_create(&(0x7f0000000440)='systemem0md5sum$\x00', 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, 0xffffffffffffffff, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0x0, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000)) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000280)='net/route\x00') 18:07:51 executing program 4: getdents(0xffffffffffffffff, &(0x7f0000000040)=""/244, 0xf4) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x3d}, {0x0, 0x2a}, {0x0}, {&(0x7f0000000100)="6653960d0ec5d684fa9f017ef0d60a3c27bc33760036001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479810be2aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e6517e615607676f8f9fc0ebf8b0b16d6f2c59957ab35d05692e664ebf68734ca53366295f4ad6142134b62f11e92ead037c7fb53455560c8ef0f1c94fafa924edfe92175aaa1c4ecc7aeeb72e0d050feacee907f40888c96a65545e07422bc6ac79f4c2d6ee3dab47d06e764682c72d7f16542fcfd05d2813cc182d1595016c179e1717c160300ab1ab0ac397e91bd193c036feb66a9ad2ec5b7967e7f5ff957f8b085a2437c59a", 0xf8}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x19) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 18:07:51 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1a00000000000000}]}, 0x78) 18:07:51 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68}, [{0x0, 0x0, 0x0, 0xf00000000000000}]}, 0x78) [ 988.533312] tmpfs: Bad value '-k7m2p' for mount option 'nr_inodes' 18:07:51 executing program 2: clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000200)={[0x7]}, &(0x7f0000000380), 0x0, 0x8) memfd_create(&(0x7f0000000440)='systemem0md5sum$\x00', 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, 0xffffffffffffffff, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0x0, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000)) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000280)='net/route\x00') 18:07:51 executing program 4: getdents(0xffffffffffffffff, &(0x7f0000000040)=""/244, 0xf4) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x3d}, {0x0, 0x2a}, {0x0}, {&(0x7f0000000100)="6653960d0ec5d684fa9f017ef0d60a3c27bc33760036001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479810be2aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e6517e615607676f8f9fc0ebf8b0b16d6f2c59957ab35d05692e664ebf68734ca53366295f4ad6142134b62f11e92ead037c7fb53455560c8ef0f1c94fafa924edfe92175aaa1c4ecc7aeeb72e0d050feacee907f40888c96a65545e07422bc6ac79f4c2d6ee3dab47d06e764682c72d7f16542fcfd05d2813cc182d1595016c179e1717c160300ab1ab0ac397e91bd193c036feb66a9ad2ec5b7967e7f5ff957f8b085a2437c59a", 0xf8}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x19) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 18:07:54 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r0, &(0x7f0000000040)=""/244, 0xf4) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {0x0}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x19) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 18:07:54 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68}, [{0x0, 0x0, 0x0, 0x1800000000000000}]}, 0x78) 18:07:54 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) keyctl$chown(0x4, 0x0, r3, 0x0) r4 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) write$uinput_user_dev(r4, 0x0, 0x0) write$uinput_user_dev(r4, &(0x7f0000000480)={'syz0\x00', {0xa65b, 0x1000, 0xfffb, 0x80}, 0x32, [0x4, 0x631, 0xaf, 0x2, 0x1b, 0x1, 0x10001, 0x1, 0x8, 0x3ff, 0x800, 0x7859, 0x7, 0x5, 0x7fff, 0xc05, 0xa4, 0x3, 0x4, 0xfffff800, 0x6, 0x7c, 0x6, 0xff, 0x2, 0x771, 0x5, 0xfffffff8, 0x81, 0x0, 0x6, 0x7, 0x6, 0x9, 0x3, 0x0, 0x282d298e, 0x7, 0x6, 0x3, 0xfaf9, 0x7, 0x2, 0xf9, 0xc2, 0x0, 0x8, 0x8, 0x9, 0x4, 0x8eb1, 0x0, 0x8, 0x9, 0x7d, 0x8, 0x9, 0x4, 0x3, 0x10000, 0xfab, 0x39, 0x7, 0x4], [0x0, 0x7ff, 0x1f, 0x1, 0x7, 0x2, 0x6, 0xd594, 0x3, 0x2a, 0x1c9b4fd4, 0x0, 0xfff, 0x5, 0xfffff801, 0x9, 0x3f, 0x8, 0x80, 0x6, 0x401, 0x8000, 0x1, 0xcb, 0x1, 0x6, 0x4, 0x92, 0x800000, 0x7, 0x1f, 0x140, 0x7ff, 0xabbc, 0x401, 0x0, 0x3, 0x20, 0x48, 0x12000, 0xfa, 0x1, 0xfffff6fe, 0x0, 0x7, 0x8818, 0x8000, 0x6, 0x1f, 0x8, 0x4, 0xff, 0x101, 0xd7, 0x8, 0x5, 0xffff8001, 0x5, 0xb621, 0x1, 0x9, 0x1395db38, 0x0, 0x3], [0x6, 0x6, 0x401, 0x2d5, 0xc08, 0x3, 0x7f, 0x7, 0x8, 0x4, 0xbe1a, 0x5, 0x3, 0x93c, 0x9, 0x80, 0x800, 0x7fff, 0x6, 0x1, 0x5, 0x2, 0x9, 0x7fff, 0x0, 0x8000, 0x4, 0x6, 0x2, 0x4, 0x6, 0xa2ec, 0x7, 0x100, 0x1, 0x3, 0x1f, 0x81, 0x10000, 0xc5, 0x7ff, 0x2aae236d, 0x4, 0x2000, 0x1c, 0x3, 0x2, 0x735c, 0x7fffffff, 0x6, 0xfffffffd, 0x4, 0x3ff, 0x7fffffff, 0x8, 0x224, 0x261, 0x8b8a, 0x100, 0xffffffff, 0x7fff, 0x41, 0x401, 0x200], [0x7, 0x4, 0x2, 0x5, 0x7, 0x1, 0x8, 0x0, 0x8, 0xffffff7b, 0x0, 0x5, 0x6, 0xcc9, 0x1, 0x5, 0x2, 0xfffffffe, 0xfffffff9, 0x0, 0x5, 0x101, 0x401, 0x2, 0x3, 0x3, 0x7f76, 0x3ff, 0x9, 0xc14, 0x3, 0x7, 0x5, 0x100, 0x6, 0x8, 0x2, 0xe0, 0x3f, 0x200, 0x3, 0x9, 0x3, 0x5, 0x95c6, 0x2, 0x6, 0x20, 0x3, 0x8, 0x9, 0x7, 0x9, 0x0, 0xffffd671, 0x1, 0x0, 0x853d, 0x7, 0x3ff, 0x0, 0xfde7, 0x1, 0x5]}, 0x45c) r5 = openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ocfs2_control\x00', 0x20200, 0x0) connect$x25(r5, &(0x7f0000000080)={0x9, @remote={[], 0x1}}, 0x12) syz_mount_image$tmpfs(&(0x7f0000000280)='tmpfs\x00', &(0x7f0000000000)='./file0\x00', 0x1f, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="6e725f626c6f636b733d2c6e725f696e6f6465733d2d6b376d32702c7375626a5f726f6c653d2fcc2a2b1d2e2c2c666f776e65723c", @ANYRESDEC=r3, @ANYBLOB="1c736d61576b6673726f6f1f0074c27f74a2002c00"]) 18:07:54 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1b00000000000000}]}, 0x78) 18:07:54 executing program 2: clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000200)={[0x7]}, &(0x7f0000000380), 0x0, 0x8) r0 = memfd_create(&(0x7f0000000440)='systemem0md5sum$\x00', 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r0, 0x0) rt_sigaction(0x0, &(0x7f0000b4a000)={0x0, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000)) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000280)='net/route\x00') 18:07:54 executing program 4: getdents(0xffffffffffffffff, &(0x7f0000000040)=""/244, 0xf4) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x3d}, {0x0, 0x2a}, {0x0}, {&(0x7f0000000100)="6653960d0ec5d684fa9f017ef0d60a3c27bc33760036001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479810be2aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e6517e615607676f8f9fc0ebf8b0b16d6f2c59957ab35d05692e664ebf68734ca53366295f4ad6142134b62f11e92ead037c7fb53455560c8ef0f1c94fafa924edfe92175aaa1c4ecc7aeeb72e0d050feacee907f40888c96a65545e07422bc6ac79f4c2d6ee3dab47d06e764682c72d7f16542fcfd05d2813cc182d1595016c179e1717c160300ab1ab0ac397e91bd193c036feb66a9ad2ec5b7967e7f5ff957f8b085a2437c59a", 0xf8}], 0x4, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(0x0, 0x19) ptrace$cont(0x18, 0x0, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, 0x0, 0x0, 0x0) 18:07:54 executing program 4: getdents(0xffffffffffffffff, &(0x7f0000000040)=""/244, 0xf4) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x3d}, {0x0, 0x2a}, {0x0}, {&(0x7f0000000100)="6653960d0ec5d684fa9f017ef0d60a3c27bc33760036001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479810be2aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e6517e615607676f8f9fc0ebf8b0b16d6f2c59957ab35d05692e664ebf68734ca53366295f4ad6142134b62f11e92ead037c7fb53455560c8ef0f1c94fafa924edfe92175aaa1c4ecc7aeeb72e0d050feacee907f40888c96a65545e07422bc6ac79f4c2d6ee3dab47d06e764682c72d7f16542fcfd05d2813cc182d1595016c179e1717c160300ab1ab0ac397e91bd193c036feb66a9ad2ec5b7967e7f5ff957f8b085a2437c59a", 0xf8}], 0x4, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(0x0, 0x19) ptrace$cont(0x18, 0x0, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, 0x0, 0x0, 0x0) 18:07:54 executing program 2: clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000200)={[0x7]}, &(0x7f0000000380), 0x0, 0x8) r0 = memfd_create(&(0x7f0000000440)='systemem0md5sum$\x00', 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r0, 0x0) rt_sigaction(0x0, &(0x7f0000b4a000)={0x0, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000)) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000280)='net/route\x00') 18:07:54 executing program 4: getdents(0xffffffffffffffff, &(0x7f0000000040)=""/244, 0xf4) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x3d}, {0x0, 0x2a}, {0x0}, {&(0x7f0000000100)="6653960d0ec5d684fa9f017ef0d60a3c27bc33760036001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479810be2aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e6517e615607676f8f9fc0ebf8b0b16d6f2c59957ab35d05692e664ebf68734ca53366295f4ad6142134b62f11e92ead037c7fb53455560c8ef0f1c94fafa924edfe92175aaa1c4ecc7aeeb72e0d050feacee907f40888c96a65545e07422bc6ac79f4c2d6ee3dab47d06e764682c72d7f16542fcfd05d2813cc182d1595016c179e1717c160300ab1ab0ac397e91bd193c036feb66a9ad2ec5b7967e7f5ff957f8b085a2437c59a", 0xf8}], 0x4, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(0x0, 0x19) ptrace$cont(0x18, 0x0, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, 0x0, 0x0, 0x0) [ 991.568211] tmpfs: Bad value '-k7m2p' for mount option 'nr_inodes' 18:07:54 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3e00000000000000}]}, 0x78) 18:07:54 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) keyctl$chown(0x4, 0x0, r3, 0x0) r4 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) write$uinput_user_dev(r4, 0x0, 0x0) write$uinput_user_dev(r4, &(0x7f0000000480)={'syz0\x00', {0xa65b, 0x1000, 0xfffb, 0x80}, 0x32, [0x4, 0x631, 0xaf, 0x2, 0x1b, 0x1, 0x10001, 0x1, 0x8, 0x3ff, 0x800, 0x7859, 0x7, 0x5, 0x7fff, 0xc05, 0xa4, 0x3, 0x4, 0xfffff800, 0x6, 0x7c, 0x6, 0xff, 0x2, 0x771, 0x5, 0xfffffff8, 0x81, 0x0, 0x6, 0x7, 0x6, 0x9, 0x3, 0x0, 0x282d298e, 0x7, 0x6, 0x3, 0xfaf9, 0x7, 0x2, 0xf9, 0xc2, 0x0, 0x8, 0x8, 0x9, 0x4, 0x8eb1, 0x0, 0x8, 0x9, 0x7d, 0x8, 0x9, 0x4, 0x3, 0x10000, 0xfab, 0x39, 0x7, 0x4], [0x0, 0x7ff, 0x1f, 0x1, 0x7, 0x2, 0x6, 0xd594, 0x3, 0x2a, 0x1c9b4fd4, 0x0, 0xfff, 0x5, 0xfffff801, 0x9, 0x3f, 0x8, 0x80, 0x6, 0x401, 0x8000, 0x1, 0xcb, 0x1, 0x6, 0x4, 0x92, 0x800000, 0x7, 0x1f, 0x140, 0x7ff, 0xabbc, 0x401, 0x0, 0x3, 0x20, 0x48, 0x12000, 0xfa, 0x1, 0xfffff6fe, 0x0, 0x7, 0x8818, 0x8000, 0x6, 0x1f, 0x8, 0x4, 0xff, 0x101, 0xd7, 0x8, 0x5, 0xffff8001, 0x5, 0xb621, 0x1, 0x9, 0x1395db38, 0x0, 0x3], [0x6, 0x6, 0x401, 0x2d5, 0xc08, 0x3, 0x7f, 0x7, 0x8, 0x4, 0xbe1a, 0x5, 0x3, 0x93c, 0x9, 0x80, 0x800, 0x7fff, 0x6, 0x1, 0x5, 0x2, 0x9, 0x7fff, 0x0, 0x8000, 0x4, 0x6, 0x2, 0x4, 0x6, 0xa2ec, 0x7, 0x100, 0x1, 0x3, 0x1f, 0x81, 0x10000, 0xc5, 0x7ff, 0x2aae236d, 0x4, 0x2000, 0x1c, 0x3, 0x2, 0x735c, 0x7fffffff, 0x6, 0xfffffffd, 0x4, 0x3ff, 0x7fffffff, 0x8, 0x224, 0x261, 0x8b8a, 0x100, 0xffffffff, 0x7fff, 0x41, 0x401, 0x200], [0x7, 0x4, 0x2, 0x5, 0x7, 0x1, 0x8, 0x0, 0x8, 0xffffff7b, 0x0, 0x5, 0x6, 0xcc9, 0x1, 0x5, 0x2, 0xfffffffe, 0xfffffff9, 0x0, 0x5, 0x101, 0x401, 0x2, 0x3, 0x3, 0x7f76, 0x3ff, 0x9, 0xc14, 0x3, 0x7, 0x5, 0x100, 0x6, 0x8, 0x2, 0xe0, 0x3f, 0x200, 0x3, 0x9, 0x3, 0x5, 0x95c6, 0x2, 0x6, 0x20, 0x3, 0x8, 0x9, 0x7, 0x9, 0x0, 0xffffd671, 0x1, 0x0, 0x853d, 0x7, 0x3ff, 0x0, 0xfde7, 0x1, 0x5]}, 0x45c) r5 = openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ocfs2_control\x00', 0x20200, 0x0) connect$x25(r5, &(0x7f0000000080)={0x9, @remote={[], 0x1}}, 0x12) syz_mount_image$tmpfs(&(0x7f0000000280)='tmpfs\x00', &(0x7f0000000000)='./file0\x00', 0x1f, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="6e725f626c6f636b733d2c6e725f696e6f6465733d2d6b376d32702c7375626a5f726f6c653d2fcc2a2b1d2e2c2c666f776e65723c", @ANYRESDEC=r3, @ANYBLOB="1c736d61576b6673726f6f1f0074c27f74a2002c00"]) 18:07:54 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68}, [{0x0, 0x0, 0x0, 0x1900000000000000}]}, 0x78) [ 991.713238] tmpfs: Bad value '-k7m2p' for mount option 'nr_inodes' 18:07:57 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r0, &(0x7f0000000040)=""/244, 0xf4) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {0x0}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x19) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 18:07:57 executing program 2: clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000200)={[0x7]}, &(0x7f0000000380), 0x0, 0x8) r0 = memfd_create(&(0x7f0000000440)='systemem0md5sum$\x00', 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r0, 0x0) rt_sigaction(0x0, &(0x7f0000b4a000)={0x0, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000)) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000280)='net/route\x00') 18:07:57 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68}, [{0x0, 0x0, 0x0, 0x1a00000000000000}]}, 0x78) 18:07:57 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f00000000000000}]}, 0x78) 18:07:57 executing program 4: getdents(0xffffffffffffffff, &(0x7f0000000040)=""/244, 0xf4) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x3d}, {0x0, 0x2a}, {0x0}, {&(0x7f0000000100)="6653960d0ec5d684fa9f017ef0d60a3c27bc33760036001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479810be2aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e6517e615607676f8f9fc0ebf8b0b16d6f2c59957ab35d05692e664ebf68734ca53366295f4ad6142134b62f11e92ead037c7fb53455560c8ef0f1c94fafa924edfe92175aaa1c4ecc7aeeb72e0d050feacee907f40888c96a65545e07422bc6ac79f4c2d6ee3dab47d06e764682c72d7f16542fcfd05d2813cc182d1595016c179e1717c160300ab1ab0ac397e91bd193c036feb66a9ad2ec5b7967e7f5ff957f8b085a2437c59a", 0xf8}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x19) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 18:07:57 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) keyctl$chown(0x4, 0x0, r3, 0x0) r4 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) write$uinput_user_dev(r4, 0x0, 0x0) write$uinput_user_dev(r4, &(0x7f0000000480)={'syz0\x00', {0xa65b, 0x1000, 0xfffb, 0x80}, 0x32, [0x4, 0x631, 0xaf, 0x2, 0x1b, 0x1, 0x10001, 0x1, 0x8, 0x3ff, 0x800, 0x7859, 0x7, 0x5, 0x7fff, 0xc05, 0xa4, 0x3, 0x4, 0xfffff800, 0x6, 0x7c, 0x6, 0xff, 0x2, 0x771, 0x5, 0xfffffff8, 0x81, 0x0, 0x6, 0x7, 0x6, 0x9, 0x3, 0x0, 0x282d298e, 0x7, 0x6, 0x3, 0xfaf9, 0x7, 0x2, 0xf9, 0xc2, 0x0, 0x8, 0x8, 0x9, 0x4, 0x8eb1, 0x0, 0x8, 0x9, 0x7d, 0x8, 0x9, 0x4, 0x3, 0x10000, 0xfab, 0x39, 0x7, 0x4], [0x0, 0x7ff, 0x1f, 0x1, 0x7, 0x2, 0x6, 0xd594, 0x3, 0x2a, 0x1c9b4fd4, 0x0, 0xfff, 0x5, 0xfffff801, 0x9, 0x3f, 0x8, 0x80, 0x6, 0x401, 0x8000, 0x1, 0xcb, 0x1, 0x6, 0x4, 0x92, 0x800000, 0x7, 0x1f, 0x140, 0x7ff, 0xabbc, 0x401, 0x0, 0x3, 0x20, 0x48, 0x12000, 0xfa, 0x1, 0xfffff6fe, 0x0, 0x7, 0x8818, 0x8000, 0x6, 0x1f, 0x8, 0x4, 0xff, 0x101, 0xd7, 0x8, 0x5, 0xffff8001, 0x5, 0xb621, 0x1, 0x9, 0x1395db38, 0x0, 0x3], [0x6, 0x6, 0x401, 0x2d5, 0xc08, 0x3, 0x7f, 0x7, 0x8, 0x4, 0xbe1a, 0x5, 0x3, 0x93c, 0x9, 0x80, 0x800, 0x7fff, 0x6, 0x1, 0x5, 0x2, 0x9, 0x7fff, 0x0, 0x8000, 0x4, 0x6, 0x2, 0x4, 0x6, 0xa2ec, 0x7, 0x100, 0x1, 0x3, 0x1f, 0x81, 0x10000, 0xc5, 0x7ff, 0x2aae236d, 0x4, 0x2000, 0x1c, 0x3, 0x2, 0x735c, 0x7fffffff, 0x6, 0xfffffffd, 0x4, 0x3ff, 0x7fffffff, 0x8, 0x224, 0x261, 0x8b8a, 0x100, 0xffffffff, 0x7fff, 0x41, 0x401, 0x200], [0x7, 0x4, 0x2, 0x5, 0x7, 0x1, 0x8, 0x0, 0x8, 0xffffff7b, 0x0, 0x5, 0x6, 0xcc9, 0x1, 0x5, 0x2, 0xfffffffe, 0xfffffff9, 0x0, 0x5, 0x101, 0x401, 0x2, 0x3, 0x3, 0x7f76, 0x3ff, 0x9, 0xc14, 0x3, 0x7, 0x5, 0x100, 0x6, 0x8, 0x2, 0xe0, 0x3f, 0x200, 0x3, 0x9, 0x3, 0x5, 0x95c6, 0x2, 0x6, 0x20, 0x3, 0x8, 0x9, 0x7, 0x9, 0x0, 0xffffd671, 0x1, 0x0, 0x853d, 0x7, 0x3ff, 0x0, 0xfde7, 0x1, 0x5]}, 0x45c) r5 = openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ocfs2_control\x00', 0x20200, 0x0) connect$x25(r5, &(0x7f0000000080)={0x9, @remote={[], 0x1}}, 0x12) 18:07:57 executing program 2: clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000200)={[0x7]}, &(0x7f0000000380), 0x0, 0x8) r0 = memfd_create(&(0x7f0000000440)='systemem0md5sum$\x00', 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r0, 0x0) rt_sigaction(0x7, 0x0, 0x0, 0x8, &(0x7f0000000000)) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000280)='net/route\x00') 18:07:57 executing program 4: getdents(0xffffffffffffffff, &(0x7f0000000040)=""/244, 0xf4) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x3d}, {0x0, 0x2a}, {0x0}, {&(0x7f0000000100)="6653960d0ec5d684fa9f017ef0d60a3c27bc33760036001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479810be2aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e6517e615607676f8f9fc0ebf8b0b16d6f2c59957ab35d05692e664ebf68734ca53366295f4ad6142134b62f11e92ead037c7fb53455560c8ef0f1c94fafa924edfe92175aaa1c4ecc7aeeb72e0d050feacee907f40888c96a65545e07422bc6ac79f4c2d6ee3dab47d06e764682c72d7f16542fcfd05d2813cc182d1595016c179e1717c160300ab1ab0ac397e91bd193c036feb66a9ad2ec5b7967e7f5ff957f8b085a2437c59a", 0xf8}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x19) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 18:07:57 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80ffffff00000000}]}, 0x78) 18:07:57 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) keyctl$chown(0x4, 0x0, r3, 0x0) r4 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) write$uinput_user_dev(r4, 0x0, 0x0) write$uinput_user_dev(r4, &(0x7f0000000480)={'syz0\x00', {0xa65b, 0x1000, 0xfffb, 0x80}, 0x32, [0x4, 0x631, 0xaf, 0x2, 0x1b, 0x1, 0x10001, 0x1, 0x8, 0x3ff, 0x800, 0x7859, 0x7, 0x5, 0x7fff, 0xc05, 0xa4, 0x3, 0x4, 0xfffff800, 0x6, 0x7c, 0x6, 0xff, 0x2, 0x771, 0x5, 0xfffffff8, 0x81, 0x0, 0x6, 0x7, 0x6, 0x9, 0x3, 0x0, 0x282d298e, 0x7, 0x6, 0x3, 0xfaf9, 0x7, 0x2, 0xf9, 0xc2, 0x0, 0x8, 0x8, 0x9, 0x4, 0x8eb1, 0x0, 0x8, 0x9, 0x7d, 0x8, 0x9, 0x4, 0x3, 0x10000, 0xfab, 0x39, 0x7, 0x4], [0x0, 0x7ff, 0x1f, 0x1, 0x7, 0x2, 0x6, 0xd594, 0x3, 0x2a, 0x1c9b4fd4, 0x0, 0xfff, 0x5, 0xfffff801, 0x9, 0x3f, 0x8, 0x80, 0x6, 0x401, 0x8000, 0x1, 0xcb, 0x1, 0x6, 0x4, 0x92, 0x800000, 0x7, 0x1f, 0x140, 0x7ff, 0xabbc, 0x401, 0x0, 0x3, 0x20, 0x48, 0x12000, 0xfa, 0x1, 0xfffff6fe, 0x0, 0x7, 0x8818, 0x8000, 0x6, 0x1f, 0x8, 0x4, 0xff, 0x101, 0xd7, 0x8, 0x5, 0xffff8001, 0x5, 0xb621, 0x1, 0x9, 0x1395db38, 0x0, 0x3], [0x6, 0x6, 0x401, 0x2d5, 0xc08, 0x3, 0x7f, 0x7, 0x8, 0x4, 0xbe1a, 0x5, 0x3, 0x93c, 0x9, 0x80, 0x800, 0x7fff, 0x6, 0x1, 0x5, 0x2, 0x9, 0x7fff, 0x0, 0x8000, 0x4, 0x6, 0x2, 0x4, 0x6, 0xa2ec, 0x7, 0x100, 0x1, 0x3, 0x1f, 0x81, 0x10000, 0xc5, 0x7ff, 0x2aae236d, 0x4, 0x2000, 0x1c, 0x3, 0x2, 0x735c, 0x7fffffff, 0x6, 0xfffffffd, 0x4, 0x3ff, 0x7fffffff, 0x8, 0x224, 0x261, 0x8b8a, 0x100, 0xffffffff, 0x7fff, 0x41, 0x401, 0x200], [0x7, 0x4, 0x2, 0x5, 0x7, 0x1, 0x8, 0x0, 0x8, 0xffffff7b, 0x0, 0x5, 0x6, 0xcc9, 0x1, 0x5, 0x2, 0xfffffffe, 0xfffffff9, 0x0, 0x5, 0x101, 0x401, 0x2, 0x3, 0x3, 0x7f76, 0x3ff, 0x9, 0xc14, 0x3, 0x7, 0x5, 0x100, 0x6, 0x8, 0x2, 0xe0, 0x3f, 0x200, 0x3, 0x9, 0x3, 0x5, 0x95c6, 0x2, 0x6, 0x20, 0x3, 0x8, 0x9, 0x7, 0x9, 0x0, 0xffffd671, 0x1, 0x0, 0x853d, 0x7, 0x3ff, 0x0, 0xfde7, 0x1, 0x5]}, 0x45c) openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ocfs2_control\x00', 0x20200, 0x0) 18:07:57 executing program 2: clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000200)={[0x7]}, &(0x7f0000000380), 0x0, 0x8) r0 = memfd_create(&(0x7f0000000440)='systemem0md5sum$\x00', 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r0, 0x0) rt_sigaction(0x7, 0x0, 0x0, 0x8, &(0x7f0000000000)) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000280)='net/route\x00') 18:07:57 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68}, [{0x0, 0x0, 0x0, 0x1b00000000000000}]}, 0x78) 18:08:00 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r0, &(0x7f0000000040)=""/244, 0xf4) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {0x0}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x19) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 18:08:00 executing program 4: getdents(0xffffffffffffffff, &(0x7f0000000040)=""/244, 0xf4) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x3d}, {0x0, 0x2a}, {0x0}, {&(0x7f0000000100)="6653960d0ec5d684fa9f017ef0d60a3c27bc33760036001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479810be2aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e6517e615607676f8f9fc0ebf8b0b16d6f2c59957ab35d05692e664ebf68734ca53366295f4ad6142134b62f11e92ead037c7fb53455560c8ef0f1c94fafa924edfe92175aaa1c4ecc7aeeb72e0d050feacee907f40888c96a65545e07422bc6ac79f4c2d6ee3dab47d06e764682c72d7f16542fcfd05d2813cc182d1595016c179e1717c160300ab1ab0ac397e91bd193c036feb66a9ad2ec5b7967e7f5ff957f8b085a2437c59a", 0xf8}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x19) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 18:08:00 executing program 2: clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000200)={[0x7]}, &(0x7f0000000380), 0x0, 0x8) r0 = memfd_create(&(0x7f0000000440)='systemem0md5sum$\x00', 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r0, 0x0) rt_sigaction(0x7, 0x0, 0x0, 0x8, &(0x7f0000000000)) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000280)='net/route\x00') 18:08:00 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68}, [{0x0, 0x0, 0x0, 0x1e00000000000000}]}, 0x78) 18:08:00 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) keyctl$chown(0x4, 0x0, r3, 0x0) r4 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) write$uinput_user_dev(r4, 0x0, 0x0) write$uinput_user_dev(r4, &(0x7f0000000480)={'syz0\x00', {0xa65b, 0x1000, 0xfffb, 0x80}, 0x32, [0x4, 0x631, 0xaf, 0x2, 0x1b, 0x1, 0x10001, 0x1, 0x8, 0x3ff, 0x800, 0x7859, 0x7, 0x5, 0x7fff, 0xc05, 0xa4, 0x3, 0x4, 0xfffff800, 0x6, 0x7c, 0x6, 0xff, 0x2, 0x771, 0x5, 0xfffffff8, 0x81, 0x0, 0x6, 0x7, 0x6, 0x9, 0x3, 0x0, 0x282d298e, 0x7, 0x6, 0x3, 0xfaf9, 0x7, 0x2, 0xf9, 0xc2, 0x0, 0x8, 0x8, 0x9, 0x4, 0x8eb1, 0x0, 0x8, 0x9, 0x7d, 0x8, 0x9, 0x4, 0x3, 0x10000, 0xfab, 0x39, 0x7, 0x4], [0x0, 0x7ff, 0x1f, 0x1, 0x7, 0x2, 0x6, 0xd594, 0x3, 0x2a, 0x1c9b4fd4, 0x0, 0xfff, 0x5, 0xfffff801, 0x9, 0x3f, 0x8, 0x80, 0x6, 0x401, 0x8000, 0x1, 0xcb, 0x1, 0x6, 0x4, 0x92, 0x800000, 0x7, 0x1f, 0x140, 0x7ff, 0xabbc, 0x401, 0x0, 0x3, 0x20, 0x48, 0x12000, 0xfa, 0x1, 0xfffff6fe, 0x0, 0x7, 0x8818, 0x8000, 0x6, 0x1f, 0x8, 0x4, 0xff, 0x101, 0xd7, 0x8, 0x5, 0xffff8001, 0x5, 0xb621, 0x1, 0x9, 0x1395db38, 0x0, 0x3], [0x6, 0x6, 0x401, 0x2d5, 0xc08, 0x3, 0x7f, 0x7, 0x8, 0x4, 0xbe1a, 0x5, 0x3, 0x93c, 0x9, 0x80, 0x800, 0x7fff, 0x6, 0x1, 0x5, 0x2, 0x9, 0x7fff, 0x0, 0x8000, 0x4, 0x6, 0x2, 0x4, 0x6, 0xa2ec, 0x7, 0x100, 0x1, 0x3, 0x1f, 0x81, 0x10000, 0xc5, 0x7ff, 0x2aae236d, 0x4, 0x2000, 0x1c, 0x3, 0x2, 0x735c, 0x7fffffff, 0x6, 0xfffffffd, 0x4, 0x3ff, 0x7fffffff, 0x8, 0x224, 0x261, 0x8b8a, 0x100, 0xffffffff, 0x7fff, 0x41, 0x401, 0x200], [0x7, 0x4, 0x2, 0x5, 0x7, 0x1, 0x8, 0x0, 0x8, 0xffffff7b, 0x0, 0x5, 0x6, 0xcc9, 0x1, 0x5, 0x2, 0xfffffffe, 0xfffffff9, 0x0, 0x5, 0x101, 0x401, 0x2, 0x3, 0x3, 0x7f76, 0x3ff, 0x9, 0xc14, 0x3, 0x7, 0x5, 0x100, 0x6, 0x8, 0x2, 0xe0, 0x3f, 0x200, 0x3, 0x9, 0x3, 0x5, 0x95c6, 0x2, 0x6, 0x20, 0x3, 0x8, 0x9, 0x7, 0x9, 0x0, 0xffffd671, 0x1, 0x0, 0x853d, 0x7, 0x3ff, 0x0, 0xfde7, 0x1, 0x5]}, 0x45c) 18:08:00 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b00000000000000}]}, 0x78) 18:08:00 executing program 4: getdents(0xffffffffffffffff, &(0x7f0000000040)=""/244, 0xf4) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x3d}, {0x0, 0x2a}, {0x0}, {&(0x7f0000000100)="6653960d0ec5d684fa9f017ef0d60a3c27bc33760036001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479810be2aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e6517e615607676f8f9fc0ebf8b0b16d6f2c59957ab35d05692e664ebf68734ca53366295f4ad6142134b62f11e92ead037c7fb53455560c8ef0f1c94fafa924edfe92175aaa1c4ecc7aeeb72e0d050feacee907f40888c96a65545e07422bc6ac79f4c2d6ee3dab47d06e764682c72d7f16542fcfd05d2813cc182d1595016c179e1717c160300ab1ab0ac397e91bd193c036feb66a9ad2ec5b7967e7f5ff957f8b085a2437c59a", 0xf8}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x19) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 18:08:00 executing program 2: clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000200)={[0x7]}, &(0x7f0000000380), 0x0, 0x8) r0 = memfd_create(&(0x7f0000000440)='systemem0md5sum$\x00', 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r0, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0x0, 0x0, 0x0}, 0x0, 0x0, 0x0) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000280)='net/route\x00') 18:08:00 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68}, [{0x0, 0x0, 0x0, 0x3e00000000000000}]}, 0x78) 18:08:00 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) keyctl$chown(0x4, 0x0, r3, 0x0) r4 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) write$uinput_user_dev(r4, &(0x7f0000000480)={'syz0\x00', {0xa65b, 0x1000, 0xfffb, 0x80}, 0x32, [0x4, 0x631, 0xaf, 0x2, 0x1b, 0x1, 0x10001, 0x1, 0x8, 0x3ff, 0x800, 0x7859, 0x7, 0x5, 0x7fff, 0xc05, 0xa4, 0x3, 0x4, 0xfffff800, 0x6, 0x7c, 0x6, 0xff, 0x2, 0x771, 0x5, 0xfffffff8, 0x81, 0x0, 0x6, 0x7, 0x6, 0x9, 0x3, 0x0, 0x282d298e, 0x7, 0x6, 0x3, 0xfaf9, 0x7, 0x2, 0xf9, 0xc2, 0x0, 0x8, 0x8, 0x9, 0x4, 0x8eb1, 0x0, 0x8, 0x9, 0x7d, 0x8, 0x9, 0x4, 0x3, 0x10000, 0xfab, 0x39, 0x7, 0x4], [0x0, 0x7ff, 0x1f, 0x1, 0x7, 0x2, 0x6, 0xd594, 0x3, 0x2a, 0x1c9b4fd4, 0x0, 0xfff, 0x5, 0xfffff801, 0x9, 0x3f, 0x8, 0x80, 0x6, 0x401, 0x8000, 0x1, 0xcb, 0x1, 0x6, 0x4, 0x92, 0x800000, 0x7, 0x1f, 0x140, 0x7ff, 0xabbc, 0x401, 0x0, 0x3, 0x20, 0x48, 0x12000, 0xfa, 0x1, 0xfffff6fe, 0x0, 0x7, 0x8818, 0x8000, 0x6, 0x1f, 0x8, 0x4, 0xff, 0x101, 0xd7, 0x8, 0x5, 0xffff8001, 0x5, 0xb621, 0x1, 0x9, 0x1395db38, 0x0, 0x3], [0x6, 0x6, 0x401, 0x2d5, 0xc08, 0x3, 0x7f, 0x7, 0x8, 0x4, 0xbe1a, 0x5, 0x3, 0x93c, 0x9, 0x80, 0x800, 0x7fff, 0x6, 0x1, 0x5, 0x2, 0x9, 0x7fff, 0x0, 0x8000, 0x4, 0x6, 0x2, 0x4, 0x6, 0xa2ec, 0x7, 0x100, 0x1, 0x3, 0x1f, 0x81, 0x10000, 0xc5, 0x7ff, 0x2aae236d, 0x4, 0x2000, 0x1c, 0x3, 0x2, 0x735c, 0x7fffffff, 0x6, 0xfffffffd, 0x4, 0x3ff, 0x7fffffff, 0x8, 0x224, 0x261, 0x8b8a, 0x100, 0xffffffff, 0x7fff, 0x41, 0x401, 0x200], [0x7, 0x4, 0x2, 0x5, 0x7, 0x1, 0x8, 0x0, 0x8, 0xffffff7b, 0x0, 0x5, 0x6, 0xcc9, 0x1, 0x5, 0x2, 0xfffffffe, 0xfffffff9, 0x0, 0x5, 0x101, 0x401, 0x2, 0x3, 0x3, 0x7f76, 0x3ff, 0x9, 0xc14, 0x3, 0x7, 0x5, 0x100, 0x6, 0x8, 0x2, 0xe0, 0x3f, 0x200, 0x3, 0x9, 0x3, 0x5, 0x95c6, 0x2, 0x6, 0x20, 0x3, 0x8, 0x9, 0x7, 0x9, 0x0, 0xffffd671, 0x1, 0x0, 0x853d, 0x7, 0x3ff, 0x0, 0xfde7, 0x1, 0x5]}, 0x45c) 18:08:00 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff000000000000}]}, 0x78) 18:08:00 executing program 4: getdents(0xffffffffffffffff, &(0x7f0000000040)=""/244, 0xf4) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x3d}, {0x0, 0x2a}, {0x0}, {&(0x7f0000000100)="6653960d0ec5d684fa9f017ef0d60a3c27bc33760036001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479810be2aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e6517e615607676f8f9fc0ebf8b0b16d6f2c59957ab35d05692e664ebf68734ca53366295f4ad6142134b62f11e92ead037c7fb53455560c8ef0f1c94fafa924edfe92175aaa1c4ecc7aeeb72e0d050feacee907f40888c96a65545e07422bc6ac79f4c2d6ee3dab47d06e764682c72d7f16542fcfd05d2813cc182d1595016c179e1717c160300ab1ab0ac397e91bd193c036feb66a9ad2ec5b7967e7f5ff957f8b085a2437c59a", 0xf8}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x19) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) [ 997.754500] ptrace attach of "/root/syz-executor.4"[8364] was attempted by "/root/syz-executor.4"[8365] 18:08:03 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r0, &(0x7f0000000040)=""/244, 0xf4) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x19) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 18:08:03 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) keyctl$chown(0x4, 0x0, r3, 0x0) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000480)={'syz0\x00', {0xa65b, 0x1000, 0xfffb, 0x80}, 0x32, [0x4, 0x631, 0xaf, 0x2, 0x1b, 0x1, 0x10001, 0x1, 0x8, 0x3ff, 0x800, 0x7859, 0x7, 0x5, 0x7fff, 0xc05, 0xa4, 0x3, 0x4, 0xfffff800, 0x6, 0x7c, 0x6, 0xff, 0x2, 0x771, 0x5, 0xfffffff8, 0x81, 0x0, 0x6, 0x7, 0x6, 0x9, 0x3, 0x0, 0x282d298e, 0x7, 0x6, 0x3, 0xfaf9, 0x7, 0x2, 0xf9, 0xc2, 0x0, 0x8, 0x8, 0x9, 0x4, 0x8eb1, 0x0, 0x8, 0x9, 0x7d, 0x8, 0x9, 0x4, 0x3, 0x10000, 0xfab, 0x39, 0x7, 0x4], [0x0, 0x7ff, 0x1f, 0x1, 0x7, 0x2, 0x6, 0xd594, 0x3, 0x2a, 0x1c9b4fd4, 0x0, 0xfff, 0x5, 0xfffff801, 0x9, 0x3f, 0x8, 0x80, 0x6, 0x401, 0x8000, 0x1, 0xcb, 0x1, 0x6, 0x4, 0x92, 0x800000, 0x7, 0x1f, 0x140, 0x7ff, 0xabbc, 0x401, 0x0, 0x3, 0x20, 0x48, 0x12000, 0xfa, 0x1, 0xfffff6fe, 0x0, 0x7, 0x8818, 0x8000, 0x6, 0x1f, 0x8, 0x4, 0xff, 0x101, 0xd7, 0x8, 0x5, 0xffff8001, 0x5, 0xb621, 0x1, 0x9, 0x1395db38, 0x0, 0x3], [0x6, 0x6, 0x401, 0x2d5, 0xc08, 0x3, 0x7f, 0x7, 0x8, 0x4, 0xbe1a, 0x5, 0x3, 0x93c, 0x9, 0x80, 0x800, 0x7fff, 0x6, 0x1, 0x5, 0x2, 0x9, 0x7fff, 0x0, 0x8000, 0x4, 0x6, 0x2, 0x4, 0x6, 0xa2ec, 0x7, 0x100, 0x1, 0x3, 0x1f, 0x81, 0x10000, 0xc5, 0x7ff, 0x2aae236d, 0x4, 0x2000, 0x1c, 0x3, 0x2, 0x735c, 0x7fffffff, 0x6, 0xfffffffd, 0x4, 0x3ff, 0x7fffffff, 0x8, 0x224, 0x261, 0x8b8a, 0x100, 0xffffffff, 0x7fff, 0x41, 0x401, 0x200], [0x7, 0x4, 0x2, 0x5, 0x7, 0x1, 0x8, 0x0, 0x8, 0xffffff7b, 0x0, 0x5, 0x6, 0xcc9, 0x1, 0x5, 0x2, 0xfffffffe, 0xfffffff9, 0x0, 0x5, 0x101, 0x401, 0x2, 0x3, 0x3, 0x7f76, 0x3ff, 0x9, 0xc14, 0x3, 0x7, 0x5, 0x100, 0x6, 0x8, 0x2, 0xe0, 0x3f, 0x200, 0x3, 0x9, 0x3, 0x5, 0x95c6, 0x2, 0x6, 0x20, 0x3, 0x8, 0x9, 0x7, 0x9, 0x0, 0xffffd671, 0x1, 0x0, 0x853d, 0x7, 0x3ff, 0x0, 0xfde7, 0x1, 0x5]}, 0x45c) 18:08:03 executing program 2: clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000200)={[0x7]}, &(0x7f0000000380), 0x0, 0x8) r0 = memfd_create(&(0x7f0000000440)='systemem0md5sum$\x00', 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r0, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0x0, 0x0, 0x0}, 0x0, 0x0, 0x0) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000280)='net/route\x00') 18:08:03 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68}, [{0x0, 0x0, 0x0, 0x3f00000000000000}]}, 0x78) 18:08:03 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}]}, 0x78) 18:08:03 executing program 4: getdents(0xffffffffffffffff, &(0x7f0000000040)=""/244, 0xf4) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x3d}, {0x0, 0x2a}, {0x0}, {&(0x7f0000000100)="6653960d0ec5d684fa9f017ef0d60a3c27bc33760036001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479810be2aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e6517e615607676f8f9fc0ebf8b0b16d6f2c59957ab35d05692e664ebf68734ca53366295f4ad6142134b62f11e92ead037c7fb53455560c8ef0f1c94fafa924edfe92175aaa1c4ecc7aeeb72e0d050feacee907f40888c96a65545e07422bc6ac79f4c2d6ee3dab47d06e764682c72d7f16542fcfd05d2813cc182d1595016c179e1717c160300ab1ab0ac397e91bd193c036feb66a9ad2ec5b7967e7f5ff957f8b085a2437c59a", 0xf8}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x19) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 18:08:03 executing program 2: clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000200)={[0x7]}, &(0x7f0000000380), 0x0, 0x8) r0 = memfd_create(&(0x7f0000000440)='systemem0md5sum$\x00', 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r0, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0x0, 0x0, 0x0}, 0x0, 0x0, 0x0) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000280)='net/route\x00') 18:08:03 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x3d}, {0x0, 0x2a}, {0x0}, {&(0x7f0000000100)="6653960d0ec5d684fa9f017ef0d60a3c27bc33760036001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479810be2aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e6517e615607676f8f9fc0ebf8b0b16d6f2c59957ab35d05692e664ebf68734ca53366295f4ad6142134b62f11e92ead037c7fb53455560c8ef0f1c94fafa924edfe92175aaa1c4ecc7aeeb72e0d050feacee907f40888c96a65545e07422bc6ac79f4c2d6ee3dab47d06e764682c72d7f16542fcfd05d2813cc182d1595016c179e1717c160300ab1ab0ac397e91bd193c036feb66a9ad2ec5b7967e7f5ff957f8b085a2437c59a", 0xf8}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x19) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 18:08:03 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}]}, 0x78) [ 1000.701731] ptrace attach of "/root/syz-executor.4"[8389] was attempted by "/root/syz-executor.4"[8394] 18:08:03 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) keyctl$chown(0x4, 0x0, r3, 0x0) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000480)={'syz0\x00', {0xa65b, 0x1000, 0xfffb, 0x80}, 0x32, [0x4, 0x631, 0xaf, 0x2, 0x1b, 0x1, 0x10001, 0x1, 0x8, 0x3ff, 0x800, 0x7859, 0x7, 0x5, 0x7fff, 0xc05, 0xa4, 0x3, 0x4, 0xfffff800, 0x6, 0x7c, 0x6, 0xff, 0x2, 0x771, 0x5, 0xfffffff8, 0x81, 0x0, 0x6, 0x7, 0x6, 0x9, 0x3, 0x0, 0x282d298e, 0x7, 0x6, 0x3, 0xfaf9, 0x7, 0x2, 0xf9, 0xc2, 0x0, 0x8, 0x8, 0x9, 0x4, 0x8eb1, 0x0, 0x8, 0x9, 0x7d, 0x8, 0x9, 0x4, 0x3, 0x10000, 0xfab, 0x39, 0x7, 0x4], [0x0, 0x7ff, 0x1f, 0x1, 0x7, 0x2, 0x6, 0xd594, 0x3, 0x2a, 0x1c9b4fd4, 0x0, 0xfff, 0x5, 0xfffff801, 0x9, 0x3f, 0x8, 0x80, 0x6, 0x401, 0x8000, 0x1, 0xcb, 0x1, 0x6, 0x4, 0x92, 0x800000, 0x7, 0x1f, 0x140, 0x7ff, 0xabbc, 0x401, 0x0, 0x3, 0x20, 0x48, 0x12000, 0xfa, 0x1, 0xfffff6fe, 0x0, 0x7, 0x8818, 0x8000, 0x6, 0x1f, 0x8, 0x4, 0xff, 0x101, 0xd7, 0x8, 0x5, 0xffff8001, 0x5, 0xb621, 0x1, 0x9, 0x1395db38, 0x0, 0x3], [0x6, 0x6, 0x401, 0x2d5, 0xc08, 0x3, 0x7f, 0x7, 0x8, 0x4, 0xbe1a, 0x5, 0x3, 0x93c, 0x9, 0x80, 0x800, 0x7fff, 0x6, 0x1, 0x5, 0x2, 0x9, 0x7fff, 0x0, 0x8000, 0x4, 0x6, 0x2, 0x4, 0x6, 0xa2ec, 0x7, 0x100, 0x1, 0x3, 0x1f, 0x81, 0x10000, 0xc5, 0x7ff, 0x2aae236d, 0x4, 0x2000, 0x1c, 0x3, 0x2, 0x735c, 0x7fffffff, 0x6, 0xfffffffd, 0x4, 0x3ff, 0x7fffffff, 0x8, 0x224, 0x261, 0x8b8a, 0x100, 0xffffffff, 0x7fff, 0x41, 0x401, 0x200], [0x7, 0x4, 0x2, 0x5, 0x7, 0x1, 0x8, 0x0, 0x8, 0xffffff7b, 0x0, 0x5, 0x6, 0xcc9, 0x1, 0x5, 0x2, 0xfffffffe, 0xfffffff9, 0x0, 0x5, 0x101, 0x401, 0x2, 0x3, 0x3, 0x7f76, 0x3ff, 0x9, 0xc14, 0x3, 0x7, 0x5, 0x100, 0x6, 0x8, 0x2, 0xe0, 0x3f, 0x200, 0x3, 0x9, 0x3, 0x5, 0x95c6, 0x2, 0x6, 0x20, 0x3, 0x8, 0x9, 0x7, 0x9, 0x0, 0xffffd671, 0x1, 0x0, 0x853d, 0x7, 0x3ff, 0x0, 0xfde7, 0x1, 0x5]}, 0x45c) 18:08:03 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68}, [{0x0, 0x0, 0x0, 0x7f00000000000000}]}, 0x78) 18:08:03 executing program 2: clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000200)={[0x7]}, &(0x7f0000000380), 0x0, 0x8) r0 = memfd_create(&(0x7f0000000440)='systemem0md5sum$\x00', 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r0, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0x0, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000)) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) 18:08:06 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r0, &(0x7f0000000040)=""/244, 0xf4) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x19) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 18:08:06 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}]}, 0x78) 18:08:06 executing program 2: clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000200)={[0x7]}, &(0x7f0000000380), 0x0, 0x8) r0 = memfd_create(&(0x7f0000000440)='systemem0md5sum$\x00', 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r0, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0x0, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000)) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) 18:08:06 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68}, [{0x0, 0x0, 0x0, 0x80ffffff00000000}]}, 0x78) 18:08:06 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) keyctl$chown(0x4, 0x0, r3, 0x0) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000480)={'syz0\x00', {0xa65b, 0x1000, 0xfffb, 0x80}, 0x32, [0x4, 0x631, 0xaf, 0x2, 0x1b, 0x1, 0x10001, 0x1, 0x8, 0x3ff, 0x800, 0x7859, 0x7, 0x5, 0x7fff, 0xc05, 0xa4, 0x3, 0x4, 0xfffff800, 0x6, 0x7c, 0x6, 0xff, 0x2, 0x771, 0x5, 0xfffffff8, 0x81, 0x0, 0x6, 0x7, 0x6, 0x9, 0x3, 0x0, 0x282d298e, 0x7, 0x6, 0x3, 0xfaf9, 0x7, 0x2, 0xf9, 0xc2, 0x0, 0x8, 0x8, 0x9, 0x4, 0x8eb1, 0x0, 0x8, 0x9, 0x7d, 0x8, 0x9, 0x4, 0x3, 0x10000, 0xfab, 0x39, 0x7, 0x4], [0x0, 0x7ff, 0x1f, 0x1, 0x7, 0x2, 0x6, 0xd594, 0x3, 0x2a, 0x1c9b4fd4, 0x0, 0xfff, 0x5, 0xfffff801, 0x9, 0x3f, 0x8, 0x80, 0x6, 0x401, 0x8000, 0x1, 0xcb, 0x1, 0x6, 0x4, 0x92, 0x800000, 0x7, 0x1f, 0x140, 0x7ff, 0xabbc, 0x401, 0x0, 0x3, 0x20, 0x48, 0x12000, 0xfa, 0x1, 0xfffff6fe, 0x0, 0x7, 0x8818, 0x8000, 0x6, 0x1f, 0x8, 0x4, 0xff, 0x101, 0xd7, 0x8, 0x5, 0xffff8001, 0x5, 0xb621, 0x1, 0x9, 0x1395db38, 0x0, 0x3], [0x6, 0x6, 0x401, 0x2d5, 0xc08, 0x3, 0x7f, 0x7, 0x8, 0x4, 0xbe1a, 0x5, 0x3, 0x93c, 0x9, 0x80, 0x800, 0x7fff, 0x6, 0x1, 0x5, 0x2, 0x9, 0x7fff, 0x0, 0x8000, 0x4, 0x6, 0x2, 0x4, 0x6, 0xa2ec, 0x7, 0x100, 0x1, 0x3, 0x1f, 0x81, 0x10000, 0xc5, 0x7ff, 0x2aae236d, 0x4, 0x2000, 0x1c, 0x3, 0x2, 0x735c, 0x7fffffff, 0x6, 0xfffffffd, 0x4, 0x3ff, 0x7fffffff, 0x8, 0x224, 0x261, 0x8b8a, 0x100, 0xffffffff, 0x7fff, 0x41, 0x401, 0x200], [0x7, 0x4, 0x2, 0x5, 0x7, 0x1, 0x8, 0x0, 0x8, 0xffffff7b, 0x0, 0x5, 0x6, 0xcc9, 0x1, 0x5, 0x2, 0xfffffffe, 0xfffffff9, 0x0, 0x5, 0x101, 0x401, 0x2, 0x3, 0x3, 0x7f76, 0x3ff, 0x9, 0xc14, 0x3, 0x7, 0x5, 0x100, 0x6, 0x8, 0x2, 0xe0, 0x3f, 0x200, 0x3, 0x9, 0x3, 0x5, 0x95c6, 0x2, 0x6, 0x20, 0x3, 0x8, 0x9, 0x7, 0x9, 0x0, 0xffffd671, 0x1, 0x0, 0x853d, 0x7, 0x3ff, 0x0, 0xfde7, 0x1, 0x5]}, 0x45c) 18:08:06 executing program 2: clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) rt_sigtimedwait(&(0x7f0000000200)={[0x7]}, &(0x7f0000000380), 0x0, 0x8) r0 = memfd_create(&(0x7f0000000440)='systemem0md5sum$\x00', 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r0, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0x0, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000000)) prctl$PR_SET_DUMPABLE(0x4, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) 18:08:06 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68}, [{0x0, 0x0, 0x0, 0x9b00000000000000}]}, 0x78) 18:08:06 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x3d}, {0x0, 0x2a}, {0x0}, {&(0x7f0000000100)="6653960d0ec5d684fa9f017ef0d60a3c27bc33760036001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479810be2aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e6517e615607676f8f9fc0ebf8b0b16d6f2c59957ab35d05692e664ebf68734ca53366295f4ad6142134b62f11e92ead037c7fb53455560c8ef0f1c94fafa924edfe92175aaa1c4ecc7aeeb72e0d050feacee907f40888c96a65545e07422bc6ac79f4c2d6ee3dab47d06e764682c72d7f16542fcfd05d2813cc182d1595016c179e1717c160300ab1ab0ac397e91bd193c036feb66a9ad2ec5b7967e7f5ff957f8b085a2437c59a", 0xf8}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x19) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 18:08:06 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68}, [{0x0, 0x0, 0x0, 0xe803000000000000}]}, 0x78) 18:08:06 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) write$uinput_user_dev(r3, &(0x7f0000000480)={'syz0\x00', {0xa65b, 0x1000, 0xfffb, 0x80}, 0x32, [0x4, 0x631, 0xaf, 0x2, 0x1b, 0x1, 0x10001, 0x1, 0x8, 0x3ff, 0x800, 0x7859, 0x7, 0x5, 0x7fff, 0xc05, 0xa4, 0x3, 0x4, 0xfffff800, 0x6, 0x7c, 0x6, 0xff, 0x2, 0x771, 0x5, 0xfffffff8, 0x81, 0x0, 0x6, 0x7, 0x6, 0x9, 0x3, 0x0, 0x282d298e, 0x7, 0x6, 0x3, 0xfaf9, 0x7, 0x2, 0xf9, 0xc2, 0x0, 0x8, 0x8, 0x9, 0x4, 0x8eb1, 0x0, 0x8, 0x9, 0x7d, 0x8, 0x9, 0x4, 0x3, 0x10000, 0xfab, 0x39, 0x7, 0x4], [0x0, 0x7ff, 0x1f, 0x1, 0x7, 0x2, 0x6, 0xd594, 0x3, 0x2a, 0x1c9b4fd4, 0x0, 0xfff, 0x5, 0xfffff801, 0x9, 0x3f, 0x8, 0x80, 0x6, 0x401, 0x8000, 0x1, 0xcb, 0x1, 0x6, 0x4, 0x92, 0x800000, 0x7, 0x1f, 0x140, 0x7ff, 0xabbc, 0x401, 0x0, 0x3, 0x20, 0x48, 0x12000, 0xfa, 0x1, 0xfffff6fe, 0x0, 0x7, 0x8818, 0x8000, 0x6, 0x1f, 0x8, 0x4, 0xff, 0x101, 0xd7, 0x8, 0x5, 0xffff8001, 0x5, 0xb621, 0x1, 0x9, 0x1395db38, 0x0, 0x3], [0x6, 0x6, 0x401, 0x2d5, 0xc08, 0x3, 0x7f, 0x7, 0x8, 0x4, 0xbe1a, 0x5, 0x3, 0x93c, 0x9, 0x80, 0x800, 0x7fff, 0x6, 0x1, 0x5, 0x2, 0x9, 0x7fff, 0x0, 0x8000, 0x4, 0x6, 0x2, 0x4, 0x6, 0xa2ec, 0x7, 0x100, 0x1, 0x3, 0x1f, 0x81, 0x10000, 0xc5, 0x7ff, 0x2aae236d, 0x4, 0x2000, 0x1c, 0x3, 0x2, 0x735c, 0x7fffffff, 0x6, 0xfffffffd, 0x4, 0x3ff, 0x7fffffff, 0x8, 0x224, 0x261, 0x8b8a, 0x100, 0xffffffff, 0x7fff, 0x41, 0x401, 0x200], [0x7, 0x4, 0x2, 0x5, 0x7, 0x1, 0x8, 0x0, 0x8, 0xffffff7b, 0x0, 0x5, 0x6, 0xcc9, 0x1, 0x5, 0x2, 0xfffffffe, 0xfffffff9, 0x0, 0x5, 0x101, 0x401, 0x2, 0x3, 0x3, 0x7f76, 0x3ff, 0x9, 0xc14, 0x3, 0x7, 0x5, 0x100, 0x6, 0x8, 0x2, 0xe0, 0x3f, 0x200, 0x3, 0x9, 0x3, 0x5, 0x95c6, 0x2, 0x6, 0x20, 0x3, 0x8, 0x9, 0x7, 0x9, 0x0, 0xffffd671, 0x1, 0x0, 0x853d, 0x7, 0x3ff, 0x0, 0xfde7, 0x1, 0x5]}, 0x45c) 18:08:06 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}]}, 0x78) 18:08:06 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) keyctl$chown(0x4, 0x0, r3, 0x0) r4 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) write$uinput_user_dev(r4, 0x0, 0x0) write$uinput_user_dev(r4, &(0x7f0000000480)={'syz0\x00', {0xa65b, 0x1000, 0xfffb, 0x80}, 0x32, [0x4, 0x631, 0xaf, 0x2, 0x1b, 0x1, 0x10001, 0x1, 0x8, 0x3ff, 0x800, 0x7859, 0x7, 0x5, 0x7fff, 0xc05, 0xa4, 0x3, 0x4, 0xfffff800, 0x6, 0x7c, 0x6, 0xff, 0x2, 0x771, 0x5, 0xfffffff8, 0x81, 0x0, 0x6, 0x7, 0x6, 0x9, 0x3, 0x0, 0x282d298e, 0x7, 0x6, 0x3, 0xfaf9, 0x7, 0x2, 0xf9, 0xc2, 0x0, 0x8, 0x8, 0x9, 0x4, 0x8eb1, 0x0, 0x8, 0x9, 0x7d, 0x8, 0x9, 0x4, 0x3, 0x10000, 0xfab, 0x39, 0x7, 0x4], [0x0, 0x7ff, 0x1f, 0x1, 0x7, 0x2, 0x6, 0xd594, 0x3, 0x2a, 0x1c9b4fd4, 0x0, 0xfff, 0x5, 0xfffff801, 0x9, 0x3f, 0x8, 0x80, 0x6, 0x401, 0x8000, 0x1, 0xcb, 0x1, 0x6, 0x4, 0x92, 0x800000, 0x7, 0x1f, 0x140, 0x7ff, 0xabbc, 0x401, 0x0, 0x3, 0x20, 0x48, 0x12000, 0xfa, 0x1, 0xfffff6fe, 0x0, 0x7, 0x8818, 0x8000, 0x6, 0x1f, 0x8, 0x4, 0xff, 0x101, 0xd7, 0x8, 0x5, 0xffff8001, 0x5, 0xb621, 0x1, 0x9, 0x1395db38, 0x0, 0x3], [0x6, 0x6, 0x401, 0x2d5, 0xc08, 0x3, 0x7f, 0x7, 0x8, 0x4, 0xbe1a, 0x5, 0x3, 0x93c, 0x9, 0x80, 0x800, 0x7fff, 0x6, 0x1, 0x5, 0x2, 0x9, 0x7fff, 0x0, 0x8000, 0x4, 0x6, 0x2, 0x4, 0x6, 0xa2ec, 0x7, 0x100, 0x1, 0x3, 0x1f, 0x81, 0x10000, 0xc5, 0x7ff, 0x2aae236d, 0x4, 0x2000, 0x1c, 0x3, 0x2, 0x735c, 0x7fffffff, 0x6, 0xfffffffd, 0x4, 0x3ff, 0x7fffffff, 0x8, 0x224, 0x261, 0x8b8a, 0x100, 0xffffffff, 0x7fff, 0x41, 0x401, 0x200], [0x7, 0x4, 0x2, 0x5, 0x7, 0x1, 0x8, 0x0, 0x8, 0xffffff7b, 0x0, 0x5, 0x6, 0xcc9, 0x1, 0x5, 0x2, 0xfffffffe, 0xfffffff9, 0x0, 0x5, 0x101, 0x401, 0x2, 0x3, 0x3, 0x7f76, 0x3ff, 0x9, 0xc14, 0x3, 0x7, 0x5, 0x100, 0x6, 0x8, 0x2, 0xe0, 0x3f, 0x200, 0x3, 0x9, 0x3, 0x5, 0x95c6, 0x2, 0x6, 0x20, 0x3, 0x8, 0x9, 0x7, 0x9, 0x0, 0xffffd671, 0x1, 0x0, 0x853d, 0x7, 0x3ff, 0x0, 0xfde7, 0x1, 0x5]}, 0x45c) r5 = openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ocfs2_control\x00', 0x20200, 0x0) connect$x25(r5, &(0x7f0000000080)={0x9, @remote={[], 0x1}}, 0x12) 18:08:09 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r0, &(0x7f0000000040)=""/244, 0xf4) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x19) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 18:08:09 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket$netlink(0x10, 0x3, 0x0) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) write$uinput_user_dev(r2, &(0x7f0000000480)={'syz0\x00', {0xa65b, 0x1000, 0xfffb, 0x80}, 0x32, [0x4, 0x631, 0xaf, 0x2, 0x1b, 0x1, 0x10001, 0x1, 0x8, 0x3ff, 0x800, 0x7859, 0x7, 0x5, 0x7fff, 0xc05, 0xa4, 0x3, 0x4, 0xfffff800, 0x6, 0x7c, 0x6, 0xff, 0x2, 0x771, 0x5, 0xfffffff8, 0x81, 0x0, 0x6, 0x7, 0x6, 0x9, 0x3, 0x0, 0x282d298e, 0x7, 0x6, 0x3, 0xfaf9, 0x7, 0x2, 0xf9, 0xc2, 0x0, 0x8, 0x8, 0x9, 0x4, 0x8eb1, 0x0, 0x8, 0x9, 0x7d, 0x8, 0x9, 0x4, 0x3, 0x10000, 0xfab, 0x39, 0x7, 0x4], [0x0, 0x7ff, 0x1f, 0x1, 0x7, 0x2, 0x6, 0xd594, 0x3, 0x2a, 0x1c9b4fd4, 0x0, 0xfff, 0x5, 0xfffff801, 0x9, 0x3f, 0x8, 0x80, 0x6, 0x401, 0x8000, 0x1, 0xcb, 0x1, 0x6, 0x4, 0x92, 0x800000, 0x7, 0x1f, 0x140, 0x7ff, 0xabbc, 0x401, 0x0, 0x3, 0x20, 0x48, 0x12000, 0xfa, 0x1, 0xfffff6fe, 0x0, 0x7, 0x8818, 0x8000, 0x6, 0x1f, 0x8, 0x4, 0xff, 0x101, 0xd7, 0x8, 0x5, 0xffff8001, 0x5, 0xb621, 0x1, 0x9, 0x1395db38, 0x0, 0x3], [0x6, 0x6, 0x401, 0x2d5, 0xc08, 0x3, 0x7f, 0x7, 0x8, 0x4, 0xbe1a, 0x5, 0x3, 0x93c, 0x9, 0x80, 0x800, 0x7fff, 0x6, 0x1, 0x5, 0x2, 0x9, 0x7fff, 0x0, 0x8000, 0x4, 0x6, 0x2, 0x4, 0x6, 0xa2ec, 0x7, 0x100, 0x1, 0x3, 0x1f, 0x81, 0x10000, 0xc5, 0x7ff, 0x2aae236d, 0x4, 0x2000, 0x1c, 0x3, 0x2, 0x735c, 0x7fffffff, 0x6, 0xfffffffd, 0x4, 0x3ff, 0x7fffffff, 0x8, 0x224, 0x261, 0x8b8a, 0x100, 0xffffffff, 0x7fff, 0x41, 0x401, 0x200], [0x7, 0x4, 0x2, 0x5, 0x7, 0x1, 0x8, 0x0, 0x8, 0xffffff7b, 0x0, 0x5, 0x6, 0xcc9, 0x1, 0x5, 0x2, 0xfffffffe, 0xfffffff9, 0x0, 0x5, 0x101, 0x401, 0x2, 0x3, 0x3, 0x7f76, 0x3ff, 0x9, 0xc14, 0x3, 0x7, 0x5, 0x100, 0x6, 0x8, 0x2, 0xe0, 0x3f, 0x200, 0x3, 0x9, 0x3, 0x5, 0x95c6, 0x2, 0x6, 0x20, 0x3, 0x8, 0x9, 0x7, 0x9, 0x0, 0xffffd671, 0x1, 0x0, 0x853d, 0x7, 0x3ff, 0x0, 0xfde7, 0x1, 0x5]}, 0x45c) 18:08:09 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68}, [{0x0, 0x0, 0x0, 0xffff000000000000}]}, 0x78) 18:08:09 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa}]}, 0x78) 18:08:09 executing program 2: r0 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mISDNtimer\x00', 0x0, 0x0) ioctl$IMADDTIMER(r0, 0x80044940, &(0x7f00000000c0)) 18:08:09 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x3d}, {0x0, 0x2a}, {0x0}, {&(0x7f0000000100)="6653960d0ec5d684fa9f017ef0d60a3c27bc33760036001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479810be2aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e6517e615607676f8f9fc0ebf8b0b16d6f2c59957ab35d05692e664ebf68734ca53366295f4ad6142134b62f11e92ead037c7fb53455560c8ef0f1c94fafa924edfe92175aaa1c4ecc7aeeb72e0d050feacee907f40888c96a65545e07422bc6ac79f4c2d6ee3dab47d06e764682c72d7f16542fcfd05d2813cc182d1595016c179e1717c160300ab1ab0ac397e91bd193c036feb66a9ad2ec5b7967e7f5ff957f8b085a2437c59a", 0xf8}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x19) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 18:08:09 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) write$uinput_user_dev(r2, &(0x7f0000000480)={'syz0\x00', {0xa65b, 0x1000, 0xfffb, 0x80}, 0x32, [0x4, 0x631, 0xaf, 0x2, 0x1b, 0x1, 0x10001, 0x1, 0x8, 0x3ff, 0x800, 0x7859, 0x7, 0x5, 0x7fff, 0xc05, 0xa4, 0x3, 0x4, 0xfffff800, 0x6, 0x7c, 0x6, 0xff, 0x2, 0x771, 0x5, 0xfffffff8, 0x81, 0x0, 0x6, 0x7, 0x6, 0x9, 0x3, 0x0, 0x282d298e, 0x7, 0x6, 0x3, 0xfaf9, 0x7, 0x2, 0xf9, 0xc2, 0x0, 0x8, 0x8, 0x9, 0x4, 0x8eb1, 0x0, 0x8, 0x9, 0x7d, 0x8, 0x9, 0x4, 0x3, 0x10000, 0xfab, 0x39, 0x7, 0x4], [0x0, 0x7ff, 0x1f, 0x1, 0x7, 0x2, 0x6, 0xd594, 0x3, 0x2a, 0x1c9b4fd4, 0x0, 0xfff, 0x5, 0xfffff801, 0x9, 0x3f, 0x8, 0x80, 0x6, 0x401, 0x8000, 0x1, 0xcb, 0x1, 0x6, 0x4, 0x92, 0x800000, 0x7, 0x1f, 0x140, 0x7ff, 0xabbc, 0x401, 0x0, 0x3, 0x20, 0x48, 0x12000, 0xfa, 0x1, 0xfffff6fe, 0x0, 0x7, 0x8818, 0x8000, 0x6, 0x1f, 0x8, 0x4, 0xff, 0x101, 0xd7, 0x8, 0x5, 0xffff8001, 0x5, 0xb621, 0x1, 0x9, 0x1395db38, 0x0, 0x3], [0x6, 0x6, 0x401, 0x2d5, 0xc08, 0x3, 0x7f, 0x7, 0x8, 0x4, 0xbe1a, 0x5, 0x3, 0x93c, 0x9, 0x80, 0x800, 0x7fff, 0x6, 0x1, 0x5, 0x2, 0x9, 0x7fff, 0x0, 0x8000, 0x4, 0x6, 0x2, 0x4, 0x6, 0xa2ec, 0x7, 0x100, 0x1, 0x3, 0x1f, 0x81, 0x10000, 0xc5, 0x7ff, 0x2aae236d, 0x4, 0x2000, 0x1c, 0x3, 0x2, 0x735c, 0x7fffffff, 0x6, 0xfffffffd, 0x4, 0x3ff, 0x7fffffff, 0x8, 0x224, 0x261, 0x8b8a, 0x100, 0xffffffff, 0x7fff, 0x41, 0x401, 0x200], [0x7, 0x4, 0x2, 0x5, 0x7, 0x1, 0x8, 0x0, 0x8, 0xffffff7b, 0x0, 0x5, 0x6, 0xcc9, 0x1, 0x5, 0x2, 0xfffffffe, 0xfffffff9, 0x0, 0x5, 0x101, 0x401, 0x2, 0x3, 0x3, 0x7f76, 0x3ff, 0x9, 0xc14, 0x3, 0x7, 0x5, 0x100, 0x6, 0x8, 0x2, 0xe0, 0x3f, 0x200, 0x3, 0x9, 0x3, 0x5, 0x95c6, 0x2, 0x6, 0x20, 0x3, 0x8, 0x9, 0x7, 0x9, 0x0, 0xffffd671, 0x1, 0x0, 0x853d, 0x7, 0x3ff, 0x0, 0xfde7, 0x1, 0x5]}, 0x45c) 18:08:09 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68}, [{0x0, 0x0, 0x0, 0x0, 0x2}]}, 0x78) 18:08:09 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000340)='/dev/sg#\x00', 0x0, 0x121402) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(0xffffffffffffffff, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000100)="ae88bff824f400005a90f57f07703aeff0f64ebbee07962c22772e11b44e69d90cf41bdd2ac8bb8c43b460e46292", 0x2e}, {&(0x7f0000000040)="53000000fcffffff770000000200040000009600000000000000a4000000000000000000", 0xffffffe5}], 0x2) 18:08:09 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc}]}, 0x78) 18:08:09 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x3d}, {0x0, 0x2a}, {0x0}, {&(0x7f0000000100)="6653960d0ec5d684fa9f017ef0d60a3c27bc33760036001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479810be2aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e6517e615607676f8f9fc0ebf8b0b16d6f2c59957ab35d05692e664ebf68734ca53366295f4ad6142134b62f11e92ead037c7fb53455560c8ef0f1c94fafa924edfe92175aaa1c4ecc7aeeb72e0d050feacee907f40888c96a65545e07422bc6ac79f4c2d6ee3dab47d06e764682c72d7f16542fcfd05d2813cc182d1595016c179e1717c160300ab1ab0ac397e91bd193c036feb66a9ad2ec5b7967e7f5ff957f8b085a2437c59a", 0xf8}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x19) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 18:08:09 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68}, [{0x0, 0x0, 0x0, 0x0, 0x5}]}, 0x78) 18:08:12 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r0, &(0x7f0000000040)=""/244, 0xf4) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="6653960d0ec5d684fa9f017ef0d60a3c27bc33760036001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479810be2aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e6517e615607676f8f9fc0ebf8b0b16d6f2c59957ab35d05692e664ebf68734ca53366295f4ad6142134b62f", 0x7c}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x19) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 18:08:12 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) write$uinput_user_dev(r1, &(0x7f0000000480)={'syz0\x00', {0xa65b, 0x1000, 0xfffb, 0x80}, 0x32, [0x4, 0x631, 0xaf, 0x2, 0x1b, 0x1, 0x10001, 0x1, 0x8, 0x3ff, 0x800, 0x7859, 0x7, 0x5, 0x7fff, 0xc05, 0xa4, 0x3, 0x4, 0xfffff800, 0x6, 0x7c, 0x6, 0xff, 0x2, 0x771, 0x5, 0xfffffff8, 0x81, 0x0, 0x6, 0x7, 0x6, 0x9, 0x3, 0x0, 0x282d298e, 0x7, 0x6, 0x3, 0xfaf9, 0x7, 0x2, 0xf9, 0xc2, 0x0, 0x8, 0x8, 0x9, 0x4, 0x8eb1, 0x0, 0x8, 0x9, 0x7d, 0x8, 0x9, 0x4, 0x3, 0x10000, 0xfab, 0x39, 0x7, 0x4], [0x0, 0x7ff, 0x1f, 0x1, 0x7, 0x2, 0x6, 0xd594, 0x3, 0x2a, 0x1c9b4fd4, 0x0, 0xfff, 0x5, 0xfffff801, 0x9, 0x3f, 0x8, 0x80, 0x6, 0x401, 0x8000, 0x1, 0xcb, 0x1, 0x6, 0x4, 0x92, 0x800000, 0x7, 0x1f, 0x140, 0x7ff, 0xabbc, 0x401, 0x0, 0x3, 0x20, 0x48, 0x12000, 0xfa, 0x1, 0xfffff6fe, 0x0, 0x7, 0x8818, 0x8000, 0x6, 0x1f, 0x8, 0x4, 0xff, 0x101, 0xd7, 0x8, 0x5, 0xffff8001, 0x5, 0xb621, 0x1, 0x9, 0x1395db38, 0x0, 0x3], [0x6, 0x6, 0x401, 0x2d5, 0xc08, 0x3, 0x7f, 0x7, 0x8, 0x4, 0xbe1a, 0x5, 0x3, 0x93c, 0x9, 0x80, 0x800, 0x7fff, 0x6, 0x1, 0x5, 0x2, 0x9, 0x7fff, 0x0, 0x8000, 0x4, 0x6, 0x2, 0x4, 0x6, 0xa2ec, 0x7, 0x100, 0x1, 0x3, 0x1f, 0x81, 0x10000, 0xc5, 0x7ff, 0x2aae236d, 0x4, 0x2000, 0x1c, 0x3, 0x2, 0x735c, 0x7fffffff, 0x6, 0xfffffffd, 0x4, 0x3ff, 0x7fffffff, 0x8, 0x224, 0x261, 0x8b8a, 0x100, 0xffffffff, 0x7fff, 0x41, 0x401, 0x200], [0x7, 0x4, 0x2, 0x5, 0x7, 0x1, 0x8, 0x0, 0x8, 0xffffff7b, 0x0, 0x5, 0x6, 0xcc9, 0x1, 0x5, 0x2, 0xfffffffe, 0xfffffff9, 0x0, 0x5, 0x101, 0x401, 0x2, 0x3, 0x3, 0x7f76, 0x3ff, 0x9, 0xc14, 0x3, 0x7, 0x5, 0x100, 0x6, 0x8, 0x2, 0xe0, 0x3f, 0x200, 0x3, 0x9, 0x3, 0x5, 0x95c6, 0x2, 0x6, 0x20, 0x3, 0x8, 0x9, 0x7, 0x9, 0x0, 0xffffd671, 0x1, 0x0, 0x853d, 0x7, 0x3ff, 0x0, 0xfde7, 0x1, 0x5]}, 0x45c) 18:08:12 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd}]}, 0x78) 18:08:12 executing program 2: syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)={[{@resize_auto='resize=auto'}, {@user_xattr='user_xattr'}]}) 18:08:12 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68}, [{0x0, 0x0, 0x0, 0x0, 0x6}]}, 0x78) 18:08:12 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x3d}, {0x0, 0x2a}, {0x0}, {&(0x7f0000000100)="6653960d0ec5d684fa9f017ef0d60a3c27bc33760036001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479810be2aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e6517e615607676f8f9fc0ebf8b0b16d6f2c59957ab35d05692e664ebf68734ca53366295f4ad6142134b62f11e92ead037c7fb53455560c8ef0f1c94fafa924edfe92175aaa1c4ecc7aeeb72e0d050feacee907f40888c96a65545e07422bc6ac79f4c2d6ee3dab47d06e764682c72d7f16542fcfd05d2813cc182d1595016c179e1717c160300ab1ab0ac397e91bd193c036feb66a9ad2ec5b7967e7f5ff957f8b085a2437c59a", 0xf8}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x19) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 18:08:12 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x3d}, {0x0, 0x2a}, {0x0}, {&(0x7f0000000100)="6653960d0ec5d684fa9f017ef0d60a3c27bc33760036001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479810be2aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e6517e615607676f8f9fc0ebf8b0b16d6f2c59957ab35d05692e664ebf68734ca53366295f4ad6142134b62f11e92ead037c7fb53455560c8ef0f1c94fafa924edfe92175aaa1c4ecc7aeeb72e0d050feacee907f40888c96a65545e07422bc6ac79f4c2d6ee3dab47d06e764682c72d7f16542fcfd05d2813cc182d1595016c179e1717c160300ab1ab0ac397e91bd193c036feb66a9ad2ec5b7967e7f5ff957f8b085a2437c59a", 0xf8}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x19) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) [ 1009.865357] REISERFS warning (device loop2): super-6502 reiserfs_getopt: unknown mount option "" 18:08:12 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) write$uinput_user_dev(r1, &(0x7f0000000480)={'syz0\x00', {0xa65b, 0x1000, 0xfffb, 0x80}, 0x32, [0x4, 0x631, 0xaf, 0x2, 0x1b, 0x1, 0x10001, 0x1, 0x8, 0x3ff, 0x800, 0x7859, 0x7, 0x5, 0x7fff, 0xc05, 0xa4, 0x3, 0x4, 0xfffff800, 0x6, 0x7c, 0x6, 0xff, 0x2, 0x771, 0x5, 0xfffffff8, 0x81, 0x0, 0x6, 0x7, 0x6, 0x9, 0x3, 0x0, 0x282d298e, 0x7, 0x6, 0x3, 0xfaf9, 0x7, 0x2, 0xf9, 0xc2, 0x0, 0x8, 0x8, 0x9, 0x4, 0x8eb1, 0x0, 0x8, 0x9, 0x7d, 0x8, 0x9, 0x4, 0x3, 0x10000, 0xfab, 0x39, 0x7, 0x4], [0x0, 0x7ff, 0x1f, 0x1, 0x7, 0x2, 0x6, 0xd594, 0x3, 0x2a, 0x1c9b4fd4, 0x0, 0xfff, 0x5, 0xfffff801, 0x9, 0x3f, 0x8, 0x80, 0x6, 0x401, 0x8000, 0x1, 0xcb, 0x1, 0x6, 0x4, 0x92, 0x800000, 0x7, 0x1f, 0x140, 0x7ff, 0xabbc, 0x401, 0x0, 0x3, 0x20, 0x48, 0x12000, 0xfa, 0x1, 0xfffff6fe, 0x0, 0x7, 0x8818, 0x8000, 0x6, 0x1f, 0x8, 0x4, 0xff, 0x101, 0xd7, 0x8, 0x5, 0xffff8001, 0x5, 0xb621, 0x1, 0x9, 0x1395db38, 0x0, 0x3], [0x6, 0x6, 0x401, 0x2d5, 0xc08, 0x3, 0x7f, 0x7, 0x8, 0x4, 0xbe1a, 0x5, 0x3, 0x93c, 0x9, 0x80, 0x800, 0x7fff, 0x6, 0x1, 0x5, 0x2, 0x9, 0x7fff, 0x0, 0x8000, 0x4, 0x6, 0x2, 0x4, 0x6, 0xa2ec, 0x7, 0x100, 0x1, 0x3, 0x1f, 0x81, 0x10000, 0xc5, 0x7ff, 0x2aae236d, 0x4, 0x2000, 0x1c, 0x3, 0x2, 0x735c, 0x7fffffff, 0x6, 0xfffffffd, 0x4, 0x3ff, 0x7fffffff, 0x8, 0x224, 0x261, 0x8b8a, 0x100, 0xffffffff, 0x7fff, 0x41, 0x401, 0x200], [0x7, 0x4, 0x2, 0x5, 0x7, 0x1, 0x8, 0x0, 0x8, 0xffffff7b, 0x0, 0x5, 0x6, 0xcc9, 0x1, 0x5, 0x2, 0xfffffffe, 0xfffffff9, 0x0, 0x5, 0x101, 0x401, 0x2, 0x3, 0x3, 0x7f76, 0x3ff, 0x9, 0xc14, 0x3, 0x7, 0x5, 0x100, 0x6, 0x8, 0x2, 0xe0, 0x3f, 0x200, 0x3, 0x9, 0x3, 0x5, 0x95c6, 0x2, 0x6, 0x20, 0x3, 0x8, 0x9, 0x7, 0x9, 0x0, 0xffffd671, 0x1, 0x0, 0x853d, 0x7, 0x3ff, 0x0, 0xfde7, 0x1, 0x5]}, 0x45c) 18:08:12 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe}]}, 0x78) 18:08:12 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68}, [{0x0, 0x0, 0x0, 0x0, 0x7}]}, 0x78) 18:08:12 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x3d}, {0x0, 0x2a}, {0x0}, {&(0x7f0000000100)="6653960d0ec5d684fa9f017ef0d60a3c27bc33760036001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479810be2aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e6517e615607676f8f9fc0ebf8b0b16d6f2c59957ab35d05692e664ebf68734ca53366295f4ad6142134b62f11e92ead037c7fb53455560c8ef0f1c94fafa924edfe92175aaa1c4ecc7aeeb72e0d050feacee907f40888c96a65545e07422bc6ac79f4c2d6ee3dab47d06e764682c72d7f16542fcfd05d2813cc182d1595016c179e1717c160300ab1ab0ac397e91bd193c036feb66a9ad2ec5b7967e7f5ff957f8b085a2437c59a", 0xf8}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x19) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 18:08:12 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x800, 0x0) mprotect(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000280)='tmpfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@mode={'mode', 0x3d, 0x3}}]}) 18:08:15 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r0, &(0x7f0000000040)=""/244, 0xf4) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="6653960d0ec5d684fa9f017ef0d60a3c27bc33760036001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479810be2aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e6517e615607676f8f9fc0ebf8b0b16d6f2c59957ab35d05692e664ebf68734ca53366295f4ad6142134b62f", 0x7c}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x19) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 18:08:15 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) write$uinput_user_dev(r1, &(0x7f0000000480)={'syz0\x00', {0xa65b, 0x1000, 0xfffb, 0x80}, 0x32, [0x4, 0x631, 0xaf, 0x2, 0x1b, 0x1, 0x10001, 0x1, 0x8, 0x3ff, 0x800, 0x7859, 0x7, 0x5, 0x7fff, 0xc05, 0xa4, 0x3, 0x4, 0xfffff800, 0x6, 0x7c, 0x6, 0xff, 0x2, 0x771, 0x5, 0xfffffff8, 0x81, 0x0, 0x6, 0x7, 0x6, 0x9, 0x3, 0x0, 0x282d298e, 0x7, 0x6, 0x3, 0xfaf9, 0x7, 0x2, 0xf9, 0xc2, 0x0, 0x8, 0x8, 0x9, 0x4, 0x8eb1, 0x0, 0x8, 0x9, 0x7d, 0x8, 0x9, 0x4, 0x3, 0x10000, 0xfab, 0x39, 0x7, 0x4], [0x0, 0x7ff, 0x1f, 0x1, 0x7, 0x2, 0x6, 0xd594, 0x3, 0x2a, 0x1c9b4fd4, 0x0, 0xfff, 0x5, 0xfffff801, 0x9, 0x3f, 0x8, 0x80, 0x6, 0x401, 0x8000, 0x1, 0xcb, 0x1, 0x6, 0x4, 0x92, 0x800000, 0x7, 0x1f, 0x140, 0x7ff, 0xabbc, 0x401, 0x0, 0x3, 0x20, 0x48, 0x12000, 0xfa, 0x1, 0xfffff6fe, 0x0, 0x7, 0x8818, 0x8000, 0x6, 0x1f, 0x8, 0x4, 0xff, 0x101, 0xd7, 0x8, 0x5, 0xffff8001, 0x5, 0xb621, 0x1, 0x9, 0x1395db38, 0x0, 0x3], [0x6, 0x6, 0x401, 0x2d5, 0xc08, 0x3, 0x7f, 0x7, 0x8, 0x4, 0xbe1a, 0x5, 0x3, 0x93c, 0x9, 0x80, 0x800, 0x7fff, 0x6, 0x1, 0x5, 0x2, 0x9, 0x7fff, 0x0, 0x8000, 0x4, 0x6, 0x2, 0x4, 0x6, 0xa2ec, 0x7, 0x100, 0x1, 0x3, 0x1f, 0x81, 0x10000, 0xc5, 0x7ff, 0x2aae236d, 0x4, 0x2000, 0x1c, 0x3, 0x2, 0x735c, 0x7fffffff, 0x6, 0xfffffffd, 0x4, 0x3ff, 0x7fffffff, 0x8, 0x224, 0x261, 0x8b8a, 0x100, 0xffffffff, 0x7fff, 0x41, 0x401, 0x200], [0x7, 0x4, 0x2, 0x5, 0x7, 0x1, 0x8, 0x0, 0x8, 0xffffff7b, 0x0, 0x5, 0x6, 0xcc9, 0x1, 0x5, 0x2, 0xfffffffe, 0xfffffff9, 0x0, 0x5, 0x101, 0x401, 0x2, 0x3, 0x3, 0x7f76, 0x3ff, 0x9, 0xc14, 0x3, 0x7, 0x5, 0x100, 0x6, 0x8, 0x2, 0xe0, 0x3f, 0x200, 0x3, 0x9, 0x3, 0x5, 0x95c6, 0x2, 0x6, 0x20, 0x3, 0x8, 0x9, 0x7, 0x9, 0x0, 0xffffd671, 0x1, 0x0, 0x853d, 0x7, 0x3ff, 0x0, 0xfde7, 0x1, 0x5]}, 0x45c) 18:08:15 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf}]}, 0x78) 18:08:15 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68}, [{0x0, 0x0, 0x0, 0x0, 0x8}]}, 0x78) 18:08:15 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x19) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 18:08:15 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x800, 0x0) mprotect(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000280)='tmpfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@mode={'mode', 0x3d, 0x3}}]}) 18:08:15 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68}, [{0x0, 0x0, 0x0, 0x0, 0x9}]}, 0x78) 18:08:15 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x800, 0x0) mprotect(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000280)='tmpfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@mode={'mode', 0x3d, 0x3}}]}) 18:08:15 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18}]}, 0x78) 18:08:15 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68}, [{0x0, 0x0, 0x0, 0x0, 0xa}]}, 0x78) 18:08:15 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) write$uinput_user_dev(r0, &(0x7f0000000480)={'syz0\x00', {0xa65b, 0x1000, 0xfffb, 0x80}, 0x32, [0x4, 0x631, 0xaf, 0x2, 0x1b, 0x1, 0x10001, 0x1, 0x8, 0x3ff, 0x800, 0x7859, 0x7, 0x5, 0x7fff, 0xc05, 0xa4, 0x3, 0x4, 0xfffff800, 0x6, 0x7c, 0x6, 0xff, 0x2, 0x771, 0x5, 0xfffffff8, 0x81, 0x0, 0x6, 0x7, 0x6, 0x9, 0x3, 0x0, 0x282d298e, 0x7, 0x6, 0x3, 0xfaf9, 0x7, 0x2, 0xf9, 0xc2, 0x0, 0x8, 0x8, 0x9, 0x4, 0x8eb1, 0x0, 0x8, 0x9, 0x7d, 0x8, 0x9, 0x4, 0x3, 0x10000, 0xfab, 0x39, 0x7, 0x4], [0x0, 0x7ff, 0x1f, 0x1, 0x7, 0x2, 0x6, 0xd594, 0x3, 0x2a, 0x1c9b4fd4, 0x0, 0xfff, 0x5, 0xfffff801, 0x9, 0x3f, 0x8, 0x80, 0x6, 0x401, 0x8000, 0x1, 0xcb, 0x1, 0x6, 0x4, 0x92, 0x800000, 0x7, 0x1f, 0x140, 0x7ff, 0xabbc, 0x401, 0x0, 0x3, 0x20, 0x48, 0x12000, 0xfa, 0x1, 0xfffff6fe, 0x0, 0x7, 0x8818, 0x8000, 0x6, 0x1f, 0x8, 0x4, 0xff, 0x101, 0xd7, 0x8, 0x5, 0xffff8001, 0x5, 0xb621, 0x1, 0x9, 0x1395db38, 0x0, 0x3], [0x6, 0x6, 0x401, 0x2d5, 0xc08, 0x3, 0x7f, 0x7, 0x8, 0x4, 0xbe1a, 0x5, 0x3, 0x93c, 0x9, 0x80, 0x800, 0x7fff, 0x6, 0x1, 0x5, 0x2, 0x9, 0x7fff, 0x0, 0x8000, 0x4, 0x6, 0x2, 0x4, 0x6, 0xa2ec, 0x7, 0x100, 0x1, 0x3, 0x1f, 0x81, 0x10000, 0xc5, 0x7ff, 0x2aae236d, 0x4, 0x2000, 0x1c, 0x3, 0x2, 0x735c, 0x7fffffff, 0x6, 0xfffffffd, 0x4, 0x3ff, 0x7fffffff, 0x8, 0x224, 0x261, 0x8b8a, 0x100, 0xffffffff, 0x7fff, 0x41, 0x401, 0x200], [0x7, 0x4, 0x2, 0x5, 0x7, 0x1, 0x8, 0x0, 0x8, 0xffffff7b, 0x0, 0x5, 0x6, 0xcc9, 0x1, 0x5, 0x2, 0xfffffffe, 0xfffffff9, 0x0, 0x5, 0x101, 0x401, 0x2, 0x3, 0x3, 0x7f76, 0x3ff, 0x9, 0xc14, 0x3, 0x7, 0x5, 0x100, 0x6, 0x8, 0x2, 0xe0, 0x3f, 0x200, 0x3, 0x9, 0x3, 0x5, 0x95c6, 0x2, 0x6, 0x20, 0x3, 0x8, 0x9, 0x7, 0x9, 0x0, 0xffffd671, 0x1, 0x0, 0x853d, 0x7, 0x3ff, 0x0, 0xfde7, 0x1, 0x5]}, 0x45c) 18:08:16 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1a}]}, 0x78) 18:08:18 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r0, &(0x7f0000000040)=""/244, 0xf4) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="6653960d0ec5d684fa9f017ef0d60a3c27bc33760036001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479810be2aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e6517e615607676f8f9fc0ebf8b0b16d6f2c59957ab35d05692e664ebf68734ca53366295f4ad6142134b62f", 0x7c}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x19) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 18:08:18 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) write$uinput_user_dev(r0, &(0x7f0000000480)={'syz0\x00', {0xa65b, 0x1000, 0xfffb, 0x80}, 0x32, [0x4, 0x631, 0xaf, 0x2, 0x1b, 0x1, 0x10001, 0x1, 0x8, 0x3ff, 0x800, 0x7859, 0x7, 0x5, 0x7fff, 0xc05, 0xa4, 0x3, 0x4, 0xfffff800, 0x6, 0x7c, 0x6, 0xff, 0x2, 0x771, 0x5, 0xfffffff8, 0x81, 0x0, 0x6, 0x7, 0x6, 0x9, 0x3, 0x0, 0x282d298e, 0x7, 0x6, 0x3, 0xfaf9, 0x7, 0x2, 0xf9, 0xc2, 0x0, 0x8, 0x8, 0x9, 0x4, 0x8eb1, 0x0, 0x8, 0x9, 0x7d, 0x8, 0x9, 0x4, 0x3, 0x10000, 0xfab, 0x39, 0x7, 0x4], [0x0, 0x7ff, 0x1f, 0x1, 0x7, 0x2, 0x6, 0xd594, 0x3, 0x2a, 0x1c9b4fd4, 0x0, 0xfff, 0x5, 0xfffff801, 0x9, 0x3f, 0x8, 0x80, 0x6, 0x401, 0x8000, 0x1, 0xcb, 0x1, 0x6, 0x4, 0x92, 0x800000, 0x7, 0x1f, 0x140, 0x7ff, 0xabbc, 0x401, 0x0, 0x3, 0x20, 0x48, 0x12000, 0xfa, 0x1, 0xfffff6fe, 0x0, 0x7, 0x8818, 0x8000, 0x6, 0x1f, 0x8, 0x4, 0xff, 0x101, 0xd7, 0x8, 0x5, 0xffff8001, 0x5, 0xb621, 0x1, 0x9, 0x1395db38, 0x0, 0x3], [0x6, 0x6, 0x401, 0x2d5, 0xc08, 0x3, 0x7f, 0x7, 0x8, 0x4, 0xbe1a, 0x5, 0x3, 0x93c, 0x9, 0x80, 0x800, 0x7fff, 0x6, 0x1, 0x5, 0x2, 0x9, 0x7fff, 0x0, 0x8000, 0x4, 0x6, 0x2, 0x4, 0x6, 0xa2ec, 0x7, 0x100, 0x1, 0x3, 0x1f, 0x81, 0x10000, 0xc5, 0x7ff, 0x2aae236d, 0x4, 0x2000, 0x1c, 0x3, 0x2, 0x735c, 0x7fffffff, 0x6, 0xfffffffd, 0x4, 0x3ff, 0x7fffffff, 0x8, 0x224, 0x261, 0x8b8a, 0x100, 0xffffffff, 0x7fff, 0x41, 0x401, 0x200], [0x7, 0x4, 0x2, 0x5, 0x7, 0x1, 0x8, 0x0, 0x8, 0xffffff7b, 0x0, 0x5, 0x6, 0xcc9, 0x1, 0x5, 0x2, 0xfffffffe, 0xfffffff9, 0x0, 0x5, 0x101, 0x401, 0x2, 0x3, 0x3, 0x7f76, 0x3ff, 0x9, 0xc14, 0x3, 0x7, 0x5, 0x100, 0x6, 0x8, 0x2, 0xe0, 0x3f, 0x200, 0x3, 0x9, 0x3, 0x5, 0x95c6, 0x2, 0x6, 0x20, 0x3, 0x8, 0x9, 0x7, 0x9, 0x0, 0xffffd671, 0x1, 0x0, 0x853d, 0x7, 0x3ff, 0x0, 0xfde7, 0x1, 0x5]}, 0x45c) 18:08:18 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x800, 0x0) syz_mount_image$tmpfs(&(0x7f0000000280)='tmpfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@mode={'mode', 0x3d, 0x3}}]}) 18:08:18 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68}, [{0x0, 0x0, 0x0, 0x0, 0xc}]}, 0x78) 18:08:18 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x19) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 18:08:18 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1b}]}, 0x78) 18:08:18 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) write$uinput_user_dev(r0, &(0x7f0000000480)={'syz0\x00', {0xa65b, 0x1000, 0xfffb, 0x80}, 0x32, [0x4, 0x631, 0xaf, 0x2, 0x1b, 0x1, 0x10001, 0x1, 0x8, 0x3ff, 0x800, 0x7859, 0x7, 0x5, 0x7fff, 0xc05, 0xa4, 0x3, 0x4, 0xfffff800, 0x6, 0x7c, 0x6, 0xff, 0x2, 0x771, 0x5, 0xfffffff8, 0x81, 0x0, 0x6, 0x7, 0x6, 0x9, 0x3, 0x0, 0x282d298e, 0x7, 0x6, 0x3, 0xfaf9, 0x7, 0x2, 0xf9, 0xc2, 0x0, 0x8, 0x8, 0x9, 0x4, 0x8eb1, 0x0, 0x8, 0x9, 0x7d, 0x8, 0x9, 0x4, 0x3, 0x10000, 0xfab, 0x39, 0x7, 0x4], [0x0, 0x7ff, 0x1f, 0x1, 0x7, 0x2, 0x6, 0xd594, 0x3, 0x2a, 0x1c9b4fd4, 0x0, 0xfff, 0x5, 0xfffff801, 0x9, 0x3f, 0x8, 0x80, 0x6, 0x401, 0x8000, 0x1, 0xcb, 0x1, 0x6, 0x4, 0x92, 0x800000, 0x7, 0x1f, 0x140, 0x7ff, 0xabbc, 0x401, 0x0, 0x3, 0x20, 0x48, 0x12000, 0xfa, 0x1, 0xfffff6fe, 0x0, 0x7, 0x8818, 0x8000, 0x6, 0x1f, 0x8, 0x4, 0xff, 0x101, 0xd7, 0x8, 0x5, 0xffff8001, 0x5, 0xb621, 0x1, 0x9, 0x1395db38, 0x0, 0x3], [0x6, 0x6, 0x401, 0x2d5, 0xc08, 0x3, 0x7f, 0x7, 0x8, 0x4, 0xbe1a, 0x5, 0x3, 0x93c, 0x9, 0x80, 0x800, 0x7fff, 0x6, 0x1, 0x5, 0x2, 0x9, 0x7fff, 0x0, 0x8000, 0x4, 0x6, 0x2, 0x4, 0x6, 0xa2ec, 0x7, 0x100, 0x1, 0x3, 0x1f, 0x81, 0x10000, 0xc5, 0x7ff, 0x2aae236d, 0x4, 0x2000, 0x1c, 0x3, 0x2, 0x735c, 0x7fffffff, 0x6, 0xfffffffd, 0x4, 0x3ff, 0x7fffffff, 0x8, 0x224, 0x261, 0x8b8a, 0x100, 0xffffffff, 0x7fff, 0x41, 0x401, 0x200], [0x7, 0x4, 0x2, 0x5, 0x7, 0x1, 0x8, 0x0, 0x8, 0xffffff7b, 0x0, 0x5, 0x6, 0xcc9, 0x1, 0x5, 0x2, 0xfffffffe, 0xfffffff9, 0x0, 0x5, 0x101, 0x401, 0x2, 0x3, 0x3, 0x7f76, 0x3ff, 0x9, 0xc14, 0x3, 0x7, 0x5, 0x100, 0x6, 0x8, 0x2, 0xe0, 0x3f, 0x200, 0x3, 0x9, 0x3, 0x5, 0x95c6, 0x2, 0x6, 0x20, 0x3, 0x8, 0x9, 0x7, 0x9, 0x0, 0xffffd671, 0x1, 0x0, 0x853d, 0x7, 0x3ff, 0x0, 0xfde7, 0x1, 0x5]}, 0x45c) 18:08:18 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68}, [{0x0, 0x0, 0x0, 0x0, 0xd}]}, 0x78) 18:08:18 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3e}]}, 0x78) 18:08:18 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000000280)='tmpfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@mode={'mode', 0x3d, 0x3}}]}) 18:08:18 executing program 1: r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) write$uinput_user_dev(r1, &(0x7f0000000480)={'syz0\x00', {0xa65b, 0x1000, 0xfffb, 0x80}, 0x32, [0x4, 0x631, 0xaf, 0x2, 0x1b, 0x1, 0x10001, 0x1, 0x8, 0x3ff, 0x800, 0x7859, 0x7, 0x5, 0x7fff, 0xc05, 0xa4, 0x3, 0x4, 0xfffff800, 0x6, 0x7c, 0x6, 0xff, 0x2, 0x771, 0x5, 0xfffffff8, 0x81, 0x0, 0x6, 0x7, 0x6, 0x9, 0x3, 0x0, 0x282d298e, 0x7, 0x6, 0x3, 0xfaf9, 0x7, 0x2, 0xf9, 0xc2, 0x0, 0x8, 0x8, 0x9, 0x4, 0x8eb1, 0x0, 0x8, 0x9, 0x7d, 0x8, 0x9, 0x4, 0x3, 0x10000, 0xfab, 0x39, 0x7, 0x4], [0x0, 0x7ff, 0x1f, 0x1, 0x7, 0x2, 0x6, 0xd594, 0x3, 0x2a, 0x1c9b4fd4, 0x0, 0xfff, 0x5, 0xfffff801, 0x9, 0x3f, 0x8, 0x80, 0x6, 0x401, 0x8000, 0x1, 0xcb, 0x1, 0x6, 0x4, 0x92, 0x800000, 0x7, 0x1f, 0x140, 0x7ff, 0xabbc, 0x401, 0x0, 0x3, 0x20, 0x48, 0x12000, 0xfa, 0x1, 0xfffff6fe, 0x0, 0x7, 0x8818, 0x8000, 0x6, 0x1f, 0x8, 0x4, 0xff, 0x101, 0xd7, 0x8, 0x5, 0xffff8001, 0x5, 0xb621, 0x1, 0x9, 0x1395db38, 0x0, 0x3], [0x6, 0x6, 0x401, 0x2d5, 0xc08, 0x3, 0x7f, 0x7, 0x8, 0x4, 0xbe1a, 0x5, 0x3, 0x93c, 0x9, 0x80, 0x800, 0x7fff, 0x6, 0x1, 0x5, 0x2, 0x9, 0x7fff, 0x0, 0x8000, 0x4, 0x6, 0x2, 0x4, 0x6, 0xa2ec, 0x7, 0x100, 0x1, 0x3, 0x1f, 0x81, 0x10000, 0xc5, 0x7ff, 0x2aae236d, 0x4, 0x2000, 0x1c, 0x3, 0x2, 0x735c, 0x7fffffff, 0x6, 0xfffffffd, 0x4, 0x3ff, 0x7fffffff, 0x8, 0x224, 0x261, 0x8b8a, 0x100, 0xffffffff, 0x7fff, 0x41, 0x401, 0x200], [0x7, 0x4, 0x2, 0x5, 0x7, 0x1, 0x8, 0x0, 0x8, 0xffffff7b, 0x0, 0x5, 0x6, 0xcc9, 0x1, 0x5, 0x2, 0xfffffffe, 0xfffffff9, 0x0, 0x5, 0x101, 0x401, 0x2, 0x3, 0x3, 0x7f76, 0x3ff, 0x9, 0xc14, 0x3, 0x7, 0x5, 0x100, 0x6, 0x8, 0x2, 0xe0, 0x3f, 0x200, 0x3, 0x9, 0x3, 0x5, 0x95c6, 0x2, 0x6, 0x20, 0x3, 0x8, 0x9, 0x7, 0x9, 0x0, 0xffffd671, 0x1, 0x0, 0x853d, 0x7, 0x3ff, 0x0, 0xfde7, 0x1, 0x5]}, 0x45c) 18:08:19 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68}, [{0x0, 0x0, 0x0, 0x0, 0xe}]}, 0x78) 18:08:21 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r0, &(0x7f0000000040)=""/244, 0xf4) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="6653960d0ec5d684fa9f017ef0d60a3c27bc33760036001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479810be2aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e6517e615607676f8f9fc0ebf8b0b16d6f2c59957ab35d05692e664ebf68734ca53366295f4ad6142134b62f11e92ead037c7fb53455560c8ef0f1c94fafa924edfe92175aaa1c4ecc7aeeb72e0d050feacee907f40888c96a65545e07422bc6ac79f4c2d6ee3dab47d0", 0xba}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x19) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 18:08:21 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b}]}, 0x78) 18:08:21 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68}, [{0x0, 0x0, 0x0, 0x0, 0xf}]}, 0x78) 18:08:21 executing program 1: r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) write$uinput_user_dev(r1, &(0x7f0000000480)={'syz0\x00', {0xa65b, 0x1000, 0xfffb, 0x80}, 0x32, [0x4, 0x631, 0xaf, 0x2, 0x1b, 0x1, 0x10001, 0x1, 0x8, 0x3ff, 0x800, 0x7859, 0x7, 0x5, 0x7fff, 0xc05, 0xa4, 0x3, 0x4, 0xfffff800, 0x6, 0x7c, 0x6, 0xff, 0x2, 0x771, 0x5, 0xfffffff8, 0x81, 0x0, 0x6, 0x7, 0x6, 0x9, 0x3, 0x0, 0x282d298e, 0x7, 0x6, 0x3, 0xfaf9, 0x7, 0x2, 0xf9, 0xc2, 0x0, 0x8, 0x8, 0x9, 0x4, 0x8eb1, 0x0, 0x8, 0x9, 0x7d, 0x8, 0x9, 0x4, 0x3, 0x10000, 0xfab, 0x39, 0x7, 0x4], [0x0, 0x7ff, 0x1f, 0x1, 0x7, 0x2, 0x6, 0xd594, 0x3, 0x2a, 0x1c9b4fd4, 0x0, 0xfff, 0x5, 0xfffff801, 0x9, 0x3f, 0x8, 0x80, 0x6, 0x401, 0x8000, 0x1, 0xcb, 0x1, 0x6, 0x4, 0x92, 0x800000, 0x7, 0x1f, 0x140, 0x7ff, 0xabbc, 0x401, 0x0, 0x3, 0x20, 0x48, 0x12000, 0xfa, 0x1, 0xfffff6fe, 0x0, 0x7, 0x8818, 0x8000, 0x6, 0x1f, 0x8, 0x4, 0xff, 0x101, 0xd7, 0x8, 0x5, 0xffff8001, 0x5, 0xb621, 0x1, 0x9, 0x1395db38, 0x0, 0x3], [0x6, 0x6, 0x401, 0x2d5, 0xc08, 0x3, 0x7f, 0x7, 0x8, 0x4, 0xbe1a, 0x5, 0x3, 0x93c, 0x9, 0x80, 0x800, 0x7fff, 0x6, 0x1, 0x5, 0x2, 0x9, 0x7fff, 0x0, 0x8000, 0x4, 0x6, 0x2, 0x4, 0x6, 0xa2ec, 0x7, 0x100, 0x1, 0x3, 0x1f, 0x81, 0x10000, 0xc5, 0x7ff, 0x2aae236d, 0x4, 0x2000, 0x1c, 0x3, 0x2, 0x735c, 0x7fffffff, 0x6, 0xfffffffd, 0x4, 0x3ff, 0x7fffffff, 0x8, 0x224, 0x261, 0x8b8a, 0x100, 0xffffffff, 0x7fff, 0x41, 0x401, 0x200], [0x7, 0x4, 0x2, 0x5, 0x7, 0x1, 0x8, 0x0, 0x8, 0xffffff7b, 0x0, 0x5, 0x6, 0xcc9, 0x1, 0x5, 0x2, 0xfffffffe, 0xfffffff9, 0x0, 0x5, 0x101, 0x401, 0x2, 0x3, 0x3, 0x7f76, 0x3ff, 0x9, 0xc14, 0x3, 0x7, 0x5, 0x100, 0x6, 0x8, 0x2, 0xe0, 0x3f, 0x200, 0x3, 0x9, 0x3, 0x5, 0x95c6, 0x2, 0x6, 0x20, 0x3, 0x8, 0x9, 0x7, 0x9, 0x0, 0xffffd671, 0x1, 0x0, 0x853d, 0x7, 0x3ff, 0x0, 0xfde7, 0x1, 0x5]}, 0x45c) 18:08:21 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x19) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 18:08:21 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) syz_mount_image$tmpfs(&(0x7f0000000280)='tmpfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@mode={'mode', 0x3d, 0x3}}]}) 18:08:21 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf0}]}, 0x78) 18:08:21 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x180}]}, 0x78) 18:08:21 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68}, [{0x0, 0x0, 0x0, 0x0, 0x18}]}, 0x78) 18:08:21 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) syz_mount_image$tmpfs(&(0x7f0000000280)='tmpfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@mode={'mode', 0x3d, 0x3}}]}) 18:08:22 executing program 1: r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) write$uinput_user_dev(r1, &(0x7f0000000480)={'syz0\x00', {0xa65b, 0x1000, 0xfffb, 0x80}, 0x32, [0x4, 0x631, 0xaf, 0x2, 0x1b, 0x1, 0x10001, 0x1, 0x8, 0x3ff, 0x800, 0x7859, 0x7, 0x5, 0x7fff, 0xc05, 0xa4, 0x3, 0x4, 0xfffff800, 0x6, 0x7c, 0x6, 0xff, 0x2, 0x771, 0x5, 0xfffffff8, 0x81, 0x0, 0x6, 0x7, 0x6, 0x9, 0x3, 0x0, 0x282d298e, 0x7, 0x6, 0x3, 0xfaf9, 0x7, 0x2, 0xf9, 0xc2, 0x0, 0x8, 0x8, 0x9, 0x4, 0x8eb1, 0x0, 0x8, 0x9, 0x7d, 0x8, 0x9, 0x4, 0x3, 0x10000, 0xfab, 0x39, 0x7, 0x4], [0x0, 0x7ff, 0x1f, 0x1, 0x7, 0x2, 0x6, 0xd594, 0x3, 0x2a, 0x1c9b4fd4, 0x0, 0xfff, 0x5, 0xfffff801, 0x9, 0x3f, 0x8, 0x80, 0x6, 0x401, 0x8000, 0x1, 0xcb, 0x1, 0x6, 0x4, 0x92, 0x800000, 0x7, 0x1f, 0x140, 0x7ff, 0xabbc, 0x401, 0x0, 0x3, 0x20, 0x48, 0x12000, 0xfa, 0x1, 0xfffff6fe, 0x0, 0x7, 0x8818, 0x8000, 0x6, 0x1f, 0x8, 0x4, 0xff, 0x101, 0xd7, 0x8, 0x5, 0xffff8001, 0x5, 0xb621, 0x1, 0x9, 0x1395db38, 0x0, 0x3], [0x6, 0x6, 0x401, 0x2d5, 0xc08, 0x3, 0x7f, 0x7, 0x8, 0x4, 0xbe1a, 0x5, 0x3, 0x93c, 0x9, 0x80, 0x800, 0x7fff, 0x6, 0x1, 0x5, 0x2, 0x9, 0x7fff, 0x0, 0x8000, 0x4, 0x6, 0x2, 0x4, 0x6, 0xa2ec, 0x7, 0x100, 0x1, 0x3, 0x1f, 0x81, 0x10000, 0xc5, 0x7ff, 0x2aae236d, 0x4, 0x2000, 0x1c, 0x3, 0x2, 0x735c, 0x7fffffff, 0x6, 0xfffffffd, 0x4, 0x3ff, 0x7fffffff, 0x8, 0x224, 0x261, 0x8b8a, 0x100, 0xffffffff, 0x7fff, 0x41, 0x401, 0x200], [0x7, 0x4, 0x2, 0x5, 0x7, 0x1, 0x8, 0x0, 0x8, 0xffffff7b, 0x0, 0x5, 0x6, 0xcc9, 0x1, 0x5, 0x2, 0xfffffffe, 0xfffffff9, 0x0, 0x5, 0x101, 0x401, 0x2, 0x3, 0x3, 0x7f76, 0x3ff, 0x9, 0xc14, 0x3, 0x7, 0x5, 0x100, 0x6, 0x8, 0x2, 0xe0, 0x3f, 0x200, 0x3, 0x9, 0x3, 0x5, 0x95c6, 0x2, 0x6, 0x20, 0x3, 0x8, 0x9, 0x7, 0x9, 0x0, 0xffffd671, 0x1, 0x0, 0x853d, 0x7, 0x3ff, 0x0, 0xfde7, 0x1, 0x5]}, 0x45c) 18:08:22 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x700}]}, 0x78) 18:08:24 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r0, &(0x7f0000000040)=""/244, 0xf4) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="6653960d0ec5d684fa9f017ef0d60a3c27bc33760036001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479810be2aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e6517e615607676f8f9fc0ebf8b0b16d6f2c59957ab35d05692e664ebf68734ca53366295f4ad6142134b62f11e92ead037c7fb53455560c8ef0f1c94fafa924edfe92175aaa1c4ecc7aeeb72e0d050feacee907f40888c96a65545e07422bc6ac79f4c2d6ee3dab47d0", 0xba}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x19) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 18:08:24 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68}, [{0x0, 0x0, 0x0, 0x0, 0x19}]}, 0x78) 18:08:24 executing program 1: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) write$uinput_user_dev(r2, &(0x7f0000000480)={'syz0\x00', {0xa65b, 0x1000, 0xfffb, 0x80}, 0x32, [0x4, 0x631, 0xaf, 0x2, 0x1b, 0x1, 0x10001, 0x1, 0x8, 0x3ff, 0x800, 0x7859, 0x7, 0x5, 0x7fff, 0xc05, 0xa4, 0x3, 0x4, 0xfffff800, 0x6, 0x7c, 0x6, 0xff, 0x2, 0x771, 0x5, 0xfffffff8, 0x81, 0x0, 0x6, 0x7, 0x6, 0x9, 0x3, 0x0, 0x282d298e, 0x7, 0x6, 0x3, 0xfaf9, 0x7, 0x2, 0xf9, 0xc2, 0x0, 0x8, 0x8, 0x9, 0x4, 0x8eb1, 0x0, 0x8, 0x9, 0x7d, 0x8, 0x9, 0x4, 0x3, 0x10000, 0xfab, 0x39, 0x7, 0x4], [0x0, 0x7ff, 0x1f, 0x1, 0x7, 0x2, 0x6, 0xd594, 0x3, 0x2a, 0x1c9b4fd4, 0x0, 0xfff, 0x5, 0xfffff801, 0x9, 0x3f, 0x8, 0x80, 0x6, 0x401, 0x8000, 0x1, 0xcb, 0x1, 0x6, 0x4, 0x92, 0x800000, 0x7, 0x1f, 0x140, 0x7ff, 0xabbc, 0x401, 0x0, 0x3, 0x20, 0x48, 0x12000, 0xfa, 0x1, 0xfffff6fe, 0x0, 0x7, 0x8818, 0x8000, 0x6, 0x1f, 0x8, 0x4, 0xff, 0x101, 0xd7, 0x8, 0x5, 0xffff8001, 0x5, 0xb621, 0x1, 0x9, 0x1395db38, 0x0, 0x3], [0x6, 0x6, 0x401, 0x2d5, 0xc08, 0x3, 0x7f, 0x7, 0x8, 0x4, 0xbe1a, 0x5, 0x3, 0x93c, 0x9, 0x80, 0x800, 0x7fff, 0x6, 0x1, 0x5, 0x2, 0x9, 0x7fff, 0x0, 0x8000, 0x4, 0x6, 0x2, 0x4, 0x6, 0xa2ec, 0x7, 0x100, 0x1, 0x3, 0x1f, 0x81, 0x10000, 0xc5, 0x7ff, 0x2aae236d, 0x4, 0x2000, 0x1c, 0x3, 0x2, 0x735c, 0x7fffffff, 0x6, 0xfffffffd, 0x4, 0x3ff, 0x7fffffff, 0x8, 0x224, 0x261, 0x8b8a, 0x100, 0xffffffff, 0x7fff, 0x41, 0x401, 0x200], [0x7, 0x4, 0x2, 0x5, 0x7, 0x1, 0x8, 0x0, 0x8, 0xffffff7b, 0x0, 0x5, 0x6, 0xcc9, 0x1, 0x5, 0x2, 0xfffffffe, 0xfffffff9, 0x0, 0x5, 0x101, 0x401, 0x2, 0x3, 0x3, 0x7f76, 0x3ff, 0x9, 0xc14, 0x3, 0x7, 0x5, 0x100, 0x6, 0x8, 0x2, 0xe0, 0x3f, 0x200, 0x3, 0x9, 0x3, 0x5, 0x95c6, 0x2, 0x6, 0x20, 0x3, 0x8, 0x9, 0x7, 0x9, 0x0, 0xffffd671, 0x1, 0x0, 0x853d, 0x7, 0x3ff, 0x0, 0xfde7, 0x1, 0x5]}, 0x45c) 18:08:24 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x900}]}, 0x78) 18:08:24 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) syz_mount_image$tmpfs(&(0x7f0000000280)='tmpfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@mode={'mode', 0x3d, 0x3}}]}) 18:08:24 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x19) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 18:08:25 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa00}]}, 0x78) 18:08:25 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68}, [{0x0, 0x0, 0x0, 0x0, 0x1a}]}, 0x78) 18:08:25 executing program 1: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) write$uinput_user_dev(r2, &(0x7f0000000480)={'syz0\x00', {0xa65b, 0x1000, 0xfffb, 0x80}, 0x32, [0x4, 0x631, 0xaf, 0x2, 0x1b, 0x1, 0x10001, 0x1, 0x8, 0x3ff, 0x800, 0x7859, 0x7, 0x5, 0x7fff, 0xc05, 0xa4, 0x3, 0x4, 0xfffff800, 0x6, 0x7c, 0x6, 0xff, 0x2, 0x771, 0x5, 0xfffffff8, 0x81, 0x0, 0x6, 0x7, 0x6, 0x9, 0x3, 0x0, 0x282d298e, 0x7, 0x6, 0x3, 0xfaf9, 0x7, 0x2, 0xf9, 0xc2, 0x0, 0x8, 0x8, 0x9, 0x4, 0x8eb1, 0x0, 0x8, 0x9, 0x7d, 0x8, 0x9, 0x4, 0x3, 0x10000, 0xfab, 0x39, 0x7, 0x4], [0x0, 0x7ff, 0x1f, 0x1, 0x7, 0x2, 0x6, 0xd594, 0x3, 0x2a, 0x1c9b4fd4, 0x0, 0xfff, 0x5, 0xfffff801, 0x9, 0x3f, 0x8, 0x80, 0x6, 0x401, 0x8000, 0x1, 0xcb, 0x1, 0x6, 0x4, 0x92, 0x800000, 0x7, 0x1f, 0x140, 0x7ff, 0xabbc, 0x401, 0x0, 0x3, 0x20, 0x48, 0x12000, 0xfa, 0x1, 0xfffff6fe, 0x0, 0x7, 0x8818, 0x8000, 0x6, 0x1f, 0x8, 0x4, 0xff, 0x101, 0xd7, 0x8, 0x5, 0xffff8001, 0x5, 0xb621, 0x1, 0x9, 0x1395db38, 0x0, 0x3], [0x6, 0x6, 0x401, 0x2d5, 0xc08, 0x3, 0x7f, 0x7, 0x8, 0x4, 0xbe1a, 0x5, 0x3, 0x93c, 0x9, 0x80, 0x800, 0x7fff, 0x6, 0x1, 0x5, 0x2, 0x9, 0x7fff, 0x0, 0x8000, 0x4, 0x6, 0x2, 0x4, 0x6, 0xa2ec, 0x7, 0x100, 0x1, 0x3, 0x1f, 0x81, 0x10000, 0xc5, 0x7ff, 0x2aae236d, 0x4, 0x2000, 0x1c, 0x3, 0x2, 0x735c, 0x7fffffff, 0x6, 0xfffffffd, 0x4, 0x3ff, 0x7fffffff, 0x8, 0x224, 0x261, 0x8b8a, 0x100, 0xffffffff, 0x7fff, 0x41, 0x401, 0x200], [0x7, 0x4, 0x2, 0x5, 0x7, 0x1, 0x8, 0x0, 0x8, 0xffffff7b, 0x0, 0x5, 0x6, 0xcc9, 0x1, 0x5, 0x2, 0xfffffffe, 0xfffffff9, 0x0, 0x5, 0x101, 0x401, 0x2, 0x3, 0x3, 0x7f76, 0x3ff, 0x9, 0xc14, 0x3, 0x7, 0x5, 0x100, 0x6, 0x8, 0x2, 0xe0, 0x3f, 0x200, 0x3, 0x9, 0x3, 0x5, 0x95c6, 0x2, 0x6, 0x20, 0x3, 0x8, 0x9, 0x7, 0x9, 0x0, 0xffffd671, 0x1, 0x0, 0x853d, 0x7, 0x3ff, 0x0, 0xfde7, 0x1, 0x5]}, 0x45c) 18:08:25 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc00}]}, 0x78) 18:08:25 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000000280)='tmpfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@mode={'mode', 0x3d, 0x3}}]}) 18:08:25 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68}, [{0x0, 0x0, 0x0, 0x0, 0x1b}]}, 0x78) 18:08:27 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd00}]}, 0x78) 18:08:27 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r0, &(0x7f0000000040)=""/244, 0xf4) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="6653960d0ec5d684fa9f017ef0d60a3c27bc33760036001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479810be2aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e6517e615607676f8f9fc0ebf8b0b16d6f2c59957ab35d05692e664ebf68734ca53366295f4ad6142134b62f11e92ead037c7fb53455560c8ef0f1c94fafa924edfe92175aaa1c4ecc7aeeb72e0d050feacee907f40888c96a65545e07422bc6ac79f4c2d6ee3dab47d0", 0xba}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x19) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 18:08:27 executing program 1: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) write$uinput_user_dev(r2, &(0x7f0000000480)={'syz0\x00', {0xa65b, 0x1000, 0xfffb, 0x80}, 0x32, [0x4, 0x631, 0xaf, 0x2, 0x1b, 0x1, 0x10001, 0x1, 0x8, 0x3ff, 0x800, 0x7859, 0x7, 0x5, 0x7fff, 0xc05, 0xa4, 0x3, 0x4, 0xfffff800, 0x6, 0x7c, 0x6, 0xff, 0x2, 0x771, 0x5, 0xfffffff8, 0x81, 0x0, 0x6, 0x7, 0x6, 0x9, 0x3, 0x0, 0x282d298e, 0x7, 0x6, 0x3, 0xfaf9, 0x7, 0x2, 0xf9, 0xc2, 0x0, 0x8, 0x8, 0x9, 0x4, 0x8eb1, 0x0, 0x8, 0x9, 0x7d, 0x8, 0x9, 0x4, 0x3, 0x10000, 0xfab, 0x39, 0x7, 0x4], [0x0, 0x7ff, 0x1f, 0x1, 0x7, 0x2, 0x6, 0xd594, 0x3, 0x2a, 0x1c9b4fd4, 0x0, 0xfff, 0x5, 0xfffff801, 0x9, 0x3f, 0x8, 0x80, 0x6, 0x401, 0x8000, 0x1, 0xcb, 0x1, 0x6, 0x4, 0x92, 0x800000, 0x7, 0x1f, 0x140, 0x7ff, 0xabbc, 0x401, 0x0, 0x3, 0x20, 0x48, 0x12000, 0xfa, 0x1, 0xfffff6fe, 0x0, 0x7, 0x8818, 0x8000, 0x6, 0x1f, 0x8, 0x4, 0xff, 0x101, 0xd7, 0x8, 0x5, 0xffff8001, 0x5, 0xb621, 0x1, 0x9, 0x1395db38, 0x0, 0x3], [0x6, 0x6, 0x401, 0x2d5, 0xc08, 0x3, 0x7f, 0x7, 0x8, 0x4, 0xbe1a, 0x5, 0x3, 0x93c, 0x9, 0x80, 0x800, 0x7fff, 0x6, 0x1, 0x5, 0x2, 0x9, 0x7fff, 0x0, 0x8000, 0x4, 0x6, 0x2, 0x4, 0x6, 0xa2ec, 0x7, 0x100, 0x1, 0x3, 0x1f, 0x81, 0x10000, 0xc5, 0x7ff, 0x2aae236d, 0x4, 0x2000, 0x1c, 0x3, 0x2, 0x735c, 0x7fffffff, 0x6, 0xfffffffd, 0x4, 0x3ff, 0x7fffffff, 0x8, 0x224, 0x261, 0x8b8a, 0x100, 0xffffffff, 0x7fff, 0x41, 0x401, 0x200], [0x7, 0x4, 0x2, 0x5, 0x7, 0x1, 0x8, 0x0, 0x8, 0xffffff7b, 0x0, 0x5, 0x6, 0xcc9, 0x1, 0x5, 0x2, 0xfffffffe, 0xfffffff9, 0x0, 0x5, 0x101, 0x401, 0x2, 0x3, 0x3, 0x7f76, 0x3ff, 0x9, 0xc14, 0x3, 0x7, 0x5, 0x100, 0x6, 0x8, 0x2, 0xe0, 0x3f, 0x200, 0x3, 0x9, 0x3, 0x5, 0x95c6, 0x2, 0x6, 0x20, 0x3, 0x8, 0x9, 0x7, 0x9, 0x0, 0xffffd671, 0x1, 0x0, 0x853d, 0x7, 0x3ff, 0x0, 0xfde7, 0x1, 0x5]}, 0x45c) 18:08:27 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68}, [{0x0, 0x0, 0x0, 0x0, 0x1e}]}, 0x78) 18:08:27 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000000280)='tmpfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@mode={'mode', 0x3d, 0x3}}]}) 18:08:27 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x19) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 18:08:28 executing program 1: socketpair$unix(0x1, 0x2, 0x0, 0x0) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) write$uinput_user_dev(r1, &(0x7f0000000480)={'syz0\x00', {0xa65b, 0x1000, 0xfffb, 0x80}, 0x32, [0x4, 0x631, 0xaf, 0x2, 0x1b, 0x1, 0x10001, 0x1, 0x8, 0x3ff, 0x800, 0x7859, 0x7, 0x5, 0x7fff, 0xc05, 0xa4, 0x3, 0x4, 0xfffff800, 0x6, 0x7c, 0x6, 0xff, 0x2, 0x771, 0x5, 0xfffffff8, 0x81, 0x0, 0x6, 0x7, 0x6, 0x9, 0x3, 0x0, 0x282d298e, 0x7, 0x6, 0x3, 0xfaf9, 0x7, 0x2, 0xf9, 0xc2, 0x0, 0x8, 0x8, 0x9, 0x4, 0x8eb1, 0x0, 0x8, 0x9, 0x7d, 0x8, 0x9, 0x4, 0x3, 0x10000, 0xfab, 0x39, 0x7, 0x4], [0x0, 0x7ff, 0x1f, 0x1, 0x7, 0x2, 0x6, 0xd594, 0x3, 0x2a, 0x1c9b4fd4, 0x0, 0xfff, 0x5, 0xfffff801, 0x9, 0x3f, 0x8, 0x80, 0x6, 0x401, 0x8000, 0x1, 0xcb, 0x1, 0x6, 0x4, 0x92, 0x800000, 0x7, 0x1f, 0x140, 0x7ff, 0xabbc, 0x401, 0x0, 0x3, 0x20, 0x48, 0x12000, 0xfa, 0x1, 0xfffff6fe, 0x0, 0x7, 0x8818, 0x8000, 0x6, 0x1f, 0x8, 0x4, 0xff, 0x101, 0xd7, 0x8, 0x5, 0xffff8001, 0x5, 0xb621, 0x1, 0x9, 0x1395db38, 0x0, 0x3], [0x6, 0x6, 0x401, 0x2d5, 0xc08, 0x3, 0x7f, 0x7, 0x8, 0x4, 0xbe1a, 0x5, 0x3, 0x93c, 0x9, 0x80, 0x800, 0x7fff, 0x6, 0x1, 0x5, 0x2, 0x9, 0x7fff, 0x0, 0x8000, 0x4, 0x6, 0x2, 0x4, 0x6, 0xa2ec, 0x7, 0x100, 0x1, 0x3, 0x1f, 0x81, 0x10000, 0xc5, 0x7ff, 0x2aae236d, 0x4, 0x2000, 0x1c, 0x3, 0x2, 0x735c, 0x7fffffff, 0x6, 0xfffffffd, 0x4, 0x3ff, 0x7fffffff, 0x8, 0x224, 0x261, 0x8b8a, 0x100, 0xffffffff, 0x7fff, 0x41, 0x401, 0x200], [0x7, 0x4, 0x2, 0x5, 0x7, 0x1, 0x8, 0x0, 0x8, 0xffffff7b, 0x0, 0x5, 0x6, 0xcc9, 0x1, 0x5, 0x2, 0xfffffffe, 0xfffffff9, 0x0, 0x5, 0x101, 0x401, 0x2, 0x3, 0x3, 0x7f76, 0x3ff, 0x9, 0xc14, 0x3, 0x7, 0x5, 0x100, 0x6, 0x8, 0x2, 0xe0, 0x3f, 0x200, 0x3, 0x9, 0x3, 0x5, 0x95c6, 0x2, 0x6, 0x20, 0x3, 0x8, 0x9, 0x7, 0x9, 0x0, 0xffffd671, 0x1, 0x0, 0x853d, 0x7, 0x3ff, 0x0, 0xfde7, 0x1, 0x5]}, 0x45c) 18:08:28 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000000280)='tmpfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@mode={'mode', 0x3d, 0x3}}]}) 18:08:28 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe00}]}, 0x78) 18:08:28 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68}, [{0x0, 0x0, 0x0, 0x0, 0x3e}]}, 0x78) 18:08:28 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf00}]}, 0x78) 18:08:28 executing program 1: socketpair$unix(0x1, 0x2, 0x0, 0x0) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) write$uinput_user_dev(r1, &(0x7f0000000480)={'syz0\x00', {0xa65b, 0x1000, 0xfffb, 0x80}, 0x32, [0x4, 0x631, 0xaf, 0x2, 0x1b, 0x1, 0x10001, 0x1, 0x8, 0x3ff, 0x800, 0x7859, 0x7, 0x5, 0x7fff, 0xc05, 0xa4, 0x3, 0x4, 0xfffff800, 0x6, 0x7c, 0x6, 0xff, 0x2, 0x771, 0x5, 0xfffffff8, 0x81, 0x0, 0x6, 0x7, 0x6, 0x9, 0x3, 0x0, 0x282d298e, 0x7, 0x6, 0x3, 0xfaf9, 0x7, 0x2, 0xf9, 0xc2, 0x0, 0x8, 0x8, 0x9, 0x4, 0x8eb1, 0x0, 0x8, 0x9, 0x7d, 0x8, 0x9, 0x4, 0x3, 0x10000, 0xfab, 0x39, 0x7, 0x4], [0x0, 0x7ff, 0x1f, 0x1, 0x7, 0x2, 0x6, 0xd594, 0x3, 0x2a, 0x1c9b4fd4, 0x0, 0xfff, 0x5, 0xfffff801, 0x9, 0x3f, 0x8, 0x80, 0x6, 0x401, 0x8000, 0x1, 0xcb, 0x1, 0x6, 0x4, 0x92, 0x800000, 0x7, 0x1f, 0x140, 0x7ff, 0xabbc, 0x401, 0x0, 0x3, 0x20, 0x48, 0x12000, 0xfa, 0x1, 0xfffff6fe, 0x0, 0x7, 0x8818, 0x8000, 0x6, 0x1f, 0x8, 0x4, 0xff, 0x101, 0xd7, 0x8, 0x5, 0xffff8001, 0x5, 0xb621, 0x1, 0x9, 0x1395db38, 0x0, 0x3], [0x6, 0x6, 0x401, 0x2d5, 0xc08, 0x3, 0x7f, 0x7, 0x8, 0x4, 0xbe1a, 0x5, 0x3, 0x93c, 0x9, 0x80, 0x800, 0x7fff, 0x6, 0x1, 0x5, 0x2, 0x9, 0x7fff, 0x0, 0x8000, 0x4, 0x6, 0x2, 0x4, 0x6, 0xa2ec, 0x7, 0x100, 0x1, 0x3, 0x1f, 0x81, 0x10000, 0xc5, 0x7ff, 0x2aae236d, 0x4, 0x2000, 0x1c, 0x3, 0x2, 0x735c, 0x7fffffff, 0x6, 0xfffffffd, 0x4, 0x3ff, 0x7fffffff, 0x8, 0x224, 0x261, 0x8b8a, 0x100, 0xffffffff, 0x7fff, 0x41, 0x401, 0x200], [0x7, 0x4, 0x2, 0x5, 0x7, 0x1, 0x8, 0x0, 0x8, 0xffffff7b, 0x0, 0x5, 0x6, 0xcc9, 0x1, 0x5, 0x2, 0xfffffffe, 0xfffffff9, 0x0, 0x5, 0x101, 0x401, 0x2, 0x3, 0x3, 0x7f76, 0x3ff, 0x9, 0xc14, 0x3, 0x7, 0x5, 0x100, 0x6, 0x8, 0x2, 0xe0, 0x3f, 0x200, 0x3, 0x9, 0x3, 0x5, 0x95c6, 0x2, 0x6, 0x20, 0x3, 0x8, 0x9, 0x7, 0x9, 0x0, 0xffffd671, 0x1, 0x0, 0x853d, 0x7, 0x3ff, 0x0, 0xfde7, 0x1, 0x5]}, 0x45c) 18:08:28 executing program 2: r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000000280)='tmpfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@mode={'mode', 0x3d, 0x3}}]}) 18:08:28 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68}, [{0x0, 0x0, 0x0, 0x0, 0x9b}]}, 0x78) 18:08:31 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r0, &(0x7f0000000040)=""/244, 0xf4) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="6653960d0ec5d684fa9f017ef0d60a3c27bc33760036001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479810be2aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e6517e615607676f8f9fc0ebf8b0b16d6f2c59957ab35d05692e664ebf68734ca53366295f4ad6142134b62f11e92ead037c7fb53455560c8ef0f1c94fafa924edfe92175aaa1c4ecc7aeeb72e0d050feacee907f40888c96a65545e07422bc6ac79f4c2d6ee3dab47d06e764682c72d7f16542fcfd05d2813cc182d1595016c179e1717c160300ab1", 0xd9}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x19) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 18:08:31 executing program 1: socketpair$unix(0x1, 0x2, 0x0, 0x0) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) write$uinput_user_dev(r1, &(0x7f0000000480)={'syz0\x00', {0xa65b, 0x1000, 0xfffb, 0x80}, 0x32, [0x4, 0x631, 0xaf, 0x2, 0x1b, 0x1, 0x10001, 0x1, 0x8, 0x3ff, 0x800, 0x7859, 0x7, 0x5, 0x7fff, 0xc05, 0xa4, 0x3, 0x4, 0xfffff800, 0x6, 0x7c, 0x6, 0xff, 0x2, 0x771, 0x5, 0xfffffff8, 0x81, 0x0, 0x6, 0x7, 0x6, 0x9, 0x3, 0x0, 0x282d298e, 0x7, 0x6, 0x3, 0xfaf9, 0x7, 0x2, 0xf9, 0xc2, 0x0, 0x8, 0x8, 0x9, 0x4, 0x8eb1, 0x0, 0x8, 0x9, 0x7d, 0x8, 0x9, 0x4, 0x3, 0x10000, 0xfab, 0x39, 0x7, 0x4], [0x0, 0x7ff, 0x1f, 0x1, 0x7, 0x2, 0x6, 0xd594, 0x3, 0x2a, 0x1c9b4fd4, 0x0, 0xfff, 0x5, 0xfffff801, 0x9, 0x3f, 0x8, 0x80, 0x6, 0x401, 0x8000, 0x1, 0xcb, 0x1, 0x6, 0x4, 0x92, 0x800000, 0x7, 0x1f, 0x140, 0x7ff, 0xabbc, 0x401, 0x0, 0x3, 0x20, 0x48, 0x12000, 0xfa, 0x1, 0xfffff6fe, 0x0, 0x7, 0x8818, 0x8000, 0x6, 0x1f, 0x8, 0x4, 0xff, 0x101, 0xd7, 0x8, 0x5, 0xffff8001, 0x5, 0xb621, 0x1, 0x9, 0x1395db38, 0x0, 0x3], [0x6, 0x6, 0x401, 0x2d5, 0xc08, 0x3, 0x7f, 0x7, 0x8, 0x4, 0xbe1a, 0x5, 0x3, 0x93c, 0x9, 0x80, 0x800, 0x7fff, 0x6, 0x1, 0x5, 0x2, 0x9, 0x7fff, 0x0, 0x8000, 0x4, 0x6, 0x2, 0x4, 0x6, 0xa2ec, 0x7, 0x100, 0x1, 0x3, 0x1f, 0x81, 0x10000, 0xc5, 0x7ff, 0x2aae236d, 0x4, 0x2000, 0x1c, 0x3, 0x2, 0x735c, 0x7fffffff, 0x6, 0xfffffffd, 0x4, 0x3ff, 0x7fffffff, 0x8, 0x224, 0x261, 0x8b8a, 0x100, 0xffffffff, 0x7fff, 0x41, 0x401, 0x200], [0x7, 0x4, 0x2, 0x5, 0x7, 0x1, 0x8, 0x0, 0x8, 0xffffff7b, 0x0, 0x5, 0x6, 0xcc9, 0x1, 0x5, 0x2, 0xfffffffe, 0xfffffff9, 0x0, 0x5, 0x101, 0x401, 0x2, 0x3, 0x3, 0x7f76, 0x3ff, 0x9, 0xc14, 0x3, 0x7, 0x5, 0x100, 0x6, 0x8, 0x2, 0xe0, 0x3f, 0x200, 0x3, 0x9, 0x3, 0x5, 0x95c6, 0x2, 0x6, 0x20, 0x3, 0x8, 0x9, 0x7, 0x9, 0x0, 0xffffd671, 0x1, 0x0, 0x853d, 0x7, 0x3ff, 0x0, 0xfde7, 0x1, 0x5]}, 0x45c) 18:08:31 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1800}]}, 0x78) 18:08:31 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68}, [{0x0, 0x0, 0x0, 0x0, 0xf0}]}, 0x78) 18:08:31 executing program 2: r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000000280)='tmpfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@mode={'mode', 0x3d, 0x3}}]}) 18:08:31 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x19) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 18:08:31 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1a00}]}, 0x78) 18:08:31 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) write$uinput_user_dev(r1, &(0x7f0000000480)={'syz0\x00', {0xa65b, 0x1000, 0xfffb, 0x80}, 0x32, [0x4, 0x631, 0xaf, 0x2, 0x1b, 0x1, 0x10001, 0x1, 0x8, 0x3ff, 0x800, 0x7859, 0x7, 0x5, 0x7fff, 0xc05, 0xa4, 0x3, 0x4, 0xfffff800, 0x6, 0x7c, 0x6, 0xff, 0x2, 0x771, 0x5, 0xfffffff8, 0x81, 0x0, 0x6, 0x7, 0x6, 0x9, 0x3, 0x0, 0x282d298e, 0x7, 0x6, 0x3, 0xfaf9, 0x7, 0x2, 0xf9, 0xc2, 0x0, 0x8, 0x8, 0x9, 0x4, 0x8eb1, 0x0, 0x8, 0x9, 0x7d, 0x8, 0x9, 0x4, 0x3, 0x10000, 0xfab, 0x39, 0x7, 0x4], [0x0, 0x7ff, 0x1f, 0x1, 0x7, 0x2, 0x6, 0xd594, 0x3, 0x2a, 0x1c9b4fd4, 0x0, 0xfff, 0x5, 0xfffff801, 0x9, 0x3f, 0x8, 0x80, 0x6, 0x401, 0x8000, 0x1, 0xcb, 0x1, 0x6, 0x4, 0x92, 0x800000, 0x7, 0x1f, 0x140, 0x7ff, 0xabbc, 0x401, 0x0, 0x3, 0x20, 0x48, 0x12000, 0xfa, 0x1, 0xfffff6fe, 0x0, 0x7, 0x8818, 0x8000, 0x6, 0x1f, 0x8, 0x4, 0xff, 0x101, 0xd7, 0x8, 0x5, 0xffff8001, 0x5, 0xb621, 0x1, 0x9, 0x1395db38, 0x0, 0x3], [0x6, 0x6, 0x401, 0x2d5, 0xc08, 0x3, 0x7f, 0x7, 0x8, 0x4, 0xbe1a, 0x5, 0x3, 0x93c, 0x9, 0x80, 0x800, 0x7fff, 0x6, 0x1, 0x5, 0x2, 0x9, 0x7fff, 0x0, 0x8000, 0x4, 0x6, 0x2, 0x4, 0x6, 0xa2ec, 0x7, 0x100, 0x1, 0x3, 0x1f, 0x81, 0x10000, 0xc5, 0x7ff, 0x2aae236d, 0x4, 0x2000, 0x1c, 0x3, 0x2, 0x735c, 0x7fffffff, 0x6, 0xfffffffd, 0x4, 0x3ff, 0x7fffffff, 0x8, 0x224, 0x261, 0x8b8a, 0x100, 0xffffffff, 0x7fff, 0x41, 0x401, 0x200], [0x7, 0x4, 0x2, 0x5, 0x7, 0x1, 0x8, 0x0, 0x8, 0xffffff7b, 0x0, 0x5, 0x6, 0xcc9, 0x1, 0x5, 0x2, 0xfffffffe, 0xfffffff9, 0x0, 0x5, 0x101, 0x401, 0x2, 0x3, 0x3, 0x7f76, 0x3ff, 0x9, 0xc14, 0x3, 0x7, 0x5, 0x100, 0x6, 0x8, 0x2, 0xe0, 0x3f, 0x200, 0x3, 0x9, 0x3, 0x5, 0x95c6, 0x2, 0x6, 0x20, 0x3, 0x8, 0x9, 0x7, 0x9, 0x0, 0xffffd671, 0x1, 0x0, 0x853d, 0x7, 0x3ff, 0x0, 0xfde7, 0x1, 0x5]}, 0x45c) 18:08:31 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68}, [{0x0, 0x0, 0x0, 0x0, 0x180}]}, 0x78) 18:08:31 executing program 2: r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000000280)='tmpfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@mode={'mode', 0x3d, 0x3}}]}) 18:08:31 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1b00}]}, 0x78) 18:08:31 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) write$uinput_user_dev(r1, &(0x7f0000000480)={'syz0\x00', {0xa65b, 0x1000, 0xfffb, 0x80}, 0x32, [0x4, 0x631, 0xaf, 0x2, 0x1b, 0x1, 0x10001, 0x1, 0x8, 0x3ff, 0x800, 0x7859, 0x7, 0x5, 0x7fff, 0xc05, 0xa4, 0x3, 0x4, 0xfffff800, 0x6, 0x7c, 0x6, 0xff, 0x2, 0x771, 0x5, 0xfffffff8, 0x81, 0x0, 0x6, 0x7, 0x6, 0x9, 0x3, 0x0, 0x282d298e, 0x7, 0x6, 0x3, 0xfaf9, 0x7, 0x2, 0xf9, 0xc2, 0x0, 0x8, 0x8, 0x9, 0x4, 0x8eb1, 0x0, 0x8, 0x9, 0x7d, 0x8, 0x9, 0x4, 0x3, 0x10000, 0xfab, 0x39, 0x7, 0x4], [0x0, 0x7ff, 0x1f, 0x1, 0x7, 0x2, 0x6, 0xd594, 0x3, 0x2a, 0x1c9b4fd4, 0x0, 0xfff, 0x5, 0xfffff801, 0x9, 0x3f, 0x8, 0x80, 0x6, 0x401, 0x8000, 0x1, 0xcb, 0x1, 0x6, 0x4, 0x92, 0x800000, 0x7, 0x1f, 0x140, 0x7ff, 0xabbc, 0x401, 0x0, 0x3, 0x20, 0x48, 0x12000, 0xfa, 0x1, 0xfffff6fe, 0x0, 0x7, 0x8818, 0x8000, 0x6, 0x1f, 0x8, 0x4, 0xff, 0x101, 0xd7, 0x8, 0x5, 0xffff8001, 0x5, 0xb621, 0x1, 0x9, 0x1395db38, 0x0, 0x3], [0x6, 0x6, 0x401, 0x2d5, 0xc08, 0x3, 0x7f, 0x7, 0x8, 0x4, 0xbe1a, 0x5, 0x3, 0x93c, 0x9, 0x80, 0x800, 0x7fff, 0x6, 0x1, 0x5, 0x2, 0x9, 0x7fff, 0x0, 0x8000, 0x4, 0x6, 0x2, 0x4, 0x6, 0xa2ec, 0x7, 0x100, 0x1, 0x3, 0x1f, 0x81, 0x10000, 0xc5, 0x7ff, 0x2aae236d, 0x4, 0x2000, 0x1c, 0x3, 0x2, 0x735c, 0x7fffffff, 0x6, 0xfffffffd, 0x4, 0x3ff, 0x7fffffff, 0x8, 0x224, 0x261, 0x8b8a, 0x100, 0xffffffff, 0x7fff, 0x41, 0x401, 0x200], [0x7, 0x4, 0x2, 0x5, 0x7, 0x1, 0x8, 0x0, 0x8, 0xffffff7b, 0x0, 0x5, 0x6, 0xcc9, 0x1, 0x5, 0x2, 0xfffffffe, 0xfffffff9, 0x0, 0x5, 0x101, 0x401, 0x2, 0x3, 0x3, 0x7f76, 0x3ff, 0x9, 0xc14, 0x3, 0x7, 0x5, 0x100, 0x6, 0x8, 0x2, 0xe0, 0x3f, 0x200, 0x3, 0x9, 0x3, 0x5, 0x95c6, 0x2, 0x6, 0x20, 0x3, 0x8, 0x9, 0x7, 0x9, 0x0, 0xffffd671, 0x1, 0x0, 0x853d, 0x7, 0x3ff, 0x0, 0xfde7, 0x1, 0x5]}, 0x45c) 18:08:34 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r0, &(0x7f0000000040)=""/244, 0xf4) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="6653960d0ec5d684fa9f017ef0d60a3c27bc33760036001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479810be2aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e6517e615607676f8f9fc0ebf8b0b16d6f2c59957ab35d05692e664ebf68734ca53366295f4ad6142134b62f11e92ead037c7fb53455560c8ef0f1c94fafa924edfe92175aaa1c4ecc7aeeb72e0d050feacee907f40888c96a65545e07422bc6ac79f4c2d6ee3dab47d06e764682c72d7f16542fcfd05d2813cc182d1595016c179e1717c160300ab1", 0xd9}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x19) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 18:08:34 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68}, [{0x0, 0x0, 0x0, 0x0, 0x3e8}]}, 0x78) 18:08:34 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3e00}]}, 0x78) 18:08:34 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) write$uinput_user_dev(r1, &(0x7f0000000480)={'syz0\x00', {0xa65b, 0x1000, 0xfffb, 0x80}, 0x32, [0x4, 0x631, 0xaf, 0x2, 0x1b, 0x1, 0x10001, 0x1, 0x8, 0x3ff, 0x800, 0x7859, 0x7, 0x5, 0x7fff, 0xc05, 0xa4, 0x3, 0x4, 0xfffff800, 0x6, 0x7c, 0x6, 0xff, 0x2, 0x771, 0x5, 0xfffffff8, 0x81, 0x0, 0x6, 0x7, 0x6, 0x9, 0x3, 0x0, 0x282d298e, 0x7, 0x6, 0x3, 0xfaf9, 0x7, 0x2, 0xf9, 0xc2, 0x0, 0x8, 0x8, 0x9, 0x4, 0x8eb1, 0x0, 0x8, 0x9, 0x7d, 0x8, 0x9, 0x4, 0x3, 0x10000, 0xfab, 0x39, 0x7, 0x4], [0x0, 0x7ff, 0x1f, 0x1, 0x7, 0x2, 0x6, 0xd594, 0x3, 0x2a, 0x1c9b4fd4, 0x0, 0xfff, 0x5, 0xfffff801, 0x9, 0x3f, 0x8, 0x80, 0x6, 0x401, 0x8000, 0x1, 0xcb, 0x1, 0x6, 0x4, 0x92, 0x800000, 0x7, 0x1f, 0x140, 0x7ff, 0xabbc, 0x401, 0x0, 0x3, 0x20, 0x48, 0x12000, 0xfa, 0x1, 0xfffff6fe, 0x0, 0x7, 0x8818, 0x8000, 0x6, 0x1f, 0x8, 0x4, 0xff, 0x101, 0xd7, 0x8, 0x5, 0xffff8001, 0x5, 0xb621, 0x1, 0x9, 0x1395db38, 0x0, 0x3], [0x6, 0x6, 0x401, 0x2d5, 0xc08, 0x3, 0x7f, 0x7, 0x8, 0x4, 0xbe1a, 0x5, 0x3, 0x93c, 0x9, 0x80, 0x800, 0x7fff, 0x6, 0x1, 0x5, 0x2, 0x9, 0x7fff, 0x0, 0x8000, 0x4, 0x6, 0x2, 0x4, 0x6, 0xa2ec, 0x7, 0x100, 0x1, 0x3, 0x1f, 0x81, 0x10000, 0xc5, 0x7ff, 0x2aae236d, 0x4, 0x2000, 0x1c, 0x3, 0x2, 0x735c, 0x7fffffff, 0x6, 0xfffffffd, 0x4, 0x3ff, 0x7fffffff, 0x8, 0x224, 0x261, 0x8b8a, 0x100, 0xffffffff, 0x7fff, 0x41, 0x401, 0x200], [0x7, 0x4, 0x2, 0x5, 0x7, 0x1, 0x8, 0x0, 0x8, 0xffffff7b, 0x0, 0x5, 0x6, 0xcc9, 0x1, 0x5, 0x2, 0xfffffffe, 0xfffffff9, 0x0, 0x5, 0x101, 0x401, 0x2, 0x3, 0x3, 0x7f76, 0x3ff, 0x9, 0xc14, 0x3, 0x7, 0x5, 0x100, 0x6, 0x8, 0x2, 0xe0, 0x3f, 0x200, 0x3, 0x9, 0x3, 0x5, 0x95c6, 0x2, 0x6, 0x20, 0x3, 0x8, 0x9, 0x7, 0x9, 0x0, 0xffffd671, 0x1, 0x0, 0x853d, 0x7, 0x3ff, 0x0, 0xfde7, 0x1, 0x5]}, 0x45c) 18:08:34 executing program 2: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000000280)='tmpfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@mode={'mode', 0x3d, 0x3}}]}) 18:08:34 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {0x0}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x19) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 18:08:34 executing program 2: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000000280)='tmpfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@mode={'mode', 0x3d, 0x3}}]}) 18:08:34 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) write$uinput_user_dev(r1, &(0x7f0000000480)={'syz0\x00', {0xa65b, 0x1000, 0xfffb, 0x80}, 0x32, [0x4, 0x631, 0xaf, 0x2, 0x1b, 0x1, 0x10001, 0x1, 0x8, 0x3ff, 0x800, 0x7859, 0x7, 0x5, 0x7fff, 0xc05, 0xa4, 0x3, 0x4, 0xfffff800, 0x6, 0x7c, 0x6, 0xff, 0x2, 0x771, 0x5, 0xfffffff8, 0x81, 0x0, 0x6, 0x7, 0x6, 0x9, 0x3, 0x0, 0x282d298e, 0x7, 0x6, 0x3, 0xfaf9, 0x7, 0x2, 0xf9, 0xc2, 0x0, 0x8, 0x8, 0x9, 0x4, 0x8eb1, 0x0, 0x8, 0x9, 0x7d, 0x8, 0x9, 0x4, 0x3, 0x10000, 0xfab, 0x39, 0x7, 0x4], [0x0, 0x7ff, 0x1f, 0x1, 0x7, 0x2, 0x6, 0xd594, 0x3, 0x2a, 0x1c9b4fd4, 0x0, 0xfff, 0x5, 0xfffff801, 0x9, 0x3f, 0x8, 0x80, 0x6, 0x401, 0x8000, 0x1, 0xcb, 0x1, 0x6, 0x4, 0x92, 0x800000, 0x7, 0x1f, 0x140, 0x7ff, 0xabbc, 0x401, 0x0, 0x3, 0x20, 0x48, 0x12000, 0xfa, 0x1, 0xfffff6fe, 0x0, 0x7, 0x8818, 0x8000, 0x6, 0x1f, 0x8, 0x4, 0xff, 0x101, 0xd7, 0x8, 0x5, 0xffff8001, 0x5, 0xb621, 0x1, 0x9, 0x1395db38, 0x0, 0x3], [0x6, 0x6, 0x401, 0x2d5, 0xc08, 0x3, 0x7f, 0x7, 0x8, 0x4, 0xbe1a, 0x5, 0x3, 0x93c, 0x9, 0x80, 0x800, 0x7fff, 0x6, 0x1, 0x5, 0x2, 0x9, 0x7fff, 0x0, 0x8000, 0x4, 0x6, 0x2, 0x4, 0x6, 0xa2ec, 0x7, 0x100, 0x1, 0x3, 0x1f, 0x81, 0x10000, 0xc5, 0x7ff, 0x2aae236d, 0x4, 0x2000, 0x1c, 0x3, 0x2, 0x735c, 0x7fffffff, 0x6, 0xfffffffd, 0x4, 0x3ff, 0x7fffffff, 0x8, 0x224, 0x261, 0x8b8a, 0x100, 0xffffffff, 0x7fff, 0x41, 0x401, 0x200], [0x7, 0x4, 0x2, 0x5, 0x7, 0x1, 0x8, 0x0, 0x8, 0xffffff7b, 0x0, 0x5, 0x6, 0xcc9, 0x1, 0x5, 0x2, 0xfffffffe, 0xfffffff9, 0x0, 0x5, 0x101, 0x401, 0x2, 0x3, 0x3, 0x7f76, 0x3ff, 0x9, 0xc14, 0x3, 0x7, 0x5, 0x100, 0x6, 0x8, 0x2, 0xe0, 0x3f, 0x200, 0x3, 0x9, 0x3, 0x5, 0x95c6, 0x2, 0x6, 0x20, 0x3, 0x8, 0x9, 0x7, 0x9, 0x0, 0xffffd671, 0x1, 0x0, 0x853d, 0x7, 0x3ff, 0x0, 0xfde7, 0x1, 0x5]}, 0x45c) 18:08:34 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f00}]}, 0x78) 18:08:34 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {0x0}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x19) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 18:08:34 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68}, [{0x0, 0x0, 0x0, 0x0, 0x500}]}, 0x78) 18:08:34 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r0, &(0x7f0000000040)=""/244, 0xf4) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="6653960d0ec5d684fa9f017ef0d60a3c27bc33760036001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479810be2aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e6517e615607676f8f9fc0ebf8b0b16d6f2c59957ab35d05692e664ebf68734ca53366295f4ad6142134b62f11e92ead037c7fb53455560c8ef0f1c94fafa924edfe92175aaa1c4ecc7aeeb72e0d050feacee907f40888c96a65545e07422bc6ac79f4c2d6ee3dab47d06e764682c72d7f16542fcfd05d2813cc182d1595016c179e1717c160300ab1", 0xd9}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x19) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 18:08:34 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) write$uinput_user_dev(r1, &(0x7f0000000480)={'syz0\x00', {0xa65b, 0x1000, 0xfffb, 0x80}, 0x32, [0x4, 0x631, 0xaf, 0x2, 0x1b, 0x1, 0x10001, 0x1, 0x8, 0x3ff, 0x800, 0x7859, 0x7, 0x5, 0x7fff, 0xc05, 0xa4, 0x3, 0x4, 0xfffff800, 0x6, 0x7c, 0x6, 0xff, 0x2, 0x771, 0x5, 0xfffffff8, 0x81, 0x0, 0x6, 0x7, 0x6, 0x9, 0x3, 0x0, 0x282d298e, 0x7, 0x6, 0x3, 0xfaf9, 0x7, 0x2, 0xf9, 0xc2, 0x0, 0x8, 0x8, 0x9, 0x4, 0x8eb1, 0x0, 0x8, 0x9, 0x7d, 0x8, 0x9, 0x4, 0x3, 0x10000, 0xfab, 0x39, 0x7, 0x4], [0x0, 0x7ff, 0x1f, 0x1, 0x7, 0x2, 0x6, 0xd594, 0x3, 0x2a, 0x1c9b4fd4, 0x0, 0xfff, 0x5, 0xfffff801, 0x9, 0x3f, 0x8, 0x80, 0x6, 0x401, 0x8000, 0x1, 0xcb, 0x1, 0x6, 0x4, 0x92, 0x800000, 0x7, 0x1f, 0x140, 0x7ff, 0xabbc, 0x401, 0x0, 0x3, 0x20, 0x48, 0x12000, 0xfa, 0x1, 0xfffff6fe, 0x0, 0x7, 0x8818, 0x8000, 0x6, 0x1f, 0x8, 0x4, 0xff, 0x101, 0xd7, 0x8, 0x5, 0xffff8001, 0x5, 0xb621, 0x1, 0x9, 0x1395db38, 0x0, 0x3], [0x6, 0x6, 0x401, 0x2d5, 0xc08, 0x3, 0x7f, 0x7, 0x8, 0x4, 0xbe1a, 0x5, 0x3, 0x93c, 0x9, 0x80, 0x800, 0x7fff, 0x6, 0x1, 0x5, 0x2, 0x9, 0x7fff, 0x0, 0x8000, 0x4, 0x6, 0x2, 0x4, 0x6, 0xa2ec, 0x7, 0x100, 0x1, 0x3, 0x1f, 0x81, 0x10000, 0xc5, 0x7ff, 0x2aae236d, 0x4, 0x2000, 0x1c, 0x3, 0x2, 0x735c, 0x7fffffff, 0x6, 0xfffffffd, 0x4, 0x3ff, 0x7fffffff, 0x8, 0x224, 0x261, 0x8b8a, 0x100, 0xffffffff, 0x7fff, 0x41, 0x401, 0x200], [0x7, 0x4, 0x2, 0x5, 0x7, 0x1, 0x8, 0x0, 0x8, 0xffffff7b, 0x0, 0x5, 0x6, 0xcc9, 0x1, 0x5, 0x2, 0xfffffffe, 0xfffffff9, 0x0, 0x5, 0x101, 0x401, 0x2, 0x3, 0x3, 0x7f76, 0x3ff, 0x9, 0xc14, 0x3, 0x7, 0x5, 0x100, 0x6, 0x8, 0x2, 0xe0, 0x3f, 0x200, 0x3, 0x9, 0x3, 0x5, 0x95c6, 0x2, 0x6, 0x20, 0x3, 0x8, 0x9, 0x7, 0x9, 0x0, 0xffffd671, 0x1, 0x0, 0x853d, 0x7, 0x3ff, 0x0, 0xfde7, 0x1, 0x5]}, 0x45c) 18:08:34 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b00}]}, 0x78) 18:08:34 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68}, [{0x0, 0x0, 0x0, 0x0, 0x600}]}, 0x78) 18:08:34 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) write$uinput_user_dev(r1, &(0x7f0000000480)={'syz0\x00', {0xa65b, 0x1000, 0xfffb, 0x80}, 0x32, [0x4, 0x631, 0xaf, 0x2, 0x1b, 0x1, 0x10001, 0x1, 0x8, 0x3ff, 0x800, 0x7859, 0x7, 0x5, 0x7fff, 0xc05, 0xa4, 0x3, 0x4, 0xfffff800, 0x6, 0x7c, 0x6, 0xff, 0x2, 0x771, 0x5, 0xfffffff8, 0x81, 0x0, 0x6, 0x7, 0x6, 0x9, 0x3, 0x0, 0x282d298e, 0x7, 0x6, 0x3, 0xfaf9, 0x7, 0x2, 0xf9, 0xc2, 0x0, 0x8, 0x8, 0x9, 0x4, 0x8eb1, 0x0, 0x8, 0x9, 0x7d, 0x8, 0x9, 0x4, 0x3, 0x10000, 0xfab, 0x39, 0x7, 0x4], [0x0, 0x7ff, 0x1f, 0x1, 0x7, 0x2, 0x6, 0xd594, 0x3, 0x2a, 0x1c9b4fd4, 0x0, 0xfff, 0x5, 0xfffff801, 0x9, 0x3f, 0x8, 0x80, 0x6, 0x401, 0x8000, 0x1, 0xcb, 0x1, 0x6, 0x4, 0x92, 0x800000, 0x7, 0x1f, 0x140, 0x7ff, 0xabbc, 0x401, 0x0, 0x3, 0x20, 0x48, 0x12000, 0xfa, 0x1, 0xfffff6fe, 0x0, 0x7, 0x8818, 0x8000, 0x6, 0x1f, 0x8, 0x4, 0xff, 0x101, 0xd7, 0x8, 0x5, 0xffff8001, 0x5, 0xb621, 0x1, 0x9, 0x1395db38, 0x0, 0x3], [0x6, 0x6, 0x401, 0x2d5, 0xc08, 0x3, 0x7f, 0x7, 0x8, 0x4, 0xbe1a, 0x5, 0x3, 0x93c, 0x9, 0x80, 0x800, 0x7fff, 0x6, 0x1, 0x5, 0x2, 0x9, 0x7fff, 0x0, 0x8000, 0x4, 0x6, 0x2, 0x4, 0x6, 0xa2ec, 0x7, 0x100, 0x1, 0x3, 0x1f, 0x81, 0x10000, 0xc5, 0x7ff, 0x2aae236d, 0x4, 0x2000, 0x1c, 0x3, 0x2, 0x735c, 0x7fffffff, 0x6, 0xfffffffd, 0x4, 0x3ff, 0x7fffffff, 0x8, 0x224, 0x261, 0x8b8a, 0x100, 0xffffffff, 0x7fff, 0x41, 0x401, 0x200], [0x7, 0x4, 0x2, 0x5, 0x7, 0x1, 0x8, 0x0, 0x8, 0xffffff7b, 0x0, 0x5, 0x6, 0xcc9, 0x1, 0x5, 0x2, 0xfffffffe, 0xfffffff9, 0x0, 0x5, 0x101, 0x401, 0x2, 0x3, 0x3, 0x7f76, 0x3ff, 0x9, 0xc14, 0x3, 0x7, 0x5, 0x100, 0x6, 0x8, 0x2, 0xe0, 0x3f, 0x200, 0x3, 0x9, 0x3, 0x5, 0x95c6, 0x2, 0x6, 0x20, 0x3, 0x8, 0x9, 0x7, 0x9, 0x0, 0xffffd671, 0x1, 0x0, 0x853d, 0x7, 0x3ff, 0x0, 0xfde7, 0x1, 0x5]}, 0x45c) 18:08:34 executing program 2: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000000280)='tmpfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@mode={'mode', 0x3d, 0x3}}]}) 18:08:34 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68}, [{0x0, 0x0, 0x0, 0x0, 0x700}]}, 0x78) 18:08:34 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) write$uinput_user_dev(r2, &(0x7f0000000480)={'syz0\x00', {0xa65b, 0x1000, 0xfffb, 0x80}, 0x32, [0x4, 0x631, 0xaf, 0x2, 0x1b, 0x1, 0x10001, 0x1, 0x8, 0x3ff, 0x800, 0x7859, 0x7, 0x5, 0x7fff, 0xc05, 0xa4, 0x3, 0x4, 0xfffff800, 0x6, 0x7c, 0x6, 0xff, 0x2, 0x771, 0x5, 0xfffffff8, 0x81, 0x0, 0x6, 0x7, 0x6, 0x9, 0x3, 0x0, 0x282d298e, 0x7, 0x6, 0x3, 0xfaf9, 0x7, 0x2, 0xf9, 0xc2, 0x0, 0x8, 0x8, 0x9, 0x4, 0x8eb1, 0x0, 0x8, 0x9, 0x7d, 0x8, 0x9, 0x4, 0x3, 0x10000, 0xfab, 0x39, 0x7, 0x4], [0x0, 0x7ff, 0x1f, 0x1, 0x7, 0x2, 0x6, 0xd594, 0x3, 0x2a, 0x1c9b4fd4, 0x0, 0xfff, 0x5, 0xfffff801, 0x9, 0x3f, 0x8, 0x80, 0x6, 0x401, 0x8000, 0x1, 0xcb, 0x1, 0x6, 0x4, 0x92, 0x800000, 0x7, 0x1f, 0x140, 0x7ff, 0xabbc, 0x401, 0x0, 0x3, 0x20, 0x48, 0x12000, 0xfa, 0x1, 0xfffff6fe, 0x0, 0x7, 0x8818, 0x8000, 0x6, 0x1f, 0x8, 0x4, 0xff, 0x101, 0xd7, 0x8, 0x5, 0xffff8001, 0x5, 0xb621, 0x1, 0x9, 0x1395db38, 0x0, 0x3], [0x6, 0x6, 0x401, 0x2d5, 0xc08, 0x3, 0x7f, 0x7, 0x8, 0x4, 0xbe1a, 0x5, 0x3, 0x93c, 0x9, 0x80, 0x800, 0x7fff, 0x6, 0x1, 0x5, 0x2, 0x9, 0x7fff, 0x0, 0x8000, 0x4, 0x6, 0x2, 0x4, 0x6, 0xa2ec, 0x7, 0x100, 0x1, 0x3, 0x1f, 0x81, 0x10000, 0xc5, 0x7ff, 0x2aae236d, 0x4, 0x2000, 0x1c, 0x3, 0x2, 0x735c, 0x7fffffff, 0x6, 0xfffffffd, 0x4, 0x3ff, 0x7fffffff, 0x8, 0x224, 0x261, 0x8b8a, 0x100, 0xffffffff, 0x7fff, 0x41, 0x401, 0x200], [0x7, 0x4, 0x2, 0x5, 0x7, 0x1, 0x8, 0x0, 0x8, 0xffffff7b, 0x0, 0x5, 0x6, 0xcc9, 0x1, 0x5, 0x2, 0xfffffffe, 0xfffffff9, 0x0, 0x5, 0x101, 0x401, 0x2, 0x3, 0x3, 0x7f76, 0x3ff, 0x9, 0xc14, 0x3, 0x7, 0x5, 0x100, 0x6, 0x8, 0x2, 0xe0, 0x3f, 0x200, 0x3, 0x9, 0x3, 0x5, 0x95c6, 0x2, 0x6, 0x20, 0x3, 0x8, 0x9, 0x7, 0x9, 0x0, 0xffffd671, 0x1, 0x0, 0x853d, 0x7, 0x3ff, 0x0, 0xfde7, 0x1, 0x5]}, 0x45c) 18:08:34 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf000}]}, 0x78) 18:08:34 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf00000}]}, 0x78) 18:08:37 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {0x0}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x19) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 18:08:37 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) write$uinput_user_dev(r2, &(0x7f0000000480)={'syz0\x00', {0xa65b, 0x1000, 0xfffb, 0x80}, 0x32, [0x4, 0x631, 0xaf, 0x2, 0x1b, 0x1, 0x10001, 0x1, 0x8, 0x3ff, 0x800, 0x7859, 0x7, 0x5, 0x7fff, 0xc05, 0xa4, 0x3, 0x4, 0xfffff800, 0x6, 0x7c, 0x6, 0xff, 0x2, 0x771, 0x5, 0xfffffff8, 0x81, 0x0, 0x6, 0x7, 0x6, 0x9, 0x3, 0x0, 0x282d298e, 0x7, 0x6, 0x3, 0xfaf9, 0x7, 0x2, 0xf9, 0xc2, 0x0, 0x8, 0x8, 0x9, 0x4, 0x8eb1, 0x0, 0x8, 0x9, 0x7d, 0x8, 0x9, 0x4, 0x3, 0x10000, 0xfab, 0x39, 0x7, 0x4], [0x0, 0x7ff, 0x1f, 0x1, 0x7, 0x2, 0x6, 0xd594, 0x3, 0x2a, 0x1c9b4fd4, 0x0, 0xfff, 0x5, 0xfffff801, 0x9, 0x3f, 0x8, 0x80, 0x6, 0x401, 0x8000, 0x1, 0xcb, 0x1, 0x6, 0x4, 0x92, 0x800000, 0x7, 0x1f, 0x140, 0x7ff, 0xabbc, 0x401, 0x0, 0x3, 0x20, 0x48, 0x12000, 0xfa, 0x1, 0xfffff6fe, 0x0, 0x7, 0x8818, 0x8000, 0x6, 0x1f, 0x8, 0x4, 0xff, 0x101, 0xd7, 0x8, 0x5, 0xffff8001, 0x5, 0xb621, 0x1, 0x9, 0x1395db38, 0x0, 0x3], [0x6, 0x6, 0x401, 0x2d5, 0xc08, 0x3, 0x7f, 0x7, 0x8, 0x4, 0xbe1a, 0x5, 0x3, 0x93c, 0x9, 0x80, 0x800, 0x7fff, 0x6, 0x1, 0x5, 0x2, 0x9, 0x7fff, 0x0, 0x8000, 0x4, 0x6, 0x2, 0x4, 0x6, 0xa2ec, 0x7, 0x100, 0x1, 0x3, 0x1f, 0x81, 0x10000, 0xc5, 0x7ff, 0x2aae236d, 0x4, 0x2000, 0x1c, 0x3, 0x2, 0x735c, 0x7fffffff, 0x6, 0xfffffffd, 0x4, 0x3ff, 0x7fffffff, 0x8, 0x224, 0x261, 0x8b8a, 0x100, 0xffffffff, 0x7fff, 0x41, 0x401, 0x200], [0x7, 0x4, 0x2, 0x5, 0x7, 0x1, 0x8, 0x0, 0x8, 0xffffff7b, 0x0, 0x5, 0x6, 0xcc9, 0x1, 0x5, 0x2, 0xfffffffe, 0xfffffff9, 0x0, 0x5, 0x101, 0x401, 0x2, 0x3, 0x3, 0x7f76, 0x3ff, 0x9, 0xc14, 0x3, 0x7, 0x5, 0x100, 0x6, 0x8, 0x2, 0xe0, 0x3f, 0x200, 0x3, 0x9, 0x3, 0x5, 0x95c6, 0x2, 0x6, 0x20, 0x3, 0x8, 0x9, 0x7, 0x9, 0x0, 0xffffd671, 0x1, 0x0, 0x853d, 0x7, 0x3ff, 0x0, 0xfde7, 0x1, 0x5]}, 0x45c) 18:08:37 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r0, &(0x7f0000000040)=""/244, 0xf4) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="6653960d0ec5d684fa9f017ef0d60a3c27bc33760036001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479810be2aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e6517e615607676f8f9fc0ebf8b0b16d6f2c59957ab35d05692e664ebf68734ca53366295f4ad6142134b62f11e92ead037c7fb53455560c8ef0f1c94fafa924edfe92175aaa1c4ecc7aeeb72e0d050feacee907f40888c96a65545e07422bc6ac79f4c2d6ee3dab47d06e764682c72d7f16542fcfd05d2813cc182d1595016c179e1717c160300ab1ab0ac397e91bd193c036feb66a9ad2", 0xe8}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x19) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 18:08:37 executing program 2: socketpair$unix(0x1, 0x2, 0x0, 0x0) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000000280)='tmpfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@mode={'mode', 0x3d, 0x3}}]}) 18:08:37 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68}, [{0x0, 0x0, 0x0, 0x0, 0x900}]}, 0x78) 18:08:37 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000}]}, 0x78) 18:08:37 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) write$uinput_user_dev(r2, &(0x7f0000000480)={'syz0\x00', {0xa65b, 0x1000, 0xfffb, 0x80}, 0x32, [0x4, 0x631, 0xaf, 0x2, 0x1b, 0x1, 0x10001, 0x1, 0x8, 0x3ff, 0x800, 0x7859, 0x7, 0x5, 0x7fff, 0xc05, 0xa4, 0x3, 0x4, 0xfffff800, 0x6, 0x7c, 0x6, 0xff, 0x2, 0x771, 0x5, 0xfffffff8, 0x81, 0x0, 0x6, 0x7, 0x6, 0x9, 0x3, 0x0, 0x282d298e, 0x7, 0x6, 0x3, 0xfaf9, 0x7, 0x2, 0xf9, 0xc2, 0x0, 0x8, 0x8, 0x9, 0x4, 0x8eb1, 0x0, 0x8, 0x9, 0x7d, 0x8, 0x9, 0x4, 0x3, 0x10000, 0xfab, 0x39, 0x7, 0x4], [0x0, 0x7ff, 0x1f, 0x1, 0x7, 0x2, 0x6, 0xd594, 0x3, 0x2a, 0x1c9b4fd4, 0x0, 0xfff, 0x5, 0xfffff801, 0x9, 0x3f, 0x8, 0x80, 0x6, 0x401, 0x8000, 0x1, 0xcb, 0x1, 0x6, 0x4, 0x92, 0x800000, 0x7, 0x1f, 0x140, 0x7ff, 0xabbc, 0x401, 0x0, 0x3, 0x20, 0x48, 0x12000, 0xfa, 0x1, 0xfffff6fe, 0x0, 0x7, 0x8818, 0x8000, 0x6, 0x1f, 0x8, 0x4, 0xff, 0x101, 0xd7, 0x8, 0x5, 0xffff8001, 0x5, 0xb621, 0x1, 0x9, 0x1395db38, 0x0, 0x3], [0x6, 0x6, 0x401, 0x2d5, 0xc08, 0x3, 0x7f, 0x7, 0x8, 0x4, 0xbe1a, 0x5, 0x3, 0x93c, 0x9, 0x80, 0x800, 0x7fff, 0x6, 0x1, 0x5, 0x2, 0x9, 0x7fff, 0x0, 0x8000, 0x4, 0x6, 0x2, 0x4, 0x6, 0xa2ec, 0x7, 0x100, 0x1, 0x3, 0x1f, 0x81, 0x10000, 0xc5, 0x7ff, 0x2aae236d, 0x4, 0x2000, 0x1c, 0x3, 0x2, 0x735c, 0x7fffffff, 0x6, 0xfffffffd, 0x4, 0x3ff, 0x7fffffff, 0x8, 0x224, 0x261, 0x8b8a, 0x100, 0xffffffff, 0x7fff, 0x41, 0x401, 0x200], [0x7, 0x4, 0x2, 0x5, 0x7, 0x1, 0x8, 0x0, 0x8, 0xffffff7b, 0x0, 0x5, 0x6, 0xcc9, 0x1, 0x5, 0x2, 0xfffffffe, 0xfffffff9, 0x0, 0x5, 0x101, 0x401, 0x2, 0x3, 0x3, 0x7f76, 0x3ff, 0x9, 0xc14, 0x3, 0x7, 0x5, 0x100, 0x6, 0x8, 0x2, 0xe0, 0x3f, 0x200, 0x3, 0x9, 0x3, 0x5, 0x95c6, 0x2, 0x6, 0x20, 0x3, 0x8, 0x9, 0x7, 0x9, 0x0, 0xffffd671, 0x1, 0x0, 0x853d, 0x7, 0x3ff, 0x0, 0xfde7, 0x1, 0x5]}, 0x45c) 18:08:37 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1800000}]}, 0x78) 18:08:37 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$sequencer(0xffffffffffffff9c, 0x0, 0x8002, 0x0) write$uinput_user_dev(r2, &(0x7f0000000480)={'syz0\x00', {0xa65b, 0x1000, 0xfffb, 0x80}, 0x32, [0x4, 0x631, 0xaf, 0x2, 0x1b, 0x1, 0x10001, 0x1, 0x8, 0x3ff, 0x800, 0x7859, 0x7, 0x5, 0x7fff, 0xc05, 0xa4, 0x3, 0x4, 0xfffff800, 0x6, 0x7c, 0x6, 0xff, 0x2, 0x771, 0x5, 0xfffffff8, 0x81, 0x0, 0x6, 0x7, 0x6, 0x9, 0x3, 0x0, 0x282d298e, 0x7, 0x6, 0x3, 0xfaf9, 0x7, 0x2, 0xf9, 0xc2, 0x0, 0x8, 0x8, 0x9, 0x4, 0x8eb1, 0x0, 0x8, 0x9, 0x7d, 0x8, 0x9, 0x4, 0x3, 0x10000, 0xfab, 0x39, 0x7, 0x4], [0x0, 0x7ff, 0x1f, 0x1, 0x7, 0x2, 0x6, 0xd594, 0x3, 0x2a, 0x1c9b4fd4, 0x0, 0xfff, 0x5, 0xfffff801, 0x9, 0x3f, 0x8, 0x80, 0x6, 0x401, 0x8000, 0x1, 0xcb, 0x1, 0x6, 0x4, 0x92, 0x800000, 0x7, 0x1f, 0x140, 0x7ff, 0xabbc, 0x401, 0x0, 0x3, 0x20, 0x48, 0x12000, 0xfa, 0x1, 0xfffff6fe, 0x0, 0x7, 0x8818, 0x8000, 0x6, 0x1f, 0x8, 0x4, 0xff, 0x101, 0xd7, 0x8, 0x5, 0xffff8001, 0x5, 0xb621, 0x1, 0x9, 0x1395db38, 0x0, 0x3], [0x6, 0x6, 0x401, 0x2d5, 0xc08, 0x3, 0x7f, 0x7, 0x8, 0x4, 0xbe1a, 0x5, 0x3, 0x93c, 0x9, 0x80, 0x800, 0x7fff, 0x6, 0x1, 0x5, 0x2, 0x9, 0x7fff, 0x0, 0x8000, 0x4, 0x6, 0x2, 0x4, 0x6, 0xa2ec, 0x7, 0x100, 0x1, 0x3, 0x1f, 0x81, 0x10000, 0xc5, 0x7ff, 0x2aae236d, 0x4, 0x2000, 0x1c, 0x3, 0x2, 0x735c, 0x7fffffff, 0x6, 0xfffffffd, 0x4, 0x3ff, 0x7fffffff, 0x8, 0x224, 0x261, 0x8b8a, 0x100, 0xffffffff, 0x7fff, 0x41, 0x401, 0x200], [0x7, 0x4, 0x2, 0x5, 0x7, 0x1, 0x8, 0x0, 0x8, 0xffffff7b, 0x0, 0x5, 0x6, 0xcc9, 0x1, 0x5, 0x2, 0xfffffffe, 0xfffffff9, 0x0, 0x5, 0x101, 0x401, 0x2, 0x3, 0x3, 0x7f76, 0x3ff, 0x9, 0xc14, 0x3, 0x7, 0x5, 0x100, 0x6, 0x8, 0x2, 0xe0, 0x3f, 0x200, 0x3, 0x9, 0x3, 0x5, 0x95c6, 0x2, 0x6, 0x20, 0x3, 0x8, 0x9, 0x7, 0x9, 0x0, 0xffffd671, 0x1, 0x0, 0x853d, 0x7, 0x3ff, 0x0, 0xfde7, 0x1, 0x5]}, 0x45c) 18:08:37 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68}, [{0x0, 0x0, 0x0, 0x0, 0xa00}]}, 0x78) 18:08:37 executing program 2: socketpair$unix(0x1, 0x2, 0x0, 0x0) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000000280)='tmpfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@mode={'mode', 0x3d, 0x3}}]}) 18:08:37 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000}]}, 0x78) 18:08:40 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x19) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 18:08:40 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$sequencer(0xffffffffffffff9c, 0x0, 0x8002, 0x0) write$uinput_user_dev(r2, &(0x7f0000000480)={'syz0\x00', {0xa65b, 0x1000, 0xfffb, 0x80}, 0x32, [0x4, 0x631, 0xaf, 0x2, 0x1b, 0x1, 0x10001, 0x1, 0x8, 0x3ff, 0x800, 0x7859, 0x7, 0x5, 0x7fff, 0xc05, 0xa4, 0x3, 0x4, 0xfffff800, 0x6, 0x7c, 0x6, 0xff, 0x2, 0x771, 0x5, 0xfffffff8, 0x81, 0x0, 0x6, 0x7, 0x6, 0x9, 0x3, 0x0, 0x282d298e, 0x7, 0x6, 0x3, 0xfaf9, 0x7, 0x2, 0xf9, 0xc2, 0x0, 0x8, 0x8, 0x9, 0x4, 0x8eb1, 0x0, 0x8, 0x9, 0x7d, 0x8, 0x9, 0x4, 0x3, 0x10000, 0xfab, 0x39, 0x7, 0x4], [0x0, 0x7ff, 0x1f, 0x1, 0x7, 0x2, 0x6, 0xd594, 0x3, 0x2a, 0x1c9b4fd4, 0x0, 0xfff, 0x5, 0xfffff801, 0x9, 0x3f, 0x8, 0x80, 0x6, 0x401, 0x8000, 0x1, 0xcb, 0x1, 0x6, 0x4, 0x92, 0x800000, 0x7, 0x1f, 0x140, 0x7ff, 0xabbc, 0x401, 0x0, 0x3, 0x20, 0x48, 0x12000, 0xfa, 0x1, 0xfffff6fe, 0x0, 0x7, 0x8818, 0x8000, 0x6, 0x1f, 0x8, 0x4, 0xff, 0x101, 0xd7, 0x8, 0x5, 0xffff8001, 0x5, 0xb621, 0x1, 0x9, 0x1395db38, 0x0, 0x3], [0x6, 0x6, 0x401, 0x2d5, 0xc08, 0x3, 0x7f, 0x7, 0x8, 0x4, 0xbe1a, 0x5, 0x3, 0x93c, 0x9, 0x80, 0x800, 0x7fff, 0x6, 0x1, 0x5, 0x2, 0x9, 0x7fff, 0x0, 0x8000, 0x4, 0x6, 0x2, 0x4, 0x6, 0xa2ec, 0x7, 0x100, 0x1, 0x3, 0x1f, 0x81, 0x10000, 0xc5, 0x7ff, 0x2aae236d, 0x4, 0x2000, 0x1c, 0x3, 0x2, 0x735c, 0x7fffffff, 0x6, 0xfffffffd, 0x4, 0x3ff, 0x7fffffff, 0x8, 0x224, 0x261, 0x8b8a, 0x100, 0xffffffff, 0x7fff, 0x41, 0x401, 0x200], [0x7, 0x4, 0x2, 0x5, 0x7, 0x1, 0x8, 0x0, 0x8, 0xffffff7b, 0x0, 0x5, 0x6, 0xcc9, 0x1, 0x5, 0x2, 0xfffffffe, 0xfffffff9, 0x0, 0x5, 0x101, 0x401, 0x2, 0x3, 0x3, 0x7f76, 0x3ff, 0x9, 0xc14, 0x3, 0x7, 0x5, 0x100, 0x6, 0x8, 0x2, 0xe0, 0x3f, 0x200, 0x3, 0x9, 0x3, 0x5, 0x95c6, 0x2, 0x6, 0x20, 0x3, 0x8, 0x9, 0x7, 0x9, 0x0, 0xffffd671, 0x1, 0x0, 0x853d, 0x7, 0x3ff, 0x0, 0xfde7, 0x1, 0x5]}, 0x45c) 18:08:40 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r0, &(0x7f0000000040)=""/244, 0xf4) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="6653960d0ec5d684fa9f017ef0d60a3c27bc33760036001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479810be2aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e6517e615607676f8f9fc0ebf8b0b16d6f2c59957ab35d05692e664ebf68734ca53366295f4ad6142134b62f11e92ead037c7fb53455560c8ef0f1c94fafa924edfe92175aaa1c4ecc7aeeb72e0d050feacee907f40888c96a65545e07422bc6ac79f4c2d6ee3dab47d06e764682c72d7f16542fcfd05d2813cc182d1595016c179e1717c160300ab1ab0ac397e91bd193c036feb66a9ad2", 0xe8}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x19) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 18:08:40 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68}, [{0x0, 0x0, 0x0, 0x0, 0xc00}]}, 0x78) 18:08:40 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7000000}]}, 0x78) 18:08:40 executing program 2: socketpair$unix(0x1, 0x2, 0x0, 0x0) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000000280)='tmpfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@mode={'mode', 0x3d, 0x3}}]}) 18:08:40 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$sequencer(0xffffffffffffff9c, 0x0, 0x8002, 0x0) write$uinput_user_dev(r2, &(0x7f0000000480)={'syz0\x00', {0xa65b, 0x1000, 0xfffb, 0x80}, 0x32, [0x4, 0x631, 0xaf, 0x2, 0x1b, 0x1, 0x10001, 0x1, 0x8, 0x3ff, 0x800, 0x7859, 0x7, 0x5, 0x7fff, 0xc05, 0xa4, 0x3, 0x4, 0xfffff800, 0x6, 0x7c, 0x6, 0xff, 0x2, 0x771, 0x5, 0xfffffff8, 0x81, 0x0, 0x6, 0x7, 0x6, 0x9, 0x3, 0x0, 0x282d298e, 0x7, 0x6, 0x3, 0xfaf9, 0x7, 0x2, 0xf9, 0xc2, 0x0, 0x8, 0x8, 0x9, 0x4, 0x8eb1, 0x0, 0x8, 0x9, 0x7d, 0x8, 0x9, 0x4, 0x3, 0x10000, 0xfab, 0x39, 0x7, 0x4], [0x0, 0x7ff, 0x1f, 0x1, 0x7, 0x2, 0x6, 0xd594, 0x3, 0x2a, 0x1c9b4fd4, 0x0, 0xfff, 0x5, 0xfffff801, 0x9, 0x3f, 0x8, 0x80, 0x6, 0x401, 0x8000, 0x1, 0xcb, 0x1, 0x6, 0x4, 0x92, 0x800000, 0x7, 0x1f, 0x140, 0x7ff, 0xabbc, 0x401, 0x0, 0x3, 0x20, 0x48, 0x12000, 0xfa, 0x1, 0xfffff6fe, 0x0, 0x7, 0x8818, 0x8000, 0x6, 0x1f, 0x8, 0x4, 0xff, 0x101, 0xd7, 0x8, 0x5, 0xffff8001, 0x5, 0xb621, 0x1, 0x9, 0x1395db38, 0x0, 0x3], [0x6, 0x6, 0x401, 0x2d5, 0xc08, 0x3, 0x7f, 0x7, 0x8, 0x4, 0xbe1a, 0x5, 0x3, 0x93c, 0x9, 0x80, 0x800, 0x7fff, 0x6, 0x1, 0x5, 0x2, 0x9, 0x7fff, 0x0, 0x8000, 0x4, 0x6, 0x2, 0x4, 0x6, 0xa2ec, 0x7, 0x100, 0x1, 0x3, 0x1f, 0x81, 0x10000, 0xc5, 0x7ff, 0x2aae236d, 0x4, 0x2000, 0x1c, 0x3, 0x2, 0x735c, 0x7fffffff, 0x6, 0xfffffffd, 0x4, 0x3ff, 0x7fffffff, 0x8, 0x224, 0x261, 0x8b8a, 0x100, 0xffffffff, 0x7fff, 0x41, 0x401, 0x200], [0x7, 0x4, 0x2, 0x5, 0x7, 0x1, 0x8, 0x0, 0x8, 0xffffff7b, 0x0, 0x5, 0x6, 0xcc9, 0x1, 0x5, 0x2, 0xfffffffe, 0xfffffff9, 0x0, 0x5, 0x101, 0x401, 0x2, 0x3, 0x3, 0x7f76, 0x3ff, 0x9, 0xc14, 0x3, 0x7, 0x5, 0x100, 0x6, 0x8, 0x2, 0xe0, 0x3f, 0x200, 0x3, 0x9, 0x3, 0x5, 0x95c6, 0x2, 0x6, 0x20, 0x3, 0x8, 0x9, 0x7, 0x9, 0x0, 0xffffd671, 0x1, 0x0, 0x853d, 0x7, 0x3ff, 0x0, 0xfde7, 0x1, 0x5]}, 0x45c) 18:08:40 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000}]}, 0x78) 18:08:40 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x0, 0x0) write$uinput_user_dev(r2, &(0x7f0000000480)={'syz0\x00', {0xa65b, 0x1000, 0xfffb, 0x80}, 0x32, [0x4, 0x631, 0xaf, 0x2, 0x1b, 0x1, 0x10001, 0x1, 0x8, 0x3ff, 0x800, 0x7859, 0x7, 0x5, 0x7fff, 0xc05, 0xa4, 0x3, 0x4, 0xfffff800, 0x6, 0x7c, 0x6, 0xff, 0x2, 0x771, 0x5, 0xfffffff8, 0x81, 0x0, 0x6, 0x7, 0x6, 0x9, 0x3, 0x0, 0x282d298e, 0x7, 0x6, 0x3, 0xfaf9, 0x7, 0x2, 0xf9, 0xc2, 0x0, 0x8, 0x8, 0x9, 0x4, 0x8eb1, 0x0, 0x8, 0x9, 0x7d, 0x8, 0x9, 0x4, 0x3, 0x10000, 0xfab, 0x39, 0x7, 0x4], [0x0, 0x7ff, 0x1f, 0x1, 0x7, 0x2, 0x6, 0xd594, 0x3, 0x2a, 0x1c9b4fd4, 0x0, 0xfff, 0x5, 0xfffff801, 0x9, 0x3f, 0x8, 0x80, 0x6, 0x401, 0x8000, 0x1, 0xcb, 0x1, 0x6, 0x4, 0x92, 0x800000, 0x7, 0x1f, 0x140, 0x7ff, 0xabbc, 0x401, 0x0, 0x3, 0x20, 0x48, 0x12000, 0xfa, 0x1, 0xfffff6fe, 0x0, 0x7, 0x8818, 0x8000, 0x6, 0x1f, 0x8, 0x4, 0xff, 0x101, 0xd7, 0x8, 0x5, 0xffff8001, 0x5, 0xb621, 0x1, 0x9, 0x1395db38, 0x0, 0x3], [0x6, 0x6, 0x401, 0x2d5, 0xc08, 0x3, 0x7f, 0x7, 0x8, 0x4, 0xbe1a, 0x5, 0x3, 0x93c, 0x9, 0x80, 0x800, 0x7fff, 0x6, 0x1, 0x5, 0x2, 0x9, 0x7fff, 0x0, 0x8000, 0x4, 0x6, 0x2, 0x4, 0x6, 0xa2ec, 0x7, 0x100, 0x1, 0x3, 0x1f, 0x81, 0x10000, 0xc5, 0x7ff, 0x2aae236d, 0x4, 0x2000, 0x1c, 0x3, 0x2, 0x735c, 0x7fffffff, 0x6, 0xfffffffd, 0x4, 0x3ff, 0x7fffffff, 0x8, 0x224, 0x261, 0x8b8a, 0x100, 0xffffffff, 0x7fff, 0x41, 0x401, 0x200], [0x7, 0x4, 0x2, 0x5, 0x7, 0x1, 0x8, 0x0, 0x8, 0xffffff7b, 0x0, 0x5, 0x6, 0xcc9, 0x1, 0x5, 0x2, 0xfffffffe, 0xfffffff9, 0x0, 0x5, 0x101, 0x401, 0x2, 0x3, 0x3, 0x7f76, 0x3ff, 0x9, 0xc14, 0x3, 0x7, 0x5, 0x100, 0x6, 0x8, 0x2, 0xe0, 0x3f, 0x200, 0x3, 0x9, 0x3, 0x5, 0x95c6, 0x2, 0x6, 0x20, 0x3, 0x8, 0x9, 0x7, 0x9, 0x0, 0xffffd671, 0x1, 0x0, 0x853d, 0x7, 0x3ff, 0x0, 0xfde7, 0x1, 0x5]}, 0x45c) 18:08:40 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68}, [{0x0, 0x0, 0x0, 0x0, 0xd00}]}, 0x78) 18:08:40 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9000000}]}, 0x78) 18:08:40 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x0, 0x0) write$uinput_user_dev(r2, &(0x7f0000000480)={'syz0\x00', {0xa65b, 0x1000, 0xfffb, 0x80}, 0x32, [0x4, 0x631, 0xaf, 0x2, 0x1b, 0x1, 0x10001, 0x1, 0x8, 0x3ff, 0x800, 0x7859, 0x7, 0x5, 0x7fff, 0xc05, 0xa4, 0x3, 0x4, 0xfffff800, 0x6, 0x7c, 0x6, 0xff, 0x2, 0x771, 0x5, 0xfffffff8, 0x81, 0x0, 0x6, 0x7, 0x6, 0x9, 0x3, 0x0, 0x282d298e, 0x7, 0x6, 0x3, 0xfaf9, 0x7, 0x2, 0xf9, 0xc2, 0x0, 0x8, 0x8, 0x9, 0x4, 0x8eb1, 0x0, 0x8, 0x9, 0x7d, 0x8, 0x9, 0x4, 0x3, 0x10000, 0xfab, 0x39, 0x7, 0x4], [0x0, 0x7ff, 0x1f, 0x1, 0x7, 0x2, 0x6, 0xd594, 0x3, 0x2a, 0x1c9b4fd4, 0x0, 0xfff, 0x5, 0xfffff801, 0x9, 0x3f, 0x8, 0x80, 0x6, 0x401, 0x8000, 0x1, 0xcb, 0x1, 0x6, 0x4, 0x92, 0x800000, 0x7, 0x1f, 0x140, 0x7ff, 0xabbc, 0x401, 0x0, 0x3, 0x20, 0x48, 0x12000, 0xfa, 0x1, 0xfffff6fe, 0x0, 0x7, 0x8818, 0x8000, 0x6, 0x1f, 0x8, 0x4, 0xff, 0x101, 0xd7, 0x8, 0x5, 0xffff8001, 0x5, 0xb621, 0x1, 0x9, 0x1395db38, 0x0, 0x3], [0x6, 0x6, 0x401, 0x2d5, 0xc08, 0x3, 0x7f, 0x7, 0x8, 0x4, 0xbe1a, 0x5, 0x3, 0x93c, 0x9, 0x80, 0x800, 0x7fff, 0x6, 0x1, 0x5, 0x2, 0x9, 0x7fff, 0x0, 0x8000, 0x4, 0x6, 0x2, 0x4, 0x6, 0xa2ec, 0x7, 0x100, 0x1, 0x3, 0x1f, 0x81, 0x10000, 0xc5, 0x7ff, 0x2aae236d, 0x4, 0x2000, 0x1c, 0x3, 0x2, 0x735c, 0x7fffffff, 0x6, 0xfffffffd, 0x4, 0x3ff, 0x7fffffff, 0x8, 0x224, 0x261, 0x8b8a, 0x100, 0xffffffff, 0x7fff, 0x41, 0x401, 0x200], [0x7, 0x4, 0x2, 0x5, 0x7, 0x1, 0x8, 0x0, 0x8, 0xffffff7b, 0x0, 0x5, 0x6, 0xcc9, 0x1, 0x5, 0x2, 0xfffffffe, 0xfffffff9, 0x0, 0x5, 0x101, 0x401, 0x2, 0x3, 0x3, 0x7f76, 0x3ff, 0x9, 0xc14, 0x3, 0x7, 0x5, 0x100, 0x6, 0x8, 0x2, 0xe0, 0x3f, 0x200, 0x3, 0x9, 0x3, 0x5, 0x95c6, 0x2, 0x6, 0x20, 0x3, 0x8, 0x9, 0x7, 0x9, 0x0, 0xffffd671, 0x1, 0x0, 0x853d, 0x7, 0x3ff, 0x0, 0xfde7, 0x1, 0x5]}, 0x45c) 18:08:43 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x19) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 18:08:43 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000000280)='tmpfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@mode={'mode', 0x3d, 0x3}}]}) 18:08:43 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r0, &(0x7f0000000040)=""/244, 0xf4) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="6653960d0ec5d684fa9f017ef0d60a3c27bc33760036001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479810be2aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e6517e615607676f8f9fc0ebf8b0b16d6f2c59957ab35d05692e664ebf68734ca53366295f4ad6142134b62f11e92ead037c7fb53455560c8ef0f1c94fafa924edfe92175aaa1c4ecc7aeeb72e0d050feacee907f40888c96a65545e07422bc6ac79f4c2d6ee3dab47d06e764682c72d7f16542fcfd05d2813cc182d1595016c179e1717c160300ab1ab0ac397e91bd193c036feb66a9ad2", 0xe8}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x19) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 18:08:43 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x0, 0x0) write$uinput_user_dev(r2, &(0x7f0000000480)={'syz0\x00', {0xa65b, 0x1000, 0xfffb, 0x80}, 0x32, [0x4, 0x631, 0xaf, 0x2, 0x1b, 0x1, 0x10001, 0x1, 0x8, 0x3ff, 0x800, 0x7859, 0x7, 0x5, 0x7fff, 0xc05, 0xa4, 0x3, 0x4, 0xfffff800, 0x6, 0x7c, 0x6, 0xff, 0x2, 0x771, 0x5, 0xfffffff8, 0x81, 0x0, 0x6, 0x7, 0x6, 0x9, 0x3, 0x0, 0x282d298e, 0x7, 0x6, 0x3, 0xfaf9, 0x7, 0x2, 0xf9, 0xc2, 0x0, 0x8, 0x8, 0x9, 0x4, 0x8eb1, 0x0, 0x8, 0x9, 0x7d, 0x8, 0x9, 0x4, 0x3, 0x10000, 0xfab, 0x39, 0x7, 0x4], [0x0, 0x7ff, 0x1f, 0x1, 0x7, 0x2, 0x6, 0xd594, 0x3, 0x2a, 0x1c9b4fd4, 0x0, 0xfff, 0x5, 0xfffff801, 0x9, 0x3f, 0x8, 0x80, 0x6, 0x401, 0x8000, 0x1, 0xcb, 0x1, 0x6, 0x4, 0x92, 0x800000, 0x7, 0x1f, 0x140, 0x7ff, 0xabbc, 0x401, 0x0, 0x3, 0x20, 0x48, 0x12000, 0xfa, 0x1, 0xfffff6fe, 0x0, 0x7, 0x8818, 0x8000, 0x6, 0x1f, 0x8, 0x4, 0xff, 0x101, 0xd7, 0x8, 0x5, 0xffff8001, 0x5, 0xb621, 0x1, 0x9, 0x1395db38, 0x0, 0x3], [0x6, 0x6, 0x401, 0x2d5, 0xc08, 0x3, 0x7f, 0x7, 0x8, 0x4, 0xbe1a, 0x5, 0x3, 0x93c, 0x9, 0x80, 0x800, 0x7fff, 0x6, 0x1, 0x5, 0x2, 0x9, 0x7fff, 0x0, 0x8000, 0x4, 0x6, 0x2, 0x4, 0x6, 0xa2ec, 0x7, 0x100, 0x1, 0x3, 0x1f, 0x81, 0x10000, 0xc5, 0x7ff, 0x2aae236d, 0x4, 0x2000, 0x1c, 0x3, 0x2, 0x735c, 0x7fffffff, 0x6, 0xfffffffd, 0x4, 0x3ff, 0x7fffffff, 0x8, 0x224, 0x261, 0x8b8a, 0x100, 0xffffffff, 0x7fff, 0x41, 0x401, 0x200], [0x7, 0x4, 0x2, 0x5, 0x7, 0x1, 0x8, 0x0, 0x8, 0xffffff7b, 0x0, 0x5, 0x6, 0xcc9, 0x1, 0x5, 0x2, 0xfffffffe, 0xfffffff9, 0x0, 0x5, 0x101, 0x401, 0x2, 0x3, 0x3, 0x7f76, 0x3ff, 0x9, 0xc14, 0x3, 0x7, 0x5, 0x100, 0x6, 0x8, 0x2, 0xe0, 0x3f, 0x200, 0x3, 0x9, 0x3, 0x5, 0x95c6, 0x2, 0x6, 0x20, 0x3, 0x8, 0x9, 0x7, 0x9, 0x0, 0xffffd671, 0x1, 0x0, 0x853d, 0x7, 0x3ff, 0x0, 0xfde7, 0x1, 0x5]}, 0x45c) 18:08:43 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa000000}]}, 0x78) 18:08:43 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68}, [{0x0, 0x0, 0x0, 0x0, 0xe00}]}, 0x78) 18:08:43 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000000280)='tmpfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@mode={'mode', 0x3d, 0x3}}]}) 18:08:43 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000000}]}, 0x78) 18:08:43 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000480)={'syz0\x00', {0xa65b, 0x1000, 0xfffb, 0x80}, 0x32, [0x4, 0x631, 0xaf, 0x2, 0x1b, 0x1, 0x10001, 0x1, 0x8, 0x3ff, 0x800, 0x7859, 0x7, 0x5, 0x7fff, 0xc05, 0xa4, 0x3, 0x4, 0xfffff800, 0x6, 0x7c, 0x6, 0xff, 0x2, 0x771, 0x5, 0xfffffff8, 0x81, 0x0, 0x6, 0x7, 0x6, 0x9, 0x3, 0x0, 0x282d298e, 0x7, 0x6, 0x3, 0xfaf9, 0x7, 0x2, 0xf9, 0xc2, 0x0, 0x8, 0x8, 0x9, 0x4, 0x8eb1, 0x0, 0x8, 0x9, 0x7d, 0x8, 0x9, 0x4, 0x3, 0x10000, 0xfab, 0x39, 0x7, 0x4], [0x0, 0x7ff, 0x1f, 0x1, 0x7, 0x2, 0x6, 0xd594, 0x3, 0x2a, 0x1c9b4fd4, 0x0, 0xfff, 0x5, 0xfffff801, 0x9, 0x3f, 0x8, 0x80, 0x6, 0x401, 0x8000, 0x1, 0xcb, 0x1, 0x6, 0x4, 0x92, 0x800000, 0x7, 0x1f, 0x140, 0x7ff, 0xabbc, 0x401, 0x0, 0x3, 0x20, 0x48, 0x12000, 0xfa, 0x1, 0xfffff6fe, 0x0, 0x7, 0x8818, 0x8000, 0x6, 0x1f, 0x8, 0x4, 0xff, 0x101, 0xd7, 0x8, 0x5, 0xffff8001, 0x5, 0xb621, 0x1, 0x9, 0x1395db38, 0x0, 0x3], [0x6, 0x6, 0x401, 0x2d5, 0xc08, 0x3, 0x7f, 0x7, 0x8, 0x4, 0xbe1a, 0x5, 0x3, 0x93c, 0x9, 0x80, 0x800, 0x7fff, 0x6, 0x1, 0x5, 0x2, 0x9, 0x7fff, 0x0, 0x8000, 0x4, 0x6, 0x2, 0x4, 0x6, 0xa2ec, 0x7, 0x100, 0x1, 0x3, 0x1f, 0x81, 0x10000, 0xc5, 0x7ff, 0x2aae236d, 0x4, 0x2000, 0x1c, 0x3, 0x2, 0x735c, 0x7fffffff, 0x6, 0xfffffffd, 0x4, 0x3ff, 0x7fffffff, 0x8, 0x224, 0x261, 0x8b8a, 0x100, 0xffffffff, 0x7fff, 0x41, 0x401, 0x200], [0x7, 0x4, 0x2, 0x5, 0x7, 0x1, 0x8, 0x0, 0x8, 0xffffff7b, 0x0, 0x5, 0x6, 0xcc9, 0x1, 0x5, 0x2, 0xfffffffe, 0xfffffff9, 0x0, 0x5, 0x101, 0x401, 0x2, 0x3, 0x3, 0x7f76, 0x3ff, 0x9, 0xc14, 0x3, 0x7, 0x5, 0x100, 0x6, 0x8, 0x2, 0xe0, 0x3f, 0x200, 0x3, 0x9, 0x3, 0x5, 0x95c6, 0x2, 0x6, 0x20, 0x3, 0x8, 0x9, 0x7, 0x9, 0x0, 0xffffd671, 0x1, 0x0, 0x853d, 0x7, 0x3ff, 0x0, 0xfde7, 0x1, 0x5]}, 0x45c) 18:08:43 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68}, [{0x0, 0x0, 0x0, 0x0, 0xf00}]}, 0x78) 18:08:43 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000480)={'syz0\x00', {0xa65b, 0x1000, 0xfffb, 0x80}, 0x32, [0x4, 0x631, 0xaf, 0x2, 0x1b, 0x1, 0x10001, 0x1, 0x8, 0x3ff, 0x800, 0x7859, 0x7, 0x5, 0x7fff, 0xc05, 0xa4, 0x3, 0x4, 0xfffff800, 0x6, 0x7c, 0x6, 0xff, 0x2, 0x771, 0x5, 0xfffffff8, 0x81, 0x0, 0x6, 0x7, 0x6, 0x9, 0x3, 0x0, 0x282d298e, 0x7, 0x6, 0x3, 0xfaf9, 0x7, 0x2, 0xf9, 0xc2, 0x0, 0x8, 0x8, 0x9, 0x4, 0x8eb1, 0x0, 0x8, 0x9, 0x7d, 0x8, 0x9, 0x4, 0x3, 0x10000, 0xfab, 0x39, 0x7, 0x4], [0x0, 0x7ff, 0x1f, 0x1, 0x7, 0x2, 0x6, 0xd594, 0x3, 0x2a, 0x1c9b4fd4, 0x0, 0xfff, 0x5, 0xfffff801, 0x9, 0x3f, 0x8, 0x80, 0x6, 0x401, 0x8000, 0x1, 0xcb, 0x1, 0x6, 0x4, 0x92, 0x800000, 0x7, 0x1f, 0x140, 0x7ff, 0xabbc, 0x401, 0x0, 0x3, 0x20, 0x48, 0x12000, 0xfa, 0x1, 0xfffff6fe, 0x0, 0x7, 0x8818, 0x8000, 0x6, 0x1f, 0x8, 0x4, 0xff, 0x101, 0xd7, 0x8, 0x5, 0xffff8001, 0x5, 0xb621, 0x1, 0x9, 0x1395db38, 0x0, 0x3], [0x6, 0x6, 0x401, 0x2d5, 0xc08, 0x3, 0x7f, 0x7, 0x8, 0x4, 0xbe1a, 0x5, 0x3, 0x93c, 0x9, 0x80, 0x800, 0x7fff, 0x6, 0x1, 0x5, 0x2, 0x9, 0x7fff, 0x0, 0x8000, 0x4, 0x6, 0x2, 0x4, 0x6, 0xa2ec, 0x7, 0x100, 0x1, 0x3, 0x1f, 0x81, 0x10000, 0xc5, 0x7ff, 0x2aae236d, 0x4, 0x2000, 0x1c, 0x3, 0x2, 0x735c, 0x7fffffff, 0x6, 0xfffffffd, 0x4, 0x3ff, 0x7fffffff, 0x8, 0x224, 0x261, 0x8b8a, 0x100, 0xffffffff, 0x7fff, 0x41, 0x401, 0x200], [0x7, 0x4, 0x2, 0x5, 0x7, 0x1, 0x8, 0x0, 0x8, 0xffffff7b, 0x0, 0x5, 0x6, 0xcc9, 0x1, 0x5, 0x2, 0xfffffffe, 0xfffffff9, 0x0, 0x5, 0x101, 0x401, 0x2, 0x3, 0x3, 0x7f76, 0x3ff, 0x9, 0xc14, 0x3, 0x7, 0x5, 0x100, 0x6, 0x8, 0x2, 0xe0, 0x3f, 0x200, 0x3, 0x9, 0x3, 0x5, 0x95c6, 0x2, 0x6, 0x20, 0x3, 0x8, 0x9, 0x7, 0x9, 0x0, 0xffffd671, 0x1, 0x0, 0x853d, 0x7, 0x3ff, 0x0, 0xfde7, 0x1, 0x5]}, 0x45c) 18:08:43 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000000280)='tmpfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@mode={'mode', 0x3d, 0x3}}]}) 18:08:46 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68}, [{0x0, 0x0, 0x0, 0x0, 0x1800}]}, 0x78) 18:08:46 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x19) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 18:08:46 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r0, &(0x7f0000000040)=""/244, 0xf4) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="6653960d0ec5d684fa9f017ef0d60a3c27bc33760036001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479810be2aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e6517e615607676f8f9fc0ebf8b0b16d6f2c59957ab35d05692e664ebf68734ca53366295f4ad6142134b62f11e92ead037c7fb53455560c8ef0f1c94fafa924edfe92175aaa1c4ecc7aeeb72e0d050feacee907f40888c96a65545e07422bc6ac79f4c2d6ee3dab47d06e764682c72d7f16542fcfd05d2813cc182d1595016c179e1717c160300ab1ab0ac397e91bd193c036feb66a9ad2ec5b7967e7f5ff95", 0xf0}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x19) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 18:08:46 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd000000}]}, 0x78) 18:08:46 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000480)={'syz0\x00', {0xa65b, 0x1000, 0xfffb, 0x80}, 0x32, [0x4, 0x631, 0xaf, 0x2, 0x1b, 0x1, 0x10001, 0x1, 0x8, 0x3ff, 0x800, 0x7859, 0x7, 0x5, 0x7fff, 0xc05, 0xa4, 0x3, 0x4, 0xfffff800, 0x6, 0x7c, 0x6, 0xff, 0x2, 0x771, 0x5, 0xfffffff8, 0x81, 0x0, 0x6, 0x7, 0x6, 0x9, 0x3, 0x0, 0x282d298e, 0x7, 0x6, 0x3, 0xfaf9, 0x7, 0x2, 0xf9, 0xc2, 0x0, 0x8, 0x8, 0x9, 0x4, 0x8eb1, 0x0, 0x8, 0x9, 0x7d, 0x8, 0x9, 0x4, 0x3, 0x10000, 0xfab, 0x39, 0x7, 0x4], [0x0, 0x7ff, 0x1f, 0x1, 0x7, 0x2, 0x6, 0xd594, 0x3, 0x2a, 0x1c9b4fd4, 0x0, 0xfff, 0x5, 0xfffff801, 0x9, 0x3f, 0x8, 0x80, 0x6, 0x401, 0x8000, 0x1, 0xcb, 0x1, 0x6, 0x4, 0x92, 0x800000, 0x7, 0x1f, 0x140, 0x7ff, 0xabbc, 0x401, 0x0, 0x3, 0x20, 0x48, 0x12000, 0xfa, 0x1, 0xfffff6fe, 0x0, 0x7, 0x8818, 0x8000, 0x6, 0x1f, 0x8, 0x4, 0xff, 0x101, 0xd7, 0x8, 0x5, 0xffff8001, 0x5, 0xb621, 0x1, 0x9, 0x1395db38, 0x0, 0x3], [0x6, 0x6, 0x401, 0x2d5, 0xc08, 0x3, 0x7f, 0x7, 0x8, 0x4, 0xbe1a, 0x5, 0x3, 0x93c, 0x9, 0x80, 0x800, 0x7fff, 0x6, 0x1, 0x5, 0x2, 0x9, 0x7fff, 0x0, 0x8000, 0x4, 0x6, 0x2, 0x4, 0x6, 0xa2ec, 0x7, 0x100, 0x1, 0x3, 0x1f, 0x81, 0x10000, 0xc5, 0x7ff, 0x2aae236d, 0x4, 0x2000, 0x1c, 0x3, 0x2, 0x735c, 0x7fffffff, 0x6, 0xfffffffd, 0x4, 0x3ff, 0x7fffffff, 0x8, 0x224, 0x261, 0x8b8a, 0x100, 0xffffffff, 0x7fff, 0x41, 0x401, 0x200], [0x7, 0x4, 0x2, 0x5, 0x7, 0x1, 0x8, 0x0, 0x8, 0xffffff7b, 0x0, 0x5, 0x6, 0xcc9, 0x1, 0x5, 0x2, 0xfffffffe, 0xfffffff9, 0x0, 0x5, 0x101, 0x401, 0x2, 0x3, 0x3, 0x7f76, 0x3ff, 0x9, 0xc14, 0x3, 0x7, 0x5, 0x100, 0x6, 0x8, 0x2, 0xe0, 0x3f, 0x200, 0x3, 0x9, 0x3, 0x5, 0x95c6, 0x2, 0x6, 0x20, 0x3, 0x8, 0x9, 0x7, 0x9, 0x0, 0xffffd671, 0x1, 0x0, 0x853d, 0x7, 0x3ff, 0x0, 0xfde7, 0x1, 0x5]}, 0x45c) 18:08:46 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000000280)='tmpfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@mode={'mode', 0x3d, 0x3}}]}) 18:08:46 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="6653960d0ec5d684fa9f017ef0d60a3c27bc33760036001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479810be2aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e6517e615607676f8f9fc0ebf8b0b16d6f2c59957ab35d05692e664ebf68734ca53366295f4ad6142134b62f", 0x7c}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x19) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 18:08:46 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68}, [{0x0, 0x0, 0x0, 0x0, 0x1900}]}, 0x78) 18:08:46 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68}, [{0x0, 0x0, 0x0, 0x0, 0x1a00}]}, 0x78) 18:08:46 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) write$uinput_user_dev(r2, 0x0, 0x0) 18:08:46 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe000000}]}, 0x78) 18:08:46 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68}, [{0x0, 0x0, 0x0, 0x0, 0x1b00}]}, 0x78) 18:08:46 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) write$uinput_user_dev(r2, 0x0, 0x0) 18:08:46 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000000280)='tmpfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@mode={'mode', 0x3d, 0x3}}]}) 18:08:49 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r0, &(0x7f0000000040)=""/244, 0xf4) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="6653960d0ec5d684fa9f017ef0d60a3c27bc33760036001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479810be2aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e6517e615607676f8f9fc0ebf8b0b16d6f2c59957ab35d05692e664ebf68734ca53366295f4ad6142134b62f11e92ead037c7fb53455560c8ef0f1c94fafa924edfe92175aaa1c4ecc7aeeb72e0d050feacee907f40888c96a65545e07422bc6ac79f4c2d6ee3dab47d06e764682c72d7f16542fcfd05d2813cc182d1595016c179e1717c160300ab1ab0ac397e91bd193c036feb66a9ad2ec5b7967e7f5ff95", 0xf0}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x19) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 18:08:49 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68}, [{0x0, 0x0, 0x0, 0x0, 0x1e00}]}, 0x78) 18:08:49 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf000000}]}, 0x78) 18:08:49 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) write$uinput_user_dev(r2, 0x0, 0x0) 18:08:49 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="6653960d0ec5d684fa9f017ef0d60a3c27bc33760036001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479810be2aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e6517e615607676f8f9fc0ebf8b0b16d6f2c59957ab35d05692e664ebf68734ca53366295f4ad6142134b62f", 0x7c}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x19) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 18:08:49 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000000280)='tmpfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@mode={'mode', 0x3d, 0x3}}]}) 18:08:49 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18000000}]}, 0x78) 18:08:49 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68}, [{0x0, 0x0, 0x0, 0x0, 0x3e00}]}, 0x78) 18:08:49 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) write$uinput_user_dev(r2, &(0x7f0000000480)={'syz0\x00', {0x0, 0x1000, 0xfffb, 0x80}, 0x32, [0x4, 0x631, 0xaf, 0x2, 0x1b, 0x1, 0x10001, 0x1, 0x8, 0x3ff, 0x800, 0x7859, 0x7, 0x5, 0x7fff, 0xc05, 0xa4, 0x3, 0x4, 0xfffff800, 0x6, 0x7c, 0x6, 0xff, 0x2, 0x771, 0x5, 0xfffffff8, 0x81, 0x0, 0x6, 0x7, 0x6, 0x9, 0x3, 0x0, 0x282d298e, 0x7, 0x6, 0x3, 0xfaf9, 0x7, 0x2, 0xf9, 0xc2, 0x0, 0x8, 0x8, 0x9, 0x4, 0x8eb1, 0x0, 0x8, 0x9, 0x7d, 0x8, 0x9, 0x4, 0x3, 0x10000, 0xfab, 0x39, 0x7, 0x4], [0x0, 0x7ff, 0x1f, 0x1, 0x7, 0x2, 0x6, 0xd594, 0x3, 0x2a, 0x1c9b4fd4, 0x0, 0xfff, 0x5, 0xfffff801, 0x9, 0x3f, 0x8, 0x80, 0x6, 0x401, 0x8000, 0x1, 0xcb, 0x1, 0x6, 0x4, 0x92, 0x800000, 0x7, 0x1f, 0x140, 0x7ff, 0xabbc, 0x401, 0x0, 0x3, 0x20, 0x48, 0x12000, 0xfa, 0x1, 0xfffff6fe, 0x0, 0x7, 0x8818, 0x8000, 0x6, 0x1f, 0x8, 0x4, 0xff, 0x101, 0xd7, 0x8, 0x5, 0xffff8001, 0x5, 0xb621, 0x1, 0x9, 0x1395db38, 0x0, 0x3], [0x6, 0x6, 0x401, 0x2d5, 0xc08, 0x3, 0x7f, 0x7, 0x8, 0x4, 0xbe1a, 0x5, 0x3, 0x93c, 0x9, 0x80, 0x800, 0x7fff, 0x6, 0x1, 0x5, 0x2, 0x9, 0x7fff, 0x0, 0x8000, 0x4, 0x6, 0x2, 0x4, 0x6, 0xa2ec, 0x7, 0x100, 0x1, 0x3, 0x1f, 0x81, 0x10000, 0xc5, 0x7ff, 0x2aae236d, 0x4, 0x2000, 0x1c, 0x3, 0x2, 0x735c, 0x7fffffff, 0x6, 0xfffffffd, 0x4, 0x3ff, 0x7fffffff, 0x8, 0x224, 0x261, 0x8b8a, 0x100, 0xffffffff, 0x7fff, 0x41, 0x401, 0x200], [0x7, 0x4, 0x2, 0x5, 0x7, 0x1, 0x8, 0x0, 0x8, 0xffffff7b, 0x0, 0x5, 0x6, 0xcc9, 0x1, 0x5, 0x2, 0xfffffffe, 0xfffffff9, 0x0, 0x5, 0x101, 0x401, 0x2, 0x3, 0x3, 0x7f76, 0x3ff, 0x9, 0xc14, 0x3, 0x7, 0x5, 0x100, 0x6, 0x8, 0x2, 0xe0, 0x3f, 0x200, 0x3, 0x9, 0x3, 0x5, 0x95c6, 0x2, 0x6, 0x20, 0x3, 0x8, 0x9, 0x7, 0x9, 0x0, 0xffffd671, 0x1, 0x0, 0x853d, 0x7, 0x3ff, 0x0, 0xfde7, 0x1, 0x5]}, 0x45c) 18:08:49 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) syz_mount_image$tmpfs(&(0x7f0000000280)='tmpfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@mode={'mode', 0x3d, 0x3}}]}) 18:08:49 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1a000000}]}, 0x78) 18:08:49 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68}, [{0x0, 0x0, 0x0, 0x0, 0x3f00}]}, 0x78) 18:08:52 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r0, &(0x7f0000000040)=""/244, 0xf4) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="6653960d0ec5d684fa9f017ef0d60a3c27bc33760036001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479810be2aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e6517e615607676f8f9fc0ebf8b0b16d6f2c59957ab35d05692e664ebf68734ca53366295f4ad6142134b62f11e92ead037c7fb53455560c8ef0f1c94fafa924edfe92175aaa1c4ecc7aeeb72e0d050feacee907f40888c96a65545e07422bc6ac79f4c2d6ee3dab47d06e764682c72d7f16542fcfd05d2813cc182d1595016c179e1717c160300ab1ab0ac397e91bd193c036feb66a9ad2ec5b7967e7f5ff95", 0xf0}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x19) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 18:08:52 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) write$uinput_user_dev(r2, &(0x7f0000000480)={'syz0\x00', {0x0, 0x0, 0xfffb, 0x80}, 0x32, [0x4, 0x631, 0xaf, 0x2, 0x1b, 0x1, 0x10001, 0x1, 0x8, 0x3ff, 0x800, 0x7859, 0x7, 0x5, 0x7fff, 0xc05, 0xa4, 0x3, 0x4, 0xfffff800, 0x6, 0x7c, 0x6, 0xff, 0x2, 0x771, 0x5, 0xfffffff8, 0x81, 0x0, 0x6, 0x7, 0x6, 0x9, 0x3, 0x0, 0x282d298e, 0x7, 0x6, 0x3, 0xfaf9, 0x7, 0x2, 0xf9, 0xc2, 0x0, 0x8, 0x8, 0x9, 0x4, 0x8eb1, 0x0, 0x8, 0x9, 0x7d, 0x8, 0x9, 0x4, 0x3, 0x10000, 0xfab, 0x39, 0x7, 0x4], [0x0, 0x7ff, 0x1f, 0x1, 0x7, 0x2, 0x6, 0xd594, 0x3, 0x2a, 0x1c9b4fd4, 0x0, 0xfff, 0x5, 0xfffff801, 0x9, 0x3f, 0x8, 0x80, 0x6, 0x401, 0x8000, 0x1, 0xcb, 0x1, 0x6, 0x4, 0x92, 0x800000, 0x7, 0x1f, 0x140, 0x7ff, 0xabbc, 0x401, 0x0, 0x3, 0x20, 0x48, 0x12000, 0xfa, 0x1, 0xfffff6fe, 0x0, 0x7, 0x8818, 0x8000, 0x6, 0x1f, 0x8, 0x4, 0xff, 0x101, 0xd7, 0x8, 0x5, 0xffff8001, 0x5, 0xb621, 0x1, 0x9, 0x1395db38, 0x0, 0x3], [0x6, 0x6, 0x401, 0x2d5, 0xc08, 0x3, 0x7f, 0x7, 0x8, 0x4, 0xbe1a, 0x5, 0x3, 0x93c, 0x9, 0x80, 0x800, 0x7fff, 0x6, 0x1, 0x5, 0x2, 0x9, 0x7fff, 0x0, 0x8000, 0x4, 0x6, 0x2, 0x4, 0x6, 0xa2ec, 0x7, 0x100, 0x1, 0x3, 0x1f, 0x81, 0x10000, 0xc5, 0x7ff, 0x2aae236d, 0x4, 0x2000, 0x1c, 0x3, 0x2, 0x735c, 0x7fffffff, 0x6, 0xfffffffd, 0x4, 0x3ff, 0x7fffffff, 0x8, 0x224, 0x261, 0x8b8a, 0x100, 0xffffffff, 0x7fff, 0x41, 0x401, 0x200], [0x7, 0x4, 0x2, 0x5, 0x7, 0x1, 0x8, 0x0, 0x8, 0xffffff7b, 0x0, 0x5, 0x6, 0xcc9, 0x1, 0x5, 0x2, 0xfffffffe, 0xfffffff9, 0x0, 0x5, 0x101, 0x401, 0x2, 0x3, 0x3, 0x7f76, 0x3ff, 0x9, 0xc14, 0x3, 0x7, 0x5, 0x100, 0x6, 0x8, 0x2, 0xe0, 0x3f, 0x200, 0x3, 0x9, 0x3, 0x5, 0x95c6, 0x2, 0x6, 0x20, 0x3, 0x8, 0x9, 0x7, 0x9, 0x0, 0xffffd671, 0x1, 0x0, 0x853d, 0x7, 0x3ff, 0x0, 0xfde7, 0x1, 0x5]}, 0x45c) 18:08:52 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68}, [{0x0, 0x0, 0x0, 0x0, 0x7f00}]}, 0x78) 18:08:52 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1b000000}]}, 0x78) 18:08:52 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="6653960d0ec5d684fa9f017ef0d60a3c27bc33760036001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479810be2aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e6517e615607676f8f9fc0ebf8b0b16d6f2c59957ab35d05692e664ebf68734ca53366295f4ad6142134b62f", 0x7c}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x19) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 18:08:52 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) syz_mount_image$tmpfs(&(0x7f0000000280)='tmpfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@mode={'mode', 0x3d, 0x3}}]}) 18:08:52 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) write$uinput_user_dev(r2, &(0x7f0000000480)={'syz0\x00', {0x0, 0x0, 0x0, 0x80}, 0x32, [0x4, 0x631, 0xaf, 0x2, 0x1b, 0x1, 0x10001, 0x1, 0x8, 0x3ff, 0x800, 0x7859, 0x7, 0x5, 0x7fff, 0xc05, 0xa4, 0x3, 0x4, 0xfffff800, 0x6, 0x7c, 0x6, 0xff, 0x2, 0x771, 0x5, 0xfffffff8, 0x81, 0x0, 0x6, 0x7, 0x6, 0x9, 0x3, 0x0, 0x282d298e, 0x7, 0x6, 0x3, 0xfaf9, 0x7, 0x2, 0xf9, 0xc2, 0x0, 0x8, 0x8, 0x9, 0x4, 0x8eb1, 0x0, 0x8, 0x9, 0x7d, 0x8, 0x9, 0x4, 0x3, 0x10000, 0xfab, 0x39, 0x7, 0x4], [0x0, 0x7ff, 0x1f, 0x1, 0x7, 0x2, 0x6, 0xd594, 0x3, 0x2a, 0x1c9b4fd4, 0x0, 0xfff, 0x5, 0xfffff801, 0x9, 0x3f, 0x8, 0x80, 0x6, 0x401, 0x8000, 0x1, 0xcb, 0x1, 0x6, 0x4, 0x92, 0x800000, 0x7, 0x1f, 0x140, 0x7ff, 0xabbc, 0x401, 0x0, 0x3, 0x20, 0x48, 0x12000, 0xfa, 0x1, 0xfffff6fe, 0x0, 0x7, 0x8818, 0x8000, 0x6, 0x1f, 0x8, 0x4, 0xff, 0x101, 0xd7, 0x8, 0x5, 0xffff8001, 0x5, 0xb621, 0x1, 0x9, 0x1395db38, 0x0, 0x3], [0x6, 0x6, 0x401, 0x2d5, 0xc08, 0x3, 0x7f, 0x7, 0x8, 0x4, 0xbe1a, 0x5, 0x3, 0x93c, 0x9, 0x80, 0x800, 0x7fff, 0x6, 0x1, 0x5, 0x2, 0x9, 0x7fff, 0x0, 0x8000, 0x4, 0x6, 0x2, 0x4, 0x6, 0xa2ec, 0x7, 0x100, 0x1, 0x3, 0x1f, 0x81, 0x10000, 0xc5, 0x7ff, 0x2aae236d, 0x4, 0x2000, 0x1c, 0x3, 0x2, 0x735c, 0x7fffffff, 0x6, 0xfffffffd, 0x4, 0x3ff, 0x7fffffff, 0x8, 0x224, 0x261, 0x8b8a, 0x100, 0xffffffff, 0x7fff, 0x41, 0x401, 0x200], [0x7, 0x4, 0x2, 0x5, 0x7, 0x1, 0x8, 0x0, 0x8, 0xffffff7b, 0x0, 0x5, 0x6, 0xcc9, 0x1, 0x5, 0x2, 0xfffffffe, 0xfffffff9, 0x0, 0x5, 0x101, 0x401, 0x2, 0x3, 0x3, 0x7f76, 0x3ff, 0x9, 0xc14, 0x3, 0x7, 0x5, 0x100, 0x6, 0x8, 0x2, 0xe0, 0x3f, 0x200, 0x3, 0x9, 0x3, 0x5, 0x95c6, 0x2, 0x6, 0x20, 0x3, 0x8, 0x9, 0x7, 0x9, 0x0, 0xffffd671, 0x1, 0x0, 0x853d, 0x7, 0x3ff, 0x0, 0xfde7, 0x1, 0x5]}, 0x45c) 18:08:52 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3e000000}]}, 0x78) 18:08:52 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68}, [{0x0, 0x0, 0x0, 0x0, 0x9b00}]}, 0x78) 18:08:52 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) syz_mount_image$tmpfs(&(0x7f0000000280)='tmpfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@mode={'mode', 0x3d, 0x3}}]}) 18:08:52 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f000000}]}, 0x78) 18:08:52 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68}, [{0x0, 0x0, 0x0, 0x0, 0xe803}]}, 0x78) 18:08:55 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r0, &(0x7f0000000040)=""/244, 0xf4) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="6653960d0ec5d684fa9f017ef0d60a3c27bc33760036001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479810be2aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e6517e615607676f8f9fc0ebf8b0b16d6f2c59957ab35d05692e664ebf68734ca53366295f4ad6142134b62f11e92ead037c7fb53455560c8ef0f1c94fafa924edfe92175aaa1c4ecc7aeeb72e0d050feacee907f40888c96a65545e07422bc6ac79f4c2d6ee3dab47d06e764682c72d7f16542fcfd05d2813cc182d1595016c179e1717c160300ab1ab0ac397e91bd193c036feb66a9ad2ec5b7967e7f5ff957f8b085a", 0xf4}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x19) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 18:08:55 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) write$uinput_user_dev(r2, &(0x7f0000000480)={'syz0\x00', {}, 0x32, [0x4, 0x631, 0xaf, 0x2, 0x1b, 0x1, 0x10001, 0x1, 0x8, 0x3ff, 0x800, 0x7859, 0x7, 0x5, 0x7fff, 0xc05, 0xa4, 0x3, 0x4, 0xfffff800, 0x6, 0x7c, 0x6, 0xff, 0x2, 0x771, 0x5, 0xfffffff8, 0x81, 0x0, 0x6, 0x7, 0x6, 0x9, 0x3, 0x0, 0x282d298e, 0x7, 0x6, 0x3, 0xfaf9, 0x7, 0x2, 0xf9, 0xc2, 0x0, 0x8, 0x8, 0x9, 0x4, 0x8eb1, 0x0, 0x8, 0x9, 0x7d, 0x8, 0x9, 0x4, 0x3, 0x10000, 0xfab, 0x39, 0x7, 0x4], [0x0, 0x7ff, 0x1f, 0x1, 0x7, 0x2, 0x6, 0xd594, 0x3, 0x2a, 0x1c9b4fd4, 0x0, 0xfff, 0x5, 0xfffff801, 0x9, 0x3f, 0x8, 0x80, 0x6, 0x401, 0x8000, 0x1, 0xcb, 0x1, 0x6, 0x4, 0x92, 0x800000, 0x7, 0x1f, 0x140, 0x7ff, 0xabbc, 0x401, 0x0, 0x3, 0x20, 0x48, 0x12000, 0xfa, 0x1, 0xfffff6fe, 0x0, 0x7, 0x8818, 0x8000, 0x6, 0x1f, 0x8, 0x4, 0xff, 0x101, 0xd7, 0x8, 0x5, 0xffff8001, 0x5, 0xb621, 0x1, 0x9, 0x1395db38, 0x0, 0x3], [0x6, 0x6, 0x401, 0x2d5, 0xc08, 0x3, 0x7f, 0x7, 0x8, 0x4, 0xbe1a, 0x5, 0x3, 0x93c, 0x9, 0x80, 0x800, 0x7fff, 0x6, 0x1, 0x5, 0x2, 0x9, 0x7fff, 0x0, 0x8000, 0x4, 0x6, 0x2, 0x4, 0x6, 0xa2ec, 0x7, 0x100, 0x1, 0x3, 0x1f, 0x81, 0x10000, 0xc5, 0x7ff, 0x2aae236d, 0x4, 0x2000, 0x1c, 0x3, 0x2, 0x735c, 0x7fffffff, 0x6, 0xfffffffd, 0x4, 0x3ff, 0x7fffffff, 0x8, 0x224, 0x261, 0x8b8a, 0x100, 0xffffffff, 0x7fff, 0x41, 0x401, 0x200], [0x7, 0x4, 0x2, 0x5, 0x7, 0x1, 0x8, 0x0, 0x8, 0xffffff7b, 0x0, 0x5, 0x6, 0xcc9, 0x1, 0x5, 0x2, 0xfffffffe, 0xfffffff9, 0x0, 0x5, 0x101, 0x401, 0x2, 0x3, 0x3, 0x7f76, 0x3ff, 0x9, 0xc14, 0x3, 0x7, 0x5, 0x100, 0x6, 0x8, 0x2, 0xe0, 0x3f, 0x200, 0x3, 0x9, 0x3, 0x5, 0x95c6, 0x2, 0x6, 0x20, 0x3, 0x8, 0x9, 0x7, 0x9, 0x0, 0xffffd671, 0x1, 0x0, 0x853d, 0x7, 0x3ff, 0x0, 0xfde7, 0x1, 0x5]}, 0x45c) 18:08:55 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80ffffff}]}, 0x78) 18:08:55 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68}, [{0x0, 0x0, 0x0, 0x0, 0xf000}]}, 0x78) 18:08:55 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@mode={'mode', 0x3d, 0x3}}]}) 18:08:55 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="6653960d0ec5d684fa9f017ef0d60a3c27bc33760036001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479810be2aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e6517e615607676f8f9fc0ebf8b0b16d6f2c59957ab35d05692e664ebf68734ca53366295f4ad6142134b62f11e92ead037c7fb53455560c8ef0f1c94fafa924edfe92175aaa1c4ecc7aeeb72e0d050feacee907f40888c96a65545e07422bc6ac79f4c2d6ee3dab47d0", 0xba}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x19) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 18:08:55 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b000000}]}, 0x78) 18:08:55 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68}, [{0x0, 0x0, 0x0, 0x0, 0xf00000}]}, 0x78) 18:08:55 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) write$uinput_user_dev(r2, &(0x7f0000000480)={'syz0\x00', {}, 0x0, [0x4, 0x631, 0xaf, 0x2, 0x1b, 0x1, 0x10001, 0x1, 0x8, 0x3ff, 0x800, 0x7859, 0x7, 0x5, 0x7fff, 0xc05, 0xa4, 0x3, 0x4, 0xfffff800, 0x6, 0x7c, 0x6, 0xff, 0x2, 0x771, 0x5, 0xfffffff8, 0x81, 0x0, 0x6, 0x7, 0x6, 0x9, 0x3, 0x0, 0x282d298e, 0x7, 0x6, 0x3, 0xfaf9, 0x7, 0x2, 0xf9, 0xc2, 0x0, 0x8, 0x8, 0x9, 0x4, 0x8eb1, 0x0, 0x8, 0x9, 0x7d, 0x8, 0x9, 0x4, 0x3, 0x10000, 0xfab, 0x39, 0x7, 0x4], [0x0, 0x7ff, 0x1f, 0x1, 0x7, 0x2, 0x6, 0xd594, 0x3, 0x2a, 0x1c9b4fd4, 0x0, 0xfff, 0x5, 0xfffff801, 0x9, 0x3f, 0x8, 0x80, 0x6, 0x401, 0x8000, 0x1, 0xcb, 0x1, 0x6, 0x4, 0x92, 0x800000, 0x7, 0x1f, 0x140, 0x7ff, 0xabbc, 0x401, 0x0, 0x3, 0x20, 0x48, 0x12000, 0xfa, 0x1, 0xfffff6fe, 0x0, 0x7, 0x8818, 0x8000, 0x6, 0x1f, 0x8, 0x4, 0xff, 0x101, 0xd7, 0x8, 0x5, 0xffff8001, 0x5, 0xb621, 0x1, 0x9, 0x1395db38, 0x0, 0x3], [0x6, 0x6, 0x401, 0x2d5, 0xc08, 0x3, 0x7f, 0x7, 0x8, 0x4, 0xbe1a, 0x5, 0x3, 0x93c, 0x9, 0x80, 0x800, 0x7fff, 0x6, 0x1, 0x5, 0x2, 0x9, 0x7fff, 0x0, 0x8000, 0x4, 0x6, 0x2, 0x4, 0x6, 0xa2ec, 0x7, 0x100, 0x1, 0x3, 0x1f, 0x81, 0x10000, 0xc5, 0x7ff, 0x2aae236d, 0x4, 0x2000, 0x1c, 0x3, 0x2, 0x735c, 0x7fffffff, 0x6, 0xfffffffd, 0x4, 0x3ff, 0x7fffffff, 0x8, 0x224, 0x261, 0x8b8a, 0x100, 0xffffffff, 0x7fff, 0x41, 0x401, 0x200], [0x7, 0x4, 0x2, 0x5, 0x7, 0x1, 0x8, 0x0, 0x8, 0xffffff7b, 0x0, 0x5, 0x6, 0xcc9, 0x1, 0x5, 0x2, 0xfffffffe, 0xfffffff9, 0x0, 0x5, 0x101, 0x401, 0x2, 0x3, 0x3, 0x7f76, 0x3ff, 0x9, 0xc14, 0x3, 0x7, 0x5, 0x100, 0x6, 0x8, 0x2, 0xe0, 0x3f, 0x200, 0x3, 0x9, 0x3, 0x5, 0x95c6, 0x2, 0x6, 0x20, 0x3, 0x8, 0x9, 0x7, 0x9, 0x0, 0xffffd671, 0x1, 0x0, 0x853d, 0x7, 0x3ff, 0x0, 0xfde7, 0x1, 0x5]}, 0x45c) 18:08:55 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@mode={'mode', 0x3d, 0x3}}]}) 18:08:55 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff0000}]}, 0x78) 18:08:55 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68}, [{0x0, 0x0, 0x0, 0x0, 0x1000000}]}, 0x78) 18:08:58 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r0, &(0x7f0000000040)=""/244, 0xf4) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="6653960d0ec5d684fa9f017ef0d60a3c27bc33760036001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479810be2aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e6517e615607676f8f9fc0ebf8b0b16d6f2c59957ab35d05692e664ebf68734ca53366295f4ad6142134b62f11e92ead037c7fb53455560c8ef0f1c94fafa924edfe92175aaa1c4ecc7aeeb72e0d050feacee907f40888c96a65545e07422bc6ac79f4c2d6ee3dab47d06e764682c72d7f16542fcfd05d2813cc182d1595016c179e1717c160300ab1ab0ac397e91bd193c036feb66a9ad2ec5b7967e7f5ff957f8b085a", 0xf4}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x19) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 18:08:58 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) write$uinput_user_dev(r2, &(0x7f0000000480)={'syz0\x00', {}, 0x0, [0x4, 0x631, 0xaf, 0x2, 0x1b, 0x1, 0x10001, 0x1, 0x8, 0x3ff, 0x800, 0x7859, 0x7, 0x5, 0x7fff, 0xc05, 0xa4, 0x3, 0x4, 0xfffff800, 0x6, 0x7c, 0x6, 0xff, 0x2, 0x771, 0x5, 0xfffffff8, 0x81, 0x0, 0x6, 0x7, 0x6, 0x9, 0x3, 0x0, 0x282d298e, 0x7, 0x6, 0x3, 0xfaf9, 0x7, 0x2, 0xf9, 0xc2, 0x0, 0x8, 0x8, 0x9, 0x4, 0x8eb1, 0x0, 0x8, 0x9, 0x7d, 0x8, 0x9, 0x4, 0x3, 0x10000, 0xfab, 0x39, 0x7], [0x0, 0x7ff, 0x1f, 0x1, 0x7, 0x2, 0x6, 0xd594, 0x3, 0x2a, 0x1c9b4fd4, 0x0, 0xfff, 0x5, 0xfffff801, 0x9, 0x3f, 0x8, 0x80, 0x6, 0x401, 0x8000, 0x1, 0xcb, 0x1, 0x6, 0x4, 0x92, 0x800000, 0x7, 0x1f, 0x140, 0x7ff, 0xabbc, 0x401, 0x0, 0x3, 0x20, 0x48, 0x12000, 0xfa, 0x1, 0xfffff6fe, 0x0, 0x7, 0x8818, 0x8000, 0x6, 0x1f, 0x8, 0x4, 0xff, 0x101, 0xd7, 0x8, 0x5, 0xffff8001, 0x5, 0xb621, 0x1, 0x9, 0x1395db38, 0x0, 0x3], [0x6, 0x6, 0x401, 0x2d5, 0xc08, 0x3, 0x7f, 0x7, 0x8, 0x4, 0xbe1a, 0x5, 0x3, 0x93c, 0x9, 0x80, 0x800, 0x7fff, 0x6, 0x1, 0x5, 0x2, 0x9, 0x7fff, 0x0, 0x8000, 0x4, 0x6, 0x2, 0x4, 0x6, 0xa2ec, 0x7, 0x100, 0x1, 0x3, 0x1f, 0x81, 0x10000, 0xc5, 0x7ff, 0x2aae236d, 0x4, 0x2000, 0x1c, 0x3, 0x2, 0x735c, 0x7fffffff, 0x6, 0xfffffffd, 0x4, 0x3ff, 0x7fffffff, 0x8, 0x224, 0x261, 0x8b8a, 0x100, 0xffffffff, 0x7fff, 0x41, 0x401, 0x200], [0x7, 0x4, 0x2, 0x5, 0x7, 0x1, 0x8, 0x0, 0x8, 0xffffff7b, 0x0, 0x5, 0x6, 0xcc9, 0x1, 0x5, 0x2, 0xfffffffe, 0xfffffff9, 0x0, 0x5, 0x101, 0x401, 0x2, 0x3, 0x3, 0x7f76, 0x3ff, 0x9, 0xc14, 0x3, 0x7, 0x5, 0x100, 0x6, 0x8, 0x2, 0xe0, 0x3f, 0x200, 0x3, 0x9, 0x3, 0x5, 0x95c6, 0x2, 0x6, 0x20, 0x3, 0x8, 0x9, 0x7, 0x9, 0x0, 0xffffd671, 0x1, 0x0, 0x853d, 0x7, 0x3ff, 0x0, 0xfde7, 0x1, 0x5]}, 0x45c) 18:08:58 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff80}]}, 0x78) 18:08:58 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68}, [{0x0, 0x0, 0x0, 0x0, 0x1800000}]}, 0x78) 18:08:58 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@mode={'mode', 0x3d, 0x3}}]}) 18:08:58 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="6653960d0ec5d684fa9f017ef0d60a3c27bc33760036001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479810be2aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e6517e615607676f8f9fc0ebf8b0b16d6f2c59957ab35d05692e664ebf68734ca53366295f4ad6142134b62f11e92ead037c7fb53455560c8ef0f1c94fafa924edfe92175aaa1c4ecc7aeeb72e0d050feacee907f40888c96a65545e07422bc6ac79f4c2d6ee3dab47d0", 0xba}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x19) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 18:08:58 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68}, [{0x0, 0x0, 0x0, 0x0, 0x2000000}]}, 0x78) 18:08:58 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000000280)='tmpfs\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@mode={'mode', 0x3d, 0x3}}]}) 18:08:58 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf0000000000000}]}, 0x78) 18:08:58 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) write$uinput_user_dev(r2, &(0x7f0000000480)={'syz0\x00', {}, 0x0, [0x4, 0x631, 0xaf, 0x2, 0x1b, 0x1, 0x10001, 0x1, 0x8, 0x3ff, 0x800, 0x7859, 0x7, 0x5, 0x7fff, 0xc05, 0xa4, 0x3, 0x4, 0xfffff800, 0x6, 0x7c, 0x6, 0xff, 0x2, 0x771, 0x5, 0xfffffff8, 0x81, 0x0, 0x6, 0x7, 0x6, 0x9, 0x3, 0x0, 0x282d298e, 0x7, 0x6, 0x3, 0xfaf9, 0x7, 0x2, 0xf9, 0xc2, 0x0, 0x8, 0x8, 0x9, 0x4, 0x8eb1, 0x0, 0x8, 0x9, 0x7d, 0x8, 0x9, 0x4, 0x3, 0x10000, 0xfab, 0x39], [0x0, 0x7ff, 0x1f, 0x1, 0x7, 0x2, 0x6, 0xd594, 0x3, 0x2a, 0x1c9b4fd4, 0x0, 0xfff, 0x5, 0xfffff801, 0x9, 0x3f, 0x8, 0x80, 0x6, 0x401, 0x8000, 0x1, 0xcb, 0x1, 0x6, 0x4, 0x92, 0x800000, 0x7, 0x1f, 0x140, 0x7ff, 0xabbc, 0x401, 0x0, 0x3, 0x20, 0x48, 0x12000, 0xfa, 0x1, 0xfffff6fe, 0x0, 0x7, 0x8818, 0x8000, 0x6, 0x1f, 0x8, 0x4, 0xff, 0x101, 0xd7, 0x8, 0x5, 0xffff8001, 0x5, 0xb621, 0x1, 0x9, 0x1395db38, 0x0, 0x3], [0x6, 0x6, 0x401, 0x2d5, 0xc08, 0x3, 0x7f, 0x7, 0x8, 0x4, 0xbe1a, 0x5, 0x3, 0x93c, 0x9, 0x80, 0x800, 0x7fff, 0x6, 0x1, 0x5, 0x2, 0x9, 0x7fff, 0x0, 0x8000, 0x4, 0x6, 0x2, 0x4, 0x6, 0xa2ec, 0x7, 0x100, 0x1, 0x3, 0x1f, 0x81, 0x10000, 0xc5, 0x7ff, 0x2aae236d, 0x4, 0x2000, 0x1c, 0x3, 0x2, 0x735c, 0x7fffffff, 0x6, 0xfffffffd, 0x4, 0x3ff, 0x7fffffff, 0x8, 0x224, 0x261, 0x8b8a, 0x100, 0xffffffff, 0x7fff, 0x41, 0x401, 0x200], [0x7, 0x4, 0x2, 0x5, 0x7, 0x1, 0x8, 0x0, 0x8, 0xffffff7b, 0x0, 0x5, 0x6, 0xcc9, 0x1, 0x5, 0x2, 0xfffffffe, 0xfffffff9, 0x0, 0x5, 0x101, 0x401, 0x2, 0x3, 0x3, 0x7f76, 0x3ff, 0x9, 0xc14, 0x3, 0x7, 0x5, 0x100, 0x6, 0x8, 0x2, 0xe0, 0x3f, 0x200, 0x3, 0x9, 0x3, 0x5, 0x95c6, 0x2, 0x6, 0x20, 0x3, 0x8, 0x9, 0x7, 0x9, 0x0, 0xffffd671, 0x1, 0x0, 0x853d, 0x7, 0x3ff, 0x0, 0xfde7, 0x1, 0x5]}, 0x45c) 18:08:58 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) write$uinput_user_dev(r2, &(0x7f0000000480)={'syz0\x00', {}, 0x0, [0x4, 0x631, 0xaf, 0x2, 0x1b, 0x1, 0x10001, 0x1, 0x8, 0x3ff, 0x800, 0x7859, 0x7, 0x5, 0x7fff, 0xc05, 0xa4, 0x3, 0x4, 0xfffff800, 0x6, 0x7c, 0x6, 0xff, 0x2, 0x771, 0x5, 0xfffffff8, 0x81, 0x0, 0x6, 0x7, 0x6, 0x9, 0x3, 0x0, 0x282d298e, 0x7, 0x6, 0x3, 0xfaf9, 0x7, 0x2, 0xf9, 0xc2, 0x0, 0x8, 0x8, 0x9, 0x4, 0x8eb1, 0x0, 0x8, 0x9, 0x7d, 0x8, 0x9, 0x4, 0x3, 0x10000, 0xfab], [0x0, 0x7ff, 0x1f, 0x1, 0x7, 0x2, 0x6, 0xd594, 0x3, 0x2a, 0x1c9b4fd4, 0x0, 0xfff, 0x5, 0xfffff801, 0x9, 0x3f, 0x8, 0x80, 0x6, 0x401, 0x8000, 0x1, 0xcb, 0x1, 0x6, 0x4, 0x92, 0x800000, 0x7, 0x1f, 0x140, 0x7ff, 0xabbc, 0x401, 0x0, 0x3, 0x20, 0x48, 0x12000, 0xfa, 0x1, 0xfffff6fe, 0x0, 0x7, 0x8818, 0x8000, 0x6, 0x1f, 0x8, 0x4, 0xff, 0x101, 0xd7, 0x8, 0x5, 0xffff8001, 0x5, 0xb621, 0x1, 0x9, 0x1395db38, 0x0, 0x3], [0x6, 0x6, 0x401, 0x2d5, 0xc08, 0x3, 0x7f, 0x7, 0x8, 0x4, 0xbe1a, 0x5, 0x3, 0x93c, 0x9, 0x80, 0x800, 0x7fff, 0x6, 0x1, 0x5, 0x2, 0x9, 0x7fff, 0x0, 0x8000, 0x4, 0x6, 0x2, 0x4, 0x6, 0xa2ec, 0x7, 0x100, 0x1, 0x3, 0x1f, 0x81, 0x10000, 0xc5, 0x7ff, 0x2aae236d, 0x4, 0x2000, 0x1c, 0x3, 0x2, 0x735c, 0x7fffffff, 0x6, 0xfffffffd, 0x4, 0x3ff, 0x7fffffff, 0x8, 0x224, 0x261, 0x8b8a, 0x100, 0xffffffff, 0x7fff, 0x41, 0x401, 0x200], [0x7, 0x4, 0x2, 0x5, 0x7, 0x1, 0x8, 0x0, 0x8, 0xffffff7b, 0x0, 0x5, 0x6, 0xcc9, 0x1, 0x5, 0x2, 0xfffffffe, 0xfffffff9, 0x0, 0x5, 0x101, 0x401, 0x2, 0x3, 0x3, 0x7f76, 0x3ff, 0x9, 0xc14, 0x3, 0x7, 0x5, 0x100, 0x6, 0x8, 0x2, 0xe0, 0x3f, 0x200, 0x3, 0x9, 0x3, 0x5, 0x95c6, 0x2, 0x6, 0x20, 0x3, 0x8, 0x9, 0x7, 0x9, 0x0, 0xffffd671, 0x1, 0x0, 0x853d, 0x7, 0x3ff, 0x0, 0xfde7, 0x1, 0x5]}, 0x45c) 18:08:58 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68}, [{0x0, 0x0, 0x0, 0x0, 0x5000000}]}, 0x78) 18:09:01 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r0, &(0x7f0000000040)=""/244, 0xf4) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="6653960d0ec5d684fa9f017ef0d60a3c27bc33760036001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479810be2aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e6517e615607676f8f9fc0ebf8b0b16d6f2c59957ab35d05692e664ebf68734ca53366295f4ad6142134b62f11e92ead037c7fb53455560c8ef0f1c94fafa924edfe92175aaa1c4ecc7aeeb72e0d050feacee907f40888c96a65545e07422bc6ac79f4c2d6ee3dab47d06e764682c72d7f16542fcfd05d2813cc182d1595016c179e1717c160300ab1ab0ac397e91bd193c036feb66a9ad2ec5b7967e7f5ff957f8b085a", 0xf4}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x19) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 18:09:01 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000}]}, 0x78) 18:09:01 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) write$uinput_user_dev(r2, &(0x7f0000000480)={'syz0\x00', {}, 0x0, [0x4, 0x631, 0xaf, 0x2, 0x1b, 0x1, 0x10001, 0x1, 0x8, 0x3ff, 0x800, 0x7859, 0x7, 0x5, 0x7fff, 0xc05, 0xa4, 0x3, 0x4, 0xfffff800, 0x6, 0x7c, 0x6, 0xff, 0x2, 0x771, 0x5, 0xfffffff8, 0x81, 0x0, 0x6, 0x7, 0x6, 0x9, 0x3, 0x0, 0x282d298e, 0x7, 0x6, 0x3, 0xfaf9, 0x7, 0x2, 0xf9, 0xc2, 0x0, 0x8, 0x8, 0x9, 0x4, 0x8eb1, 0x0, 0x8, 0x9, 0x7d, 0x8, 0x9, 0x4, 0x3, 0x10000], [0x0, 0x7ff, 0x1f, 0x1, 0x7, 0x2, 0x6, 0xd594, 0x3, 0x2a, 0x1c9b4fd4, 0x0, 0xfff, 0x5, 0xfffff801, 0x9, 0x3f, 0x8, 0x80, 0x6, 0x401, 0x8000, 0x1, 0xcb, 0x1, 0x6, 0x4, 0x92, 0x800000, 0x7, 0x1f, 0x140, 0x7ff, 0xabbc, 0x401, 0x0, 0x3, 0x20, 0x48, 0x12000, 0xfa, 0x1, 0xfffff6fe, 0x0, 0x7, 0x8818, 0x8000, 0x6, 0x1f, 0x8, 0x4, 0xff, 0x101, 0xd7, 0x8, 0x5, 0xffff8001, 0x5, 0xb621, 0x1, 0x9, 0x1395db38, 0x0, 0x3], [0x6, 0x6, 0x401, 0x2d5, 0xc08, 0x3, 0x7f, 0x7, 0x8, 0x4, 0xbe1a, 0x5, 0x3, 0x93c, 0x9, 0x80, 0x800, 0x7fff, 0x6, 0x1, 0x5, 0x2, 0x9, 0x7fff, 0x0, 0x8000, 0x4, 0x6, 0x2, 0x4, 0x6, 0xa2ec, 0x7, 0x100, 0x1, 0x3, 0x1f, 0x81, 0x10000, 0xc5, 0x7ff, 0x2aae236d, 0x4, 0x2000, 0x1c, 0x3, 0x2, 0x735c, 0x7fffffff, 0x6, 0xfffffffd, 0x4, 0x3ff, 0x7fffffff, 0x8, 0x224, 0x261, 0x8b8a, 0x100, 0xffffffff, 0x7fff, 0x41, 0x401, 0x200], [0x7, 0x4, 0x2, 0x5, 0x7, 0x1, 0x8, 0x0, 0x8, 0xffffff7b, 0x0, 0x5, 0x6, 0xcc9, 0x1, 0x5, 0x2, 0xfffffffe, 0xfffffff9, 0x0, 0x5, 0x101, 0x401, 0x2, 0x3, 0x3, 0x7f76, 0x3ff, 0x9, 0xc14, 0x3, 0x7, 0x5, 0x100, 0x6, 0x8, 0x2, 0xe0, 0x3f, 0x200, 0x3, 0x9, 0x3, 0x5, 0x95c6, 0x2, 0x6, 0x20, 0x3, 0x8, 0x9, 0x7, 0x9, 0x0, 0xffffd671, 0x1, 0x0, 0x853d, 0x7, 0x3ff, 0x0, 0xfde7, 0x1, 0x5]}, 0x45c) 18:09:01 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000000280)='tmpfs\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@mode={'mode', 0x3d, 0x3}}]}) 18:09:01 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68}, [{0x0, 0x0, 0x0, 0x0, 0x6000000}]}, 0x78) 18:09:01 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="6653960d0ec5d684fa9f017ef0d60a3c27bc33760036001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479810be2aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e6517e615607676f8f9fc0ebf8b0b16d6f2c59957ab35d05692e664ebf68734ca53366295f4ad6142134b62f11e92ead037c7fb53455560c8ef0f1c94fafa924edfe92175aaa1c4ecc7aeeb72e0d050feacee907f40888c96a65545e07422bc6ac79f4c2d6ee3dab47d0", 0xba}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x19) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 18:09:01 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68}, [{0x0, 0x0, 0x0, 0x0, 0x7000000}]}, 0x78) 18:09:01 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) write$uinput_user_dev(r2, &(0x7f0000000480)={'syz0\x00', {}, 0x0, [0x4, 0x631, 0xaf, 0x2, 0x1b, 0x1, 0x10001, 0x1, 0x8, 0x3ff, 0x800, 0x7859, 0x7, 0x5, 0x7fff, 0xc05, 0xa4, 0x3, 0x4, 0xfffff800, 0x6, 0x7c, 0x6, 0xff, 0x2, 0x771, 0x5, 0xfffffff8, 0x81, 0x0, 0x6, 0x7, 0x6, 0x9, 0x3, 0x0, 0x282d298e, 0x7, 0x6, 0x3, 0xfaf9, 0x7, 0x2, 0xf9, 0xc2, 0x0, 0x8, 0x8, 0x9, 0x4, 0x8eb1, 0x0, 0x8, 0x9, 0x7d, 0x8, 0x9, 0x4, 0x3], [0x0, 0x7ff, 0x1f, 0x1, 0x7, 0x2, 0x6, 0xd594, 0x3, 0x2a, 0x1c9b4fd4, 0x0, 0xfff, 0x5, 0xfffff801, 0x9, 0x3f, 0x8, 0x80, 0x6, 0x401, 0x8000, 0x1, 0xcb, 0x1, 0x6, 0x4, 0x92, 0x800000, 0x7, 0x1f, 0x140, 0x7ff, 0xabbc, 0x401, 0x0, 0x3, 0x20, 0x48, 0x12000, 0xfa, 0x1, 0xfffff6fe, 0x0, 0x7, 0x8818, 0x8000, 0x6, 0x1f, 0x8, 0x4, 0xff, 0x101, 0xd7, 0x8, 0x5, 0xffff8001, 0x5, 0xb621, 0x1, 0x9, 0x1395db38, 0x0, 0x3], [0x6, 0x6, 0x401, 0x2d5, 0xc08, 0x3, 0x7f, 0x7, 0x8, 0x4, 0xbe1a, 0x5, 0x3, 0x93c, 0x9, 0x80, 0x800, 0x7fff, 0x6, 0x1, 0x5, 0x2, 0x9, 0x7fff, 0x0, 0x8000, 0x4, 0x6, 0x2, 0x4, 0x6, 0xa2ec, 0x7, 0x100, 0x1, 0x3, 0x1f, 0x81, 0x10000, 0xc5, 0x7ff, 0x2aae236d, 0x4, 0x2000, 0x1c, 0x3, 0x2, 0x735c, 0x7fffffff, 0x6, 0xfffffffd, 0x4, 0x3ff, 0x7fffffff, 0x8, 0x224, 0x261, 0x8b8a, 0x100, 0xffffffff, 0x7fff, 0x41, 0x401, 0x200], [0x7, 0x4, 0x2, 0x5, 0x7, 0x1, 0x8, 0x0, 0x8, 0xffffff7b, 0x0, 0x5, 0x6, 0xcc9, 0x1, 0x5, 0x2, 0xfffffffe, 0xfffffff9, 0x0, 0x5, 0x101, 0x401, 0x2, 0x3, 0x3, 0x7f76, 0x3ff, 0x9, 0xc14, 0x3, 0x7, 0x5, 0x100, 0x6, 0x8, 0x2, 0xe0, 0x3f, 0x200, 0x3, 0x9, 0x3, 0x5, 0x95c6, 0x2, 0x6, 0x20, 0x3, 0x8, 0x9, 0x7, 0x9, 0x0, 0xffffd671, 0x1, 0x0, 0x853d, 0x7, 0x3ff, 0x0, 0xfde7, 0x1, 0x5]}, 0x45c) 18:09:01 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x180000000000000}]}, 0x78) 18:09:01 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000000280)='tmpfs\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@mode={'mode', 0x3d, 0x3}}]}) 18:09:01 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) write$uinput_user_dev(r2, &(0x7f0000000480)={'syz0\x00', {}, 0x0, [0x4, 0x631, 0xaf, 0x2, 0x1b, 0x1, 0x10001, 0x1, 0x8, 0x3ff, 0x800, 0x7859, 0x7, 0x5, 0x7fff, 0xc05, 0xa4, 0x3, 0x4, 0xfffff800, 0x6, 0x7c, 0x6, 0xff, 0x2, 0x771, 0x5, 0xfffffff8, 0x81, 0x0, 0x6, 0x7, 0x6, 0x9, 0x3, 0x0, 0x282d298e, 0x7, 0x6, 0x3, 0xfaf9, 0x7, 0x2, 0xf9, 0xc2, 0x0, 0x8, 0x8, 0x9, 0x4, 0x8eb1, 0x0, 0x8, 0x9, 0x7d, 0x8, 0x9, 0x4], [0x0, 0x7ff, 0x1f, 0x1, 0x7, 0x2, 0x6, 0xd594, 0x3, 0x2a, 0x1c9b4fd4, 0x0, 0xfff, 0x5, 0xfffff801, 0x9, 0x3f, 0x8, 0x80, 0x6, 0x401, 0x8000, 0x1, 0xcb, 0x1, 0x6, 0x4, 0x92, 0x800000, 0x7, 0x1f, 0x140, 0x7ff, 0xabbc, 0x401, 0x0, 0x3, 0x20, 0x48, 0x12000, 0xfa, 0x1, 0xfffff6fe, 0x0, 0x7, 0x8818, 0x8000, 0x6, 0x1f, 0x8, 0x4, 0xff, 0x101, 0xd7, 0x8, 0x5, 0xffff8001, 0x5, 0xb621, 0x1, 0x9, 0x1395db38, 0x0, 0x3], [0x6, 0x6, 0x401, 0x2d5, 0xc08, 0x3, 0x7f, 0x7, 0x8, 0x4, 0xbe1a, 0x5, 0x3, 0x93c, 0x9, 0x80, 0x800, 0x7fff, 0x6, 0x1, 0x5, 0x2, 0x9, 0x7fff, 0x0, 0x8000, 0x4, 0x6, 0x2, 0x4, 0x6, 0xa2ec, 0x7, 0x100, 0x1, 0x3, 0x1f, 0x81, 0x10000, 0xc5, 0x7ff, 0x2aae236d, 0x4, 0x2000, 0x1c, 0x3, 0x2, 0x735c, 0x7fffffff, 0x6, 0xfffffffd, 0x4, 0x3ff, 0x7fffffff, 0x8, 0x224, 0x261, 0x8b8a, 0x100, 0xffffffff, 0x7fff, 0x41, 0x401, 0x200], [0x7, 0x4, 0x2, 0x5, 0x7, 0x1, 0x8, 0x0, 0x8, 0xffffff7b, 0x0, 0x5, 0x6, 0xcc9, 0x1, 0x5, 0x2, 0xfffffffe, 0xfffffff9, 0x0, 0x5, 0x101, 0x401, 0x2, 0x3, 0x3, 0x7f76, 0x3ff, 0x9, 0xc14, 0x3, 0x7, 0x5, 0x100, 0x6, 0x8, 0x2, 0xe0, 0x3f, 0x200, 0x3, 0x9, 0x3, 0x5, 0x95c6, 0x2, 0x6, 0x20, 0x3, 0x8, 0x9, 0x7, 0x9, 0x0, 0xffffd671, 0x1, 0x0, 0x853d, 0x7, 0x3ff, 0x0, 0xfde7, 0x1, 0x5]}, 0x45c) 18:09:01 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000}]}, 0x78) 18:09:04 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000000280)='tmpfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 18:09:04 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68}, [{0x0, 0x0, 0x0, 0x0, 0x8000000}]}, 0x78) 18:09:04 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r0, &(0x7f0000000040)=""/244, 0xf4) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="6653960d0ec5d684fa9f017ef0d60a3c27bc33760036001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479810be2aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e6517e615607676f8f9fc0ebf8b0b16d6f2c59957ab35d05692e664ebf68734ca53366295f4ad6142134b62f11e92ead037c7fb53455560c8ef0f1c94fafa924edfe92175aaa1c4ecc7aeeb72e0d050feacee907f40888c96a65545e07422bc6ac79f4c2d6ee3dab47d06e764682c72d7f16542fcfd05d2813cc182d1595016c179e1717c160300ab1ab0ac397e91bd193c036feb66a9ad2ec5b7967e7f5ff957f8b085a2437", 0xf6}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x19) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 18:09:04 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) write$uinput_user_dev(r2, &(0x7f0000000480)={'syz0\x00', {}, 0x0, [0x4, 0x631, 0xaf, 0x2, 0x1b, 0x1, 0x10001, 0x1, 0x8, 0x3ff, 0x800, 0x7859, 0x7, 0x5, 0x7fff, 0xc05, 0xa4, 0x3, 0x4, 0xfffff800, 0x6, 0x7c, 0x6, 0xff, 0x2, 0x771, 0x5, 0xfffffff8, 0x81, 0x0, 0x6, 0x7, 0x6, 0x9, 0x3, 0x0, 0x282d298e, 0x7, 0x6, 0x3, 0xfaf9, 0x7, 0x2, 0xf9, 0xc2, 0x0, 0x8, 0x8, 0x9, 0x4, 0x8eb1, 0x0, 0x8, 0x9, 0x7d, 0x8, 0x9], [0x0, 0x7ff, 0x1f, 0x1, 0x7, 0x2, 0x6, 0xd594, 0x3, 0x2a, 0x1c9b4fd4, 0x0, 0xfff, 0x5, 0xfffff801, 0x9, 0x3f, 0x8, 0x80, 0x6, 0x401, 0x8000, 0x1, 0xcb, 0x1, 0x6, 0x4, 0x92, 0x800000, 0x7, 0x1f, 0x140, 0x7ff, 0xabbc, 0x401, 0x0, 0x3, 0x20, 0x48, 0x12000, 0xfa, 0x1, 0xfffff6fe, 0x0, 0x7, 0x8818, 0x8000, 0x6, 0x1f, 0x8, 0x4, 0xff, 0x101, 0xd7, 0x8, 0x5, 0xffff8001, 0x5, 0xb621, 0x1, 0x9, 0x1395db38, 0x0, 0x3], [0x6, 0x6, 0x401, 0x2d5, 0xc08, 0x3, 0x7f, 0x7, 0x8, 0x4, 0xbe1a, 0x5, 0x3, 0x93c, 0x9, 0x80, 0x800, 0x7fff, 0x6, 0x1, 0x5, 0x2, 0x9, 0x7fff, 0x0, 0x8000, 0x4, 0x6, 0x2, 0x4, 0x6, 0xa2ec, 0x7, 0x100, 0x1, 0x3, 0x1f, 0x81, 0x10000, 0xc5, 0x7ff, 0x2aae236d, 0x4, 0x2000, 0x1c, 0x3, 0x2, 0x735c, 0x7fffffff, 0x6, 0xfffffffd, 0x4, 0x3ff, 0x7fffffff, 0x8, 0x224, 0x261, 0x8b8a, 0x100, 0xffffffff, 0x7fff, 0x41, 0x401, 0x200], [0x7, 0x4, 0x2, 0x5, 0x7, 0x1, 0x8, 0x0, 0x8, 0xffffff7b, 0x0, 0x5, 0x6, 0xcc9, 0x1, 0x5, 0x2, 0xfffffffe, 0xfffffff9, 0x0, 0x5, 0x101, 0x401, 0x2, 0x3, 0x3, 0x7f76, 0x3ff, 0x9, 0xc14, 0x3, 0x7, 0x5, 0x100, 0x6, 0x8, 0x2, 0xe0, 0x3f, 0x200, 0x3, 0x9, 0x3, 0x5, 0x95c6, 0x2, 0x6, 0x20, 0x3, 0x8, 0x9, 0x7, 0x9, 0x0, 0xffffd671, 0x1, 0x0, 0x853d, 0x7, 0x3ff, 0x0, 0xfde7, 0x1, 0x5]}, 0x45c) 18:09:04 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x700000000000000}]}, 0x78) 18:09:04 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="6653960d0ec5d684fa9f017ef0d60a3c27bc33760036001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479810be2aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e6517e615607676f8f9fc0ebf8b0b16d6f2c59957ab35d05692e664ebf68734ca53366295f4ad6142134b62f11e92ead037c7fb53455560c8ef0f1c94fafa924edfe92175aaa1c4ecc7aeeb72e0d050feacee907f40888c96a65545e07422bc6ac79f4c2d6ee3dab47d06e764682c72d7f16542fcfd05d2813cc182d1595016c179e1717c160300ab1", 0xd9}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x19) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 18:09:04 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68}, [{0x0, 0x0, 0x0, 0x0, 0x9000000}]}, 0x78) 18:09:04 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) write$uinput_user_dev(r2, &(0x7f0000000480)={'syz0\x00', {}, 0x0, [0x4, 0x631, 0xaf, 0x2, 0x1b, 0x1, 0x10001, 0x1, 0x8, 0x3ff, 0x800, 0x7859, 0x7, 0x5, 0x7fff, 0xc05, 0xa4, 0x3, 0x4, 0xfffff800, 0x6, 0x7c, 0x6, 0xff, 0x2, 0x771, 0x5, 0xfffffff8, 0x81, 0x0, 0x6, 0x7, 0x6, 0x9, 0x3, 0x0, 0x282d298e, 0x7, 0x6, 0x3, 0xfaf9, 0x7, 0x2, 0xf9, 0xc2, 0x0, 0x8, 0x8, 0x9, 0x4, 0x8eb1, 0x0, 0x8, 0x9, 0x7d, 0x8], [0x0, 0x7ff, 0x1f, 0x1, 0x7, 0x2, 0x6, 0xd594, 0x3, 0x2a, 0x1c9b4fd4, 0x0, 0xfff, 0x5, 0xfffff801, 0x9, 0x3f, 0x8, 0x80, 0x6, 0x401, 0x8000, 0x1, 0xcb, 0x1, 0x6, 0x4, 0x92, 0x800000, 0x7, 0x1f, 0x140, 0x7ff, 0xabbc, 0x401, 0x0, 0x3, 0x20, 0x48, 0x12000, 0xfa, 0x1, 0xfffff6fe, 0x0, 0x7, 0x8818, 0x8000, 0x6, 0x1f, 0x8, 0x4, 0xff, 0x101, 0xd7, 0x8, 0x5, 0xffff8001, 0x5, 0xb621, 0x1, 0x9, 0x1395db38, 0x0, 0x3], [0x6, 0x6, 0x401, 0x2d5, 0xc08, 0x3, 0x7f, 0x7, 0x8, 0x4, 0xbe1a, 0x5, 0x3, 0x93c, 0x9, 0x80, 0x800, 0x7fff, 0x6, 0x1, 0x5, 0x2, 0x9, 0x7fff, 0x0, 0x8000, 0x4, 0x6, 0x2, 0x4, 0x6, 0xa2ec, 0x7, 0x100, 0x1, 0x3, 0x1f, 0x81, 0x10000, 0xc5, 0x7ff, 0x2aae236d, 0x4, 0x2000, 0x1c, 0x3, 0x2, 0x735c, 0x7fffffff, 0x6, 0xfffffffd, 0x4, 0x3ff, 0x7fffffff, 0x8, 0x224, 0x261, 0x8b8a, 0x100, 0xffffffff, 0x7fff, 0x41, 0x401, 0x200], [0x7, 0x4, 0x2, 0x5, 0x7, 0x1, 0x8, 0x0, 0x8, 0xffffff7b, 0x0, 0x5, 0x6, 0xcc9, 0x1, 0x5, 0x2, 0xfffffffe, 0xfffffff9, 0x0, 0x5, 0x101, 0x401, 0x2, 0x3, 0x3, 0x7f76, 0x3ff, 0x9, 0xc14, 0x3, 0x7, 0x5, 0x100, 0x6, 0x8, 0x2, 0xe0, 0x3f, 0x200, 0x3, 0x9, 0x3, 0x5, 0x95c6, 0x2, 0x6, 0x20, 0x3, 0x8, 0x9, 0x7, 0x9, 0x0, 0xffffd671, 0x1, 0x0, 0x853d, 0x7, 0x3ff, 0x0, 0xfde7, 0x1, 0x5]}, 0x45c) 18:09:04 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000000280)='tmpfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 18:09:04 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000000000}]}, 0x78) 18:09:04 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x900000000000000}]}, 0x78) 18:09:04 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68}, [{0x0, 0x0, 0x0, 0x0, 0xa000000}]}, 0x78) 18:09:04 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) write$uinput_user_dev(r2, &(0x7f0000000480)={'syz0\x00', {}, 0x0, [0x4, 0x631, 0xaf, 0x2, 0x1b, 0x1, 0x10001, 0x1, 0x8, 0x3ff, 0x800, 0x7859, 0x7, 0x5, 0x7fff, 0xc05, 0xa4, 0x3, 0x4, 0xfffff800, 0x6, 0x7c, 0x6, 0xff, 0x2, 0x771, 0x5, 0xfffffff8, 0x81, 0x0, 0x6, 0x7, 0x6, 0x9, 0x3, 0x0, 0x282d298e, 0x7, 0x6, 0x3, 0xfaf9, 0x7, 0x2, 0xf9, 0xc2, 0x0, 0x8, 0x8, 0x9, 0x4, 0x8eb1, 0x0, 0x8, 0x9, 0x7d], [0x0, 0x7ff, 0x1f, 0x1, 0x7, 0x2, 0x6, 0xd594, 0x3, 0x2a, 0x1c9b4fd4, 0x0, 0xfff, 0x5, 0xfffff801, 0x9, 0x3f, 0x8, 0x80, 0x6, 0x401, 0x8000, 0x1, 0xcb, 0x1, 0x6, 0x4, 0x92, 0x800000, 0x7, 0x1f, 0x140, 0x7ff, 0xabbc, 0x401, 0x0, 0x3, 0x20, 0x48, 0x12000, 0xfa, 0x1, 0xfffff6fe, 0x0, 0x7, 0x8818, 0x8000, 0x6, 0x1f, 0x8, 0x4, 0xff, 0x101, 0xd7, 0x8, 0x5, 0xffff8001, 0x5, 0xb621, 0x1, 0x9, 0x1395db38, 0x0, 0x3], [0x6, 0x6, 0x401, 0x2d5, 0xc08, 0x3, 0x7f, 0x7, 0x8, 0x4, 0xbe1a, 0x5, 0x3, 0x93c, 0x9, 0x80, 0x800, 0x7fff, 0x6, 0x1, 0x5, 0x2, 0x9, 0x7fff, 0x0, 0x8000, 0x4, 0x6, 0x2, 0x4, 0x6, 0xa2ec, 0x7, 0x100, 0x1, 0x3, 0x1f, 0x81, 0x10000, 0xc5, 0x7ff, 0x2aae236d, 0x4, 0x2000, 0x1c, 0x3, 0x2, 0x735c, 0x7fffffff, 0x6, 0xfffffffd, 0x4, 0x3ff, 0x7fffffff, 0x8, 0x224, 0x261, 0x8b8a, 0x100, 0xffffffff, 0x7fff, 0x41, 0x401, 0x200], [0x7, 0x4, 0x2, 0x5, 0x7, 0x1, 0x8, 0x0, 0x8, 0xffffff7b, 0x0, 0x5, 0x6, 0xcc9, 0x1, 0x5, 0x2, 0xfffffffe, 0xfffffff9, 0x0, 0x5, 0x101, 0x401, 0x2, 0x3, 0x3, 0x7f76, 0x3ff, 0x9, 0xc14, 0x3, 0x7, 0x5, 0x100, 0x6, 0x8, 0x2, 0xe0, 0x3f, 0x200, 0x3, 0x9, 0x3, 0x5, 0x95c6, 0x2, 0x6, 0x20, 0x3, 0x8, 0x9, 0x7, 0x9, 0x0, 0xffffd671, 0x1, 0x0, 0x853d, 0x7, 0x3ff, 0x0, 0xfde7, 0x1, 0x5]}, 0x45c) 18:09:04 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000000280)='tmpfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 18:09:04 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68}, [{0x0, 0x0, 0x0, 0x0, 0xc000000}]}, 0x78) 18:09:07 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa00000000000000}]}, 0x78) 18:09:07 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) write$uinput_user_dev(r2, &(0x7f0000000480)={'syz0\x00', {}, 0x0, [0x4, 0x631, 0xaf, 0x2, 0x1b, 0x1, 0x10001, 0x1, 0x8, 0x3ff, 0x800, 0x7859, 0x7, 0x5, 0x7fff, 0xc05, 0xa4, 0x3, 0x4, 0xfffff800, 0x6, 0x7c, 0x6, 0xff, 0x2, 0x771, 0x5, 0xfffffff8, 0x81, 0x0, 0x6, 0x7, 0x6, 0x9, 0x3, 0x0, 0x282d298e, 0x7, 0x6, 0x3, 0xfaf9, 0x7, 0x2, 0xf9, 0xc2, 0x0, 0x8, 0x8, 0x9, 0x4, 0x8eb1, 0x0, 0x8, 0x9], [0x0, 0x7ff, 0x1f, 0x1, 0x7, 0x2, 0x6, 0xd594, 0x3, 0x2a, 0x1c9b4fd4, 0x0, 0xfff, 0x5, 0xfffff801, 0x9, 0x3f, 0x8, 0x80, 0x6, 0x401, 0x8000, 0x1, 0xcb, 0x1, 0x6, 0x4, 0x92, 0x800000, 0x7, 0x1f, 0x140, 0x7ff, 0xabbc, 0x401, 0x0, 0x3, 0x20, 0x48, 0x12000, 0xfa, 0x1, 0xfffff6fe, 0x0, 0x7, 0x8818, 0x8000, 0x6, 0x1f, 0x8, 0x4, 0xff, 0x101, 0xd7, 0x8, 0x5, 0xffff8001, 0x5, 0xb621, 0x1, 0x9, 0x1395db38, 0x0, 0x3], [0x6, 0x6, 0x401, 0x2d5, 0xc08, 0x3, 0x7f, 0x7, 0x8, 0x4, 0xbe1a, 0x5, 0x3, 0x93c, 0x9, 0x80, 0x800, 0x7fff, 0x6, 0x1, 0x5, 0x2, 0x9, 0x7fff, 0x0, 0x8000, 0x4, 0x6, 0x2, 0x4, 0x6, 0xa2ec, 0x7, 0x100, 0x1, 0x3, 0x1f, 0x81, 0x10000, 0xc5, 0x7ff, 0x2aae236d, 0x4, 0x2000, 0x1c, 0x3, 0x2, 0x735c, 0x7fffffff, 0x6, 0xfffffffd, 0x4, 0x3ff, 0x7fffffff, 0x8, 0x224, 0x261, 0x8b8a, 0x100, 0xffffffff, 0x7fff, 0x41, 0x401, 0x200], [0x7, 0x4, 0x2, 0x5, 0x7, 0x1, 0x8, 0x0, 0x8, 0xffffff7b, 0x0, 0x5, 0x6, 0xcc9, 0x1, 0x5, 0x2, 0xfffffffe, 0xfffffff9, 0x0, 0x5, 0x101, 0x401, 0x2, 0x3, 0x3, 0x7f76, 0x3ff, 0x9, 0xc14, 0x3, 0x7, 0x5, 0x100, 0x6, 0x8, 0x2, 0xe0, 0x3f, 0x200, 0x3, 0x9, 0x3, 0x5, 0x95c6, 0x2, 0x6, 0x20, 0x3, 0x8, 0x9, 0x7, 0x9, 0x0, 0xffffd671, 0x1, 0x0, 0x853d, 0x7, 0x3ff, 0x0, 0xfde7, 0x1, 0x5]}, 0x45c) 18:09:07 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="6653960d0ec5d684fa9f017ef0d60a3c27bc33760036001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479810be2aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e6517e615607676f8f9fc0ebf8b0b16d6f2c59957ab35d05692e664ebf68734ca53366295f4ad6142134b62f11e92ead037c7fb53455560c8ef0f1c94fafa924edfe92175aaa1c4ecc7aeeb72e0d050feacee907f40888c96a65545e07422bc6ac79f4c2d6ee3dab47d06e764682c72d7f16542fcfd05d2813cc182d1595016c179e1717c160300ab1", 0xd9}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x19) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 18:09:07 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r0, &(0x7f0000000040)=""/244, 0xf4) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="6653960d0ec5d684fa9f017ef0d60a3c27bc33760036001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479810be2aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e6517e615607676f8f9fc0ebf8b0b16d6f2c59957ab35d05692e664ebf68734ca53366295f4ad6142134b62f11e92ead037c7fb53455560c8ef0f1c94fafa924edfe92175aaa1c4ecc7aeeb72e0d050feacee907f40888c96a65545e07422bc6ac79f4c2d6ee3dab47d06e764682c72d7f16542fcfd05d2813cc182d1595016c179e1717c160300ab1ab0ac397e91bd193c036feb66a9ad2ec5b7967e7f5ff957f8b085a2437", 0xf6}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x19) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 18:09:07 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000000280)='tmpfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)) 18:09:07 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68}, [{0x0, 0x0, 0x0, 0x0, 0xd000000}]}, 0x78) 18:09:07 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc00000000000000}]}, 0x78) 18:09:07 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) write$uinput_user_dev(r2, &(0x7f0000000480)={'syz0\x00', {}, 0x0, [0x4, 0x631, 0xaf, 0x2, 0x1b, 0x1, 0x10001, 0x1, 0x8, 0x3ff, 0x800, 0x7859, 0x7, 0x5, 0x7fff, 0xc05, 0xa4, 0x3, 0x4, 0xfffff800, 0x6, 0x7c, 0x6, 0xff, 0x2, 0x771, 0x5, 0xfffffff8, 0x81, 0x0, 0x6, 0x7, 0x6, 0x9, 0x3, 0x0, 0x282d298e, 0x7, 0x6, 0x3, 0xfaf9, 0x7, 0x2, 0xf9, 0xc2, 0x0, 0x8, 0x8, 0x9, 0x4, 0x8eb1, 0x0, 0x8], [0x0, 0x7ff, 0x1f, 0x1, 0x7, 0x2, 0x6, 0xd594, 0x3, 0x2a, 0x1c9b4fd4, 0x0, 0xfff, 0x5, 0xfffff801, 0x9, 0x3f, 0x8, 0x80, 0x6, 0x401, 0x8000, 0x1, 0xcb, 0x1, 0x6, 0x4, 0x92, 0x800000, 0x7, 0x1f, 0x140, 0x7ff, 0xabbc, 0x401, 0x0, 0x3, 0x20, 0x48, 0x12000, 0xfa, 0x1, 0xfffff6fe, 0x0, 0x7, 0x8818, 0x8000, 0x6, 0x1f, 0x8, 0x4, 0xff, 0x101, 0xd7, 0x8, 0x5, 0xffff8001, 0x5, 0xb621, 0x1, 0x9, 0x1395db38, 0x0, 0x3], [0x6, 0x6, 0x401, 0x2d5, 0xc08, 0x3, 0x7f, 0x7, 0x8, 0x4, 0xbe1a, 0x5, 0x3, 0x93c, 0x9, 0x80, 0x800, 0x7fff, 0x6, 0x1, 0x5, 0x2, 0x9, 0x7fff, 0x0, 0x8000, 0x4, 0x6, 0x2, 0x4, 0x6, 0xa2ec, 0x7, 0x100, 0x1, 0x3, 0x1f, 0x81, 0x10000, 0xc5, 0x7ff, 0x2aae236d, 0x4, 0x2000, 0x1c, 0x3, 0x2, 0x735c, 0x7fffffff, 0x6, 0xfffffffd, 0x4, 0x3ff, 0x7fffffff, 0x8, 0x224, 0x261, 0x8b8a, 0x100, 0xffffffff, 0x7fff, 0x41, 0x401, 0x200], [0x7, 0x4, 0x2, 0x5, 0x7, 0x1, 0x8, 0x0, 0x8, 0xffffff7b, 0x0, 0x5, 0x6, 0xcc9, 0x1, 0x5, 0x2, 0xfffffffe, 0xfffffff9, 0x0, 0x5, 0x101, 0x401, 0x2, 0x3, 0x3, 0x7f76, 0x3ff, 0x9, 0xc14, 0x3, 0x7, 0x5, 0x100, 0x6, 0x8, 0x2, 0xe0, 0x3f, 0x200, 0x3, 0x9, 0x3, 0x5, 0x95c6, 0x2, 0x6, 0x20, 0x3, 0x8, 0x9, 0x7, 0x9, 0x0, 0xffffd671, 0x1, 0x0, 0x853d, 0x7, 0x3ff, 0x0, 0xfde7, 0x1, 0x5]}, 0x45c) 18:09:07 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd00000000000000}]}, 0x78) 18:09:07 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) write$uinput_user_dev(r2, &(0x7f0000000480)={'syz0\x00', {}, 0x0, [0x4, 0x631, 0xaf, 0x2, 0x1b, 0x1, 0x10001, 0x1, 0x8, 0x3ff, 0x800, 0x7859, 0x7, 0x5, 0x7fff, 0xc05, 0xa4, 0x3, 0x4, 0xfffff800, 0x6, 0x7c, 0x6, 0xff, 0x2, 0x771, 0x5, 0xfffffff8, 0x81, 0x0, 0x6, 0x7, 0x6, 0x9, 0x3, 0x0, 0x282d298e, 0x7, 0x6, 0x3, 0xfaf9, 0x7, 0x2, 0xf9, 0xc2, 0x0, 0x8, 0x8, 0x9, 0x4, 0x8eb1], [0x0, 0x7ff, 0x1f, 0x1, 0x7, 0x2, 0x6, 0xd594, 0x3, 0x2a, 0x1c9b4fd4, 0x0, 0xfff, 0x5, 0xfffff801, 0x9, 0x3f, 0x8, 0x80, 0x6, 0x401, 0x8000, 0x1, 0xcb, 0x1, 0x6, 0x4, 0x92, 0x800000, 0x7, 0x1f, 0x140, 0x7ff, 0xabbc, 0x401, 0x0, 0x3, 0x20, 0x48, 0x12000, 0xfa, 0x1, 0xfffff6fe, 0x0, 0x7, 0x8818, 0x8000, 0x6, 0x1f, 0x8, 0x4, 0xff, 0x101, 0xd7, 0x8, 0x5, 0xffff8001, 0x5, 0xb621, 0x1, 0x9, 0x1395db38, 0x0, 0x3], [0x6, 0x6, 0x401, 0x2d5, 0xc08, 0x3, 0x7f, 0x7, 0x8, 0x4, 0xbe1a, 0x5, 0x3, 0x93c, 0x9, 0x80, 0x800, 0x7fff, 0x6, 0x1, 0x5, 0x2, 0x9, 0x7fff, 0x0, 0x8000, 0x4, 0x6, 0x2, 0x4, 0x6, 0xa2ec, 0x7, 0x100, 0x1, 0x3, 0x1f, 0x81, 0x10000, 0xc5, 0x7ff, 0x2aae236d, 0x4, 0x2000, 0x1c, 0x3, 0x2, 0x735c, 0x7fffffff, 0x6, 0xfffffffd, 0x4, 0x3ff, 0x7fffffff, 0x8, 0x224, 0x261, 0x8b8a, 0x100, 0xffffffff, 0x7fff, 0x41, 0x401, 0x200], [0x7, 0x4, 0x2, 0x5, 0x7, 0x1, 0x8, 0x0, 0x8, 0xffffff7b, 0x0, 0x5, 0x6, 0xcc9, 0x1, 0x5, 0x2, 0xfffffffe, 0xfffffff9, 0x0, 0x5, 0x101, 0x401, 0x2, 0x3, 0x3, 0x7f76, 0x3ff, 0x9, 0xc14, 0x3, 0x7, 0x5, 0x100, 0x6, 0x8, 0x2, 0xe0, 0x3f, 0x200, 0x3, 0x9, 0x3, 0x5, 0x95c6, 0x2, 0x6, 0x20, 0x3, 0x8, 0x9, 0x7, 0x9, 0x0, 0xffffd671, 0x1, 0x0, 0x853d, 0x7, 0x3ff, 0x0, 0xfde7, 0x1, 0x5]}, 0x45c) 18:09:07 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68}, [{0x0, 0x0, 0x0, 0x0, 0xe000000}]}, 0x78) 18:09:07 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000000280)='tmpfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)) 18:09:07 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe00000000000000}]}, 0x78) 18:09:08 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68}, [{0x0, 0x0, 0x0, 0x0, 0xf000000}]}, 0x78) 18:09:10 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="6653960d0ec5d684fa9f017ef0d60a3c27bc33760036001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479810be2aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e6517e615607676f8f9fc0ebf8b0b16d6f2c59957ab35d05692e664ebf68734ca53366295f4ad6142134b62f11e92ead037c7fb53455560c8ef0f1c94fafa924edfe92175aaa1c4ecc7aeeb72e0d050feacee907f40888c96a65545e07422bc6ac79f4c2d6ee3dab47d06e764682c72d7f16542fcfd05d2813cc182d1595016c179e1717c160300ab1", 0xd9}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x19) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 18:09:10 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) write$uinput_user_dev(r2, &(0x7f0000000480)={'syz0\x00', {}, 0x0, [0x4, 0x631, 0xaf, 0x2, 0x1b, 0x1, 0x10001, 0x1, 0x8, 0x3ff, 0x800, 0x7859, 0x7, 0x5, 0x7fff, 0xc05, 0xa4, 0x3, 0x4, 0xfffff800, 0x6, 0x7c, 0x6, 0xff, 0x2, 0x771, 0x5, 0xfffffff8, 0x81, 0x0, 0x6, 0x7, 0x6, 0x9, 0x3, 0x0, 0x282d298e, 0x7, 0x6, 0x3, 0xfaf9, 0x7, 0x2, 0xf9, 0xc2, 0x0, 0x8, 0x8, 0x9, 0x4], [0x0, 0x7ff, 0x1f, 0x1, 0x7, 0x2, 0x6, 0xd594, 0x3, 0x2a, 0x1c9b4fd4, 0x0, 0xfff, 0x5, 0xfffff801, 0x9, 0x3f, 0x8, 0x80, 0x6, 0x401, 0x8000, 0x1, 0xcb, 0x1, 0x6, 0x4, 0x92, 0x800000, 0x7, 0x1f, 0x140, 0x7ff, 0xabbc, 0x401, 0x0, 0x3, 0x20, 0x48, 0x12000, 0xfa, 0x1, 0xfffff6fe, 0x0, 0x7, 0x8818, 0x8000, 0x6, 0x1f, 0x8, 0x4, 0xff, 0x101, 0xd7, 0x8, 0x5, 0xffff8001, 0x5, 0xb621, 0x1, 0x9, 0x1395db38, 0x0, 0x3], [0x6, 0x6, 0x401, 0x2d5, 0xc08, 0x3, 0x7f, 0x7, 0x8, 0x4, 0xbe1a, 0x5, 0x3, 0x93c, 0x9, 0x80, 0x800, 0x7fff, 0x6, 0x1, 0x5, 0x2, 0x9, 0x7fff, 0x0, 0x8000, 0x4, 0x6, 0x2, 0x4, 0x6, 0xa2ec, 0x7, 0x100, 0x1, 0x3, 0x1f, 0x81, 0x10000, 0xc5, 0x7ff, 0x2aae236d, 0x4, 0x2000, 0x1c, 0x3, 0x2, 0x735c, 0x7fffffff, 0x6, 0xfffffffd, 0x4, 0x3ff, 0x7fffffff, 0x8, 0x224, 0x261, 0x8b8a, 0x100, 0xffffffff, 0x7fff, 0x41, 0x401, 0x200], [0x7, 0x4, 0x2, 0x5, 0x7, 0x1, 0x8, 0x0, 0x8, 0xffffff7b, 0x0, 0x5, 0x6, 0xcc9, 0x1, 0x5, 0x2, 0xfffffffe, 0xfffffff9, 0x0, 0x5, 0x101, 0x401, 0x2, 0x3, 0x3, 0x7f76, 0x3ff, 0x9, 0xc14, 0x3, 0x7, 0x5, 0x100, 0x6, 0x8, 0x2, 0xe0, 0x3f, 0x200, 0x3, 0x9, 0x3, 0x5, 0x95c6, 0x2, 0x6, 0x20, 0x3, 0x8, 0x9, 0x7, 0x9, 0x0, 0xffffd671, 0x1, 0x0, 0x853d, 0x7, 0x3ff, 0x0, 0xfde7, 0x1, 0x5]}, 0x45c) 18:09:10 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf00000000000000}]}, 0x78) 18:09:10 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000000280)='tmpfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)) 18:09:10 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68}, [{0x0, 0x0, 0x0, 0x0, 0x18000000}]}, 0x78) 18:09:10 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r0, &(0x7f0000000040)=""/244, 0xf4) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="6653960d0ec5d684fa9f017ef0d60a3c27bc33760036001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479810be2aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e6517e615607676f8f9fc0ebf8b0b16d6f2c59957ab35d05692e664ebf68734ca53366295f4ad6142134b62f11e92ead037c7fb53455560c8ef0f1c94fafa924edfe92175aaa1c4ecc7aeeb72e0d050feacee907f40888c96a65545e07422bc6ac79f4c2d6ee3dab47d06e764682c72d7f16542fcfd05d2813cc182d1595016c179e1717c160300ab1ab0ac397e91bd193c036feb66a9ad2ec5b7967e7f5ff957f8b085a2437", 0xf6}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x19) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 18:09:10 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1800000000000000}]}, 0x78) 18:09:10 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) write$uinput_user_dev(r2, &(0x7f0000000480)={'syz0\x00', {}, 0x0, [0x4, 0x631, 0xaf, 0x2, 0x1b, 0x1, 0x10001, 0x1, 0x8, 0x3ff, 0x800, 0x7859, 0x7, 0x5, 0x7fff, 0xc05, 0xa4, 0x3, 0x4, 0xfffff800, 0x6, 0x7c, 0x6, 0xff, 0x2, 0x771, 0x5, 0xfffffff8, 0x81, 0x0, 0x6, 0x7, 0x6, 0x9, 0x3, 0x0, 0x282d298e, 0x7, 0x6, 0x3, 0xfaf9, 0x7, 0x2, 0xf9, 0xc2, 0x0, 0x8, 0x8, 0x9], [0x0, 0x7ff, 0x1f, 0x1, 0x7, 0x2, 0x6, 0xd594, 0x3, 0x2a, 0x1c9b4fd4, 0x0, 0xfff, 0x5, 0xfffff801, 0x9, 0x3f, 0x8, 0x80, 0x6, 0x401, 0x8000, 0x1, 0xcb, 0x1, 0x6, 0x4, 0x92, 0x800000, 0x7, 0x1f, 0x140, 0x7ff, 0xabbc, 0x401, 0x0, 0x3, 0x20, 0x48, 0x12000, 0xfa, 0x1, 0xfffff6fe, 0x0, 0x7, 0x8818, 0x8000, 0x6, 0x1f, 0x8, 0x4, 0xff, 0x101, 0xd7, 0x8, 0x5, 0xffff8001, 0x5, 0xb621, 0x1, 0x9, 0x1395db38, 0x0, 0x3], [0x6, 0x6, 0x401, 0x2d5, 0xc08, 0x3, 0x7f, 0x7, 0x8, 0x4, 0xbe1a, 0x5, 0x3, 0x93c, 0x9, 0x80, 0x800, 0x7fff, 0x6, 0x1, 0x5, 0x2, 0x9, 0x7fff, 0x0, 0x8000, 0x4, 0x6, 0x2, 0x4, 0x6, 0xa2ec, 0x7, 0x100, 0x1, 0x3, 0x1f, 0x81, 0x10000, 0xc5, 0x7ff, 0x2aae236d, 0x4, 0x2000, 0x1c, 0x3, 0x2, 0x735c, 0x7fffffff, 0x6, 0xfffffffd, 0x4, 0x3ff, 0x7fffffff, 0x8, 0x224, 0x261, 0x8b8a, 0x100, 0xffffffff, 0x7fff, 0x41, 0x401, 0x200], [0x7, 0x4, 0x2, 0x5, 0x7, 0x1, 0x8, 0x0, 0x8, 0xffffff7b, 0x0, 0x5, 0x6, 0xcc9, 0x1, 0x5, 0x2, 0xfffffffe, 0xfffffff9, 0x0, 0x5, 0x101, 0x401, 0x2, 0x3, 0x3, 0x7f76, 0x3ff, 0x9, 0xc14, 0x3, 0x7, 0x5, 0x100, 0x6, 0x8, 0x2, 0xe0, 0x3f, 0x200, 0x3, 0x9, 0x3, 0x5, 0x95c6, 0x2, 0x6, 0x20, 0x3, 0x8, 0x9, 0x7, 0x9, 0x0, 0xffffd671, 0x1, 0x0, 0x853d, 0x7, 0x3ff, 0x0, 0xfde7, 0x1, 0x5]}, 0x45c) 18:09:10 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68}, [{0x0, 0x0, 0x0, 0x0, 0x19000000}]}, 0x78) 18:09:10 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000000280)='tmpfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@mode={'mode'}}]}) 18:09:11 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68}, [{0x0, 0x0, 0x0, 0x0, 0x1a000000}]}, 0x78) 18:09:11 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) write$uinput_user_dev(r2, &(0x7f0000000480)={'syz0\x00', {}, 0x0, [0x4, 0x631, 0xaf, 0x2, 0x1b, 0x1, 0x10001, 0x1, 0x8, 0x3ff, 0x800, 0x7859, 0x7, 0x5, 0x7fff, 0xc05, 0xa4, 0x3, 0x4, 0xfffff800, 0x6, 0x7c, 0x6, 0xff, 0x2, 0x771, 0x5, 0xfffffff8, 0x81, 0x0, 0x6, 0x7, 0x6, 0x9, 0x3, 0x0, 0x282d298e, 0x7, 0x6, 0x3, 0xfaf9, 0x7, 0x2, 0xf9, 0xc2, 0x0, 0x8, 0x8], [0x0, 0x7ff, 0x1f, 0x1, 0x7, 0x2, 0x6, 0xd594, 0x3, 0x2a, 0x1c9b4fd4, 0x0, 0xfff, 0x5, 0xfffff801, 0x9, 0x3f, 0x8, 0x80, 0x6, 0x401, 0x8000, 0x1, 0xcb, 0x1, 0x6, 0x4, 0x92, 0x800000, 0x7, 0x1f, 0x140, 0x7ff, 0xabbc, 0x401, 0x0, 0x3, 0x20, 0x48, 0x12000, 0xfa, 0x1, 0xfffff6fe, 0x0, 0x7, 0x8818, 0x8000, 0x6, 0x1f, 0x8, 0x4, 0xff, 0x101, 0xd7, 0x8, 0x5, 0xffff8001, 0x5, 0xb621, 0x1, 0x9, 0x1395db38, 0x0, 0x3], [0x6, 0x6, 0x401, 0x2d5, 0xc08, 0x3, 0x7f, 0x7, 0x8, 0x4, 0xbe1a, 0x5, 0x3, 0x93c, 0x9, 0x80, 0x800, 0x7fff, 0x6, 0x1, 0x5, 0x2, 0x9, 0x7fff, 0x0, 0x8000, 0x4, 0x6, 0x2, 0x4, 0x6, 0xa2ec, 0x7, 0x100, 0x1, 0x3, 0x1f, 0x81, 0x10000, 0xc5, 0x7ff, 0x2aae236d, 0x4, 0x2000, 0x1c, 0x3, 0x2, 0x735c, 0x7fffffff, 0x6, 0xfffffffd, 0x4, 0x3ff, 0x7fffffff, 0x8, 0x224, 0x261, 0x8b8a, 0x100, 0xffffffff, 0x7fff, 0x41, 0x401, 0x200], [0x7, 0x4, 0x2, 0x5, 0x7, 0x1, 0x8, 0x0, 0x8, 0xffffff7b, 0x0, 0x5, 0x6, 0xcc9, 0x1, 0x5, 0x2, 0xfffffffe, 0xfffffff9, 0x0, 0x5, 0x101, 0x401, 0x2, 0x3, 0x3, 0x7f76, 0x3ff, 0x9, 0xc14, 0x3, 0x7, 0x5, 0x100, 0x6, 0x8, 0x2, 0xe0, 0x3f, 0x200, 0x3, 0x9, 0x3, 0x5, 0x95c6, 0x2, 0x6, 0x20, 0x3, 0x8, 0x9, 0x7, 0x9, 0x0, 0xffffd671, 0x1, 0x0, 0x853d, 0x7, 0x3ff, 0x0, 0xfde7, 0x1, 0x5]}, 0x45c) 18:09:13 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="6653960d0ec5d684fa9f017ef0d60a3c27bc33760036001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479810be2aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e6517e615607676f8f9fc0ebf8b0b16d6f2c59957ab35d05692e664ebf68734ca53366295f4ad6142134b62f11e92ead037c7fb53455560c8ef0f1c94fafa924edfe92175aaa1c4ecc7aeeb72e0d050feacee907f40888c96a65545e07422bc6ac79f4c2d6ee3dab47d06e764682c72d7f16542fcfd05d2813cc182d1595016c179e1717c160300ab1ab0ac397e91bd193c036feb66a9ad2ec", 0xe9}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x19) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 18:09:13 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1a00000000000000}]}, 0x78) 18:09:13 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68}, [{0x0, 0x0, 0x0, 0x0, 0x1b000000}]}, 0x78) 18:09:13 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) write$uinput_user_dev(r2, &(0x7f0000000480)={'syz0\x00', {}, 0x0, [0x4, 0x631, 0xaf, 0x2, 0x1b, 0x1, 0x10001, 0x1, 0x8, 0x3ff, 0x800, 0x7859, 0x7, 0x5, 0x7fff, 0xc05, 0xa4, 0x3, 0x4, 0xfffff800, 0x6, 0x7c, 0x6, 0xff, 0x2, 0x771, 0x5, 0xfffffff8, 0x81, 0x0, 0x6, 0x7, 0x6, 0x9, 0x3, 0x0, 0x282d298e, 0x7, 0x6, 0x3, 0xfaf9, 0x7, 0x2, 0xf9, 0xc2, 0x0, 0x8], [0x0, 0x7ff, 0x1f, 0x1, 0x7, 0x2, 0x6, 0xd594, 0x3, 0x2a, 0x1c9b4fd4, 0x0, 0xfff, 0x5, 0xfffff801, 0x9, 0x3f, 0x8, 0x80, 0x6, 0x401, 0x8000, 0x1, 0xcb, 0x1, 0x6, 0x4, 0x92, 0x800000, 0x7, 0x1f, 0x140, 0x7ff, 0xabbc, 0x401, 0x0, 0x3, 0x20, 0x48, 0x12000, 0xfa, 0x1, 0xfffff6fe, 0x0, 0x7, 0x8818, 0x8000, 0x6, 0x1f, 0x8, 0x4, 0xff, 0x101, 0xd7, 0x8, 0x5, 0xffff8001, 0x5, 0xb621, 0x1, 0x9, 0x1395db38, 0x0, 0x3], [0x6, 0x6, 0x401, 0x2d5, 0xc08, 0x3, 0x7f, 0x7, 0x8, 0x4, 0xbe1a, 0x5, 0x3, 0x93c, 0x9, 0x80, 0x800, 0x7fff, 0x6, 0x1, 0x5, 0x2, 0x9, 0x7fff, 0x0, 0x8000, 0x4, 0x6, 0x2, 0x4, 0x6, 0xa2ec, 0x7, 0x100, 0x1, 0x3, 0x1f, 0x81, 0x10000, 0xc5, 0x7ff, 0x2aae236d, 0x4, 0x2000, 0x1c, 0x3, 0x2, 0x735c, 0x7fffffff, 0x6, 0xfffffffd, 0x4, 0x3ff, 0x7fffffff, 0x8, 0x224, 0x261, 0x8b8a, 0x100, 0xffffffff, 0x7fff, 0x41, 0x401, 0x200], [0x7, 0x4, 0x2, 0x5, 0x7, 0x1, 0x8, 0x0, 0x8, 0xffffff7b, 0x0, 0x5, 0x6, 0xcc9, 0x1, 0x5, 0x2, 0xfffffffe, 0xfffffff9, 0x0, 0x5, 0x101, 0x401, 0x2, 0x3, 0x3, 0x7f76, 0x3ff, 0x9, 0xc14, 0x3, 0x7, 0x5, 0x100, 0x6, 0x8, 0x2, 0xe0, 0x3f, 0x200, 0x3, 0x9, 0x3, 0x5, 0x95c6, 0x2, 0x6, 0x20, 0x3, 0x8, 0x9, 0x7, 0x9, 0x0, 0xffffd671, 0x1, 0x0, 0x853d, 0x7, 0x3ff, 0x0, 0xfde7, 0x1, 0x5]}, 0x45c) 18:09:13 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) write$uinput_user_dev(r2, &(0x7f0000000480)={'syz0\x00', {}, 0x0, [0x4, 0x631, 0xaf, 0x2, 0x1b, 0x1, 0x10001, 0x1, 0x8, 0x3ff, 0x800, 0x7859, 0x7, 0x5, 0x7fff, 0xc05, 0xa4, 0x3, 0x4, 0xfffff800, 0x6, 0x7c, 0x6, 0xff, 0x2, 0x771, 0x5, 0xfffffff8, 0x81, 0x0, 0x6, 0x7, 0x6, 0x9, 0x3, 0x0, 0x282d298e, 0x7, 0x6, 0x3, 0xfaf9, 0x7, 0x2, 0xf9, 0xc2, 0x0, 0x8, 0x8, 0x9], [0x0, 0x7ff, 0x1f, 0x1, 0x7, 0x2, 0x6, 0xd594, 0x3, 0x2a, 0x1c9b4fd4, 0x0, 0xfff, 0x5, 0xfffff801, 0x9, 0x3f, 0x8, 0x80, 0x6, 0x401, 0x8000, 0x1, 0xcb, 0x1, 0x6, 0x4, 0x92, 0x800000, 0x7, 0x1f, 0x140, 0x7ff, 0xabbc, 0x401, 0x0, 0x3, 0x20, 0x48, 0x12000, 0xfa, 0x1, 0xfffff6fe, 0x0, 0x7, 0x8818, 0x8000, 0x6, 0x1f, 0x8, 0x4, 0xff, 0x101, 0xd7, 0x8, 0x5, 0xffff8001, 0x5, 0xb621, 0x1, 0x9, 0x1395db38, 0x0, 0x3], [0x6, 0x6, 0x401, 0x2d5, 0xc08, 0x3, 0x7f, 0x7, 0x8, 0x4, 0xbe1a, 0x5, 0x3, 0x93c, 0x9, 0x80, 0x800, 0x7fff, 0x6, 0x1, 0x5, 0x2, 0x9, 0x7fff, 0x0, 0x8000, 0x4, 0x6, 0x2, 0x4, 0x6, 0xa2ec, 0x7, 0x100, 0x1, 0x3, 0x1f, 0x81, 0x10000, 0xc5, 0x7ff, 0x2aae236d, 0x4, 0x2000, 0x1c, 0x3, 0x2, 0x735c, 0x7fffffff, 0x6, 0xfffffffd, 0x4, 0x3ff, 0x7fffffff, 0x8, 0x224, 0x261, 0x8b8a, 0x100, 0xffffffff, 0x7fff, 0x41, 0x401, 0x200], [0x7, 0x4, 0x2, 0x5, 0x7, 0x1, 0x8, 0x0, 0x8, 0xffffff7b, 0x0, 0x5, 0x6, 0xcc9, 0x1, 0x5, 0x2, 0xfffffffe, 0xfffffff9, 0x0, 0x5, 0x101, 0x401, 0x2, 0x3, 0x3, 0x7f76, 0x3ff, 0x9, 0xc14, 0x3, 0x7, 0x5, 0x100, 0x6, 0x8, 0x2, 0xe0, 0x3f, 0x200, 0x3, 0x9, 0x3, 0x5, 0x95c6, 0x2, 0x6, 0x20, 0x3, 0x8, 0x9, 0x7, 0x9, 0x0, 0xffffd671, 0x1, 0x0, 0x853d, 0x7, 0x3ff, 0x0, 0xfde7, 0x1, 0x5]}, 0x45c) 18:09:13 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r0, &(0x7f0000000040)=""/244, 0xf4) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f0000000100)="6653960d0ec5d684fa9f017ef0d60a3c27bc33760036001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479810be2aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e6517e615607676f8f9fc0ebf8b0b16d6f2c59957ab35d05692e664ebf68734ca53366295f4ad6142134b62f11e92ead037c7fb53455560c8ef0f1c94fafa924edfe92175aaa1c4ecc7aeeb72e0d050feacee907f40888c96a65545e07422bc6ac79f4c2d6ee3dab47d06e764682c72d7f16542fcfd05d2813cc182d1595016c179e1717c160300ab1ab0ac397e91bd193c036feb66a9ad2ec5b7967e7f5ff957f8b085a2437c5", 0xf7}], 0x3, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x19) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 18:09:13 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1b00000000000000}]}, 0x78) 18:09:13 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) write$uinput_user_dev(r2, &(0x7f0000000480)={'syz0\x00', {}, 0x0, [0x4, 0x631, 0xaf, 0x2, 0x1b, 0x1, 0x10001, 0x1, 0x8, 0x3ff, 0x800, 0x7859, 0x7, 0x5, 0x7fff, 0xc05, 0xa4, 0x3, 0x4, 0xfffff800, 0x6, 0x7c, 0x6, 0xff, 0x2, 0x771, 0x5, 0xfffffff8, 0x81, 0x0, 0x6, 0x7, 0x6, 0x9, 0x3, 0x0, 0x282d298e, 0x7, 0x6, 0x3, 0xfaf9, 0x7, 0x2, 0xf9, 0xc2, 0x0, 0x8, 0x8, 0x9], [0x0, 0x7ff, 0x1f, 0x1, 0x7, 0x2, 0x6, 0xd594, 0x3, 0x2a, 0x1c9b4fd4, 0x0, 0xfff, 0x5, 0xfffff801, 0x9, 0x3f, 0x8, 0x80, 0x6, 0x401, 0x8000, 0x1, 0xcb, 0x1, 0x6, 0x4, 0x92, 0x800000, 0x7, 0x1f, 0x140, 0x7ff, 0xabbc, 0x401, 0x0, 0x3, 0x20, 0x48, 0x12000, 0xfa, 0x1, 0xfffff6fe, 0x0, 0x7, 0x8818, 0x8000, 0x6, 0x1f, 0x8, 0x4, 0xff, 0x101, 0xd7, 0x8, 0x5, 0xffff8001, 0x5, 0xb621, 0x1, 0x9, 0x1395db38, 0x0, 0x3], [0x6, 0x6, 0x401, 0x2d5, 0xc08, 0x3, 0x7f, 0x7, 0x8, 0x4, 0xbe1a, 0x5, 0x3, 0x93c, 0x9, 0x80, 0x800, 0x7fff, 0x6, 0x1, 0x5, 0x2, 0x9, 0x7fff, 0x0, 0x8000, 0x4, 0x6, 0x2, 0x4, 0x6, 0xa2ec, 0x7, 0x100, 0x1, 0x3, 0x1f, 0x81, 0x10000, 0xc5, 0x7ff, 0x2aae236d, 0x4, 0x2000, 0x1c, 0x3, 0x2, 0x735c, 0x7fffffff, 0x6, 0xfffffffd, 0x4, 0x3ff, 0x7fffffff, 0x8, 0x224, 0x261, 0x8b8a, 0x100, 0xffffffff, 0x7fff, 0x41, 0x401, 0x200], [0x7, 0x4, 0x2, 0x5, 0x7, 0x1, 0x8, 0x0, 0x8, 0xffffff7b, 0x0, 0x5, 0x6, 0xcc9, 0x1, 0x5, 0x2, 0xfffffffe, 0xfffffff9, 0x0, 0x5, 0x101, 0x401, 0x2, 0x3, 0x3, 0x7f76, 0x3ff, 0x9, 0xc14, 0x3, 0x7, 0x5, 0x100, 0x6, 0x8, 0x2, 0xe0, 0x3f, 0x200, 0x3, 0x9, 0x3, 0x5, 0x95c6, 0x2, 0x6, 0x20, 0x3, 0x8, 0x9, 0x7, 0x9, 0x0, 0xffffd671, 0x1, 0x0, 0x853d, 0x7, 0x3ff, 0x0, 0xfde7, 0x1, 0x5]}, 0x45c) 18:09:13 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) write$uinput_user_dev(r2, &(0x7f0000000480)={'syz0\x00', {}, 0x0, [0x4, 0x631, 0xaf, 0x2, 0x1b, 0x1, 0x10001, 0x1, 0x8, 0x3ff, 0x800, 0x7859, 0x7, 0x5, 0x7fff, 0xc05, 0xa4, 0x3, 0x4, 0xfffff800, 0x6, 0x7c, 0x6, 0xff, 0x2, 0x771, 0x5, 0xfffffff8, 0x81, 0x0, 0x6, 0x7, 0x6, 0x9, 0x3, 0x0, 0x282d298e, 0x7, 0x6, 0x3, 0xfaf9, 0x7, 0x2, 0xf9, 0xc2], [0x0, 0x7ff, 0x1f, 0x1, 0x7, 0x2, 0x6, 0xd594, 0x3, 0x2a, 0x1c9b4fd4, 0x0, 0xfff, 0x5, 0xfffff801, 0x9, 0x3f, 0x8, 0x80, 0x6, 0x401, 0x8000, 0x1, 0xcb, 0x1, 0x6, 0x4, 0x92, 0x800000, 0x7, 0x1f, 0x140, 0x7ff, 0xabbc, 0x401, 0x0, 0x3, 0x20, 0x48, 0x12000, 0xfa, 0x1, 0xfffff6fe, 0x0, 0x7, 0x8818, 0x8000, 0x6, 0x1f, 0x8, 0x4, 0xff, 0x101, 0xd7, 0x8, 0x5, 0xffff8001, 0x5, 0xb621, 0x1, 0x9, 0x1395db38, 0x0, 0x3], [0x6, 0x6, 0x401, 0x2d5, 0xc08, 0x3, 0x7f, 0x7, 0x8, 0x4, 0xbe1a, 0x5, 0x3, 0x93c, 0x9, 0x80, 0x800, 0x7fff, 0x6, 0x1, 0x5, 0x2, 0x9, 0x7fff, 0x0, 0x8000, 0x4, 0x6, 0x2, 0x4, 0x6, 0xa2ec, 0x7, 0x100, 0x1, 0x3, 0x1f, 0x81, 0x10000, 0xc5, 0x7ff, 0x2aae236d, 0x4, 0x2000, 0x1c, 0x3, 0x2, 0x735c, 0x7fffffff, 0x6, 0xfffffffd, 0x4, 0x3ff, 0x7fffffff, 0x8, 0x224, 0x261, 0x8b8a, 0x100, 0xffffffff, 0x7fff, 0x41, 0x401, 0x200], [0x7, 0x4, 0x2, 0x5, 0x7, 0x1, 0x8, 0x0, 0x8, 0xffffff7b, 0x0, 0x5, 0x6, 0xcc9, 0x1, 0x5, 0x2, 0xfffffffe, 0xfffffff9, 0x0, 0x5, 0x101, 0x401, 0x2, 0x3, 0x3, 0x7f76, 0x3ff, 0x9, 0xc14, 0x3, 0x7, 0x5, 0x100, 0x6, 0x8, 0x2, 0xe0, 0x3f, 0x200, 0x3, 0x9, 0x3, 0x5, 0x95c6, 0x2, 0x6, 0x20, 0x3, 0x8, 0x9, 0x7, 0x9, 0x0, 0xffffd671, 0x1, 0x0, 0x853d, 0x7, 0x3ff, 0x0, 0xfde7, 0x1, 0x5]}, 0x45c) 18:09:13 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68}, [{0x0, 0x0, 0x0, 0x0, 0x1e000000}]}, 0x78) 18:09:14 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68}, [{0x0, 0x0, 0x0, 0x0, 0x3e000000}]}, 0x78) 18:09:14 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3e00000000000000}]}, 0x78) 18:09:16 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) write$uinput_user_dev(r2, &(0x7f0000000480)={'syz0\x00', {}, 0x0, [0x4, 0x631, 0xaf, 0x2, 0x1b, 0x1, 0x10001, 0x1, 0x8, 0x3ff, 0x800, 0x7859, 0x7, 0x5, 0x7fff, 0xc05, 0xa4, 0x3, 0x4, 0xfffff800, 0x6, 0x7c, 0x6, 0xff, 0x2, 0x771, 0x5, 0xfffffff8, 0x81, 0x0, 0x6, 0x7, 0x6, 0x9, 0x3, 0x0, 0x282d298e, 0x7, 0x6, 0x3, 0xfaf9, 0x7, 0x2, 0xf9, 0xc2, 0x0, 0x8, 0x8, 0x9], [0x0, 0x7ff, 0x1f, 0x1, 0x7, 0x2, 0x6, 0xd594, 0x3, 0x2a, 0x1c9b4fd4, 0x0, 0xfff, 0x5, 0xfffff801, 0x9, 0x3f, 0x8, 0x80, 0x6, 0x401, 0x8000, 0x1, 0xcb, 0x1, 0x6, 0x4, 0x92, 0x800000, 0x7, 0x1f, 0x140, 0x7ff, 0xabbc, 0x401, 0x0, 0x3, 0x20, 0x48, 0x12000, 0xfa, 0x1, 0xfffff6fe, 0x0, 0x7, 0x8818, 0x8000, 0x6, 0x1f, 0x8, 0x4, 0xff, 0x101, 0xd7, 0x8, 0x5, 0xffff8001, 0x5, 0xb621, 0x1, 0x9, 0x1395db38, 0x0, 0x3], [0x6, 0x6, 0x401, 0x2d5, 0xc08, 0x3, 0x7f, 0x7, 0x8, 0x4, 0xbe1a, 0x5, 0x3, 0x93c, 0x9, 0x80, 0x800, 0x7fff, 0x6, 0x1, 0x5, 0x2, 0x9, 0x7fff, 0x0, 0x8000, 0x4, 0x6, 0x2, 0x4, 0x6, 0xa2ec, 0x7, 0x100, 0x1, 0x3, 0x1f, 0x81, 0x10000, 0xc5, 0x7ff, 0x2aae236d, 0x4, 0x2000, 0x1c, 0x3, 0x2, 0x735c, 0x7fffffff, 0x6, 0xfffffffd, 0x4, 0x3ff, 0x7fffffff, 0x8, 0x224, 0x261, 0x8b8a, 0x100, 0xffffffff, 0x7fff, 0x41, 0x401, 0x200], [0x7, 0x4, 0x2, 0x5, 0x7, 0x1, 0x8, 0x0, 0x8, 0xffffff7b, 0x0, 0x5, 0x6, 0xcc9, 0x1, 0x5, 0x2, 0xfffffffe, 0xfffffff9, 0x0, 0x5, 0x101, 0x401, 0x2, 0x3, 0x3, 0x7f76, 0x3ff, 0x9, 0xc14, 0x3, 0x7, 0x5, 0x100, 0x6, 0x8, 0x2, 0xe0, 0x3f, 0x200, 0x3, 0x9, 0x3, 0x5, 0x95c6, 0x2, 0x6, 0x20, 0x3, 0x8, 0x9, 0x7, 0x9, 0x0, 0xffffd671, 0x1, 0x0, 0x853d, 0x7, 0x3ff, 0x0, 0xfde7, 0x1, 0x5]}, 0x45c) 18:09:16 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="6653960d0ec5d684fa9f017ef0d60a3c27bc33760036001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479810be2aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e6517e615607676f8f9fc0ebf8b0b16d6f2c59957ab35d05692e664ebf68734ca53366295f4ad6142134b62f11e92ead037c7fb53455560c8ef0f1c94fafa924edfe92175aaa1c4ecc7aeeb72e0d050feacee907f40888c96a65545e07422bc6ac79f4c2d6ee3dab47d06e764682c72d7f16542fcfd05d2813cc182d1595016c179e1717c160300ab1ab0ac397e91bd193c036feb66a9ad2ec", 0xe9}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x19) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 18:09:16 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68}, [{0x0, 0x0, 0x0, 0x0, 0x3f000000}]}, 0x78) 18:09:16 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f00000000000000}]}, 0x78) 18:09:16 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) write$uinput_user_dev(r2, &(0x7f0000000480)={'syz0\x00', {}, 0x0, [0x4, 0x631, 0xaf, 0x2, 0x1b, 0x1, 0x10001, 0x1, 0x8, 0x3ff, 0x800, 0x7859, 0x7, 0x5, 0x7fff, 0xc05, 0xa4, 0x3, 0x4, 0xfffff800, 0x6, 0x7c, 0x6, 0xff, 0x2, 0x771, 0x5, 0xfffffff8, 0x81, 0x0, 0x6, 0x7, 0x6, 0x9, 0x3, 0x0, 0x282d298e, 0x7, 0x6, 0x3, 0xfaf9, 0x7, 0x2, 0xf9], [0x0, 0x7ff, 0x1f, 0x1, 0x7, 0x2, 0x6, 0xd594, 0x3, 0x2a, 0x1c9b4fd4, 0x0, 0xfff, 0x5, 0xfffff801, 0x9, 0x3f, 0x8, 0x80, 0x6, 0x401, 0x8000, 0x1, 0xcb, 0x1, 0x6, 0x4, 0x92, 0x800000, 0x7, 0x1f, 0x140, 0x7ff, 0xabbc, 0x401, 0x0, 0x3, 0x20, 0x48, 0x12000, 0xfa, 0x1, 0xfffff6fe, 0x0, 0x7, 0x8818, 0x8000, 0x6, 0x1f, 0x8, 0x4, 0xff, 0x101, 0xd7, 0x8, 0x5, 0xffff8001, 0x5, 0xb621, 0x1, 0x9, 0x1395db38, 0x0, 0x3], [0x6, 0x6, 0x401, 0x2d5, 0xc08, 0x3, 0x7f, 0x7, 0x8, 0x4, 0xbe1a, 0x5, 0x3, 0x93c, 0x9, 0x80, 0x800, 0x7fff, 0x6, 0x1, 0x5, 0x2, 0x9, 0x7fff, 0x0, 0x8000, 0x4, 0x6, 0x2, 0x4, 0x6, 0xa2ec, 0x7, 0x100, 0x1, 0x3, 0x1f, 0x81, 0x10000, 0xc5, 0x7ff, 0x2aae236d, 0x4, 0x2000, 0x1c, 0x3, 0x2, 0x735c, 0x7fffffff, 0x6, 0xfffffffd, 0x4, 0x3ff, 0x7fffffff, 0x8, 0x224, 0x261, 0x8b8a, 0x100, 0xffffffff, 0x7fff, 0x41, 0x401, 0x200], [0x7, 0x4, 0x2, 0x5, 0x7, 0x1, 0x8, 0x0, 0x8, 0xffffff7b, 0x0, 0x5, 0x6, 0xcc9, 0x1, 0x5, 0x2, 0xfffffffe, 0xfffffff9, 0x0, 0x5, 0x101, 0x401, 0x2, 0x3, 0x3, 0x7f76, 0x3ff, 0x9, 0xc14, 0x3, 0x7, 0x5, 0x100, 0x6, 0x8, 0x2, 0xe0, 0x3f, 0x200, 0x3, 0x9, 0x3, 0x5, 0x95c6, 0x2, 0x6, 0x20, 0x3, 0x8, 0x9, 0x7, 0x9, 0x0, 0xffffd671, 0x1, 0x0, 0x853d, 0x7, 0x3ff, 0x0, 0xfde7, 0x1, 0x5]}, 0x45c) 18:09:16 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r0, &(0x7f0000000040)=""/244, 0xf4) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f0000000100)="6653960d0ec5d684fa9f017ef0d60a3c27bc33760036001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479810be2aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e6517e615607676f8f9fc0ebf8b0b16d6f2c59957ab35d05692e664ebf68734ca53366295f4ad6142134b62f11e92ead037c7fb53455560c8ef0f1c94fafa924edfe92175aaa1c4ecc7aeeb72e0d050feacee907f40888c96a65545e07422bc6ac79f4c2d6ee3dab47d06e764682c72d7f16542fcfd05d2813cc182d1595016c179e1717c160300ab1ab0ac397e91bd193c036feb66a9ad2ec5b7967e7f5ff957f8b085a2437c5", 0xf7}], 0x3, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x19) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 18:09:16 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68}, [{0x0, 0x0, 0x0, 0x0, 0x7f000000}]}, 0x78) 18:09:16 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80ffffff00000000}]}, 0x78) 18:09:16 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000480)={'syz0\x00', {}, 0x0, [0x4, 0x631, 0xaf, 0x2, 0x1b, 0x1, 0x10001, 0x1, 0x8, 0x3ff, 0x800, 0x7859, 0x7, 0x5, 0x7fff, 0xc05, 0xa4, 0x3, 0x4, 0xfffff800, 0x6, 0x7c, 0x6, 0xff, 0x2, 0x771, 0x5, 0xfffffff8, 0x81, 0x0, 0x6, 0x7, 0x6, 0x9, 0x3, 0x0, 0x282d298e, 0x7, 0x6, 0x3, 0xfaf9, 0x7, 0x2, 0xf9, 0xc2, 0x0, 0x8, 0x8, 0x9], [0x0, 0x7ff, 0x1f, 0x1, 0x7, 0x2, 0x6, 0xd594, 0x3, 0x2a, 0x1c9b4fd4, 0x0, 0xfff, 0x5, 0xfffff801, 0x9, 0x3f, 0x8, 0x80, 0x6, 0x401, 0x8000, 0x1, 0xcb, 0x1, 0x6, 0x4, 0x92, 0x800000, 0x7, 0x1f, 0x140, 0x7ff, 0xabbc, 0x401, 0x0, 0x3, 0x20, 0x48, 0x12000, 0xfa, 0x1, 0xfffff6fe, 0x0, 0x7, 0x8818, 0x8000, 0x6, 0x1f, 0x8, 0x4, 0xff, 0x101, 0xd7, 0x8, 0x5, 0xffff8001, 0x5, 0xb621, 0x1, 0x9, 0x1395db38, 0x0, 0x3], [0x6, 0x6, 0x401, 0x2d5, 0xc08, 0x3, 0x7f, 0x7, 0x8, 0x4, 0xbe1a, 0x5, 0x3, 0x93c, 0x9, 0x80, 0x800, 0x7fff, 0x6, 0x1, 0x5, 0x2, 0x9, 0x7fff, 0x0, 0x8000, 0x4, 0x6, 0x2, 0x4, 0x6, 0xa2ec, 0x7, 0x100, 0x1, 0x3, 0x1f, 0x81, 0x10000, 0xc5, 0x7ff, 0x2aae236d, 0x4, 0x2000, 0x1c, 0x3, 0x2, 0x735c, 0x7fffffff, 0x6, 0xfffffffd, 0x4, 0x3ff, 0x7fffffff, 0x8, 0x224, 0x261, 0x8b8a, 0x100, 0xffffffff, 0x7fff, 0x41, 0x401, 0x200], [0x7, 0x4, 0x2, 0x5, 0x7, 0x1, 0x8, 0x0, 0x8, 0xffffff7b, 0x0, 0x5, 0x6, 0xcc9, 0x1, 0x5, 0x2, 0xfffffffe, 0xfffffff9, 0x0, 0x5, 0x101, 0x401, 0x2, 0x3, 0x3, 0x7f76, 0x3ff, 0x9, 0xc14, 0x3, 0x7, 0x5, 0x100, 0x6, 0x8, 0x2, 0xe0, 0x3f, 0x200, 0x3, 0x9, 0x3, 0x5, 0x95c6, 0x2, 0x6, 0x20, 0x3, 0x8, 0x9, 0x7, 0x9, 0x0, 0xffffd671, 0x1, 0x0, 0x853d, 0x7, 0x3ff, 0x0, 0xfde7, 0x1, 0x5]}, 0x45c) 18:09:16 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) write$uinput_user_dev(r2, &(0x7f0000000480)={'syz0\x00', {}, 0x0, [0x4, 0x631, 0xaf, 0x2, 0x1b, 0x1, 0x10001, 0x1, 0x8, 0x3ff, 0x800, 0x7859, 0x7, 0x5, 0x7fff, 0xc05, 0xa4, 0x3, 0x4, 0xfffff800, 0x6, 0x7c, 0x6, 0xff, 0x2, 0x771, 0x5, 0xfffffff8, 0x81, 0x0, 0x6, 0x7, 0x6, 0x9, 0x3, 0x0, 0x282d298e, 0x7, 0x6, 0x3, 0xfaf9, 0x7, 0x2], [0x0, 0x7ff, 0x1f, 0x1, 0x7, 0x2, 0x6, 0xd594, 0x3, 0x2a, 0x1c9b4fd4, 0x0, 0xfff, 0x5, 0xfffff801, 0x9, 0x3f, 0x8, 0x80, 0x6, 0x401, 0x8000, 0x1, 0xcb, 0x1, 0x6, 0x4, 0x92, 0x800000, 0x7, 0x1f, 0x140, 0x7ff, 0xabbc, 0x401, 0x0, 0x3, 0x20, 0x48, 0x12000, 0xfa, 0x1, 0xfffff6fe, 0x0, 0x7, 0x8818, 0x8000, 0x6, 0x1f, 0x8, 0x4, 0xff, 0x101, 0xd7, 0x8, 0x5, 0xffff8001, 0x5, 0xb621, 0x1, 0x9, 0x1395db38, 0x0, 0x3], [0x6, 0x6, 0x401, 0x2d5, 0xc08, 0x3, 0x7f, 0x7, 0x8, 0x4, 0xbe1a, 0x5, 0x3, 0x93c, 0x9, 0x80, 0x800, 0x7fff, 0x6, 0x1, 0x5, 0x2, 0x9, 0x7fff, 0x0, 0x8000, 0x4, 0x6, 0x2, 0x4, 0x6, 0xa2ec, 0x7, 0x100, 0x1, 0x3, 0x1f, 0x81, 0x10000, 0xc5, 0x7ff, 0x2aae236d, 0x4, 0x2000, 0x1c, 0x3, 0x2, 0x735c, 0x7fffffff, 0x6, 0xfffffffd, 0x4, 0x3ff, 0x7fffffff, 0x8, 0x224, 0x261, 0x8b8a, 0x100, 0xffffffff, 0x7fff, 0x41, 0x401, 0x200], [0x7, 0x4, 0x2, 0x5, 0x7, 0x1, 0x8, 0x0, 0x8, 0xffffff7b, 0x0, 0x5, 0x6, 0xcc9, 0x1, 0x5, 0x2, 0xfffffffe, 0xfffffff9, 0x0, 0x5, 0x101, 0x401, 0x2, 0x3, 0x3, 0x7f76, 0x3ff, 0x9, 0xc14, 0x3, 0x7, 0x5, 0x100, 0x6, 0x8, 0x2, 0xe0, 0x3f, 0x200, 0x3, 0x9, 0x3, 0x5, 0x95c6, 0x2, 0x6, 0x20, 0x3, 0x8, 0x9, 0x7, 0x9, 0x0, 0xffffd671, 0x1, 0x0, 0x853d, 0x7, 0x3ff, 0x0, 0xfde7, 0x1, 0x5]}, 0x45c) 18:09:17 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9b00000000000000}]}, 0x78) 18:09:17 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000480)={'syz0\x00', {}, 0x0, [0x4, 0x631, 0xaf, 0x2, 0x1b, 0x1, 0x10001, 0x1, 0x8, 0x3ff, 0x800, 0x7859, 0x7, 0x5, 0x7fff, 0xc05, 0xa4, 0x3, 0x4, 0xfffff800, 0x6, 0x7c, 0x6, 0xff, 0x2, 0x771, 0x5, 0xfffffff8, 0x81, 0x0, 0x6, 0x7, 0x6, 0x9, 0x3, 0x0, 0x282d298e, 0x7, 0x6, 0x3, 0xfaf9, 0x7, 0x2, 0xf9, 0xc2, 0x0, 0x8, 0x8, 0x9], [0x0, 0x7ff, 0x1f, 0x1, 0x7, 0x2, 0x6, 0xd594, 0x3, 0x2a, 0x1c9b4fd4, 0x0, 0xfff, 0x5, 0xfffff801, 0x9, 0x3f, 0x8, 0x80, 0x6, 0x401, 0x8000, 0x1, 0xcb, 0x1, 0x6, 0x4, 0x92, 0x800000, 0x7, 0x1f, 0x140, 0x7ff, 0xabbc, 0x401, 0x0, 0x3, 0x20, 0x48, 0x12000, 0xfa, 0x1, 0xfffff6fe, 0x0, 0x7, 0x8818, 0x8000, 0x6, 0x1f, 0x8, 0x4, 0xff, 0x101, 0xd7, 0x8, 0x5, 0xffff8001, 0x5, 0xb621, 0x1, 0x9, 0x1395db38, 0x0, 0x3], [0x6, 0x6, 0x401, 0x2d5, 0xc08, 0x3, 0x7f, 0x7, 0x8, 0x4, 0xbe1a, 0x5, 0x3, 0x93c, 0x9, 0x80, 0x800, 0x7fff, 0x6, 0x1, 0x5, 0x2, 0x9, 0x7fff, 0x0, 0x8000, 0x4, 0x6, 0x2, 0x4, 0x6, 0xa2ec, 0x7, 0x100, 0x1, 0x3, 0x1f, 0x81, 0x10000, 0xc5, 0x7ff, 0x2aae236d, 0x4, 0x2000, 0x1c, 0x3, 0x2, 0x735c, 0x7fffffff, 0x6, 0xfffffffd, 0x4, 0x3ff, 0x7fffffff, 0x8, 0x224, 0x261, 0x8b8a, 0x100, 0xffffffff, 0x7fff, 0x41, 0x401, 0x200], [0x7, 0x4, 0x2, 0x5, 0x7, 0x1, 0x8, 0x0, 0x8, 0xffffff7b, 0x0, 0x5, 0x6, 0xcc9, 0x1, 0x5, 0x2, 0xfffffffe, 0xfffffff9, 0x0, 0x5, 0x101, 0x401, 0x2, 0x3, 0x3, 0x7f76, 0x3ff, 0x9, 0xc14, 0x3, 0x7, 0x5, 0x100, 0x6, 0x8, 0x2, 0xe0, 0x3f, 0x200, 0x3, 0x9, 0x3, 0x5, 0x95c6, 0x2, 0x6, 0x20, 0x3, 0x8, 0x9, 0x7, 0x9, 0x0, 0xffffd671, 0x1, 0x0, 0x853d, 0x7, 0x3ff, 0x0, 0xfde7, 0x1, 0x5]}, 0x45c) 18:09:17 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68}, [{0x0, 0x0, 0x0, 0x0, 0x80ffffff}]}, 0x78) 18:09:19 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="6653960d0ec5d684fa9f017ef0d60a3c27bc33760036001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479810be2aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e6517e615607676f8f9fc0ebf8b0b16d6f2c59957ab35d05692e664ebf68734ca53366295f4ad6142134b62f11e92ead037c7fb53455560c8ef0f1c94fafa924edfe92175aaa1c4ecc7aeeb72e0d050feacee907f40888c96a65545e07422bc6ac79f4c2d6ee3dab47d06e764682c72d7f16542fcfd05d2813cc182d1595016c179e1717c160300ab1ab0ac397e91bd193c036feb66a9ad2ec", 0xe9}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x19) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 18:09:19 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) write$uinput_user_dev(r2, &(0x7f0000000480)={'syz0\x00', {}, 0x0, [0x4, 0x631, 0xaf, 0x2, 0x1b, 0x1, 0x10001, 0x1, 0x8, 0x3ff, 0x800, 0x7859, 0x7, 0x5, 0x7fff, 0xc05, 0xa4, 0x3, 0x4, 0xfffff800, 0x6, 0x7c, 0x6, 0xff, 0x2, 0x771, 0x5, 0xfffffff8, 0x81, 0x0, 0x6, 0x7, 0x6, 0x9, 0x3, 0x0, 0x282d298e, 0x7, 0x6, 0x3, 0xfaf9, 0x7], [0x0, 0x7ff, 0x1f, 0x1, 0x7, 0x2, 0x6, 0xd594, 0x3, 0x2a, 0x1c9b4fd4, 0x0, 0xfff, 0x5, 0xfffff801, 0x9, 0x3f, 0x8, 0x80, 0x6, 0x401, 0x8000, 0x1, 0xcb, 0x1, 0x6, 0x4, 0x92, 0x800000, 0x7, 0x1f, 0x140, 0x7ff, 0xabbc, 0x401, 0x0, 0x3, 0x20, 0x48, 0x12000, 0xfa, 0x1, 0xfffff6fe, 0x0, 0x7, 0x8818, 0x8000, 0x6, 0x1f, 0x8, 0x4, 0xff, 0x101, 0xd7, 0x8, 0x5, 0xffff8001, 0x5, 0xb621, 0x1, 0x9, 0x1395db38, 0x0, 0x3], [0x6, 0x6, 0x401, 0x2d5, 0xc08, 0x3, 0x7f, 0x7, 0x8, 0x4, 0xbe1a, 0x5, 0x3, 0x93c, 0x9, 0x80, 0x800, 0x7fff, 0x6, 0x1, 0x5, 0x2, 0x9, 0x7fff, 0x0, 0x8000, 0x4, 0x6, 0x2, 0x4, 0x6, 0xa2ec, 0x7, 0x100, 0x1, 0x3, 0x1f, 0x81, 0x10000, 0xc5, 0x7ff, 0x2aae236d, 0x4, 0x2000, 0x1c, 0x3, 0x2, 0x735c, 0x7fffffff, 0x6, 0xfffffffd, 0x4, 0x3ff, 0x7fffffff, 0x8, 0x224, 0x261, 0x8b8a, 0x100, 0xffffffff, 0x7fff, 0x41, 0x401, 0x200], [0x7, 0x4, 0x2, 0x5, 0x7, 0x1, 0x8, 0x0, 0x8, 0xffffff7b, 0x0, 0x5, 0x6, 0xcc9, 0x1, 0x5, 0x2, 0xfffffffe, 0xfffffff9, 0x0, 0x5, 0x101, 0x401, 0x2, 0x3, 0x3, 0x7f76, 0x3ff, 0x9, 0xc14, 0x3, 0x7, 0x5, 0x100, 0x6, 0x8, 0x2, 0xe0, 0x3f, 0x200, 0x3, 0x9, 0x3, 0x5, 0x95c6, 0x2, 0x6, 0x20, 0x3, 0x8, 0x9, 0x7, 0x9, 0x0, 0xffffd671, 0x1, 0x0, 0x853d, 0x7, 0x3ff, 0x0, 0xfde7, 0x1, 0x5]}, 0x45c) 18:09:19 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff000000000000}]}, 0x78) 18:09:19 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000480)={'syz0\x00', {}, 0x0, [0x4, 0x631, 0xaf, 0x2, 0x1b, 0x1, 0x10001, 0x1, 0x8, 0x3ff, 0x800, 0x7859, 0x7, 0x5, 0x7fff, 0xc05, 0xa4, 0x3, 0x4, 0xfffff800, 0x6, 0x7c, 0x6, 0xff, 0x2, 0x771, 0x5, 0xfffffff8, 0x81, 0x0, 0x6, 0x7, 0x6, 0x9, 0x3, 0x0, 0x282d298e, 0x7, 0x6, 0x3, 0xfaf9, 0x7, 0x2, 0xf9, 0xc2, 0x0, 0x8, 0x8, 0x9], [0x0, 0x7ff, 0x1f, 0x1, 0x7, 0x2, 0x6, 0xd594, 0x3, 0x2a, 0x1c9b4fd4, 0x0, 0xfff, 0x5, 0xfffff801, 0x9, 0x3f, 0x8, 0x80, 0x6, 0x401, 0x8000, 0x1, 0xcb, 0x1, 0x6, 0x4, 0x92, 0x800000, 0x7, 0x1f, 0x140, 0x7ff, 0xabbc, 0x401, 0x0, 0x3, 0x20, 0x48, 0x12000, 0xfa, 0x1, 0xfffff6fe, 0x0, 0x7, 0x8818, 0x8000, 0x6, 0x1f, 0x8, 0x4, 0xff, 0x101, 0xd7, 0x8, 0x5, 0xffff8001, 0x5, 0xb621, 0x1, 0x9, 0x1395db38, 0x0, 0x3], [0x6, 0x6, 0x401, 0x2d5, 0xc08, 0x3, 0x7f, 0x7, 0x8, 0x4, 0xbe1a, 0x5, 0x3, 0x93c, 0x9, 0x80, 0x800, 0x7fff, 0x6, 0x1, 0x5, 0x2, 0x9, 0x7fff, 0x0, 0x8000, 0x4, 0x6, 0x2, 0x4, 0x6, 0xa2ec, 0x7, 0x100, 0x1, 0x3, 0x1f, 0x81, 0x10000, 0xc5, 0x7ff, 0x2aae236d, 0x4, 0x2000, 0x1c, 0x3, 0x2, 0x735c, 0x7fffffff, 0x6, 0xfffffffd, 0x4, 0x3ff, 0x7fffffff, 0x8, 0x224, 0x261, 0x8b8a, 0x100, 0xffffffff, 0x7fff, 0x41, 0x401, 0x200], [0x7, 0x4, 0x2, 0x5, 0x7, 0x1, 0x8, 0x0, 0x8, 0xffffff7b, 0x0, 0x5, 0x6, 0xcc9, 0x1, 0x5, 0x2, 0xfffffffe, 0xfffffff9, 0x0, 0x5, 0x101, 0x401, 0x2, 0x3, 0x3, 0x7f76, 0x3ff, 0x9, 0xc14, 0x3, 0x7, 0x5, 0x100, 0x6, 0x8, 0x2, 0xe0, 0x3f, 0x200, 0x3, 0x9, 0x3, 0x5, 0x95c6, 0x2, 0x6, 0x20, 0x3, 0x8, 0x9, 0x7, 0x9, 0x0, 0xffffd671, 0x1, 0x0, 0x853d, 0x7, 0x3ff, 0x0, 0xfde7, 0x1, 0x5]}, 0x45c) 18:09:20 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r0, &(0x7f0000000040)=""/244, 0xf4) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f0000000100)="6653960d0ec5d684fa9f017ef0d60a3c27bc33760036001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479810be2aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e6517e615607676f8f9fc0ebf8b0b16d6f2c59957ab35d05692e664ebf68734ca53366295f4ad6142134b62f11e92ead037c7fb53455560c8ef0f1c94fafa924edfe92175aaa1c4ecc7aeeb72e0d050feacee907f40888c96a65545e07422bc6ac79f4c2d6ee3dab47d06e764682c72d7f16542fcfd05d2813cc182d1595016c179e1717c160300ab1ab0ac397e91bd193c036feb66a9ad2ec5b7967e7f5ff957f8b085a2437c5", 0xf7}], 0x3, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x19) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 18:09:20 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68}, [{0x0, 0x0, 0x0, 0x0, 0x9b000000}]}, 0x78) 18:09:20 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) write$uinput_user_dev(r2, &(0x7f0000000480)={'syz0\x00', {}, 0x0, [0x4, 0x631, 0xaf, 0x2, 0x1b, 0x1, 0x10001, 0x1, 0x8, 0x3ff, 0x800, 0x7859, 0x7, 0x5, 0x7fff, 0xc05, 0xa4, 0x3, 0x4, 0xfffff800, 0x6, 0x7c, 0x6, 0xff, 0x2, 0x771, 0x5, 0xfffffff8, 0x81, 0x0, 0x6, 0x7, 0x6, 0x9, 0x3, 0x0, 0x282d298e, 0x7, 0x6, 0x3, 0xfaf9], [0x0, 0x7ff, 0x1f, 0x1, 0x7, 0x2, 0x6, 0xd594, 0x3, 0x2a, 0x1c9b4fd4, 0x0, 0xfff, 0x5, 0xfffff801, 0x9, 0x3f, 0x8, 0x80, 0x6, 0x401, 0x8000, 0x1, 0xcb, 0x1, 0x6, 0x4, 0x92, 0x800000, 0x7, 0x1f, 0x140, 0x7ff, 0xabbc, 0x401, 0x0, 0x3, 0x20, 0x48, 0x12000, 0xfa, 0x1, 0xfffff6fe, 0x0, 0x7, 0x8818, 0x8000, 0x6, 0x1f, 0x8, 0x4, 0xff, 0x101, 0xd7, 0x8, 0x5, 0xffff8001, 0x5, 0xb621, 0x1, 0x9, 0x1395db38, 0x0, 0x3], [0x6, 0x6, 0x401, 0x2d5, 0xc08, 0x3, 0x7f, 0x7, 0x8, 0x4, 0xbe1a, 0x5, 0x3, 0x93c, 0x9, 0x80, 0x800, 0x7fff, 0x6, 0x1, 0x5, 0x2, 0x9, 0x7fff, 0x0, 0x8000, 0x4, 0x6, 0x2, 0x4, 0x6, 0xa2ec, 0x7, 0x100, 0x1, 0x3, 0x1f, 0x81, 0x10000, 0xc5, 0x7ff, 0x2aae236d, 0x4, 0x2000, 0x1c, 0x3, 0x2, 0x735c, 0x7fffffff, 0x6, 0xfffffffd, 0x4, 0x3ff, 0x7fffffff, 0x8, 0x224, 0x261, 0x8b8a, 0x100, 0xffffffff, 0x7fff, 0x41, 0x401, 0x200], [0x7, 0x4, 0x2, 0x5, 0x7, 0x1, 0x8, 0x0, 0x8, 0xffffff7b, 0x0, 0x5, 0x6, 0xcc9, 0x1, 0x5, 0x2, 0xfffffffe, 0xfffffff9, 0x0, 0x5, 0x101, 0x401, 0x2, 0x3, 0x3, 0x7f76, 0x3ff, 0x9, 0xc14, 0x3, 0x7, 0x5, 0x100, 0x6, 0x8, 0x2, 0xe0, 0x3f, 0x200, 0x3, 0x9, 0x3, 0x5, 0x95c6, 0x2, 0x6, 0x20, 0x3, 0x8, 0x9, 0x7, 0x9, 0x0, 0xffffd671, 0x1, 0x0, 0x853d, 0x7, 0x3ff, 0x0, 0xfde7, 0x1, 0x5]}, 0x45c) 18:09:20 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) write$uinput_user_dev(r1, &(0x7f0000000480)={'syz0\x00', {}, 0x0, [0x4, 0x631, 0xaf, 0x2, 0x1b, 0x1, 0x10001, 0x1, 0x8, 0x3ff, 0x800, 0x7859, 0x7, 0x5, 0x7fff, 0xc05, 0xa4, 0x3, 0x4, 0xfffff800, 0x6, 0x7c, 0x6, 0xff, 0x2, 0x771, 0x5, 0xfffffff8, 0x81, 0x0, 0x6, 0x7, 0x6, 0x9, 0x3, 0x0, 0x282d298e, 0x7, 0x6, 0x3, 0xfaf9, 0x7, 0x2, 0xf9, 0xc2, 0x0, 0x8, 0x8, 0x9], [0x0, 0x7ff, 0x1f, 0x1, 0x7, 0x2, 0x6, 0xd594, 0x3, 0x2a, 0x1c9b4fd4, 0x0, 0xfff, 0x5, 0xfffff801, 0x9, 0x3f, 0x8, 0x80, 0x6, 0x401, 0x8000, 0x1, 0xcb, 0x1, 0x6, 0x4, 0x92, 0x800000, 0x7, 0x1f, 0x140, 0x7ff, 0xabbc, 0x401, 0x0, 0x3, 0x20, 0x48, 0x12000, 0xfa, 0x1, 0xfffff6fe, 0x0, 0x7, 0x8818, 0x8000, 0x6, 0x1f, 0x8, 0x4, 0xff, 0x101, 0xd7, 0x8, 0x5, 0xffff8001, 0x5, 0xb621, 0x1, 0x9, 0x1395db38, 0x0, 0x3], [0x6, 0x6, 0x401, 0x2d5, 0xc08, 0x3, 0x7f, 0x7, 0x8, 0x4, 0xbe1a, 0x5, 0x3, 0x93c, 0x9, 0x80, 0x800, 0x7fff, 0x6, 0x1, 0x5, 0x2, 0x9, 0x7fff, 0x0, 0x8000, 0x4, 0x6, 0x2, 0x4, 0x6, 0xa2ec, 0x7, 0x100, 0x1, 0x3, 0x1f, 0x81, 0x10000, 0xc5, 0x7ff, 0x2aae236d, 0x4, 0x2000, 0x1c, 0x3, 0x2, 0x735c, 0x7fffffff, 0x6, 0xfffffffd, 0x4, 0x3ff, 0x7fffffff, 0x8, 0x224, 0x261, 0x8b8a, 0x100, 0xffffffff, 0x7fff, 0x41, 0x401, 0x200], [0x7, 0x4, 0x2, 0x5, 0x7, 0x1, 0x8, 0x0, 0x8, 0xffffff7b, 0x0, 0x5, 0x6, 0xcc9, 0x1, 0x5, 0x2, 0xfffffffe, 0xfffffff9, 0x0, 0x5, 0x101, 0x401, 0x2, 0x3, 0x3, 0x7f76, 0x3ff, 0x9, 0xc14, 0x3, 0x7, 0x5, 0x100, 0x6, 0x8, 0x2, 0xe0, 0x3f, 0x200, 0x3, 0x9, 0x3, 0x5, 0x95c6, 0x2, 0x6, 0x20, 0x3, 0x8, 0x9, 0x7, 0x9, 0x0, 0xffffd671, 0x1, 0x0, 0x853d, 0x7, 0x3ff, 0x0, 0xfde7, 0x1, 0x5]}, 0x45c) 18:09:20 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63}, [{}]}, 0x2) 18:09:20 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63}, [{}]}, 0x3) 18:09:20 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) write$uinput_user_dev(r1, &(0x7f0000000480)={'syz0\x00', {}, 0x0, [0x4, 0x631, 0xaf, 0x2, 0x1b, 0x1, 0x10001, 0x1, 0x8, 0x3ff, 0x800, 0x7859, 0x7, 0x5, 0x7fff, 0xc05, 0xa4, 0x3, 0x4, 0xfffff800, 0x6, 0x7c, 0x6, 0xff, 0x2, 0x771, 0x5, 0xfffffff8, 0x81, 0x0, 0x6, 0x7, 0x6, 0x9, 0x3, 0x0, 0x282d298e, 0x7, 0x6, 0x3, 0xfaf9, 0x7, 0x2, 0xf9, 0xc2, 0x0, 0x8, 0x8, 0x9], [0x0, 0x7ff, 0x1f, 0x1, 0x7, 0x2, 0x6, 0xd594, 0x3, 0x2a, 0x1c9b4fd4, 0x0, 0xfff, 0x5, 0xfffff801, 0x9, 0x3f, 0x8, 0x80, 0x6, 0x401, 0x8000, 0x1, 0xcb, 0x1, 0x6, 0x4, 0x92, 0x800000, 0x7, 0x1f, 0x140, 0x7ff, 0xabbc, 0x401, 0x0, 0x3, 0x20, 0x48, 0x12000, 0xfa, 0x1, 0xfffff6fe, 0x0, 0x7, 0x8818, 0x8000, 0x6, 0x1f, 0x8, 0x4, 0xff, 0x101, 0xd7, 0x8, 0x5, 0xffff8001, 0x5, 0xb621, 0x1, 0x9, 0x1395db38, 0x0, 0x3], [0x6, 0x6, 0x401, 0x2d5, 0xc08, 0x3, 0x7f, 0x7, 0x8, 0x4, 0xbe1a, 0x5, 0x3, 0x93c, 0x9, 0x80, 0x800, 0x7fff, 0x6, 0x1, 0x5, 0x2, 0x9, 0x7fff, 0x0, 0x8000, 0x4, 0x6, 0x2, 0x4, 0x6, 0xa2ec, 0x7, 0x100, 0x1, 0x3, 0x1f, 0x81, 0x10000, 0xc5, 0x7ff, 0x2aae236d, 0x4, 0x2000, 0x1c, 0x3, 0x2, 0x735c, 0x7fffffff, 0x6, 0xfffffffd, 0x4, 0x3ff, 0x7fffffff, 0x8, 0x224, 0x261, 0x8b8a, 0x100, 0xffffffff, 0x7fff, 0x41, 0x401, 0x200], [0x7, 0x4, 0x2, 0x5, 0x7, 0x1, 0x8, 0x0, 0x8, 0xffffff7b, 0x0, 0x5, 0x6, 0xcc9, 0x1, 0x5, 0x2, 0xfffffffe, 0xfffffff9, 0x0, 0x5, 0x101, 0x401, 0x2, 0x3, 0x3, 0x7f76, 0x3ff, 0x9, 0xc14, 0x3, 0x7, 0x5, 0x100, 0x6, 0x8, 0x2, 0xe0, 0x3f, 0x200, 0x3, 0x9, 0x3, 0x5, 0x95c6, 0x2, 0x6, 0x20, 0x3, 0x8, 0x9, 0x7, 0x9, 0x0, 0xffffd671, 0x1, 0x0, 0x853d, 0x7, 0x3ff, 0x0, 0xfde7, 0x1, 0x5]}, 0x45c) 18:09:20 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) write$uinput_user_dev(r2, &(0x7f0000000480)={'syz0\x00', {}, 0x0, [0x4, 0x631, 0xaf, 0x2, 0x1b, 0x1, 0x10001, 0x1, 0x8, 0x3ff, 0x800, 0x7859, 0x7, 0x5, 0x7fff, 0xc05, 0xa4, 0x3, 0x4, 0xfffff800, 0x6, 0x7c, 0x6, 0xff, 0x2, 0x771, 0x5, 0xfffffff8, 0x81, 0x0, 0x6, 0x7, 0x6, 0x9, 0x3, 0x0, 0x282d298e, 0x7, 0x6, 0x3], [0x0, 0x7ff, 0x1f, 0x1, 0x7, 0x2, 0x6, 0xd594, 0x3, 0x2a, 0x1c9b4fd4, 0x0, 0xfff, 0x5, 0xfffff801, 0x9, 0x3f, 0x8, 0x80, 0x6, 0x401, 0x8000, 0x1, 0xcb, 0x1, 0x6, 0x4, 0x92, 0x800000, 0x7, 0x1f, 0x140, 0x7ff, 0xabbc, 0x401, 0x0, 0x3, 0x20, 0x48, 0x12000, 0xfa, 0x1, 0xfffff6fe, 0x0, 0x7, 0x8818, 0x8000, 0x6, 0x1f, 0x8, 0x4, 0xff, 0x101, 0xd7, 0x8, 0x5, 0xffff8001, 0x5, 0xb621, 0x1, 0x9, 0x1395db38, 0x0, 0x3], [0x6, 0x6, 0x401, 0x2d5, 0xc08, 0x3, 0x7f, 0x7, 0x8, 0x4, 0xbe1a, 0x5, 0x3, 0x93c, 0x9, 0x80, 0x800, 0x7fff, 0x6, 0x1, 0x5, 0x2, 0x9, 0x7fff, 0x0, 0x8000, 0x4, 0x6, 0x2, 0x4, 0x6, 0xa2ec, 0x7, 0x100, 0x1, 0x3, 0x1f, 0x81, 0x10000, 0xc5, 0x7ff, 0x2aae236d, 0x4, 0x2000, 0x1c, 0x3, 0x2, 0x735c, 0x7fffffff, 0x6, 0xfffffffd, 0x4, 0x3ff, 0x7fffffff, 0x8, 0x224, 0x261, 0x8b8a, 0x100, 0xffffffff, 0x7fff, 0x41, 0x401, 0x200], [0x7, 0x4, 0x2, 0x5, 0x7, 0x1, 0x8, 0x0, 0x8, 0xffffff7b, 0x0, 0x5, 0x6, 0xcc9, 0x1, 0x5, 0x2, 0xfffffffe, 0xfffffff9, 0x0, 0x5, 0x101, 0x401, 0x2, 0x3, 0x3, 0x7f76, 0x3ff, 0x9, 0xc14, 0x3, 0x7, 0x5, 0x100, 0x6, 0x8, 0x2, 0xe0, 0x3f, 0x200, 0x3, 0x9, 0x3, 0x5, 0x95c6, 0x2, 0x6, 0x20, 0x3, 0x8, 0x9, 0x7, 0x9, 0x0, 0xffffd671, 0x1, 0x0, 0x853d, 0x7, 0x3ff, 0x0, 0xfde7, 0x1, 0x5]}, 0x45c) 18:09:22 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="6653960d0ec5d684fa9f017ef0d60a3c27bc33760036001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479810be2aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e6517e615607676f8f9fc0ebf8b0b16d6f2c59957ab35d05692e664ebf68734ca53366295f4ad6142134b62f11e92ead037c7fb53455560c8ef0f1c94fafa924edfe92175aaa1c4ecc7aeeb72e0d050feacee907f40888c96a65545e07422bc6ac79f4c2d6ee3dab47d06e764682c72d7f16542fcfd05d2813cc182d1595016c179e1717c160300ab1ab0ac397e91bd193c036feb66a9ad2ec5b7967e7f5ff957f", 0xf1}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x19) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 18:09:22 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68}, [{0x0, 0x0, 0x0, 0x0, 0xe8030000}]}, 0x78) 18:09:22 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) write$uinput_user_dev(r1, &(0x7f0000000480)={'syz0\x00', {}, 0x0, [0x4, 0x631, 0xaf, 0x2, 0x1b, 0x1, 0x10001, 0x1, 0x8, 0x3ff, 0x800, 0x7859, 0x7, 0x5, 0x7fff, 0xc05, 0xa4, 0x3, 0x4, 0xfffff800, 0x6, 0x7c, 0x6, 0xff, 0x2, 0x771, 0x5, 0xfffffff8, 0x81, 0x0, 0x6, 0x7, 0x6, 0x9, 0x3, 0x0, 0x282d298e, 0x7, 0x6, 0x3, 0xfaf9, 0x7, 0x2, 0xf9, 0xc2, 0x0, 0x8, 0x8, 0x9], [0x0, 0x7ff, 0x1f, 0x1, 0x7, 0x2, 0x6, 0xd594, 0x3, 0x2a, 0x1c9b4fd4, 0x0, 0xfff, 0x5, 0xfffff801, 0x9, 0x3f, 0x8, 0x80, 0x6, 0x401, 0x8000, 0x1, 0xcb, 0x1, 0x6, 0x4, 0x92, 0x800000, 0x7, 0x1f, 0x140, 0x7ff, 0xabbc, 0x401, 0x0, 0x3, 0x20, 0x48, 0x12000, 0xfa, 0x1, 0xfffff6fe, 0x0, 0x7, 0x8818, 0x8000, 0x6, 0x1f, 0x8, 0x4, 0xff, 0x101, 0xd7, 0x8, 0x5, 0xffff8001, 0x5, 0xb621, 0x1, 0x9, 0x1395db38, 0x0, 0x3], [0x6, 0x6, 0x401, 0x2d5, 0xc08, 0x3, 0x7f, 0x7, 0x8, 0x4, 0xbe1a, 0x5, 0x3, 0x93c, 0x9, 0x80, 0x800, 0x7fff, 0x6, 0x1, 0x5, 0x2, 0x9, 0x7fff, 0x0, 0x8000, 0x4, 0x6, 0x2, 0x4, 0x6, 0xa2ec, 0x7, 0x100, 0x1, 0x3, 0x1f, 0x81, 0x10000, 0xc5, 0x7ff, 0x2aae236d, 0x4, 0x2000, 0x1c, 0x3, 0x2, 0x735c, 0x7fffffff, 0x6, 0xfffffffd, 0x4, 0x3ff, 0x7fffffff, 0x8, 0x224, 0x261, 0x8b8a, 0x100, 0xffffffff, 0x7fff, 0x41, 0x401, 0x200], [0x7, 0x4, 0x2, 0x5, 0x7, 0x1, 0x8, 0x0, 0x8, 0xffffff7b, 0x0, 0x5, 0x6, 0xcc9, 0x1, 0x5, 0x2, 0xfffffffe, 0xfffffff9, 0x0, 0x5, 0x101, 0x401, 0x2, 0x3, 0x3, 0x7f76, 0x3ff, 0x9, 0xc14, 0x3, 0x7, 0x5, 0x100, 0x6, 0x8, 0x2, 0xe0, 0x3f, 0x200, 0x3, 0x9, 0x3, 0x5, 0x95c6, 0x2, 0x6, 0x20, 0x3, 0x8, 0x9, 0x7, 0x9, 0x0, 0xffffd671, 0x1, 0x0, 0x853d, 0x7, 0x3ff, 0x0, 0xfde7, 0x1, 0x5]}, 0x45c) 18:09:22 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63}, [{}]}, 0x4) 18:09:23 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r0, &(0x7f0000000040)=""/244, 0xf4) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f0000000100)="6653960d0ec5d684fa9f017ef0d60a3c27bc33760036001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479810be2aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e6517e615607676f8f9fc0ebf8b0b16d6f2c59957ab35d05692e664ebf68734ca53366295f4ad6142134b62f11e92ead037c7fb53455560c8ef0f1c94fafa924edfe92175aaa1c4ecc7aeeb72e0d050feacee907f40888c96a65545e07422bc6ac79f4c2d6ee3dab47d06e764682c72d7f16542fcfd05d2813cc182d1595016c179e1717c160300ab1ab0ac397e91bd193c036feb66a9ad2ec5b7967e7f5ff957f8b085a2437c5", 0xf7}], 0x3, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x19) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 18:09:23 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) write$uinput_user_dev(r2, &(0x7f0000000480)={'syz0\x00', {}, 0x0, [0x4, 0x631, 0xaf, 0x2, 0x1b, 0x1, 0x10001, 0x1, 0x8, 0x3ff, 0x800, 0x7859, 0x7, 0x5, 0x7fff, 0xc05, 0xa4, 0x3, 0x4, 0xfffff800, 0x6, 0x7c, 0x6, 0xff, 0x2, 0x771, 0x5, 0xfffffff8, 0x81, 0x0, 0x6, 0x7, 0x6, 0x9, 0x3, 0x0, 0x282d298e, 0x7, 0x6], [0x0, 0x7ff, 0x1f, 0x1, 0x7, 0x2, 0x6, 0xd594, 0x3, 0x2a, 0x1c9b4fd4, 0x0, 0xfff, 0x5, 0xfffff801, 0x9, 0x3f, 0x8, 0x80, 0x6, 0x401, 0x8000, 0x1, 0xcb, 0x1, 0x6, 0x4, 0x92, 0x800000, 0x7, 0x1f, 0x140, 0x7ff, 0xabbc, 0x401, 0x0, 0x3, 0x20, 0x48, 0x12000, 0xfa, 0x1, 0xfffff6fe, 0x0, 0x7, 0x8818, 0x8000, 0x6, 0x1f, 0x8, 0x4, 0xff, 0x101, 0xd7, 0x8, 0x5, 0xffff8001, 0x5, 0xb621, 0x1, 0x9, 0x1395db38, 0x0, 0x3], [0x6, 0x6, 0x401, 0x2d5, 0xc08, 0x3, 0x7f, 0x7, 0x8, 0x4, 0xbe1a, 0x5, 0x3, 0x93c, 0x9, 0x80, 0x800, 0x7fff, 0x6, 0x1, 0x5, 0x2, 0x9, 0x7fff, 0x0, 0x8000, 0x4, 0x6, 0x2, 0x4, 0x6, 0xa2ec, 0x7, 0x100, 0x1, 0x3, 0x1f, 0x81, 0x10000, 0xc5, 0x7ff, 0x2aae236d, 0x4, 0x2000, 0x1c, 0x3, 0x2, 0x735c, 0x7fffffff, 0x6, 0xfffffffd, 0x4, 0x3ff, 0x7fffffff, 0x8, 0x224, 0x261, 0x8b8a, 0x100, 0xffffffff, 0x7fff, 0x41, 0x401, 0x200], [0x7, 0x4, 0x2, 0x5, 0x7, 0x1, 0x8, 0x0, 0x8, 0xffffff7b, 0x0, 0x5, 0x6, 0xcc9, 0x1, 0x5, 0x2, 0xfffffffe, 0xfffffff9, 0x0, 0x5, 0x101, 0x401, 0x2, 0x3, 0x3, 0x7f76, 0x3ff, 0x9, 0xc14, 0x3, 0x7, 0x5, 0x100, 0x6, 0x8, 0x2, 0xe0, 0x3f, 0x200, 0x3, 0x9, 0x3, 0x5, 0x95c6, 0x2, 0x6, 0x20, 0x3, 0x8, 0x9, 0x7, 0x9, 0x0, 0xffffd671, 0x1, 0x0, 0x853d, 0x7, 0x3ff, 0x0, 0xfde7, 0x1, 0x5]}, 0x45c) 18:09:23 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63}, [{}]}, 0x5) 18:09:23 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68}, [{0x0, 0x0, 0x0, 0x0, 0xffff0000}]}, 0x78) 18:09:23 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) write$uinput_user_dev(r0, &(0x7f0000000480)={'syz0\x00', {}, 0x0, [0x4, 0x631, 0xaf, 0x2, 0x1b, 0x1, 0x10001, 0x1, 0x8, 0x3ff, 0x800, 0x7859, 0x7, 0x5, 0x7fff, 0xc05, 0xa4, 0x3, 0x4, 0xfffff800, 0x6, 0x7c, 0x6, 0xff, 0x2, 0x771, 0x5, 0xfffffff8, 0x81, 0x0, 0x6, 0x7, 0x6, 0x9, 0x3, 0x0, 0x282d298e, 0x7, 0x6, 0x3, 0xfaf9, 0x7, 0x2, 0xf9, 0xc2, 0x0, 0x8, 0x8, 0x9], [0x0, 0x7ff, 0x1f, 0x1, 0x7, 0x2, 0x6, 0xd594, 0x3, 0x2a, 0x1c9b4fd4, 0x0, 0xfff, 0x5, 0xfffff801, 0x9, 0x3f, 0x8, 0x80, 0x6, 0x401, 0x8000, 0x1, 0xcb, 0x1, 0x6, 0x4, 0x92, 0x800000, 0x7, 0x1f, 0x140, 0x7ff, 0xabbc, 0x401, 0x0, 0x3, 0x20, 0x48, 0x12000, 0xfa, 0x1, 0xfffff6fe, 0x0, 0x7, 0x8818, 0x8000, 0x6, 0x1f, 0x8, 0x4, 0xff, 0x101, 0xd7, 0x8, 0x5, 0xffff8001, 0x5, 0xb621, 0x1, 0x9, 0x1395db38, 0x0, 0x3], [0x6, 0x6, 0x401, 0x2d5, 0xc08, 0x3, 0x7f, 0x7, 0x8, 0x4, 0xbe1a, 0x5, 0x3, 0x93c, 0x9, 0x80, 0x800, 0x7fff, 0x6, 0x1, 0x5, 0x2, 0x9, 0x7fff, 0x0, 0x8000, 0x4, 0x6, 0x2, 0x4, 0x6, 0xa2ec, 0x7, 0x100, 0x1, 0x3, 0x1f, 0x81, 0x10000, 0xc5, 0x7ff, 0x2aae236d, 0x4, 0x2000, 0x1c, 0x3, 0x2, 0x735c, 0x7fffffff, 0x6, 0xfffffffd, 0x4, 0x3ff, 0x7fffffff, 0x8, 0x224, 0x261, 0x8b8a, 0x100, 0xffffffff, 0x7fff, 0x41, 0x401, 0x200], [0x7, 0x4, 0x2, 0x5, 0x7, 0x1, 0x8, 0x0, 0x8, 0xffffff7b, 0x0, 0x5, 0x6, 0xcc9, 0x1, 0x5, 0x2, 0xfffffffe, 0xfffffff9, 0x0, 0x5, 0x101, 0x401, 0x2, 0x3, 0x3, 0x7f76, 0x3ff, 0x9, 0xc14, 0x3, 0x7, 0x5, 0x100, 0x6, 0x8, 0x2, 0xe0, 0x3f, 0x200, 0x3, 0x9, 0x3, 0x5, 0x95c6, 0x2, 0x6, 0x20, 0x3, 0x8, 0x9, 0x7, 0x9, 0x0, 0xffffd671, 0x1, 0x0, 0x853d, 0x7, 0x3ff, 0x0, 0xfde7, 0x1, 0x5]}, 0x45c) 18:09:23 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68}, [{0x0, 0x0, 0x0, 0x0, 0xffffff80}]}, 0x78) 18:09:23 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) write$uinput_user_dev(r2, &(0x7f0000000480)={'syz0\x00', {}, 0x0, [0x4, 0x631, 0xaf, 0x2, 0x1b, 0x1, 0x10001, 0x1, 0x8, 0x3ff, 0x800, 0x7859, 0x7, 0x5, 0x7fff, 0xc05, 0xa4, 0x3, 0x4, 0xfffff800, 0x6, 0x7c, 0x6, 0xff, 0x2, 0x771, 0x5, 0xfffffff8, 0x81, 0x0, 0x6, 0x7, 0x6, 0x9, 0x3, 0x0, 0x282d298e, 0x7], [0x0, 0x7ff, 0x1f, 0x1, 0x7, 0x2, 0x6, 0xd594, 0x3, 0x2a, 0x1c9b4fd4, 0x0, 0xfff, 0x5, 0xfffff801, 0x9, 0x3f, 0x8, 0x80, 0x6, 0x401, 0x8000, 0x1, 0xcb, 0x1, 0x6, 0x4, 0x92, 0x800000, 0x7, 0x1f, 0x140, 0x7ff, 0xabbc, 0x401, 0x0, 0x3, 0x20, 0x48, 0x12000, 0xfa, 0x1, 0xfffff6fe, 0x0, 0x7, 0x8818, 0x8000, 0x6, 0x1f, 0x8, 0x4, 0xff, 0x101, 0xd7, 0x8, 0x5, 0xffff8001, 0x5, 0xb621, 0x1, 0x9, 0x1395db38, 0x0, 0x3], [0x6, 0x6, 0x401, 0x2d5, 0xc08, 0x3, 0x7f, 0x7, 0x8, 0x4, 0xbe1a, 0x5, 0x3, 0x93c, 0x9, 0x80, 0x800, 0x7fff, 0x6, 0x1, 0x5, 0x2, 0x9, 0x7fff, 0x0, 0x8000, 0x4, 0x6, 0x2, 0x4, 0x6, 0xa2ec, 0x7, 0x100, 0x1, 0x3, 0x1f, 0x81, 0x10000, 0xc5, 0x7ff, 0x2aae236d, 0x4, 0x2000, 0x1c, 0x3, 0x2, 0x735c, 0x7fffffff, 0x6, 0xfffffffd, 0x4, 0x3ff, 0x7fffffff, 0x8, 0x224, 0x261, 0x8b8a, 0x100, 0xffffffff, 0x7fff, 0x41, 0x401, 0x200], [0x7, 0x4, 0x2, 0x5, 0x7, 0x1, 0x8, 0x0, 0x8, 0xffffff7b, 0x0, 0x5, 0x6, 0xcc9, 0x1, 0x5, 0x2, 0xfffffffe, 0xfffffff9, 0x0, 0x5, 0x101, 0x401, 0x2, 0x3, 0x3, 0x7f76, 0x3ff, 0x9, 0xc14, 0x3, 0x7, 0x5, 0x100, 0x6, 0x8, 0x2, 0xe0, 0x3f, 0x200, 0x3, 0x9, 0x3, 0x5, 0x95c6, 0x2, 0x6, 0x20, 0x3, 0x8, 0x9, 0x7, 0x9, 0x0, 0xffffd671, 0x1, 0x0, 0x853d, 0x7, 0x3ff, 0x0, 0xfde7, 0x1, 0x5]}, 0x45c) 18:09:23 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) write$uinput_user_dev(r0, &(0x7f0000000480)={'syz0\x00', {}, 0x0, [0x4, 0x631, 0xaf, 0x2, 0x1b, 0x1, 0x10001, 0x1, 0x8, 0x3ff, 0x800, 0x7859, 0x7, 0x5, 0x7fff, 0xc05, 0xa4, 0x3, 0x4, 0xfffff800, 0x6, 0x7c, 0x6, 0xff, 0x2, 0x771, 0x5, 0xfffffff8, 0x81, 0x0, 0x6, 0x7, 0x6, 0x9, 0x3, 0x0, 0x282d298e, 0x7, 0x6, 0x3, 0xfaf9, 0x7, 0x2, 0xf9, 0xc2, 0x0, 0x8, 0x8, 0x9], [0x0, 0x7ff, 0x1f, 0x1, 0x7, 0x2, 0x6, 0xd594, 0x3, 0x2a, 0x1c9b4fd4, 0x0, 0xfff, 0x5, 0xfffff801, 0x9, 0x3f, 0x8, 0x80, 0x6, 0x401, 0x8000, 0x1, 0xcb, 0x1, 0x6, 0x4, 0x92, 0x800000, 0x7, 0x1f, 0x140, 0x7ff, 0xabbc, 0x401, 0x0, 0x3, 0x20, 0x48, 0x12000, 0xfa, 0x1, 0xfffff6fe, 0x0, 0x7, 0x8818, 0x8000, 0x6, 0x1f, 0x8, 0x4, 0xff, 0x101, 0xd7, 0x8, 0x5, 0xffff8001, 0x5, 0xb621, 0x1, 0x9, 0x1395db38, 0x0, 0x3], [0x6, 0x6, 0x401, 0x2d5, 0xc08, 0x3, 0x7f, 0x7, 0x8, 0x4, 0xbe1a, 0x5, 0x3, 0x93c, 0x9, 0x80, 0x800, 0x7fff, 0x6, 0x1, 0x5, 0x2, 0x9, 0x7fff, 0x0, 0x8000, 0x4, 0x6, 0x2, 0x4, 0x6, 0xa2ec, 0x7, 0x100, 0x1, 0x3, 0x1f, 0x81, 0x10000, 0xc5, 0x7ff, 0x2aae236d, 0x4, 0x2000, 0x1c, 0x3, 0x2, 0x735c, 0x7fffffff, 0x6, 0xfffffffd, 0x4, 0x3ff, 0x7fffffff, 0x8, 0x224, 0x261, 0x8b8a, 0x100, 0xffffffff, 0x7fff, 0x41, 0x401, 0x200], [0x7, 0x4, 0x2, 0x5, 0x7, 0x1, 0x8, 0x0, 0x8, 0xffffff7b, 0x0, 0x5, 0x6, 0xcc9, 0x1, 0x5, 0x2, 0xfffffffe, 0xfffffff9, 0x0, 0x5, 0x101, 0x401, 0x2, 0x3, 0x3, 0x7f76, 0x3ff, 0x9, 0xc14, 0x3, 0x7, 0x5, 0x100, 0x6, 0x8, 0x2, 0xe0, 0x3f, 0x200, 0x3, 0x9, 0x3, 0x5, 0x95c6, 0x2, 0x6, 0x20, 0x3, 0x8, 0x9, 0x7, 0x9, 0x0, 0xffffd671, 0x1, 0x0, 0x853d, 0x7, 0x3ff, 0x0, 0xfde7, 0x1, 0x5]}, 0x45c) 18:09:25 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68}, [{0x0, 0x0, 0x0, 0x0, 0xf0000000000000}]}, 0x78) 18:09:25 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63}, [{}]}, 0x6) 18:09:25 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="6653960d0ec5d684fa9f017ef0d60a3c27bc33760036001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479810be2aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e6517e615607676f8f9fc0ebf8b0b16d6f2c59957ab35d05692e664ebf68734ca53366295f4ad6142134b62f11e92ead037c7fb53455560c8ef0f1c94fafa924edfe92175aaa1c4ecc7aeeb72e0d050feacee907f40888c96a65545e07422bc6ac79f4c2d6ee3dab47d06e764682c72d7f16542fcfd05d2813cc182d1595016c179e1717c160300ab1ab0ac397e91bd193c036feb66a9ad2ec5b7967e7f5ff957f", 0xf1}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x19) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 18:09:25 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) write$uinput_user_dev(r2, &(0x7f0000000480)={'syz0\x00', {}, 0x0, [0x4, 0x631, 0xaf, 0x2, 0x1b, 0x1, 0x10001, 0x1, 0x8, 0x3ff, 0x800, 0x7859, 0x7, 0x5, 0x7fff, 0xc05, 0xa4, 0x3, 0x4, 0xfffff800, 0x6, 0x7c, 0x6, 0xff, 0x2, 0x771, 0x5, 0xfffffff8, 0x81, 0x0, 0x6, 0x7, 0x6, 0x9, 0x3, 0x0, 0x282d298e], [0x0, 0x7ff, 0x1f, 0x1, 0x7, 0x2, 0x6, 0xd594, 0x3, 0x2a, 0x1c9b4fd4, 0x0, 0xfff, 0x5, 0xfffff801, 0x9, 0x3f, 0x8, 0x80, 0x6, 0x401, 0x8000, 0x1, 0xcb, 0x1, 0x6, 0x4, 0x92, 0x800000, 0x7, 0x1f, 0x140, 0x7ff, 0xabbc, 0x401, 0x0, 0x3, 0x20, 0x48, 0x12000, 0xfa, 0x1, 0xfffff6fe, 0x0, 0x7, 0x8818, 0x8000, 0x6, 0x1f, 0x8, 0x4, 0xff, 0x101, 0xd7, 0x8, 0x5, 0xffff8001, 0x5, 0xb621, 0x1, 0x9, 0x1395db38, 0x0, 0x3], [0x6, 0x6, 0x401, 0x2d5, 0xc08, 0x3, 0x7f, 0x7, 0x8, 0x4, 0xbe1a, 0x5, 0x3, 0x93c, 0x9, 0x80, 0x800, 0x7fff, 0x6, 0x1, 0x5, 0x2, 0x9, 0x7fff, 0x0, 0x8000, 0x4, 0x6, 0x2, 0x4, 0x6, 0xa2ec, 0x7, 0x100, 0x1, 0x3, 0x1f, 0x81, 0x10000, 0xc5, 0x7ff, 0x2aae236d, 0x4, 0x2000, 0x1c, 0x3, 0x2, 0x735c, 0x7fffffff, 0x6, 0xfffffffd, 0x4, 0x3ff, 0x7fffffff, 0x8, 0x224, 0x261, 0x8b8a, 0x100, 0xffffffff, 0x7fff, 0x41, 0x401, 0x200], [0x7, 0x4, 0x2, 0x5, 0x7, 0x1, 0x8, 0x0, 0x8, 0xffffff7b, 0x0, 0x5, 0x6, 0xcc9, 0x1, 0x5, 0x2, 0xfffffffe, 0xfffffff9, 0x0, 0x5, 0x101, 0x401, 0x2, 0x3, 0x3, 0x7f76, 0x3ff, 0x9, 0xc14, 0x3, 0x7, 0x5, 0x100, 0x6, 0x8, 0x2, 0xe0, 0x3f, 0x200, 0x3, 0x9, 0x3, 0x5, 0x95c6, 0x2, 0x6, 0x20, 0x3, 0x8, 0x9, 0x7, 0x9, 0x0, 0xffffd671, 0x1, 0x0, 0x853d, 0x7, 0x3ff, 0x0, 0xfde7, 0x1, 0x5]}, 0x45c) 18:09:26 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r0, &(0x7f0000000040)=""/244, 0xf4) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f0000000100)="6653960d0ec5d684fa9f017ef0d60a3c27bc33760036001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479810be2aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e6517e615607676f8f9fc0ebf8b0b16d6f2c59957ab35d05692e664ebf68734ca53366295f4ad6142134b62f11e92ead037c7fb53455560c8ef0f1c94fafa924edfe92175aaa1c4ecc7aeeb72e0d050feacee907f40888c96a65545e07422bc6ac79f4c2d6ee3dab47d06e764682c72d7f16542fcfd05d2813cc182d1595016c179e1717c160300ab1ab0ac397e91bd193c036feb66a9ad2ec5b7967e7f5ff957f8b085a2437c5", 0xf7}], 0x3, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x19) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 18:09:26 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) write$uinput_user_dev(r0, &(0x7f0000000480)={'syz0\x00', {}, 0x0, [0x4, 0x631, 0xaf, 0x2, 0x1b, 0x1, 0x10001, 0x1, 0x8, 0x3ff, 0x800, 0x7859, 0x7, 0x5, 0x7fff, 0xc05, 0xa4, 0x3, 0x4, 0xfffff800, 0x6, 0x7c, 0x6, 0xff, 0x2, 0x771, 0x5, 0xfffffff8, 0x81, 0x0, 0x6, 0x7, 0x6, 0x9, 0x3, 0x0, 0x282d298e, 0x7, 0x6, 0x3, 0xfaf9, 0x7, 0x2, 0xf9, 0xc2, 0x0, 0x8, 0x8, 0x9], [0x0, 0x7ff, 0x1f, 0x1, 0x7, 0x2, 0x6, 0xd594, 0x3, 0x2a, 0x1c9b4fd4, 0x0, 0xfff, 0x5, 0xfffff801, 0x9, 0x3f, 0x8, 0x80, 0x6, 0x401, 0x8000, 0x1, 0xcb, 0x1, 0x6, 0x4, 0x92, 0x800000, 0x7, 0x1f, 0x140, 0x7ff, 0xabbc, 0x401, 0x0, 0x3, 0x20, 0x48, 0x12000, 0xfa, 0x1, 0xfffff6fe, 0x0, 0x7, 0x8818, 0x8000, 0x6, 0x1f, 0x8, 0x4, 0xff, 0x101, 0xd7, 0x8, 0x5, 0xffff8001, 0x5, 0xb621, 0x1, 0x9, 0x1395db38, 0x0, 0x3], [0x6, 0x6, 0x401, 0x2d5, 0xc08, 0x3, 0x7f, 0x7, 0x8, 0x4, 0xbe1a, 0x5, 0x3, 0x93c, 0x9, 0x80, 0x800, 0x7fff, 0x6, 0x1, 0x5, 0x2, 0x9, 0x7fff, 0x0, 0x8000, 0x4, 0x6, 0x2, 0x4, 0x6, 0xa2ec, 0x7, 0x100, 0x1, 0x3, 0x1f, 0x81, 0x10000, 0xc5, 0x7ff, 0x2aae236d, 0x4, 0x2000, 0x1c, 0x3, 0x2, 0x735c, 0x7fffffff, 0x6, 0xfffffffd, 0x4, 0x3ff, 0x7fffffff, 0x8, 0x224, 0x261, 0x8b8a, 0x100, 0xffffffff, 0x7fff, 0x41, 0x401, 0x200], [0x7, 0x4, 0x2, 0x5, 0x7, 0x1, 0x8, 0x0, 0x8, 0xffffff7b, 0x0, 0x5, 0x6, 0xcc9, 0x1, 0x5, 0x2, 0xfffffffe, 0xfffffff9, 0x0, 0x5, 0x101, 0x401, 0x2, 0x3, 0x3, 0x7f76, 0x3ff, 0x9, 0xc14, 0x3, 0x7, 0x5, 0x100, 0x6, 0x8, 0x2, 0xe0, 0x3f, 0x200, 0x3, 0x9, 0x3, 0x5, 0x95c6, 0x2, 0x6, 0x20, 0x3, 0x8, 0x9, 0x7, 0x9, 0x0, 0xffffd671, 0x1, 0x0, 0x853d, 0x7, 0x3ff, 0x0, 0xfde7, 0x1, 0x5]}, 0x45c) 18:09:26 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68}, [{0x0, 0x0, 0x0, 0x0, 0x100000000000000}]}, 0x78) 18:09:26 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63}, [{}]}, 0x7) 18:09:26 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) write$uinput_user_dev(r2, &(0x7f0000000480)={'syz0\x00', {}, 0x0, [0x4, 0x631, 0xaf, 0x2, 0x1b, 0x1, 0x10001, 0x1, 0x8, 0x3ff, 0x800, 0x7859, 0x7, 0x5, 0x7fff, 0xc05, 0xa4, 0x3, 0x4, 0xfffff800, 0x6, 0x7c, 0x6, 0xff, 0x2, 0x771, 0x5, 0xfffffff8, 0x81, 0x0, 0x6, 0x7, 0x6, 0x9, 0x3], [0x0, 0x7ff, 0x1f, 0x1, 0x7, 0x2, 0x6, 0xd594, 0x3, 0x2a, 0x1c9b4fd4, 0x0, 0xfff, 0x5, 0xfffff801, 0x9, 0x3f, 0x8, 0x80, 0x6, 0x401, 0x8000, 0x1, 0xcb, 0x1, 0x6, 0x4, 0x92, 0x800000, 0x7, 0x1f, 0x140, 0x7ff, 0xabbc, 0x401, 0x0, 0x3, 0x20, 0x48, 0x12000, 0xfa, 0x1, 0xfffff6fe, 0x0, 0x7, 0x8818, 0x8000, 0x6, 0x1f, 0x8, 0x4, 0xff, 0x101, 0xd7, 0x8, 0x5, 0xffff8001, 0x5, 0xb621, 0x1, 0x9, 0x1395db38, 0x0, 0x3], [0x6, 0x6, 0x401, 0x2d5, 0xc08, 0x3, 0x7f, 0x7, 0x8, 0x4, 0xbe1a, 0x5, 0x3, 0x93c, 0x9, 0x80, 0x800, 0x7fff, 0x6, 0x1, 0x5, 0x2, 0x9, 0x7fff, 0x0, 0x8000, 0x4, 0x6, 0x2, 0x4, 0x6, 0xa2ec, 0x7, 0x100, 0x1, 0x3, 0x1f, 0x81, 0x10000, 0xc5, 0x7ff, 0x2aae236d, 0x4, 0x2000, 0x1c, 0x3, 0x2, 0x735c, 0x7fffffff, 0x6, 0xfffffffd, 0x4, 0x3ff, 0x7fffffff, 0x8, 0x224, 0x261, 0x8b8a, 0x100, 0xffffffff, 0x7fff, 0x41, 0x401, 0x200], [0x7, 0x4, 0x2, 0x5, 0x7, 0x1, 0x8, 0x0, 0x8, 0xffffff7b, 0x0, 0x5, 0x6, 0xcc9, 0x1, 0x5, 0x2, 0xfffffffe, 0xfffffff9, 0x0, 0x5, 0x101, 0x401, 0x2, 0x3, 0x3, 0x7f76, 0x3ff, 0x9, 0xc14, 0x3, 0x7, 0x5, 0x100, 0x6, 0x8, 0x2, 0xe0, 0x3f, 0x200, 0x3, 0x9, 0x3, 0x5, 0x95c6, 0x2, 0x6, 0x20, 0x3, 0x8, 0x9, 0x7, 0x9, 0x0, 0xffffd671, 0x1, 0x0, 0x853d, 0x7, 0x3ff, 0x0, 0xfde7, 0x1, 0x5]}, 0x45c) 18:09:26 executing program 2: r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) write$uinput_user_dev(r1, &(0x7f0000000480)={'syz0\x00', {}, 0x0, [0x4, 0x631, 0xaf, 0x2, 0x1b, 0x1, 0x10001, 0x1, 0x8, 0x3ff, 0x800, 0x7859, 0x7, 0x5, 0x7fff, 0xc05, 0xa4, 0x3, 0x4, 0xfffff800, 0x6, 0x7c, 0x6, 0xff, 0x2, 0x771, 0x5, 0xfffffff8, 0x81, 0x0, 0x6, 0x7, 0x6, 0x9, 0x3, 0x0, 0x282d298e, 0x7, 0x6, 0x3, 0xfaf9, 0x7, 0x2, 0xf9, 0xc2, 0x0, 0x8, 0x8, 0x9], [0x0, 0x7ff, 0x1f, 0x1, 0x7, 0x2, 0x6, 0xd594, 0x3, 0x2a, 0x1c9b4fd4, 0x0, 0xfff, 0x5, 0xfffff801, 0x9, 0x3f, 0x8, 0x80, 0x6, 0x401, 0x8000, 0x1, 0xcb, 0x1, 0x6, 0x4, 0x92, 0x800000, 0x7, 0x1f, 0x140, 0x7ff, 0xabbc, 0x401, 0x0, 0x3, 0x20, 0x48, 0x12000, 0xfa, 0x1, 0xfffff6fe, 0x0, 0x7, 0x8818, 0x8000, 0x6, 0x1f, 0x8, 0x4, 0xff, 0x101, 0xd7, 0x8, 0x5, 0xffff8001, 0x5, 0xb621, 0x1, 0x9, 0x1395db38, 0x0, 0x3], [0x6, 0x6, 0x401, 0x2d5, 0xc08, 0x3, 0x7f, 0x7, 0x8, 0x4, 0xbe1a, 0x5, 0x3, 0x93c, 0x9, 0x80, 0x800, 0x7fff, 0x6, 0x1, 0x5, 0x2, 0x9, 0x7fff, 0x0, 0x8000, 0x4, 0x6, 0x2, 0x4, 0x6, 0xa2ec, 0x7, 0x100, 0x1, 0x3, 0x1f, 0x81, 0x10000, 0xc5, 0x7ff, 0x2aae236d, 0x4, 0x2000, 0x1c, 0x3, 0x2, 0x735c, 0x7fffffff, 0x6, 0xfffffffd, 0x4, 0x3ff, 0x7fffffff, 0x8, 0x224, 0x261, 0x8b8a, 0x100, 0xffffffff, 0x7fff, 0x41, 0x401, 0x200], [0x7, 0x4, 0x2, 0x5, 0x7, 0x1, 0x8, 0x0, 0x8, 0xffffff7b, 0x0, 0x5, 0x6, 0xcc9, 0x1, 0x5, 0x2, 0xfffffffe, 0xfffffff9, 0x0, 0x5, 0x101, 0x401, 0x2, 0x3, 0x3, 0x7f76, 0x3ff, 0x9, 0xc14, 0x3, 0x7, 0x5, 0x100, 0x6, 0x8, 0x2, 0xe0, 0x3f, 0x200, 0x3, 0x9, 0x3, 0x5, 0x95c6, 0x2, 0x6, 0x20, 0x3, 0x8, 0x9, 0x7, 0x9, 0x0, 0xffffd671, 0x1, 0x0, 0x853d, 0x7, 0x3ff, 0x0, 0xfde7, 0x1, 0x5]}, 0x45c) 18:09:26 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68}, [{0x0, 0x0, 0x0, 0x0, 0x180000000000000}]}, 0x78) 18:09:26 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63}, [{}]}, 0x8) 18:09:26 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) write$uinput_user_dev(r2, &(0x7f0000000480)={'syz0\x00', {}, 0x0, [0x4, 0x631, 0xaf, 0x2, 0x1b, 0x1, 0x10001, 0x1, 0x8, 0x3ff, 0x800, 0x7859, 0x7, 0x5, 0x7fff, 0xc05, 0xa4, 0x3, 0x4, 0xfffff800, 0x6, 0x7c, 0x6, 0xff, 0x2, 0x771, 0x5, 0xfffffff8, 0x81, 0x0, 0x6, 0x7, 0x6, 0x9], [0x0, 0x7ff, 0x1f, 0x1, 0x7, 0x2, 0x6, 0xd594, 0x3, 0x2a, 0x1c9b4fd4, 0x0, 0xfff, 0x5, 0xfffff801, 0x9, 0x3f, 0x8, 0x80, 0x6, 0x401, 0x8000, 0x1, 0xcb, 0x1, 0x6, 0x4, 0x92, 0x800000, 0x7, 0x1f, 0x140, 0x7ff, 0xabbc, 0x401, 0x0, 0x3, 0x20, 0x48, 0x12000, 0xfa, 0x1, 0xfffff6fe, 0x0, 0x7, 0x8818, 0x8000, 0x6, 0x1f, 0x8, 0x4, 0xff, 0x101, 0xd7, 0x8, 0x5, 0xffff8001, 0x5, 0xb621, 0x1, 0x9, 0x1395db38, 0x0, 0x3], [0x6, 0x6, 0x401, 0x2d5, 0xc08, 0x3, 0x7f, 0x7, 0x8, 0x4, 0xbe1a, 0x5, 0x3, 0x93c, 0x9, 0x80, 0x800, 0x7fff, 0x6, 0x1, 0x5, 0x2, 0x9, 0x7fff, 0x0, 0x8000, 0x4, 0x6, 0x2, 0x4, 0x6, 0xa2ec, 0x7, 0x100, 0x1, 0x3, 0x1f, 0x81, 0x10000, 0xc5, 0x7ff, 0x2aae236d, 0x4, 0x2000, 0x1c, 0x3, 0x2, 0x735c, 0x7fffffff, 0x6, 0xfffffffd, 0x4, 0x3ff, 0x7fffffff, 0x8, 0x224, 0x261, 0x8b8a, 0x100, 0xffffffff, 0x7fff, 0x41, 0x401, 0x200], [0x7, 0x4, 0x2, 0x5, 0x7, 0x1, 0x8, 0x0, 0x8, 0xffffff7b, 0x0, 0x5, 0x6, 0xcc9, 0x1, 0x5, 0x2, 0xfffffffe, 0xfffffff9, 0x0, 0x5, 0x101, 0x401, 0x2, 0x3, 0x3, 0x7f76, 0x3ff, 0x9, 0xc14, 0x3, 0x7, 0x5, 0x100, 0x6, 0x8, 0x2, 0xe0, 0x3f, 0x200, 0x3, 0x9, 0x3, 0x5, 0x95c6, 0x2, 0x6, 0x20, 0x3, 0x8, 0x9, 0x7, 0x9, 0x0, 0xffffd671, 0x1, 0x0, 0x853d, 0x7, 0x3ff, 0x0, 0xfde7, 0x1, 0x5]}, 0x45c) 18:09:26 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63}, [{}]}, 0x9) 18:09:29 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="6653960d0ec5d684fa9f017ef0d60a3c27bc33760036001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479810be2aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e6517e615607676f8f9fc0ebf8b0b16d6f2c59957ab35d05692e664ebf68734ca53366295f4ad6142134b62f11e92ead037c7fb53455560c8ef0f1c94fafa924edfe92175aaa1c4ecc7aeeb72e0d050feacee907f40888c96a65545e07422bc6ac79f4c2d6ee3dab47d06e764682c72d7f16542fcfd05d2813cc182d1595016c179e1717c160300ab1ab0ac397e91bd193c036feb66a9ad2ec5b7967e7f5ff957f", 0xf1}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x19) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 18:09:29 executing program 2: r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) write$uinput_user_dev(r1, &(0x7f0000000480)={'syz0\x00', {}, 0x0, [0x4, 0x631, 0xaf, 0x2, 0x1b, 0x1, 0x10001, 0x1, 0x8, 0x3ff, 0x800, 0x7859, 0x7, 0x5, 0x7fff, 0xc05, 0xa4, 0x3, 0x4, 0xfffff800, 0x6, 0x7c, 0x6, 0xff, 0x2, 0x771, 0x5, 0xfffffff8, 0x81, 0x0, 0x6, 0x7, 0x6, 0x9, 0x3, 0x0, 0x282d298e, 0x7, 0x6, 0x3, 0xfaf9, 0x7, 0x2, 0xf9, 0xc2, 0x0, 0x8, 0x8, 0x9], [0x0, 0x7ff, 0x1f, 0x1, 0x7, 0x2, 0x6, 0xd594, 0x3, 0x2a, 0x1c9b4fd4, 0x0, 0xfff, 0x5, 0xfffff801, 0x9, 0x3f, 0x8, 0x80, 0x6, 0x401, 0x8000, 0x1, 0xcb, 0x1, 0x6, 0x4, 0x92, 0x800000, 0x7, 0x1f, 0x140, 0x7ff, 0xabbc, 0x401, 0x0, 0x3, 0x20, 0x48, 0x12000, 0xfa, 0x1, 0xfffff6fe, 0x0, 0x7, 0x8818, 0x8000, 0x6, 0x1f, 0x8, 0x4, 0xff, 0x101, 0xd7, 0x8, 0x5, 0xffff8001, 0x5, 0xb621, 0x1, 0x9, 0x1395db38, 0x0, 0x3], [0x6, 0x6, 0x401, 0x2d5, 0xc08, 0x3, 0x7f, 0x7, 0x8, 0x4, 0xbe1a, 0x5, 0x3, 0x93c, 0x9, 0x80, 0x800, 0x7fff, 0x6, 0x1, 0x5, 0x2, 0x9, 0x7fff, 0x0, 0x8000, 0x4, 0x6, 0x2, 0x4, 0x6, 0xa2ec, 0x7, 0x100, 0x1, 0x3, 0x1f, 0x81, 0x10000, 0xc5, 0x7ff, 0x2aae236d, 0x4, 0x2000, 0x1c, 0x3, 0x2, 0x735c, 0x7fffffff, 0x6, 0xfffffffd, 0x4, 0x3ff, 0x7fffffff, 0x8, 0x224, 0x261, 0x8b8a, 0x100, 0xffffffff, 0x7fff, 0x41, 0x401, 0x200], [0x7, 0x4, 0x2, 0x5, 0x7, 0x1, 0x8, 0x0, 0x8, 0xffffff7b, 0x0, 0x5, 0x6, 0xcc9, 0x1, 0x5, 0x2, 0xfffffffe, 0xfffffff9, 0x0, 0x5, 0x101, 0x401, 0x2, 0x3, 0x3, 0x7f76, 0x3ff, 0x9, 0xc14, 0x3, 0x7, 0x5, 0x100, 0x6, 0x8, 0x2, 0xe0, 0x3f, 0x200, 0x3, 0x9, 0x3, 0x5, 0x95c6, 0x2, 0x6, 0x20, 0x3, 0x8, 0x9, 0x7, 0x9, 0x0, 0xffffd671, 0x1, 0x0, 0x853d, 0x7, 0x3ff, 0x0, 0xfde7, 0x1, 0x5]}, 0x45c) 18:09:29 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r0, &(0x7f0000000040)=""/244, 0xf4) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f0000000100)="6653960d0ec5d684fa9f017ef0d60a3c27bc33760036001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479810be2aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e6517e615607676f8f9fc0ebf8b0b16d6f2c59957ab35d05692e664ebf68734ca53366295f4ad6142134b62f11e92ead037c7fb53455560c8ef0f1c94fafa924edfe92175aaa1c4ecc7aeeb72e0d050feacee907f40888c96a65545e07422bc6ac79f4c2d6ee3dab47d06e764682c72d7f16542fcfd05d2813cc182d1595016c179e1717c160300ab1ab0ac397e91bd193c036feb66a9ad2ec5b7967e7f5ff957f8b085a2437c5", 0xf7}], 0x3, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x19) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 18:09:29 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68}, [{0x0, 0x0, 0x0, 0x0, 0x200000000000000}]}, 0x78) 18:09:29 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) write$uinput_user_dev(r2, &(0x7f0000000480)={'syz0\x00', {}, 0x0, [0x4, 0x631, 0xaf, 0x2, 0x1b, 0x1, 0x10001, 0x1, 0x8, 0x3ff, 0x800, 0x7859, 0x7, 0x5, 0x7fff, 0xc05, 0xa4, 0x3, 0x4, 0xfffff800, 0x6, 0x7c, 0x6, 0xff, 0x2, 0x771, 0x5, 0xfffffff8, 0x81, 0x0, 0x6, 0x7, 0x6], [0x0, 0x7ff, 0x1f, 0x1, 0x7, 0x2, 0x6, 0xd594, 0x3, 0x2a, 0x1c9b4fd4, 0x0, 0xfff, 0x5, 0xfffff801, 0x9, 0x3f, 0x8, 0x80, 0x6, 0x401, 0x8000, 0x1, 0xcb, 0x1, 0x6, 0x4, 0x92, 0x800000, 0x7, 0x1f, 0x140, 0x7ff, 0xabbc, 0x401, 0x0, 0x3, 0x20, 0x48, 0x12000, 0xfa, 0x1, 0xfffff6fe, 0x0, 0x7, 0x8818, 0x8000, 0x6, 0x1f, 0x8, 0x4, 0xff, 0x101, 0xd7, 0x8, 0x5, 0xffff8001, 0x5, 0xb621, 0x1, 0x9, 0x1395db38, 0x0, 0x3], [0x6, 0x6, 0x401, 0x2d5, 0xc08, 0x3, 0x7f, 0x7, 0x8, 0x4, 0xbe1a, 0x5, 0x3, 0x93c, 0x9, 0x80, 0x800, 0x7fff, 0x6, 0x1, 0x5, 0x2, 0x9, 0x7fff, 0x0, 0x8000, 0x4, 0x6, 0x2, 0x4, 0x6, 0xa2ec, 0x7, 0x100, 0x1, 0x3, 0x1f, 0x81, 0x10000, 0xc5, 0x7ff, 0x2aae236d, 0x4, 0x2000, 0x1c, 0x3, 0x2, 0x735c, 0x7fffffff, 0x6, 0xfffffffd, 0x4, 0x3ff, 0x7fffffff, 0x8, 0x224, 0x261, 0x8b8a, 0x100, 0xffffffff, 0x7fff, 0x41, 0x401, 0x200], [0x7, 0x4, 0x2, 0x5, 0x7, 0x1, 0x8, 0x0, 0x8, 0xffffff7b, 0x0, 0x5, 0x6, 0xcc9, 0x1, 0x5, 0x2, 0xfffffffe, 0xfffffff9, 0x0, 0x5, 0x101, 0x401, 0x2, 0x3, 0x3, 0x7f76, 0x3ff, 0x9, 0xc14, 0x3, 0x7, 0x5, 0x100, 0x6, 0x8, 0x2, 0xe0, 0x3f, 0x200, 0x3, 0x9, 0x3, 0x5, 0x95c6, 0x2, 0x6, 0x20, 0x3, 0x8, 0x9, 0x7, 0x9, 0x0, 0xffffd671, 0x1, 0x0, 0x853d, 0x7, 0x3ff, 0x0, 0xfde7, 0x1, 0x5]}, 0x45c) 18:09:29 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63}, [{}]}, 0xa) 18:09:29 executing program 2: r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) write$uinput_user_dev(r1, &(0x7f0000000480)={'syz0\x00', {}, 0x0, [0x4, 0x631, 0xaf, 0x2, 0x1b, 0x1, 0x10001, 0x1, 0x8, 0x3ff, 0x800, 0x7859, 0x7, 0x5, 0x7fff, 0xc05, 0xa4, 0x3, 0x4, 0xfffff800, 0x6, 0x7c, 0x6, 0xff, 0x2, 0x771, 0x5, 0xfffffff8, 0x81, 0x0, 0x6, 0x7, 0x6, 0x9, 0x3, 0x0, 0x282d298e, 0x7, 0x6, 0x3, 0xfaf9, 0x7, 0x2, 0xf9, 0xc2, 0x0, 0x8, 0x8, 0x9], [0x0, 0x7ff, 0x1f, 0x1, 0x7, 0x2, 0x6, 0xd594, 0x3, 0x2a, 0x1c9b4fd4, 0x0, 0xfff, 0x5, 0xfffff801, 0x9, 0x3f, 0x8, 0x80, 0x6, 0x401, 0x8000, 0x1, 0xcb, 0x1, 0x6, 0x4, 0x92, 0x800000, 0x7, 0x1f, 0x140, 0x7ff, 0xabbc, 0x401, 0x0, 0x3, 0x20, 0x48, 0x12000, 0xfa, 0x1, 0xfffff6fe, 0x0, 0x7, 0x8818, 0x8000, 0x6, 0x1f, 0x8, 0x4, 0xff, 0x101, 0xd7, 0x8, 0x5, 0xffff8001, 0x5, 0xb621, 0x1, 0x9, 0x1395db38, 0x0, 0x3], [0x6, 0x6, 0x401, 0x2d5, 0xc08, 0x3, 0x7f, 0x7, 0x8, 0x4, 0xbe1a, 0x5, 0x3, 0x93c, 0x9, 0x80, 0x800, 0x7fff, 0x6, 0x1, 0x5, 0x2, 0x9, 0x7fff, 0x0, 0x8000, 0x4, 0x6, 0x2, 0x4, 0x6, 0xa2ec, 0x7, 0x100, 0x1, 0x3, 0x1f, 0x81, 0x10000, 0xc5, 0x7ff, 0x2aae236d, 0x4, 0x2000, 0x1c, 0x3, 0x2, 0x735c, 0x7fffffff, 0x6, 0xfffffffd, 0x4, 0x3ff, 0x7fffffff, 0x8, 0x224, 0x261, 0x8b8a, 0x100, 0xffffffff, 0x7fff, 0x41, 0x401, 0x200], [0x7, 0x4, 0x2, 0x5, 0x7, 0x1, 0x8, 0x0, 0x8, 0xffffff7b, 0x0, 0x5, 0x6, 0xcc9, 0x1, 0x5, 0x2, 0xfffffffe, 0xfffffff9, 0x0, 0x5, 0x101, 0x401, 0x2, 0x3, 0x3, 0x7f76, 0x3ff, 0x9, 0xc14, 0x3, 0x7, 0x5, 0x100, 0x6, 0x8, 0x2, 0xe0, 0x3f, 0x200, 0x3, 0x9, 0x3, 0x5, 0x95c6, 0x2, 0x6, 0x20, 0x3, 0x8, 0x9, 0x7, 0x9, 0x0, 0xffffd671, 0x1, 0x0, 0x853d, 0x7, 0x3ff, 0x0, 0xfde7, 0x1, 0x5]}, 0x45c) 18:09:29 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68}, [{0x0, 0x0, 0x0, 0x0, 0x500000000000000}]}, 0x78) 18:09:29 executing program 2: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) write$uinput_user_dev(r2, &(0x7f0000000480)={'syz0\x00', {}, 0x0, [0x4, 0x631, 0xaf, 0x2, 0x1b, 0x1, 0x10001, 0x1, 0x8, 0x3ff, 0x800, 0x7859, 0x7, 0x5, 0x7fff, 0xc05, 0xa4, 0x3, 0x4, 0xfffff800, 0x6, 0x7c, 0x6, 0xff, 0x2, 0x771, 0x5, 0xfffffff8, 0x81, 0x0, 0x6, 0x7, 0x6, 0x9, 0x3, 0x0, 0x282d298e, 0x7, 0x6, 0x3, 0xfaf9, 0x7, 0x2, 0xf9, 0xc2, 0x0, 0x8, 0x8, 0x9], [0x0, 0x7ff, 0x1f, 0x1, 0x7, 0x2, 0x6, 0xd594, 0x3, 0x2a, 0x1c9b4fd4, 0x0, 0xfff, 0x5, 0xfffff801, 0x9, 0x3f, 0x8, 0x80, 0x6, 0x401, 0x8000, 0x1, 0xcb, 0x1, 0x6, 0x4, 0x92, 0x800000, 0x7, 0x1f, 0x140, 0x7ff, 0xabbc, 0x401, 0x0, 0x3, 0x20, 0x48, 0x12000, 0xfa, 0x1, 0xfffff6fe, 0x0, 0x7, 0x8818, 0x8000, 0x6, 0x1f, 0x8, 0x4, 0xff, 0x101, 0xd7, 0x8, 0x5, 0xffff8001, 0x5, 0xb621, 0x1, 0x9, 0x1395db38, 0x0, 0x3], [0x6, 0x6, 0x401, 0x2d5, 0xc08, 0x3, 0x7f, 0x7, 0x8, 0x4, 0xbe1a, 0x5, 0x3, 0x93c, 0x9, 0x80, 0x800, 0x7fff, 0x6, 0x1, 0x5, 0x2, 0x9, 0x7fff, 0x0, 0x8000, 0x4, 0x6, 0x2, 0x4, 0x6, 0xa2ec, 0x7, 0x100, 0x1, 0x3, 0x1f, 0x81, 0x10000, 0xc5, 0x7ff, 0x2aae236d, 0x4, 0x2000, 0x1c, 0x3, 0x2, 0x735c, 0x7fffffff, 0x6, 0xfffffffd, 0x4, 0x3ff, 0x7fffffff, 0x8, 0x224, 0x261, 0x8b8a, 0x100, 0xffffffff, 0x7fff, 0x41, 0x401, 0x200], [0x7, 0x4, 0x2, 0x5, 0x7, 0x1, 0x8, 0x0, 0x8, 0xffffff7b, 0x0, 0x5, 0x6, 0xcc9, 0x1, 0x5, 0x2, 0xfffffffe, 0xfffffff9, 0x0, 0x5, 0x101, 0x401, 0x2, 0x3, 0x3, 0x7f76, 0x3ff, 0x9, 0xc14, 0x3, 0x7, 0x5, 0x100, 0x6, 0x8, 0x2, 0xe0, 0x3f, 0x200, 0x3, 0x9, 0x3, 0x5, 0x95c6, 0x2, 0x6, 0x20, 0x3, 0x8, 0x9, 0x7, 0x9, 0x0, 0xffffd671, 0x1, 0x0, 0x853d, 0x7, 0x3ff, 0x0, 0xfde7, 0x1, 0x5]}, 0x45c) 18:09:29 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63}, [{}]}, 0xb) 18:09:29 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) write$uinput_user_dev(r2, &(0x7f0000000480)={'syz0\x00', {}, 0x0, [0x4, 0x631, 0xaf, 0x2, 0x1b, 0x1, 0x10001, 0x1, 0x8, 0x3ff, 0x800, 0x7859, 0x7, 0x5, 0x7fff, 0xc05, 0xa4, 0x3, 0x4, 0xfffff800, 0x6, 0x7c, 0x6, 0xff, 0x2, 0x771, 0x5, 0xfffffff8, 0x81, 0x0, 0x6, 0x7], [0x0, 0x7ff, 0x1f, 0x1, 0x7, 0x2, 0x6, 0xd594, 0x3, 0x2a, 0x1c9b4fd4, 0x0, 0xfff, 0x5, 0xfffff801, 0x9, 0x3f, 0x8, 0x80, 0x6, 0x401, 0x8000, 0x1, 0xcb, 0x1, 0x6, 0x4, 0x92, 0x800000, 0x7, 0x1f, 0x140, 0x7ff, 0xabbc, 0x401, 0x0, 0x3, 0x20, 0x48, 0x12000, 0xfa, 0x1, 0xfffff6fe, 0x0, 0x7, 0x8818, 0x8000, 0x6, 0x1f, 0x8, 0x4, 0xff, 0x101, 0xd7, 0x8, 0x5, 0xffff8001, 0x5, 0xb621, 0x1, 0x9, 0x1395db38, 0x0, 0x3], [0x6, 0x6, 0x401, 0x2d5, 0xc08, 0x3, 0x7f, 0x7, 0x8, 0x4, 0xbe1a, 0x5, 0x3, 0x93c, 0x9, 0x80, 0x800, 0x7fff, 0x6, 0x1, 0x5, 0x2, 0x9, 0x7fff, 0x0, 0x8000, 0x4, 0x6, 0x2, 0x4, 0x6, 0xa2ec, 0x7, 0x100, 0x1, 0x3, 0x1f, 0x81, 0x10000, 0xc5, 0x7ff, 0x2aae236d, 0x4, 0x2000, 0x1c, 0x3, 0x2, 0x735c, 0x7fffffff, 0x6, 0xfffffffd, 0x4, 0x3ff, 0x7fffffff, 0x8, 0x224, 0x261, 0x8b8a, 0x100, 0xffffffff, 0x7fff, 0x41, 0x401, 0x200], [0x7, 0x4, 0x2, 0x5, 0x7, 0x1, 0x8, 0x0, 0x8, 0xffffff7b, 0x0, 0x5, 0x6, 0xcc9, 0x1, 0x5, 0x2, 0xfffffffe, 0xfffffff9, 0x0, 0x5, 0x101, 0x401, 0x2, 0x3, 0x3, 0x7f76, 0x3ff, 0x9, 0xc14, 0x3, 0x7, 0x5, 0x100, 0x6, 0x8, 0x2, 0xe0, 0x3f, 0x200, 0x3, 0x9, 0x3, 0x5, 0x95c6, 0x2, 0x6, 0x20, 0x3, 0x8, 0x9, 0x7, 0x9, 0x0, 0xffffd671, 0x1, 0x0, 0x853d, 0x7, 0x3ff, 0x0, 0xfde7, 0x1, 0x5]}, 0x45c) 18:09:29 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63}, [{}]}, 0xc) 18:09:32 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) write$uinput_user_dev(r2, &(0x7f0000000480)={'syz0\x00', {}, 0x0, [0x4, 0x631, 0xaf, 0x2, 0x1b, 0x1, 0x10001, 0x1, 0x8, 0x3ff, 0x800, 0x7859, 0x7, 0x5, 0x7fff, 0xc05, 0xa4, 0x3, 0x4, 0xfffff800, 0x6, 0x7c, 0x6, 0xff, 0x2, 0x771, 0x5, 0xfffffff8, 0x81, 0x0, 0x6], [0x0, 0x7ff, 0x1f, 0x1, 0x7, 0x2, 0x6, 0xd594, 0x3, 0x2a, 0x1c9b4fd4, 0x0, 0xfff, 0x5, 0xfffff801, 0x9, 0x3f, 0x8, 0x80, 0x6, 0x401, 0x8000, 0x1, 0xcb, 0x1, 0x6, 0x4, 0x92, 0x800000, 0x7, 0x1f, 0x140, 0x7ff, 0xabbc, 0x401, 0x0, 0x3, 0x20, 0x48, 0x12000, 0xfa, 0x1, 0xfffff6fe, 0x0, 0x7, 0x8818, 0x8000, 0x6, 0x1f, 0x8, 0x4, 0xff, 0x101, 0xd7, 0x8, 0x5, 0xffff8001, 0x5, 0xb621, 0x1, 0x9, 0x1395db38, 0x0, 0x3], [0x6, 0x6, 0x401, 0x2d5, 0xc08, 0x3, 0x7f, 0x7, 0x8, 0x4, 0xbe1a, 0x5, 0x3, 0x93c, 0x9, 0x80, 0x800, 0x7fff, 0x6, 0x1, 0x5, 0x2, 0x9, 0x7fff, 0x0, 0x8000, 0x4, 0x6, 0x2, 0x4, 0x6, 0xa2ec, 0x7, 0x100, 0x1, 0x3, 0x1f, 0x81, 0x10000, 0xc5, 0x7ff, 0x2aae236d, 0x4, 0x2000, 0x1c, 0x3, 0x2, 0x735c, 0x7fffffff, 0x6, 0xfffffffd, 0x4, 0x3ff, 0x7fffffff, 0x8, 0x224, 0x261, 0x8b8a, 0x100, 0xffffffff, 0x7fff, 0x41, 0x401, 0x200], [0x7, 0x4, 0x2, 0x5, 0x7, 0x1, 0x8, 0x0, 0x8, 0xffffff7b, 0x0, 0x5, 0x6, 0xcc9, 0x1, 0x5, 0x2, 0xfffffffe, 0xfffffff9, 0x0, 0x5, 0x101, 0x401, 0x2, 0x3, 0x3, 0x7f76, 0x3ff, 0x9, 0xc14, 0x3, 0x7, 0x5, 0x100, 0x6, 0x8, 0x2, 0xe0, 0x3f, 0x200, 0x3, 0x9, 0x3, 0x5, 0x95c6, 0x2, 0x6, 0x20, 0x3, 0x8, 0x9, 0x7, 0x9, 0x0, 0xffffd671, 0x1, 0x0, 0x853d, 0x7, 0x3ff, 0x0, 0xfde7, 0x1, 0x5]}, 0x45c) 18:09:32 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="6653960d0ec5d684fa9f017ef0d60a3c27bc33760036001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479810be2aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e6517e615607676f8f9fc0ebf8b0b16d6f2c59957ab35d05692e664ebf68734ca53366295f4ad6142134b62f11e92ead037c7fb53455560c8ef0f1c94fafa924edfe92175aaa1c4ecc7aeeb72e0d050feacee907f40888c96a65545e07422bc6ac79f4c2d6ee3dab47d06e764682c72d7f16542fcfd05d2813cc182d1595016c179e1717c160300ab1ab0ac397e91bd193c036feb66a9ad2ec5b7967e7f5ff957f8b085a24", 0xf5}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x19) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 18:09:32 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r0, &(0x7f0000000040)=""/244, 0xf4) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f0000000100)="6653960d0ec5d684fa9f017ef0d60a3c27bc33760036001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479810be2aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e6517e615607676f8f9fc0ebf8b0b16d6f2c59957ab35d05692e664ebf68734ca53366295f4ad6142134b62f11e92ead037c7fb53455560c8ef0f1c94fafa924edfe92175aaa1c4ecc7aeeb72e0d050feacee907f40888c96a65545e07422bc6ac79f4c2d6ee3dab47d06e764682c72d7f16542fcfd05d2813cc182d1595016c179e1717c160300ab1ab0ac397e91bd193c036feb66a9ad2ec5b7967e7f5ff957f8b085a2437c5", 0xf7}], 0x3, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x19) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 18:09:32 executing program 2: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) write$uinput_user_dev(r2, &(0x7f0000000480)={'syz0\x00', {}, 0x0, [0x4, 0x631, 0xaf, 0x2, 0x1b, 0x1, 0x10001, 0x1, 0x8, 0x3ff, 0x800, 0x7859, 0x7, 0x5, 0x7fff, 0xc05, 0xa4, 0x3, 0x4, 0xfffff800, 0x6, 0x7c, 0x6, 0xff, 0x2, 0x771, 0x5, 0xfffffff8, 0x81, 0x0, 0x6, 0x7, 0x6, 0x9, 0x3, 0x0, 0x282d298e, 0x7, 0x6, 0x3, 0xfaf9, 0x7, 0x2, 0xf9, 0xc2, 0x0, 0x8, 0x8, 0x9], [0x0, 0x7ff, 0x1f, 0x1, 0x7, 0x2, 0x6, 0xd594, 0x3, 0x2a, 0x1c9b4fd4, 0x0, 0xfff, 0x5, 0xfffff801, 0x9, 0x3f, 0x8, 0x80, 0x6, 0x401, 0x8000, 0x1, 0xcb, 0x1, 0x6, 0x4, 0x92, 0x800000, 0x7, 0x1f, 0x140, 0x7ff, 0xabbc, 0x401, 0x0, 0x3, 0x20, 0x48, 0x12000, 0xfa, 0x1, 0xfffff6fe, 0x0, 0x7, 0x8818, 0x8000, 0x6, 0x1f, 0x8, 0x4, 0xff, 0x101, 0xd7, 0x8, 0x5, 0xffff8001, 0x5, 0xb621, 0x1, 0x9, 0x1395db38, 0x0, 0x3], [0x6, 0x6, 0x401, 0x2d5, 0xc08, 0x3, 0x7f, 0x7, 0x8, 0x4, 0xbe1a, 0x5, 0x3, 0x93c, 0x9, 0x80, 0x800, 0x7fff, 0x6, 0x1, 0x5, 0x2, 0x9, 0x7fff, 0x0, 0x8000, 0x4, 0x6, 0x2, 0x4, 0x6, 0xa2ec, 0x7, 0x100, 0x1, 0x3, 0x1f, 0x81, 0x10000, 0xc5, 0x7ff, 0x2aae236d, 0x4, 0x2000, 0x1c, 0x3, 0x2, 0x735c, 0x7fffffff, 0x6, 0xfffffffd, 0x4, 0x3ff, 0x7fffffff, 0x8, 0x224, 0x261, 0x8b8a, 0x100, 0xffffffff, 0x7fff, 0x41, 0x401, 0x200], [0x7, 0x4, 0x2, 0x5, 0x7, 0x1, 0x8, 0x0, 0x8, 0xffffff7b, 0x0, 0x5, 0x6, 0xcc9, 0x1, 0x5, 0x2, 0xfffffffe, 0xfffffff9, 0x0, 0x5, 0x101, 0x401, 0x2, 0x3, 0x3, 0x7f76, 0x3ff, 0x9, 0xc14, 0x3, 0x7, 0x5, 0x100, 0x6, 0x8, 0x2, 0xe0, 0x3f, 0x200, 0x3, 0x9, 0x3, 0x5, 0x95c6, 0x2, 0x6, 0x20, 0x3, 0x8, 0x9, 0x7, 0x9, 0x0, 0xffffd671, 0x1, 0x0, 0x853d, 0x7, 0x3ff, 0x0, 0xfde7, 0x1, 0x5]}, 0x45c) 18:09:32 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63}, [{}]}, 0xd) 18:09:32 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68}, [{0x0, 0x0, 0x0, 0x0, 0x600000000000000}]}, 0x78) 18:09:32 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) write$uinput_user_dev(r2, &(0x7f0000000480)={'syz0\x00', {}, 0x0, [0x4, 0x631, 0xaf, 0x2, 0x1b, 0x1, 0x10001, 0x1, 0x8, 0x3ff, 0x800, 0x7859, 0x7, 0x5, 0x7fff, 0xc05, 0xa4, 0x3, 0x4, 0xfffff800, 0x6, 0x7c, 0x6, 0xff, 0x2, 0x771, 0x5, 0xfffffff8, 0x81], [0x0, 0x7ff, 0x1f, 0x1, 0x7, 0x2, 0x6, 0xd594, 0x3, 0x2a, 0x1c9b4fd4, 0x0, 0xfff, 0x5, 0xfffff801, 0x9, 0x3f, 0x8, 0x80, 0x6, 0x401, 0x8000, 0x1, 0xcb, 0x1, 0x6, 0x4, 0x92, 0x800000, 0x7, 0x1f, 0x140, 0x7ff, 0xabbc, 0x401, 0x0, 0x3, 0x20, 0x48, 0x12000, 0xfa, 0x1, 0xfffff6fe, 0x0, 0x7, 0x8818, 0x8000, 0x6, 0x1f, 0x8, 0x4, 0xff, 0x101, 0xd7, 0x8, 0x5, 0xffff8001, 0x5, 0xb621, 0x1, 0x9, 0x1395db38, 0x0, 0x3], [0x6, 0x6, 0x401, 0x2d5, 0xc08, 0x3, 0x7f, 0x7, 0x8, 0x4, 0xbe1a, 0x5, 0x3, 0x93c, 0x9, 0x80, 0x800, 0x7fff, 0x6, 0x1, 0x5, 0x2, 0x9, 0x7fff, 0x0, 0x8000, 0x4, 0x6, 0x2, 0x4, 0x6, 0xa2ec, 0x7, 0x100, 0x1, 0x3, 0x1f, 0x81, 0x10000, 0xc5, 0x7ff, 0x2aae236d, 0x4, 0x2000, 0x1c, 0x3, 0x2, 0x735c, 0x7fffffff, 0x6, 0xfffffffd, 0x4, 0x3ff, 0x7fffffff, 0x8, 0x224, 0x261, 0x8b8a, 0x100, 0xffffffff, 0x7fff, 0x41, 0x401, 0x200], [0x7, 0x4, 0x2, 0x5, 0x7, 0x1, 0x8, 0x0, 0x8, 0xffffff7b, 0x0, 0x5, 0x6, 0xcc9, 0x1, 0x5, 0x2, 0xfffffffe, 0xfffffff9, 0x0, 0x5, 0x101, 0x401, 0x2, 0x3, 0x3, 0x7f76, 0x3ff, 0x9, 0xc14, 0x3, 0x7, 0x5, 0x100, 0x6, 0x8, 0x2, 0xe0, 0x3f, 0x200, 0x3, 0x9, 0x3, 0x5, 0x95c6, 0x2, 0x6, 0x20, 0x3, 0x8, 0x9, 0x7, 0x9, 0x0, 0xffffd671, 0x1, 0x0, 0x853d, 0x7, 0x3ff, 0x0, 0xfde7, 0x1, 0x5]}, 0x45c) 18:09:32 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63}, [{}]}, 0xe) 18:09:32 executing program 2: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) write$uinput_user_dev(r2, &(0x7f0000000480)={'syz0\x00', {}, 0x0, [0x4, 0x631, 0xaf, 0x2, 0x1b, 0x1, 0x10001, 0x1, 0x8, 0x3ff, 0x800, 0x7859, 0x7, 0x5, 0x7fff, 0xc05, 0xa4, 0x3, 0x4, 0xfffff800, 0x6, 0x7c, 0x6, 0xff, 0x2, 0x771, 0x5, 0xfffffff8, 0x81, 0x0, 0x6, 0x7, 0x6, 0x9, 0x3, 0x0, 0x282d298e, 0x7, 0x6, 0x3, 0xfaf9, 0x7, 0x2, 0xf9, 0xc2, 0x0, 0x8, 0x8, 0x9], [0x0, 0x7ff, 0x1f, 0x1, 0x7, 0x2, 0x6, 0xd594, 0x3, 0x2a, 0x1c9b4fd4, 0x0, 0xfff, 0x5, 0xfffff801, 0x9, 0x3f, 0x8, 0x80, 0x6, 0x401, 0x8000, 0x1, 0xcb, 0x1, 0x6, 0x4, 0x92, 0x800000, 0x7, 0x1f, 0x140, 0x7ff, 0xabbc, 0x401, 0x0, 0x3, 0x20, 0x48, 0x12000, 0xfa, 0x1, 0xfffff6fe, 0x0, 0x7, 0x8818, 0x8000, 0x6, 0x1f, 0x8, 0x4, 0xff, 0x101, 0xd7, 0x8, 0x5, 0xffff8001, 0x5, 0xb621, 0x1, 0x9, 0x1395db38, 0x0, 0x3], [0x6, 0x6, 0x401, 0x2d5, 0xc08, 0x3, 0x7f, 0x7, 0x8, 0x4, 0xbe1a, 0x5, 0x3, 0x93c, 0x9, 0x80, 0x800, 0x7fff, 0x6, 0x1, 0x5, 0x2, 0x9, 0x7fff, 0x0, 0x8000, 0x4, 0x6, 0x2, 0x4, 0x6, 0xa2ec, 0x7, 0x100, 0x1, 0x3, 0x1f, 0x81, 0x10000, 0xc5, 0x7ff, 0x2aae236d, 0x4, 0x2000, 0x1c, 0x3, 0x2, 0x735c, 0x7fffffff, 0x6, 0xfffffffd, 0x4, 0x3ff, 0x7fffffff, 0x8, 0x224, 0x261, 0x8b8a, 0x100, 0xffffffff, 0x7fff, 0x41, 0x401, 0x200], [0x7, 0x4, 0x2, 0x5, 0x7, 0x1, 0x8, 0x0, 0x8, 0xffffff7b, 0x0, 0x5, 0x6, 0xcc9, 0x1, 0x5, 0x2, 0xfffffffe, 0xfffffff9, 0x0, 0x5, 0x101, 0x401, 0x2, 0x3, 0x3, 0x7f76, 0x3ff, 0x9, 0xc14, 0x3, 0x7, 0x5, 0x100, 0x6, 0x8, 0x2, 0xe0, 0x3f, 0x200, 0x3, 0x9, 0x3, 0x5, 0x95c6, 0x2, 0x6, 0x20, 0x3, 0x8, 0x9, 0x7, 0x9, 0x0, 0xffffd671, 0x1, 0x0, 0x853d, 0x7, 0x3ff, 0x0, 0xfde7, 0x1, 0x5]}, 0x45c) 18:09:32 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) write$uinput_user_dev(r2, &(0x7f0000000480)={'syz0\x00', {}, 0x0, [0x4, 0x631, 0xaf, 0x2, 0x1b, 0x1, 0x10001, 0x1, 0x8, 0x3ff, 0x800, 0x7859, 0x7, 0x5, 0x7fff, 0xc05, 0xa4, 0x3, 0x4, 0xfffff800, 0x6, 0x7c, 0x6, 0xff, 0x2, 0x771, 0x5, 0xfffffff8], [0x0, 0x7ff, 0x1f, 0x1, 0x7, 0x2, 0x6, 0xd594, 0x3, 0x2a, 0x1c9b4fd4, 0x0, 0xfff, 0x5, 0xfffff801, 0x9, 0x3f, 0x8, 0x80, 0x6, 0x401, 0x8000, 0x1, 0xcb, 0x1, 0x6, 0x4, 0x92, 0x800000, 0x7, 0x1f, 0x140, 0x7ff, 0xabbc, 0x401, 0x0, 0x3, 0x20, 0x48, 0x12000, 0xfa, 0x1, 0xfffff6fe, 0x0, 0x7, 0x8818, 0x8000, 0x6, 0x1f, 0x8, 0x4, 0xff, 0x101, 0xd7, 0x8, 0x5, 0xffff8001, 0x5, 0xb621, 0x1, 0x9, 0x1395db38, 0x0, 0x3], [0x6, 0x6, 0x401, 0x2d5, 0xc08, 0x3, 0x7f, 0x7, 0x8, 0x4, 0xbe1a, 0x5, 0x3, 0x93c, 0x9, 0x80, 0x800, 0x7fff, 0x6, 0x1, 0x5, 0x2, 0x9, 0x7fff, 0x0, 0x8000, 0x4, 0x6, 0x2, 0x4, 0x6, 0xa2ec, 0x7, 0x100, 0x1, 0x3, 0x1f, 0x81, 0x10000, 0xc5, 0x7ff, 0x2aae236d, 0x4, 0x2000, 0x1c, 0x3, 0x2, 0x735c, 0x7fffffff, 0x6, 0xfffffffd, 0x4, 0x3ff, 0x7fffffff, 0x8, 0x224, 0x261, 0x8b8a, 0x100, 0xffffffff, 0x7fff, 0x41, 0x401, 0x200], [0x7, 0x4, 0x2, 0x5, 0x7, 0x1, 0x8, 0x0, 0x8, 0xffffff7b, 0x0, 0x5, 0x6, 0xcc9, 0x1, 0x5, 0x2, 0xfffffffe, 0xfffffff9, 0x0, 0x5, 0x101, 0x401, 0x2, 0x3, 0x3, 0x7f76, 0x3ff, 0x9, 0xc14, 0x3, 0x7, 0x5, 0x100, 0x6, 0x8, 0x2, 0xe0, 0x3f, 0x200, 0x3, 0x9, 0x3, 0x5, 0x95c6, 0x2, 0x6, 0x20, 0x3, 0x8, 0x9, 0x7, 0x9, 0x0, 0xffffd671, 0x1, 0x0, 0x853d, 0x7, 0x3ff, 0x0, 0xfde7, 0x1, 0x5]}, 0x45c) 18:09:32 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68}, [{0x0, 0x0, 0x0, 0x0, 0x700000000000000}]}, 0x78) 18:09:32 executing program 2: socketpair$unix(0x1, 0x2, 0x0, 0x0) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) write$uinput_user_dev(r1, &(0x7f0000000480)={'syz0\x00', {}, 0x0, [0x4, 0x631, 0xaf, 0x2, 0x1b, 0x1, 0x10001, 0x1, 0x8, 0x3ff, 0x800, 0x7859, 0x7, 0x5, 0x7fff, 0xc05, 0xa4, 0x3, 0x4, 0xfffff800, 0x6, 0x7c, 0x6, 0xff, 0x2, 0x771, 0x5, 0xfffffff8, 0x81, 0x0, 0x6, 0x7, 0x6, 0x9, 0x3, 0x0, 0x282d298e, 0x7, 0x6, 0x3, 0xfaf9, 0x7, 0x2, 0xf9, 0xc2, 0x0, 0x8, 0x8, 0x9], [0x0, 0x7ff, 0x1f, 0x1, 0x7, 0x2, 0x6, 0xd594, 0x3, 0x2a, 0x1c9b4fd4, 0x0, 0xfff, 0x5, 0xfffff801, 0x9, 0x3f, 0x8, 0x80, 0x6, 0x401, 0x8000, 0x1, 0xcb, 0x1, 0x6, 0x4, 0x92, 0x800000, 0x7, 0x1f, 0x140, 0x7ff, 0xabbc, 0x401, 0x0, 0x3, 0x20, 0x48, 0x12000, 0xfa, 0x1, 0xfffff6fe, 0x0, 0x7, 0x8818, 0x8000, 0x6, 0x1f, 0x8, 0x4, 0xff, 0x101, 0xd7, 0x8, 0x5, 0xffff8001, 0x5, 0xb621, 0x1, 0x9, 0x1395db38, 0x0, 0x3], [0x6, 0x6, 0x401, 0x2d5, 0xc08, 0x3, 0x7f, 0x7, 0x8, 0x4, 0xbe1a, 0x5, 0x3, 0x93c, 0x9, 0x80, 0x800, 0x7fff, 0x6, 0x1, 0x5, 0x2, 0x9, 0x7fff, 0x0, 0x8000, 0x4, 0x6, 0x2, 0x4, 0x6, 0xa2ec, 0x7, 0x100, 0x1, 0x3, 0x1f, 0x81, 0x10000, 0xc5, 0x7ff, 0x2aae236d, 0x4, 0x2000, 0x1c, 0x3, 0x2, 0x735c, 0x7fffffff, 0x6, 0xfffffffd, 0x4, 0x3ff, 0x7fffffff, 0x8, 0x224, 0x261, 0x8b8a, 0x100, 0xffffffff, 0x7fff, 0x41, 0x401, 0x200], [0x7, 0x4, 0x2, 0x5, 0x7, 0x1, 0x8, 0x0, 0x8, 0xffffff7b, 0x0, 0x5, 0x6, 0xcc9, 0x1, 0x5, 0x2, 0xfffffffe, 0xfffffff9, 0x0, 0x5, 0x101, 0x401, 0x2, 0x3, 0x3, 0x7f76, 0x3ff, 0x9, 0xc14, 0x3, 0x7, 0x5, 0x100, 0x6, 0x8, 0x2, 0xe0, 0x3f, 0x200, 0x3, 0x9, 0x3, 0x5, 0x95c6, 0x2, 0x6, 0x20, 0x3, 0x8, 0x9, 0x7, 0x9, 0x0, 0xffffd671, 0x1, 0x0, 0x853d, 0x7, 0x3ff, 0x0, 0xfde7, 0x1, 0x5]}, 0x45c) 18:09:32 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) write$uinput_user_dev(r2, &(0x7f0000000480)={'syz0\x00', {}, 0x0, [0x4, 0x631, 0xaf, 0x2, 0x1b, 0x1, 0x10001, 0x1, 0x8, 0x3ff, 0x800, 0x7859, 0x7, 0x5, 0x7fff, 0xc05, 0xa4, 0x3, 0x4, 0xfffff800, 0x6, 0x7c, 0x6, 0xff, 0x2, 0x771, 0x5], [0x0, 0x7ff, 0x1f, 0x1, 0x7, 0x2, 0x6, 0xd594, 0x3, 0x2a, 0x1c9b4fd4, 0x0, 0xfff, 0x5, 0xfffff801, 0x9, 0x3f, 0x8, 0x80, 0x6, 0x401, 0x8000, 0x1, 0xcb, 0x1, 0x6, 0x4, 0x92, 0x800000, 0x7, 0x1f, 0x140, 0x7ff, 0xabbc, 0x401, 0x0, 0x3, 0x20, 0x48, 0x12000, 0xfa, 0x1, 0xfffff6fe, 0x0, 0x7, 0x8818, 0x8000, 0x6, 0x1f, 0x8, 0x4, 0xff, 0x101, 0xd7, 0x8, 0x5, 0xffff8001, 0x5, 0xb621, 0x1, 0x9, 0x1395db38, 0x0, 0x3], [0x6, 0x6, 0x401, 0x2d5, 0xc08, 0x3, 0x7f, 0x7, 0x8, 0x4, 0xbe1a, 0x5, 0x3, 0x93c, 0x9, 0x80, 0x800, 0x7fff, 0x6, 0x1, 0x5, 0x2, 0x9, 0x7fff, 0x0, 0x8000, 0x4, 0x6, 0x2, 0x4, 0x6, 0xa2ec, 0x7, 0x100, 0x1, 0x3, 0x1f, 0x81, 0x10000, 0xc5, 0x7ff, 0x2aae236d, 0x4, 0x2000, 0x1c, 0x3, 0x2, 0x735c, 0x7fffffff, 0x6, 0xfffffffd, 0x4, 0x3ff, 0x7fffffff, 0x8, 0x224, 0x261, 0x8b8a, 0x100, 0xffffffff, 0x7fff, 0x41, 0x401, 0x200], [0x7, 0x4, 0x2, 0x5, 0x7, 0x1, 0x8, 0x0, 0x8, 0xffffff7b, 0x0, 0x5, 0x6, 0xcc9, 0x1, 0x5, 0x2, 0xfffffffe, 0xfffffff9, 0x0, 0x5, 0x101, 0x401, 0x2, 0x3, 0x3, 0x7f76, 0x3ff, 0x9, 0xc14, 0x3, 0x7, 0x5, 0x100, 0x6, 0x8, 0x2, 0xe0, 0x3f, 0x200, 0x3, 0x9, 0x3, 0x5, 0x95c6, 0x2, 0x6, 0x20, 0x3, 0x8, 0x9, 0x7, 0x9, 0x0, 0xffffd671, 0x1, 0x0, 0x853d, 0x7, 0x3ff, 0x0, 0xfde7, 0x1, 0x5]}, 0x45c) 18:09:35 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="6653960d0ec5d684fa9f017ef0d60a3c27bc33760036001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479810be2aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e6517e615607676f8f9fc0ebf8b0b16d6f2c59957ab35d05692e664ebf68734ca53366295f4ad6142134b62f11e92ead037c7fb53455560c8ef0f1c94fafa924edfe92175aaa1c4ecc7aeeb72e0d050feacee907f40888c96a65545e07422bc6ac79f4c2d6ee3dab47d06e764682c72d7f16542fcfd05d2813cc182d1595016c179e1717c160300ab1ab0ac397e91bd193c036feb66a9ad2ec5b7967e7f5ff957f8b085a24", 0xf5}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x19) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 18:09:35 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r0, &(0x7f0000000040)=""/244, 0xf4) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f0000000100)="6653960d0ec5d684fa9f017ef0d60a3c27bc33760036001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479810be2aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e6517e615607676f8f9fc0ebf8b0b16d6f2c59957ab35d05692e664ebf68734ca53366295f4ad6142134b62f11e92ead037c7fb53455560c8ef0f1c94fafa924edfe92175aaa1c4ecc7aeeb72e0d050feacee907f40888c96a65545e07422bc6ac79f4c2d6ee3dab47d06e764682c72d7f16542fcfd05d2813cc182d1595016c179e1717c160300ab1ab0ac397e91bd193c036feb66a9ad2ec5b7967e7f5ff957f8b085a2437c5", 0xf7}], 0x3, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x19) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 18:09:35 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63}, [{}]}, 0xf) 18:09:35 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68}, [{0x0, 0x0, 0x0, 0x0, 0x800000000000000}]}, 0x78) 18:09:35 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) write$uinput_user_dev(r2, &(0x7f0000000480)={'syz0\x00', {}, 0x0, [0x4, 0x631, 0xaf, 0x2, 0x1b, 0x1, 0x10001, 0x1, 0x8, 0x3ff, 0x800, 0x7859, 0x7, 0x5, 0x7fff, 0xc05, 0xa4, 0x3, 0x4, 0xfffff800, 0x6, 0x7c, 0x6, 0xff, 0x2, 0x771], [0x0, 0x7ff, 0x1f, 0x1, 0x7, 0x2, 0x6, 0xd594, 0x3, 0x2a, 0x1c9b4fd4, 0x0, 0xfff, 0x5, 0xfffff801, 0x9, 0x3f, 0x8, 0x80, 0x6, 0x401, 0x8000, 0x1, 0xcb, 0x1, 0x6, 0x4, 0x92, 0x800000, 0x7, 0x1f, 0x140, 0x7ff, 0xabbc, 0x401, 0x0, 0x3, 0x20, 0x48, 0x12000, 0xfa, 0x1, 0xfffff6fe, 0x0, 0x7, 0x8818, 0x8000, 0x6, 0x1f, 0x8, 0x4, 0xff, 0x101, 0xd7, 0x8, 0x5, 0xffff8001, 0x5, 0xb621, 0x1, 0x9, 0x1395db38, 0x0, 0x3], [0x6, 0x6, 0x401, 0x2d5, 0xc08, 0x3, 0x7f, 0x7, 0x8, 0x4, 0xbe1a, 0x5, 0x3, 0x93c, 0x9, 0x80, 0x800, 0x7fff, 0x6, 0x1, 0x5, 0x2, 0x9, 0x7fff, 0x0, 0x8000, 0x4, 0x6, 0x2, 0x4, 0x6, 0xa2ec, 0x7, 0x100, 0x1, 0x3, 0x1f, 0x81, 0x10000, 0xc5, 0x7ff, 0x2aae236d, 0x4, 0x2000, 0x1c, 0x3, 0x2, 0x735c, 0x7fffffff, 0x6, 0xfffffffd, 0x4, 0x3ff, 0x7fffffff, 0x8, 0x224, 0x261, 0x8b8a, 0x100, 0xffffffff, 0x7fff, 0x41, 0x401, 0x200], [0x7, 0x4, 0x2, 0x5, 0x7, 0x1, 0x8, 0x0, 0x8, 0xffffff7b, 0x0, 0x5, 0x6, 0xcc9, 0x1, 0x5, 0x2, 0xfffffffe, 0xfffffff9, 0x0, 0x5, 0x101, 0x401, 0x2, 0x3, 0x3, 0x7f76, 0x3ff, 0x9, 0xc14, 0x3, 0x7, 0x5, 0x100, 0x6, 0x8, 0x2, 0xe0, 0x3f, 0x200, 0x3, 0x9, 0x3, 0x5, 0x95c6, 0x2, 0x6, 0x20, 0x3, 0x8, 0x9, 0x7, 0x9, 0x0, 0xffffd671, 0x1, 0x0, 0x853d, 0x7, 0x3ff, 0x0, 0xfde7, 0x1, 0x5]}, 0x45c) 18:09:35 executing program 2: socketpair$unix(0x1, 0x2, 0x0, 0x0) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) write$uinput_user_dev(r1, &(0x7f0000000480)={'syz0\x00', {}, 0x0, [0x4, 0x631, 0xaf, 0x2, 0x1b, 0x1, 0x10001, 0x1, 0x8, 0x3ff, 0x800, 0x7859, 0x7, 0x5, 0x7fff, 0xc05, 0xa4, 0x3, 0x4, 0xfffff800, 0x6, 0x7c, 0x6, 0xff, 0x2, 0x771, 0x5, 0xfffffff8, 0x81, 0x0, 0x6, 0x7, 0x6, 0x9, 0x3, 0x0, 0x282d298e, 0x7, 0x6, 0x3, 0xfaf9, 0x7, 0x2, 0xf9, 0xc2, 0x0, 0x8, 0x8, 0x9], [0x0, 0x7ff, 0x1f, 0x1, 0x7, 0x2, 0x6, 0xd594, 0x3, 0x2a, 0x1c9b4fd4, 0x0, 0xfff, 0x5, 0xfffff801, 0x9, 0x3f, 0x8, 0x80, 0x6, 0x401, 0x8000, 0x1, 0xcb, 0x1, 0x6, 0x4, 0x92, 0x800000, 0x7, 0x1f, 0x140, 0x7ff, 0xabbc, 0x401, 0x0, 0x3, 0x20, 0x48, 0x12000, 0xfa, 0x1, 0xfffff6fe, 0x0, 0x7, 0x8818, 0x8000, 0x6, 0x1f, 0x8, 0x4, 0xff, 0x101, 0xd7, 0x8, 0x5, 0xffff8001, 0x5, 0xb621, 0x1, 0x9, 0x1395db38, 0x0, 0x3], [0x6, 0x6, 0x401, 0x2d5, 0xc08, 0x3, 0x7f, 0x7, 0x8, 0x4, 0xbe1a, 0x5, 0x3, 0x93c, 0x9, 0x80, 0x800, 0x7fff, 0x6, 0x1, 0x5, 0x2, 0x9, 0x7fff, 0x0, 0x8000, 0x4, 0x6, 0x2, 0x4, 0x6, 0xa2ec, 0x7, 0x100, 0x1, 0x3, 0x1f, 0x81, 0x10000, 0xc5, 0x7ff, 0x2aae236d, 0x4, 0x2000, 0x1c, 0x3, 0x2, 0x735c, 0x7fffffff, 0x6, 0xfffffffd, 0x4, 0x3ff, 0x7fffffff, 0x8, 0x224, 0x261, 0x8b8a, 0x100, 0xffffffff, 0x7fff, 0x41, 0x401, 0x200], [0x7, 0x4, 0x2, 0x5, 0x7, 0x1, 0x8, 0x0, 0x8, 0xffffff7b, 0x0, 0x5, 0x6, 0xcc9, 0x1, 0x5, 0x2, 0xfffffffe, 0xfffffff9, 0x0, 0x5, 0x101, 0x401, 0x2, 0x3, 0x3, 0x7f76, 0x3ff, 0x9, 0xc14, 0x3, 0x7, 0x5, 0x100, 0x6, 0x8, 0x2, 0xe0, 0x3f, 0x200, 0x3, 0x9, 0x3, 0x5, 0x95c6, 0x2, 0x6, 0x20, 0x3, 0x8, 0x9, 0x7, 0x9, 0x0, 0xffffd671, 0x1, 0x0, 0x853d, 0x7, 0x3ff, 0x0, 0xfde7, 0x1, 0x5]}, 0x45c) 18:09:35 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68}, [{0x0, 0x0, 0x0, 0x0, 0x900000000000000}]}, 0x78) 18:09:35 executing program 2: socketpair$unix(0x1, 0x2, 0x0, 0x0) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) write$uinput_user_dev(r1, &(0x7f0000000480)={'syz0\x00', {}, 0x0, [0x4, 0x631, 0xaf, 0x2, 0x1b, 0x1, 0x10001, 0x1, 0x8, 0x3ff, 0x800, 0x7859, 0x7, 0x5, 0x7fff, 0xc05, 0xa4, 0x3, 0x4, 0xfffff800, 0x6, 0x7c, 0x6, 0xff, 0x2, 0x771, 0x5, 0xfffffff8, 0x81, 0x0, 0x6, 0x7, 0x6, 0x9, 0x3, 0x0, 0x282d298e, 0x7, 0x6, 0x3, 0xfaf9, 0x7, 0x2, 0xf9, 0xc2, 0x0, 0x8, 0x8, 0x9], [0x0, 0x7ff, 0x1f, 0x1, 0x7, 0x2, 0x6, 0xd594, 0x3, 0x2a, 0x1c9b4fd4, 0x0, 0xfff, 0x5, 0xfffff801, 0x9, 0x3f, 0x8, 0x80, 0x6, 0x401, 0x8000, 0x1, 0xcb, 0x1, 0x6, 0x4, 0x92, 0x800000, 0x7, 0x1f, 0x140, 0x7ff, 0xabbc, 0x401, 0x0, 0x3, 0x20, 0x48, 0x12000, 0xfa, 0x1, 0xfffff6fe, 0x0, 0x7, 0x8818, 0x8000, 0x6, 0x1f, 0x8, 0x4, 0xff, 0x101, 0xd7, 0x8, 0x5, 0xffff8001, 0x5, 0xb621, 0x1, 0x9, 0x1395db38, 0x0, 0x3], [0x6, 0x6, 0x401, 0x2d5, 0xc08, 0x3, 0x7f, 0x7, 0x8, 0x4, 0xbe1a, 0x5, 0x3, 0x93c, 0x9, 0x80, 0x800, 0x7fff, 0x6, 0x1, 0x5, 0x2, 0x9, 0x7fff, 0x0, 0x8000, 0x4, 0x6, 0x2, 0x4, 0x6, 0xa2ec, 0x7, 0x100, 0x1, 0x3, 0x1f, 0x81, 0x10000, 0xc5, 0x7ff, 0x2aae236d, 0x4, 0x2000, 0x1c, 0x3, 0x2, 0x735c, 0x7fffffff, 0x6, 0xfffffffd, 0x4, 0x3ff, 0x7fffffff, 0x8, 0x224, 0x261, 0x8b8a, 0x100, 0xffffffff, 0x7fff, 0x41, 0x401, 0x200], [0x7, 0x4, 0x2, 0x5, 0x7, 0x1, 0x8, 0x0, 0x8, 0xffffff7b, 0x0, 0x5, 0x6, 0xcc9, 0x1, 0x5, 0x2, 0xfffffffe, 0xfffffff9, 0x0, 0x5, 0x101, 0x401, 0x2, 0x3, 0x3, 0x7f76, 0x3ff, 0x9, 0xc14, 0x3, 0x7, 0x5, 0x100, 0x6, 0x8, 0x2, 0xe0, 0x3f, 0x200, 0x3, 0x9, 0x3, 0x5, 0x95c6, 0x2, 0x6, 0x20, 0x3, 0x8, 0x9, 0x7, 0x9, 0x0, 0xffffd671, 0x1, 0x0, 0x853d, 0x7, 0x3ff, 0x0, 0xfde7, 0x1, 0x5]}, 0x45c) 18:09:35 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63}, [{}]}, 0x10) 18:09:35 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) write$uinput_user_dev(r2, &(0x7f0000000480)={'syz0\x00', {}, 0x0, [0x4, 0x631, 0xaf, 0x2, 0x1b, 0x1, 0x10001, 0x1, 0x8, 0x3ff, 0x800, 0x7859, 0x7, 0x5, 0x7fff, 0xc05, 0xa4, 0x3, 0x4, 0xfffff800, 0x6, 0x7c, 0x6, 0xff, 0x2], [0x0, 0x7ff, 0x1f, 0x1, 0x7, 0x2, 0x6, 0xd594, 0x3, 0x2a, 0x1c9b4fd4, 0x0, 0xfff, 0x5, 0xfffff801, 0x9, 0x3f, 0x8, 0x80, 0x6, 0x401, 0x8000, 0x1, 0xcb, 0x1, 0x6, 0x4, 0x92, 0x800000, 0x7, 0x1f, 0x140, 0x7ff, 0xabbc, 0x401, 0x0, 0x3, 0x20, 0x48, 0x12000, 0xfa, 0x1, 0xfffff6fe, 0x0, 0x7, 0x8818, 0x8000, 0x6, 0x1f, 0x8, 0x4, 0xff, 0x101, 0xd7, 0x8, 0x5, 0xffff8001, 0x5, 0xb621, 0x1, 0x9, 0x1395db38, 0x0, 0x3], [0x6, 0x6, 0x401, 0x2d5, 0xc08, 0x3, 0x7f, 0x7, 0x8, 0x4, 0xbe1a, 0x5, 0x3, 0x93c, 0x9, 0x80, 0x800, 0x7fff, 0x6, 0x1, 0x5, 0x2, 0x9, 0x7fff, 0x0, 0x8000, 0x4, 0x6, 0x2, 0x4, 0x6, 0xa2ec, 0x7, 0x100, 0x1, 0x3, 0x1f, 0x81, 0x10000, 0xc5, 0x7ff, 0x2aae236d, 0x4, 0x2000, 0x1c, 0x3, 0x2, 0x735c, 0x7fffffff, 0x6, 0xfffffffd, 0x4, 0x3ff, 0x7fffffff, 0x8, 0x224, 0x261, 0x8b8a, 0x100, 0xffffffff, 0x7fff, 0x41, 0x401, 0x200], [0x7, 0x4, 0x2, 0x5, 0x7, 0x1, 0x8, 0x0, 0x8, 0xffffff7b, 0x0, 0x5, 0x6, 0xcc9, 0x1, 0x5, 0x2, 0xfffffffe, 0xfffffff9, 0x0, 0x5, 0x101, 0x401, 0x2, 0x3, 0x3, 0x7f76, 0x3ff, 0x9, 0xc14, 0x3, 0x7, 0x5, 0x100, 0x6, 0x8, 0x2, 0xe0, 0x3f, 0x200, 0x3, 0x9, 0x3, 0x5, 0x95c6, 0x2, 0x6, 0x20, 0x3, 0x8, 0x9, 0x7, 0x9, 0x0, 0xffffd671, 0x1, 0x0, 0x853d, 0x7, 0x3ff, 0x0, 0xfde7, 0x1, 0x5]}, 0x45c) 18:09:35 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63}, [{}]}, 0x11) 18:09:35 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68}, [{0x0, 0x0, 0x0, 0x0, 0xa00000000000000}]}, 0x78) 18:09:38 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="6653960d0ec5d684fa9f017ef0d60a3c27bc33760036001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479810be2aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e6517e615607676f8f9fc0ebf8b0b16d6f2c59957ab35d05692e664ebf68734ca53366295f4ad6142134b62f11e92ead037c7fb53455560c8ef0f1c94fafa924edfe92175aaa1c4ecc7aeeb72e0d050feacee907f40888c96a65545e07422bc6ac79f4c2d6ee3dab47d06e764682c72d7f16542fcfd05d2813cc182d1595016c179e1717c160300ab1ab0ac397e91bd193c036feb66a9ad2ec5b7967e7f5ff957f8b085a24", 0xf5}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x19) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 18:09:38 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r0, &(0x7f0000000040)=""/244, 0xf4) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f0000000100)="6653960d0ec5d684fa9f017ef0d60a3c27bc33760036001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479810be2aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e6517e615607676f8f9fc0ebf8b0b16d6f2c59957ab35d05692e664ebf68734ca53366295f4ad6142134b62f11e92ead037c7fb53455560c8ef0f1c94fafa924edfe92175aaa1c4ecc7aeeb72e0d050feacee907f40888c96a65545e07422bc6ac79f4c2d6ee3dab47d06e764682c72d7f16542fcfd05d2813cc182d1595016c179e1717c160300ab1ab0ac397e91bd193c036feb66a9ad2ec5b7967e7f5ff957f8b085a2437c5", 0xf7}], 0x3, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x19) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 18:09:38 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) write$uinput_user_dev(r2, &(0x7f0000000480)={'syz0\x00', {}, 0x0, [0x4, 0x631, 0xaf, 0x2, 0x1b, 0x1, 0x10001, 0x1, 0x8, 0x3ff, 0x800, 0x7859, 0x7, 0x5, 0x7fff, 0xc05, 0xa4, 0x3, 0x4, 0xfffff800, 0x6, 0x7c, 0x6, 0xff], [0x0, 0x7ff, 0x1f, 0x1, 0x7, 0x2, 0x6, 0xd594, 0x3, 0x2a, 0x1c9b4fd4, 0x0, 0xfff, 0x5, 0xfffff801, 0x9, 0x3f, 0x8, 0x80, 0x6, 0x401, 0x8000, 0x1, 0xcb, 0x1, 0x6, 0x4, 0x92, 0x800000, 0x7, 0x1f, 0x140, 0x7ff, 0xabbc, 0x401, 0x0, 0x3, 0x20, 0x48, 0x12000, 0xfa, 0x1, 0xfffff6fe, 0x0, 0x7, 0x8818, 0x8000, 0x6, 0x1f, 0x8, 0x4, 0xff, 0x101, 0xd7, 0x8, 0x5, 0xffff8001, 0x5, 0xb621, 0x1, 0x9, 0x1395db38, 0x0, 0x3], [0x6, 0x6, 0x401, 0x2d5, 0xc08, 0x3, 0x7f, 0x7, 0x8, 0x4, 0xbe1a, 0x5, 0x3, 0x93c, 0x9, 0x80, 0x800, 0x7fff, 0x6, 0x1, 0x5, 0x2, 0x9, 0x7fff, 0x0, 0x8000, 0x4, 0x6, 0x2, 0x4, 0x6, 0xa2ec, 0x7, 0x100, 0x1, 0x3, 0x1f, 0x81, 0x10000, 0xc5, 0x7ff, 0x2aae236d, 0x4, 0x2000, 0x1c, 0x3, 0x2, 0x735c, 0x7fffffff, 0x6, 0xfffffffd, 0x4, 0x3ff, 0x7fffffff, 0x8, 0x224, 0x261, 0x8b8a, 0x100, 0xffffffff, 0x7fff, 0x41, 0x401, 0x200], [0x7, 0x4, 0x2, 0x5, 0x7, 0x1, 0x8, 0x0, 0x8, 0xffffff7b, 0x0, 0x5, 0x6, 0xcc9, 0x1, 0x5, 0x2, 0xfffffffe, 0xfffffff9, 0x0, 0x5, 0x101, 0x401, 0x2, 0x3, 0x3, 0x7f76, 0x3ff, 0x9, 0xc14, 0x3, 0x7, 0x5, 0x100, 0x6, 0x8, 0x2, 0xe0, 0x3f, 0x200, 0x3, 0x9, 0x3, 0x5, 0x95c6, 0x2, 0x6, 0x20, 0x3, 0x8, 0x9, 0x7, 0x9, 0x0, 0xffffd671, 0x1, 0x0, 0x853d, 0x7, 0x3ff, 0x0, 0xfde7, 0x1, 0x5]}, 0x45c) 18:09:38 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) write$uinput_user_dev(r1, &(0x7f0000000480)={'syz0\x00', {}, 0x0, [0x4, 0x631, 0xaf, 0x2, 0x1b, 0x1, 0x10001, 0x1, 0x8, 0x3ff, 0x800, 0x7859, 0x7, 0x5, 0x7fff, 0xc05, 0xa4, 0x3, 0x4, 0xfffff800, 0x6, 0x7c, 0x6, 0xff, 0x2, 0x771, 0x5, 0xfffffff8, 0x81, 0x0, 0x6, 0x7, 0x6, 0x9, 0x3, 0x0, 0x282d298e, 0x7, 0x6, 0x3, 0xfaf9, 0x7, 0x2, 0xf9, 0xc2, 0x0, 0x8, 0x8, 0x9], [0x0, 0x7ff, 0x1f, 0x1, 0x7, 0x2, 0x6, 0xd594, 0x3, 0x2a, 0x1c9b4fd4, 0x0, 0xfff, 0x5, 0xfffff801, 0x9, 0x3f, 0x8, 0x80, 0x6, 0x401, 0x8000, 0x1, 0xcb, 0x1, 0x6, 0x4, 0x92, 0x800000, 0x7, 0x1f, 0x140, 0x7ff, 0xabbc, 0x401, 0x0, 0x3, 0x20, 0x48, 0x12000, 0xfa, 0x1, 0xfffff6fe, 0x0, 0x7, 0x8818, 0x8000, 0x6, 0x1f, 0x8, 0x4, 0xff, 0x101, 0xd7, 0x8, 0x5, 0xffff8001, 0x5, 0xb621, 0x1, 0x9, 0x1395db38, 0x0, 0x3], [0x6, 0x6, 0x401, 0x2d5, 0xc08, 0x3, 0x7f, 0x7, 0x8, 0x4, 0xbe1a, 0x5, 0x3, 0x93c, 0x9, 0x80, 0x800, 0x7fff, 0x6, 0x1, 0x5, 0x2, 0x9, 0x7fff, 0x0, 0x8000, 0x4, 0x6, 0x2, 0x4, 0x6, 0xa2ec, 0x7, 0x100, 0x1, 0x3, 0x1f, 0x81, 0x10000, 0xc5, 0x7ff, 0x2aae236d, 0x4, 0x2000, 0x1c, 0x3, 0x2, 0x735c, 0x7fffffff, 0x6, 0xfffffffd, 0x4, 0x3ff, 0x7fffffff, 0x8, 0x224, 0x261, 0x8b8a, 0x100, 0xffffffff, 0x7fff, 0x41, 0x401, 0x200], [0x7, 0x4, 0x2, 0x5, 0x7, 0x1, 0x8, 0x0, 0x8, 0xffffff7b, 0x0, 0x5, 0x6, 0xcc9, 0x1, 0x5, 0x2, 0xfffffffe, 0xfffffff9, 0x0, 0x5, 0x101, 0x401, 0x2, 0x3, 0x3, 0x7f76, 0x3ff, 0x9, 0xc14, 0x3, 0x7, 0x5, 0x100, 0x6, 0x8, 0x2, 0xe0, 0x3f, 0x200, 0x3, 0x9, 0x3, 0x5, 0x95c6, 0x2, 0x6, 0x20, 0x3, 0x8, 0x9, 0x7, 0x9, 0x0, 0xffffd671, 0x1, 0x0, 0x853d, 0x7, 0x3ff, 0x0, 0xfde7, 0x1, 0x5]}, 0x45c) 18:09:38 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68}, [{0x0, 0x0, 0x0, 0x0, 0xc00000000000000}]}, 0x78) 18:09:38 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63}, [{}]}, 0x12) 18:09:38 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) write$uinput_user_dev(r2, &(0x7f0000000480)={'syz0\x00', {}, 0x0, [0x4, 0x631, 0xaf, 0x2, 0x1b, 0x1, 0x10001, 0x1, 0x8, 0x3ff, 0x800, 0x7859, 0x7, 0x5, 0x7fff, 0xc05, 0xa4, 0x3, 0x4, 0xfffff800, 0x6, 0x7c, 0x6], [0x0, 0x7ff, 0x1f, 0x1, 0x7, 0x2, 0x6, 0xd594, 0x3, 0x2a, 0x1c9b4fd4, 0x0, 0xfff, 0x5, 0xfffff801, 0x9, 0x3f, 0x8, 0x80, 0x6, 0x401, 0x8000, 0x1, 0xcb, 0x1, 0x6, 0x4, 0x92, 0x800000, 0x7, 0x1f, 0x140, 0x7ff, 0xabbc, 0x401, 0x0, 0x3, 0x20, 0x48, 0x12000, 0xfa, 0x1, 0xfffff6fe, 0x0, 0x7, 0x8818, 0x8000, 0x6, 0x1f, 0x8, 0x4, 0xff, 0x101, 0xd7, 0x8, 0x5, 0xffff8001, 0x5, 0xb621, 0x1, 0x9, 0x1395db38, 0x0, 0x3], [0x6, 0x6, 0x401, 0x2d5, 0xc08, 0x3, 0x7f, 0x7, 0x8, 0x4, 0xbe1a, 0x5, 0x3, 0x93c, 0x9, 0x80, 0x800, 0x7fff, 0x6, 0x1, 0x5, 0x2, 0x9, 0x7fff, 0x0, 0x8000, 0x4, 0x6, 0x2, 0x4, 0x6, 0xa2ec, 0x7, 0x100, 0x1, 0x3, 0x1f, 0x81, 0x10000, 0xc5, 0x7ff, 0x2aae236d, 0x4, 0x2000, 0x1c, 0x3, 0x2, 0x735c, 0x7fffffff, 0x6, 0xfffffffd, 0x4, 0x3ff, 0x7fffffff, 0x8, 0x224, 0x261, 0x8b8a, 0x100, 0xffffffff, 0x7fff, 0x41, 0x401, 0x200], [0x7, 0x4, 0x2, 0x5, 0x7, 0x1, 0x8, 0x0, 0x8, 0xffffff7b, 0x0, 0x5, 0x6, 0xcc9, 0x1, 0x5, 0x2, 0xfffffffe, 0xfffffff9, 0x0, 0x5, 0x101, 0x401, 0x2, 0x3, 0x3, 0x7f76, 0x3ff, 0x9, 0xc14, 0x3, 0x7, 0x5, 0x100, 0x6, 0x8, 0x2, 0xe0, 0x3f, 0x200, 0x3, 0x9, 0x3, 0x5, 0x95c6, 0x2, 0x6, 0x20, 0x3, 0x8, 0x9, 0x7, 0x9, 0x0, 0xffffd671, 0x1, 0x0, 0x853d, 0x7, 0x3ff, 0x0, 0xfde7, 0x1, 0x5]}, 0x45c) 18:09:38 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68}, [{0x0, 0x0, 0x0, 0x0, 0xd00000000000000}]}, 0x78) 18:09:38 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) write$uinput_user_dev(r1, &(0x7f0000000480)={'syz0\x00', {}, 0x0, [0x4, 0x631, 0xaf, 0x2, 0x1b, 0x1, 0x10001, 0x1, 0x8, 0x3ff, 0x800, 0x7859, 0x7, 0x5, 0x7fff, 0xc05, 0xa4, 0x3, 0x4, 0xfffff800, 0x6, 0x7c, 0x6, 0xff, 0x2, 0x771, 0x5, 0xfffffff8, 0x81, 0x0, 0x6, 0x7, 0x6, 0x9, 0x3, 0x0, 0x282d298e, 0x7, 0x6, 0x3, 0xfaf9, 0x7, 0x2, 0xf9, 0xc2, 0x0, 0x8, 0x8, 0x9], [0x0, 0x7ff, 0x1f, 0x1, 0x7, 0x2, 0x6, 0xd594, 0x3, 0x2a, 0x1c9b4fd4, 0x0, 0xfff, 0x5, 0xfffff801, 0x9, 0x3f, 0x8, 0x80, 0x6, 0x401, 0x8000, 0x1, 0xcb, 0x1, 0x6, 0x4, 0x92, 0x800000, 0x7, 0x1f, 0x140, 0x7ff, 0xabbc, 0x401, 0x0, 0x3, 0x20, 0x48, 0x12000, 0xfa, 0x1, 0xfffff6fe, 0x0, 0x7, 0x8818, 0x8000, 0x6, 0x1f, 0x8, 0x4, 0xff, 0x101, 0xd7, 0x8, 0x5, 0xffff8001, 0x5, 0xb621, 0x1, 0x9, 0x1395db38, 0x0, 0x3], [0x6, 0x6, 0x401, 0x2d5, 0xc08, 0x3, 0x7f, 0x7, 0x8, 0x4, 0xbe1a, 0x5, 0x3, 0x93c, 0x9, 0x80, 0x800, 0x7fff, 0x6, 0x1, 0x5, 0x2, 0x9, 0x7fff, 0x0, 0x8000, 0x4, 0x6, 0x2, 0x4, 0x6, 0xa2ec, 0x7, 0x100, 0x1, 0x3, 0x1f, 0x81, 0x10000, 0xc5, 0x7ff, 0x2aae236d, 0x4, 0x2000, 0x1c, 0x3, 0x2, 0x735c, 0x7fffffff, 0x6, 0xfffffffd, 0x4, 0x3ff, 0x7fffffff, 0x8, 0x224, 0x261, 0x8b8a, 0x100, 0xffffffff, 0x7fff, 0x41, 0x401, 0x200], [0x7, 0x4, 0x2, 0x5, 0x7, 0x1, 0x8, 0x0, 0x8, 0xffffff7b, 0x0, 0x5, 0x6, 0xcc9, 0x1, 0x5, 0x2, 0xfffffffe, 0xfffffff9, 0x0, 0x5, 0x101, 0x401, 0x2, 0x3, 0x3, 0x7f76, 0x3ff, 0x9, 0xc14, 0x3, 0x7, 0x5, 0x100, 0x6, 0x8, 0x2, 0xe0, 0x3f, 0x200, 0x3, 0x9, 0x3, 0x5, 0x95c6, 0x2, 0x6, 0x20, 0x3, 0x8, 0x9, 0x7, 0x9, 0x0, 0xffffd671, 0x1, 0x0, 0x853d, 0x7, 0x3ff, 0x0, 0xfde7, 0x1, 0x5]}, 0x45c) 18:09:38 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63}, [{}]}, 0x13) 18:09:38 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68}, [{0x0, 0x0, 0x0, 0x0, 0xe00000000000000}]}, 0x78) 18:09:38 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) write$uinput_user_dev(r2, &(0x7f0000000480)={'syz0\x00', {}, 0x0, [0x4, 0x631, 0xaf, 0x2, 0x1b, 0x1, 0x10001, 0x1, 0x8, 0x3ff, 0x800, 0x7859, 0x7, 0x5, 0x7fff, 0xc05, 0xa4, 0x3, 0x4, 0xfffff800, 0x6, 0x7c], [0x0, 0x7ff, 0x1f, 0x1, 0x7, 0x2, 0x6, 0xd594, 0x3, 0x2a, 0x1c9b4fd4, 0x0, 0xfff, 0x5, 0xfffff801, 0x9, 0x3f, 0x8, 0x80, 0x6, 0x401, 0x8000, 0x1, 0xcb, 0x1, 0x6, 0x4, 0x92, 0x800000, 0x7, 0x1f, 0x140, 0x7ff, 0xabbc, 0x401, 0x0, 0x3, 0x20, 0x48, 0x12000, 0xfa, 0x1, 0xfffff6fe, 0x0, 0x7, 0x8818, 0x8000, 0x6, 0x1f, 0x8, 0x4, 0xff, 0x101, 0xd7, 0x8, 0x5, 0xffff8001, 0x5, 0xb621, 0x1, 0x9, 0x1395db38, 0x0, 0x3], [0x6, 0x6, 0x401, 0x2d5, 0xc08, 0x3, 0x7f, 0x7, 0x8, 0x4, 0xbe1a, 0x5, 0x3, 0x93c, 0x9, 0x80, 0x800, 0x7fff, 0x6, 0x1, 0x5, 0x2, 0x9, 0x7fff, 0x0, 0x8000, 0x4, 0x6, 0x2, 0x4, 0x6, 0xa2ec, 0x7, 0x100, 0x1, 0x3, 0x1f, 0x81, 0x10000, 0xc5, 0x7ff, 0x2aae236d, 0x4, 0x2000, 0x1c, 0x3, 0x2, 0x735c, 0x7fffffff, 0x6, 0xfffffffd, 0x4, 0x3ff, 0x7fffffff, 0x8, 0x224, 0x261, 0x8b8a, 0x100, 0xffffffff, 0x7fff, 0x41, 0x401, 0x200], [0x7, 0x4, 0x2, 0x5, 0x7, 0x1, 0x8, 0x0, 0x8, 0xffffff7b, 0x0, 0x5, 0x6, 0xcc9, 0x1, 0x5, 0x2, 0xfffffffe, 0xfffffff9, 0x0, 0x5, 0x101, 0x401, 0x2, 0x3, 0x3, 0x7f76, 0x3ff, 0x9, 0xc14, 0x3, 0x7, 0x5, 0x100, 0x6, 0x8, 0x2, 0xe0, 0x3f, 0x200, 0x3, 0x9, 0x3, 0x5, 0x95c6, 0x2, 0x6, 0x20, 0x3, 0x8, 0x9, 0x7, 0x9, 0x0, 0xffffd671, 0x1, 0x0, 0x853d, 0x7, 0x3ff, 0x0, 0xfde7, 0x1, 0x5]}, 0x45c) 18:09:41 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="6653960d0ec5d684fa9f017ef0d60a3c27bc33760036001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479810be2aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e6517e615607676f8f9fc0ebf8b0b16d6f2c59957ab35d05692e664ebf68734ca53366295f4ad6142134b62f11e92ead037c7fb53455560c8ef0f1c94fafa924edfe92175aaa1c4ecc7aeeb72e0d050feacee907f40888c96a65545e07422bc6ac79f4c2d6ee3dab47d06e764682c72d7f16542fcfd05d2813cc182d1595016c179e1717c160300ab1ab0ac397e91bd193c036feb66a9ad2ec5b7967e7f5ff957f8b085a2437c5", 0xf7}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x19) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 18:09:41 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r0, &(0x7f0000000040)=""/244, 0xf4) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="6653960d0ec5d684fa9f017ef0d60a3c27bc33760036001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479810be2aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e6517e615607676f8f9fc0ebf8b0b16d6f2c59957ab35d05692e664ebf68734ca53366295f4ad6142134b62f11e92ead037c7fb53455560c8ef0f1c94fafa924edfe92175aaa1c4ecc7aeeb72e0d050feacee907f40888c96a65545e07422bc6ac79f4c2d6ee3dab47d06e764682c72d7f16542fcfd05d2813cc182d1595016c179e1717c160300ab1ab0ac397e91bd193c036feb66a9ad2ec5b7967e7f5ff957f8b085a2437c5", 0xf7}], 0x4, 0x0) ptrace$setopts(0xffffffffffffffff, r1, 0x0, 0x0) tkill(r1, 0x19) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 18:09:41 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) write$uinput_user_dev(r1, &(0x7f0000000480)={'syz0\x00', {}, 0x0, [0x4, 0x631, 0xaf, 0x2, 0x1b, 0x1, 0x10001, 0x1, 0x8, 0x3ff, 0x800, 0x7859, 0x7, 0x5, 0x7fff, 0xc05, 0xa4, 0x3, 0x4, 0xfffff800, 0x6, 0x7c, 0x6, 0xff, 0x2, 0x771, 0x5, 0xfffffff8, 0x81, 0x0, 0x6, 0x7, 0x6, 0x9, 0x3, 0x0, 0x282d298e, 0x7, 0x6, 0x3, 0xfaf9, 0x7, 0x2, 0xf9, 0xc2, 0x0, 0x8, 0x8, 0x9], [0x0, 0x7ff, 0x1f, 0x1, 0x7, 0x2, 0x6, 0xd594, 0x3, 0x2a, 0x1c9b4fd4, 0x0, 0xfff, 0x5, 0xfffff801, 0x9, 0x3f, 0x8, 0x80, 0x6, 0x401, 0x8000, 0x1, 0xcb, 0x1, 0x6, 0x4, 0x92, 0x800000, 0x7, 0x1f, 0x140, 0x7ff, 0xabbc, 0x401, 0x0, 0x3, 0x20, 0x48, 0x12000, 0xfa, 0x1, 0xfffff6fe, 0x0, 0x7, 0x8818, 0x8000, 0x6, 0x1f, 0x8, 0x4, 0xff, 0x101, 0xd7, 0x8, 0x5, 0xffff8001, 0x5, 0xb621, 0x1, 0x9, 0x1395db38, 0x0, 0x3], [0x6, 0x6, 0x401, 0x2d5, 0xc08, 0x3, 0x7f, 0x7, 0x8, 0x4, 0xbe1a, 0x5, 0x3, 0x93c, 0x9, 0x80, 0x800, 0x7fff, 0x6, 0x1, 0x5, 0x2, 0x9, 0x7fff, 0x0, 0x8000, 0x4, 0x6, 0x2, 0x4, 0x6, 0xa2ec, 0x7, 0x100, 0x1, 0x3, 0x1f, 0x81, 0x10000, 0xc5, 0x7ff, 0x2aae236d, 0x4, 0x2000, 0x1c, 0x3, 0x2, 0x735c, 0x7fffffff, 0x6, 0xfffffffd, 0x4, 0x3ff, 0x7fffffff, 0x8, 0x224, 0x261, 0x8b8a, 0x100, 0xffffffff, 0x7fff, 0x41, 0x401, 0x200], [0x7, 0x4, 0x2, 0x5, 0x7, 0x1, 0x8, 0x0, 0x8, 0xffffff7b, 0x0, 0x5, 0x6, 0xcc9, 0x1, 0x5, 0x2, 0xfffffffe, 0xfffffff9, 0x0, 0x5, 0x101, 0x401, 0x2, 0x3, 0x3, 0x7f76, 0x3ff, 0x9, 0xc14, 0x3, 0x7, 0x5, 0x100, 0x6, 0x8, 0x2, 0xe0, 0x3f, 0x200, 0x3, 0x9, 0x3, 0x5, 0x95c6, 0x2, 0x6, 0x20, 0x3, 0x8, 0x9, 0x7, 0x9, 0x0, 0xffffd671, 0x1, 0x0, 0x853d, 0x7, 0x3ff, 0x0, 0xfde7, 0x1, 0x5]}, 0x45c) 18:09:41 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63}, [{}]}, 0x14) 18:09:41 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) write$uinput_user_dev(r2, &(0x7f0000000480)={'syz0\x00', {}, 0x0, [0x4, 0x631, 0xaf, 0x2, 0x1b, 0x1, 0x10001, 0x1, 0x8, 0x3ff, 0x800, 0x7859, 0x7, 0x5, 0x7fff, 0xc05, 0xa4, 0x3, 0x4, 0xfffff800, 0x6], [0x0, 0x7ff, 0x1f, 0x1, 0x7, 0x2, 0x6, 0xd594, 0x3, 0x2a, 0x1c9b4fd4, 0x0, 0xfff, 0x5, 0xfffff801, 0x9, 0x3f, 0x8, 0x80, 0x6, 0x401, 0x8000, 0x1, 0xcb, 0x1, 0x6, 0x4, 0x92, 0x800000, 0x7, 0x1f, 0x140, 0x7ff, 0xabbc, 0x401, 0x0, 0x3, 0x20, 0x48, 0x12000, 0xfa, 0x1, 0xfffff6fe, 0x0, 0x7, 0x8818, 0x8000, 0x6, 0x1f, 0x8, 0x4, 0xff, 0x101, 0xd7, 0x8, 0x5, 0xffff8001, 0x5, 0xb621, 0x1, 0x9, 0x1395db38, 0x0, 0x3], [0x6, 0x6, 0x401, 0x2d5, 0xc08, 0x3, 0x7f, 0x7, 0x8, 0x4, 0xbe1a, 0x5, 0x3, 0x93c, 0x9, 0x80, 0x800, 0x7fff, 0x6, 0x1, 0x5, 0x2, 0x9, 0x7fff, 0x0, 0x8000, 0x4, 0x6, 0x2, 0x4, 0x6, 0xa2ec, 0x7, 0x100, 0x1, 0x3, 0x1f, 0x81, 0x10000, 0xc5, 0x7ff, 0x2aae236d, 0x4, 0x2000, 0x1c, 0x3, 0x2, 0x735c, 0x7fffffff, 0x6, 0xfffffffd, 0x4, 0x3ff, 0x7fffffff, 0x8, 0x224, 0x261, 0x8b8a, 0x100, 0xffffffff, 0x7fff, 0x41, 0x401, 0x200], [0x7, 0x4, 0x2, 0x5, 0x7, 0x1, 0x8, 0x0, 0x8, 0xffffff7b, 0x0, 0x5, 0x6, 0xcc9, 0x1, 0x5, 0x2, 0xfffffffe, 0xfffffff9, 0x0, 0x5, 0x101, 0x401, 0x2, 0x3, 0x3, 0x7f76, 0x3ff, 0x9, 0xc14, 0x3, 0x7, 0x5, 0x100, 0x6, 0x8, 0x2, 0xe0, 0x3f, 0x200, 0x3, 0x9, 0x3, 0x5, 0x95c6, 0x2, 0x6, 0x20, 0x3, 0x8, 0x9, 0x7, 0x9, 0x0, 0xffffd671, 0x1, 0x0, 0x853d, 0x7, 0x3ff, 0x0, 0xfde7, 0x1, 0x5]}, 0x45c) 18:09:41 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68}, [{0x0, 0x0, 0x0, 0x0, 0xf00000000000000}]}, 0x78) 18:09:41 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="6653960d0ec5d684fa9f017ef0d60a3c27bc33760036001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479810be2aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e6517e615607676f8f9fc0ebf8b0b16d6f2c59957ab35d05692e664ebf68734ca53366295f4ad6142134b62f11e92ead037c7fb53455560c8ef0f1c94fafa924edfe92175aaa1c4ecc7aeeb72e0d050feacee907f40888c96a65545e07422bc6ac79f4c2d6ee3dab47d06e764682c72d7f16542fcfd05d2813cc182d1595016c179e1717c160300ab1ab0ac397e91bd193c036feb66a9ad2ec5b7967e7f5ff957f8b085a2437c5", 0xf7}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x19) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 18:09:41 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63}, [{}]}, 0x15) 18:09:41 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) write$uinput_user_dev(r1, &(0x7f0000000480)={'syz0\x00', {}, 0x0, [0x4, 0x631, 0xaf, 0x2, 0x1b, 0x1, 0x10001, 0x1, 0x8, 0x3ff, 0x800, 0x7859, 0x7, 0x5, 0x7fff, 0xc05, 0xa4, 0x3, 0x4, 0xfffff800, 0x6, 0x7c, 0x6, 0xff, 0x2, 0x771, 0x5, 0xfffffff8, 0x81, 0x0, 0x6, 0x7, 0x6, 0x9, 0x3, 0x0, 0x282d298e, 0x7, 0x6, 0x3, 0xfaf9, 0x7, 0x2, 0xf9, 0xc2, 0x0, 0x8, 0x8, 0x9], [0x0, 0x7ff, 0x1f, 0x1, 0x7, 0x2, 0x6, 0xd594, 0x3, 0x2a, 0x1c9b4fd4, 0x0, 0xfff, 0x5, 0xfffff801, 0x9, 0x3f, 0x8, 0x80, 0x6, 0x401, 0x8000, 0x1, 0xcb, 0x1, 0x6, 0x4, 0x92, 0x800000, 0x7, 0x1f, 0x140, 0x7ff, 0xabbc, 0x401, 0x0, 0x3, 0x20, 0x48, 0x12000, 0xfa, 0x1, 0xfffff6fe, 0x0, 0x7, 0x8818, 0x8000, 0x6, 0x1f, 0x8, 0x4, 0xff, 0x101, 0xd7, 0x8, 0x5, 0xffff8001, 0x5, 0xb621, 0x1, 0x9, 0x1395db38, 0x0, 0x3], [0x6, 0x6, 0x401, 0x2d5, 0xc08, 0x3, 0x7f, 0x7, 0x8, 0x4, 0xbe1a, 0x5, 0x3, 0x93c, 0x9, 0x80, 0x800, 0x7fff, 0x6, 0x1, 0x5, 0x2, 0x9, 0x7fff, 0x0, 0x8000, 0x4, 0x6, 0x2, 0x4, 0x6, 0xa2ec, 0x7, 0x100, 0x1, 0x3, 0x1f, 0x81, 0x10000, 0xc5, 0x7ff, 0x2aae236d, 0x4, 0x2000, 0x1c, 0x3, 0x2, 0x735c, 0x7fffffff, 0x6, 0xfffffffd, 0x4, 0x3ff, 0x7fffffff, 0x8, 0x224, 0x261, 0x8b8a, 0x100, 0xffffffff, 0x7fff, 0x41, 0x401, 0x200], [0x7, 0x4, 0x2, 0x5, 0x7, 0x1, 0x8, 0x0, 0x8, 0xffffff7b, 0x0, 0x5, 0x6, 0xcc9, 0x1, 0x5, 0x2, 0xfffffffe, 0xfffffff9, 0x0, 0x5, 0x101, 0x401, 0x2, 0x3, 0x3, 0x7f76, 0x3ff, 0x9, 0xc14, 0x3, 0x7, 0x5, 0x100, 0x6, 0x8, 0x2, 0xe0, 0x3f, 0x200, 0x3, 0x9, 0x3, 0x5, 0x95c6, 0x2, 0x6, 0x20, 0x3, 0x8, 0x9, 0x7, 0x9, 0x0, 0xffffd671, 0x1, 0x0, 0x853d, 0x7, 0x3ff, 0x0, 0xfde7, 0x1, 0x5]}, 0x45c) 18:09:41 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68}, [{0x0, 0x0, 0x0, 0x0, 0x1800000000000000}]}, 0x78) 18:09:41 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) write$uinput_user_dev(r2, &(0x7f0000000480)={'syz0\x00', {}, 0x0, [0x4, 0x631, 0xaf, 0x2, 0x1b, 0x1, 0x10001, 0x1, 0x8, 0x3ff, 0x800, 0x7859, 0x7, 0x5, 0x7fff, 0xc05, 0xa4, 0x3, 0x4, 0xfffff800], [0x0, 0x7ff, 0x1f, 0x1, 0x7, 0x2, 0x6, 0xd594, 0x3, 0x2a, 0x1c9b4fd4, 0x0, 0xfff, 0x5, 0xfffff801, 0x9, 0x3f, 0x8, 0x80, 0x6, 0x401, 0x8000, 0x1, 0xcb, 0x1, 0x6, 0x4, 0x92, 0x800000, 0x7, 0x1f, 0x140, 0x7ff, 0xabbc, 0x401, 0x0, 0x3, 0x20, 0x48, 0x12000, 0xfa, 0x1, 0xfffff6fe, 0x0, 0x7, 0x8818, 0x8000, 0x6, 0x1f, 0x8, 0x4, 0xff, 0x101, 0xd7, 0x8, 0x5, 0xffff8001, 0x5, 0xb621, 0x1, 0x9, 0x1395db38, 0x0, 0x3], [0x6, 0x6, 0x401, 0x2d5, 0xc08, 0x3, 0x7f, 0x7, 0x8, 0x4, 0xbe1a, 0x5, 0x3, 0x93c, 0x9, 0x80, 0x800, 0x7fff, 0x6, 0x1, 0x5, 0x2, 0x9, 0x7fff, 0x0, 0x8000, 0x4, 0x6, 0x2, 0x4, 0x6, 0xa2ec, 0x7, 0x100, 0x1, 0x3, 0x1f, 0x81, 0x10000, 0xc5, 0x7ff, 0x2aae236d, 0x4, 0x2000, 0x1c, 0x3, 0x2, 0x735c, 0x7fffffff, 0x6, 0xfffffffd, 0x4, 0x3ff, 0x7fffffff, 0x8, 0x224, 0x261, 0x8b8a, 0x100, 0xffffffff, 0x7fff, 0x41, 0x401, 0x200], [0x7, 0x4, 0x2, 0x5, 0x7, 0x1, 0x8, 0x0, 0x8, 0xffffff7b, 0x0, 0x5, 0x6, 0xcc9, 0x1, 0x5, 0x2, 0xfffffffe, 0xfffffff9, 0x0, 0x5, 0x101, 0x401, 0x2, 0x3, 0x3, 0x7f76, 0x3ff, 0x9, 0xc14, 0x3, 0x7, 0x5, 0x100, 0x6, 0x8, 0x2, 0xe0, 0x3f, 0x200, 0x3, 0x9, 0x3, 0x5, 0x95c6, 0x2, 0x6, 0x20, 0x3, 0x8, 0x9, 0x7, 0x9, 0x0, 0xffffd671, 0x1, 0x0, 0x853d, 0x7, 0x3ff, 0x0, 0xfde7, 0x1, 0x5]}, 0x45c) 18:09:41 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r0, &(0x7f0000000040)=""/244, 0xf4) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="6653960d0ec5d684fa9f017ef0d60a3c27bc33760036001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479810be2aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e6517e615607676f8f9fc0ebf8b0b16d6f2c59957ab35d05692e664ebf68734ca53366295f4ad6142134b62f11e92ead037c7fb53455560c8ef0f1c94fafa924edfe92175aaa1c4ecc7aeeb72e0d050feacee907f40888c96a65545e07422bc6ac79f4c2d6ee3dab47d06e764682c72d7f16542fcfd05d2813cc182d1595016c179e1717c160300ab1ab0ac397e91bd193c036feb66a9ad2ec5b7967e7f5ff957f8b085a2437c5", 0xf7}], 0x4, 0x0) ptrace$setopts(0xffffffffffffffff, r1, 0x0, 0x0) tkill(r1, 0x19) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 18:09:41 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63}, [{}]}, 0x16) 18:09:41 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r0, &(0x7f0000000040)=""/244, 0xf4) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="6653960d0ec5d684fa9f017ef0d60a3c27bc33760036001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479810be2aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e6517e615607676f8f9fc0ebf8b0b16d6f2c59957ab35d05692e664ebf68734ca53366295f4ad6142134b62f11e92ead037c7fb53455560c8ef0f1c94fafa924edfe92175aaa1c4ecc7aeeb72e0d050feacee907f40888c96a65545e07422bc6ac79f4c2d6ee3dab47d06e764682c72d7f16542fcfd05d2813cc182d1595016c179e1717c160300ab1ab0ac397e91bd193c036feb66a9ad2ec5b7967e7f5ff957f8b085a2437c5", 0xf7}], 0x4, 0x0) ptrace$setopts(0xffffffffffffffff, r1, 0x0, 0x0) tkill(r1, 0x19) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 18:09:41 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) write$uinput_user_dev(r2, &(0x7f0000000480)={'syz0\x00', {}, 0x0, [0x4, 0x631, 0xaf, 0x2, 0x1b, 0x1, 0x10001, 0x1, 0x8, 0x3ff, 0x800, 0x7859, 0x7, 0x5, 0x7fff, 0xc05, 0xa4, 0x3, 0x4], [0x0, 0x7ff, 0x1f, 0x1, 0x7, 0x2, 0x6, 0xd594, 0x3, 0x2a, 0x1c9b4fd4, 0x0, 0xfff, 0x5, 0xfffff801, 0x9, 0x3f, 0x8, 0x80, 0x6, 0x401, 0x8000, 0x1, 0xcb, 0x1, 0x6, 0x4, 0x92, 0x800000, 0x7, 0x1f, 0x140, 0x7ff, 0xabbc, 0x401, 0x0, 0x3, 0x20, 0x48, 0x12000, 0xfa, 0x1, 0xfffff6fe, 0x0, 0x7, 0x8818, 0x8000, 0x6, 0x1f, 0x8, 0x4, 0xff, 0x101, 0xd7, 0x8, 0x5, 0xffff8001, 0x5, 0xb621, 0x1, 0x9, 0x1395db38, 0x0, 0x3], [0x6, 0x6, 0x401, 0x2d5, 0xc08, 0x3, 0x7f, 0x7, 0x8, 0x4, 0xbe1a, 0x5, 0x3, 0x93c, 0x9, 0x80, 0x800, 0x7fff, 0x6, 0x1, 0x5, 0x2, 0x9, 0x7fff, 0x0, 0x8000, 0x4, 0x6, 0x2, 0x4, 0x6, 0xa2ec, 0x7, 0x100, 0x1, 0x3, 0x1f, 0x81, 0x10000, 0xc5, 0x7ff, 0x2aae236d, 0x4, 0x2000, 0x1c, 0x3, 0x2, 0x735c, 0x7fffffff, 0x6, 0xfffffffd, 0x4, 0x3ff, 0x7fffffff, 0x8, 0x224, 0x261, 0x8b8a, 0x100, 0xffffffff, 0x7fff, 0x41, 0x401, 0x200], [0x7, 0x4, 0x2, 0x5, 0x7, 0x1, 0x8, 0x0, 0x8, 0xffffff7b, 0x0, 0x5, 0x6, 0xcc9, 0x1, 0x5, 0x2, 0xfffffffe, 0xfffffff9, 0x0, 0x5, 0x101, 0x401, 0x2, 0x3, 0x3, 0x7f76, 0x3ff, 0x9, 0xc14, 0x3, 0x7, 0x5, 0x100, 0x6, 0x8, 0x2, 0xe0, 0x3f, 0x200, 0x3, 0x9, 0x3, 0x5, 0x95c6, 0x2, 0x6, 0x20, 0x3, 0x8, 0x9, 0x7, 0x9, 0x0, 0xffffd671, 0x1, 0x0, 0x853d, 0x7, 0x3ff, 0x0, 0xfde7, 0x1, 0x5]}, 0x45c) 18:09:41 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68}, [{0x0, 0x0, 0x0, 0x0, 0x1900000000000000}]}, 0x78) 18:09:41 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) write$uinput_user_dev(r1, &(0x7f0000000480)={'syz0\x00', {}, 0x0, [0x4, 0x631, 0xaf, 0x2, 0x1b, 0x1, 0x10001, 0x1, 0x8, 0x3ff, 0x800, 0x7859, 0x7, 0x5, 0x7fff, 0xc05, 0xa4, 0x3, 0x4, 0xfffff800, 0x6, 0x7c, 0x6, 0xff, 0x2, 0x771, 0x5, 0xfffffff8, 0x81, 0x0, 0x6, 0x7, 0x6, 0x9, 0x3, 0x0, 0x282d298e, 0x7, 0x6, 0x3, 0xfaf9, 0x7, 0x2, 0xf9, 0xc2, 0x0, 0x8, 0x8, 0x9], [0x0, 0x7ff, 0x1f, 0x1, 0x7, 0x2, 0x6, 0xd594, 0x3, 0x2a, 0x1c9b4fd4, 0x0, 0xfff, 0x5, 0xfffff801, 0x9, 0x3f, 0x8, 0x80, 0x6, 0x401, 0x8000, 0x1, 0xcb, 0x1, 0x6, 0x4, 0x92, 0x800000, 0x7, 0x1f, 0x140, 0x7ff, 0xabbc, 0x401, 0x0, 0x3, 0x20, 0x48, 0x12000, 0xfa, 0x1, 0xfffff6fe, 0x0, 0x7, 0x8818, 0x8000, 0x6, 0x1f, 0x8, 0x4, 0xff, 0x101, 0xd7, 0x8, 0x5, 0xffff8001, 0x5, 0xb621, 0x1, 0x9, 0x1395db38, 0x0, 0x3], [0x6, 0x6, 0x401, 0x2d5, 0xc08, 0x3, 0x7f, 0x7, 0x8, 0x4, 0xbe1a, 0x5, 0x3, 0x93c, 0x9, 0x80, 0x800, 0x7fff, 0x6, 0x1, 0x5, 0x2, 0x9, 0x7fff, 0x0, 0x8000, 0x4, 0x6, 0x2, 0x4, 0x6, 0xa2ec, 0x7, 0x100, 0x1, 0x3, 0x1f, 0x81, 0x10000, 0xc5, 0x7ff, 0x2aae236d, 0x4, 0x2000, 0x1c, 0x3, 0x2, 0x735c, 0x7fffffff, 0x6, 0xfffffffd, 0x4, 0x3ff, 0x7fffffff, 0x8, 0x224, 0x261, 0x8b8a, 0x100, 0xffffffff, 0x7fff, 0x41, 0x401, 0x200], [0x7, 0x4, 0x2, 0x5, 0x7, 0x1, 0x8, 0x0, 0x8, 0xffffff7b, 0x0, 0x5, 0x6, 0xcc9, 0x1, 0x5, 0x2, 0xfffffffe, 0xfffffff9, 0x0, 0x5, 0x101, 0x401, 0x2, 0x3, 0x3, 0x7f76, 0x3ff, 0x9, 0xc14, 0x3, 0x7, 0x5, 0x100, 0x6, 0x8, 0x2, 0xe0, 0x3f, 0x200, 0x3, 0x9, 0x3, 0x5, 0x95c6, 0x2, 0x6, 0x20, 0x3, 0x8, 0x9, 0x7, 0x9, 0x0, 0xffffd671, 0x1, 0x0, 0x853d, 0x7, 0x3ff, 0x0, 0xfde7, 0x1, 0x5]}, 0x45c) 18:09:41 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63}, [{}]}, 0x17) 18:09:44 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="6653960d0ec5d684fa9f017ef0d60a3c27bc33760036001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479810be2aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e6517e615607676f8f9fc0ebf8b0b16d6f2c59957ab35d05692e664ebf68734ca53366295f4ad6142134b62f11e92ead037c7fb53455560c8ef0f1c94fafa924edfe92175aaa1c4ecc7aeeb72e0d050feacee907f40888c96a65545e07422bc6ac79f4c2d6ee3dab47d06e764682c72d7f16542fcfd05d2813cc182d1595016c179e1717c160300ab1ab0ac397e91bd193c036feb66a9ad2ec5b7967e7f5ff957f8b085a2437c5", 0xf7}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x19) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 18:09:44 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r0, &(0x7f0000000040)=""/244, 0xf4) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="6653960d0ec5d684fa9f017ef0d60a3c27bc33760036001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479810be2aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e6517e615607676f8f9fc0ebf8b0b16d6f2c59957ab35d05692e664ebf68734ca53366295f4ad6142134b62f11e92ead037c7fb53455560c8ef0f1c94fafa924edfe92175aaa1c4ecc7aeeb72e0d050feacee907f40888c96a65545e07422bc6ac79f4c2d6ee3dab47d06e764682c72d7f16542fcfd05d2813cc182d1595016c179e1717c160300ab1ab0ac397e91bd193c036feb66a9ad2ec5b7967e7f5ff957f8b085a2437c5", 0xf7}], 0x4, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(r1, 0x19) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 18:09:44 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) write$uinput_user_dev(r2, &(0x7f0000000480)={'syz0\x00', {}, 0x0, [0x4, 0x631, 0xaf, 0x2, 0x1b, 0x1, 0x10001, 0x1, 0x8, 0x3ff, 0x800, 0x7859, 0x7, 0x5, 0x7fff, 0xc05, 0xa4, 0x3], [0x0, 0x7ff, 0x1f, 0x1, 0x7, 0x2, 0x6, 0xd594, 0x3, 0x2a, 0x1c9b4fd4, 0x0, 0xfff, 0x5, 0xfffff801, 0x9, 0x3f, 0x8, 0x80, 0x6, 0x401, 0x8000, 0x1, 0xcb, 0x1, 0x6, 0x4, 0x92, 0x800000, 0x7, 0x1f, 0x140, 0x7ff, 0xabbc, 0x401, 0x0, 0x3, 0x20, 0x48, 0x12000, 0xfa, 0x1, 0xfffff6fe, 0x0, 0x7, 0x8818, 0x8000, 0x6, 0x1f, 0x8, 0x4, 0xff, 0x101, 0xd7, 0x8, 0x5, 0xffff8001, 0x5, 0xb621, 0x1, 0x9, 0x1395db38, 0x0, 0x3], [0x6, 0x6, 0x401, 0x2d5, 0xc08, 0x3, 0x7f, 0x7, 0x8, 0x4, 0xbe1a, 0x5, 0x3, 0x93c, 0x9, 0x80, 0x800, 0x7fff, 0x6, 0x1, 0x5, 0x2, 0x9, 0x7fff, 0x0, 0x8000, 0x4, 0x6, 0x2, 0x4, 0x6, 0xa2ec, 0x7, 0x100, 0x1, 0x3, 0x1f, 0x81, 0x10000, 0xc5, 0x7ff, 0x2aae236d, 0x4, 0x2000, 0x1c, 0x3, 0x2, 0x735c, 0x7fffffff, 0x6, 0xfffffffd, 0x4, 0x3ff, 0x7fffffff, 0x8, 0x224, 0x261, 0x8b8a, 0x100, 0xffffffff, 0x7fff, 0x41, 0x401, 0x200], [0x7, 0x4, 0x2, 0x5, 0x7, 0x1, 0x8, 0x0, 0x8, 0xffffff7b, 0x0, 0x5, 0x6, 0xcc9, 0x1, 0x5, 0x2, 0xfffffffe, 0xfffffff9, 0x0, 0x5, 0x101, 0x401, 0x2, 0x3, 0x3, 0x7f76, 0x3ff, 0x9, 0xc14, 0x3, 0x7, 0x5, 0x100, 0x6, 0x8, 0x2, 0xe0, 0x3f, 0x200, 0x3, 0x9, 0x3, 0x5, 0x95c6, 0x2, 0x6, 0x20, 0x3, 0x8, 0x9, 0x7, 0x9, 0x0, 0xffffd671, 0x1, 0x0, 0x853d, 0x7, 0x3ff, 0x0, 0xfde7, 0x1, 0x5]}, 0x45c) 18:09:44 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) write$uinput_user_dev(r1, &(0x7f0000000480)={'syz0\x00', {}, 0x0, [0x4, 0x631, 0xaf, 0x2, 0x1b, 0x1, 0x10001, 0x1, 0x8, 0x3ff, 0x800, 0x7859, 0x7, 0x5, 0x7fff, 0xc05, 0xa4, 0x3, 0x4, 0xfffff800, 0x6, 0x7c, 0x6, 0xff, 0x2, 0x771, 0x5, 0xfffffff8, 0x81, 0x0, 0x6, 0x7, 0x6, 0x9, 0x3, 0x0, 0x282d298e, 0x7, 0x6, 0x3, 0xfaf9, 0x7, 0x2, 0xf9, 0xc2, 0x0, 0x8, 0x8, 0x9], [0x0, 0x7ff, 0x1f, 0x1, 0x7, 0x2, 0x6, 0xd594, 0x3, 0x2a, 0x1c9b4fd4, 0x0, 0xfff, 0x5, 0xfffff801, 0x9, 0x3f, 0x8, 0x80, 0x6, 0x401, 0x8000, 0x1, 0xcb, 0x1, 0x6, 0x4, 0x92, 0x800000, 0x7, 0x1f, 0x140, 0x7ff, 0xabbc, 0x401, 0x0, 0x3, 0x20, 0x48, 0x12000, 0xfa, 0x1, 0xfffff6fe, 0x0, 0x7, 0x8818, 0x8000, 0x6, 0x1f, 0x8, 0x4, 0xff, 0x101, 0xd7, 0x8, 0x5, 0xffff8001, 0x5, 0xb621, 0x1, 0x9, 0x1395db38, 0x0, 0x3], [0x6, 0x6, 0x401, 0x2d5, 0xc08, 0x3, 0x7f, 0x7, 0x8, 0x4, 0xbe1a, 0x5, 0x3, 0x93c, 0x9, 0x80, 0x800, 0x7fff, 0x6, 0x1, 0x5, 0x2, 0x9, 0x7fff, 0x0, 0x8000, 0x4, 0x6, 0x2, 0x4, 0x6, 0xa2ec, 0x7, 0x100, 0x1, 0x3, 0x1f, 0x81, 0x10000, 0xc5, 0x7ff, 0x2aae236d, 0x4, 0x2000, 0x1c, 0x3, 0x2, 0x735c, 0x7fffffff, 0x6, 0xfffffffd, 0x4, 0x3ff, 0x7fffffff, 0x8, 0x224, 0x261, 0x8b8a, 0x100, 0xffffffff, 0x7fff, 0x41, 0x401, 0x200], [0x7, 0x4, 0x2, 0x5, 0x7, 0x1, 0x8, 0x0, 0x8, 0xffffff7b, 0x0, 0x5, 0x6, 0xcc9, 0x1, 0x5, 0x2, 0xfffffffe, 0xfffffff9, 0x0, 0x5, 0x101, 0x401, 0x2, 0x3, 0x3, 0x7f76, 0x3ff, 0x9, 0xc14, 0x3, 0x7, 0x5, 0x100, 0x6, 0x8, 0x2, 0xe0, 0x3f, 0x200, 0x3, 0x9, 0x3, 0x5, 0x95c6, 0x2, 0x6, 0x20, 0x3, 0x8, 0x9, 0x7, 0x9, 0x0, 0xffffd671, 0x1, 0x0, 0x853d, 0x7, 0x3ff, 0x0, 0xfde7, 0x1, 0x5]}, 0x45c) 18:09:44 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68}, [{0x0, 0x0, 0x0, 0x0, 0x1a00000000000000}]}, 0x78) 18:09:44 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63}, [{}]}, 0x18) 18:09:44 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r0, &(0x7f0000000040)=""/244, 0xf4) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="6653960d0ec5d684fa9f017ef0d60a3c27bc33760036001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479810be2aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e6517e615607676f8f9fc0ebf8b0b16d6f2c59957ab35d05692e664ebf68734ca53366295f4ad6142134b62f11e92ead037c7fb53455560c8ef0f1c94fafa924edfe92175aaa1c4ecc7aeeb72e0d050feacee907f40888c96a65545e07422bc6ac79f4c2d6ee3dab47d06e764682c72d7f16542fcfd05d2813cc182d1595016c179e1717c160300ab1ab0ac397e91bd193c036feb66a9ad2ec5b7967e7f5ff957f8b085a2437c5", 0xf7}], 0x4, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(r1, 0x19) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 18:09:44 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68}, [{0x0, 0x0, 0x0, 0x0, 0x1b00000000000000}]}, 0x78) 18:09:44 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) write$uinput_user_dev(r2, &(0x7f0000000480)={'syz0\x00', {}, 0x0, [0x4, 0x631, 0xaf, 0x2, 0x1b, 0x1, 0x10001, 0x1, 0x8, 0x3ff, 0x800, 0x7859, 0x7, 0x5, 0x7fff, 0xc05, 0xa4], [0x0, 0x7ff, 0x1f, 0x1, 0x7, 0x2, 0x6, 0xd594, 0x3, 0x2a, 0x1c9b4fd4, 0x0, 0xfff, 0x5, 0xfffff801, 0x9, 0x3f, 0x8, 0x80, 0x6, 0x401, 0x8000, 0x1, 0xcb, 0x1, 0x6, 0x4, 0x92, 0x800000, 0x7, 0x1f, 0x140, 0x7ff, 0xabbc, 0x401, 0x0, 0x3, 0x20, 0x48, 0x12000, 0xfa, 0x1, 0xfffff6fe, 0x0, 0x7, 0x8818, 0x8000, 0x6, 0x1f, 0x8, 0x4, 0xff, 0x101, 0xd7, 0x8, 0x5, 0xffff8001, 0x5, 0xb621, 0x1, 0x9, 0x1395db38, 0x0, 0x3], [0x6, 0x6, 0x401, 0x2d5, 0xc08, 0x3, 0x7f, 0x7, 0x8, 0x4, 0xbe1a, 0x5, 0x3, 0x93c, 0x9, 0x80, 0x800, 0x7fff, 0x6, 0x1, 0x5, 0x2, 0x9, 0x7fff, 0x0, 0x8000, 0x4, 0x6, 0x2, 0x4, 0x6, 0xa2ec, 0x7, 0x100, 0x1, 0x3, 0x1f, 0x81, 0x10000, 0xc5, 0x7ff, 0x2aae236d, 0x4, 0x2000, 0x1c, 0x3, 0x2, 0x735c, 0x7fffffff, 0x6, 0xfffffffd, 0x4, 0x3ff, 0x7fffffff, 0x8, 0x224, 0x261, 0x8b8a, 0x100, 0xffffffff, 0x7fff, 0x41, 0x401, 0x200], [0x7, 0x4, 0x2, 0x5, 0x7, 0x1, 0x8, 0x0, 0x8, 0xffffff7b, 0x0, 0x5, 0x6, 0xcc9, 0x1, 0x5, 0x2, 0xfffffffe, 0xfffffff9, 0x0, 0x5, 0x101, 0x401, 0x2, 0x3, 0x3, 0x7f76, 0x3ff, 0x9, 0xc14, 0x3, 0x7, 0x5, 0x100, 0x6, 0x8, 0x2, 0xe0, 0x3f, 0x200, 0x3, 0x9, 0x3, 0x5, 0x95c6, 0x2, 0x6, 0x20, 0x3, 0x8, 0x9, 0x7, 0x9, 0x0, 0xffffd671, 0x1, 0x0, 0x853d, 0x7, 0x3ff, 0x0, 0xfde7, 0x1, 0x5]}, 0x45c) 18:09:44 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) write$uinput_user_dev(r2, &(0x7f0000000480)={'syz0\x00', {}, 0x0, [0x4, 0x631, 0xaf, 0x2, 0x1b, 0x1, 0x10001, 0x1, 0x8, 0x3ff, 0x800, 0x7859, 0x7, 0x5, 0x7fff, 0xc05, 0xa4, 0x3, 0x4, 0xfffff800, 0x6, 0x7c, 0x6, 0xff, 0x2, 0x771, 0x5, 0xfffffff8, 0x81, 0x0, 0x6, 0x7, 0x6, 0x9, 0x3, 0x0, 0x282d298e, 0x7, 0x6, 0x3, 0xfaf9, 0x7, 0x2, 0xf9, 0xc2, 0x0, 0x8, 0x8, 0x9], [0x0, 0x7ff, 0x1f, 0x1, 0x7, 0x2, 0x6, 0xd594, 0x3, 0x2a, 0x1c9b4fd4, 0x0, 0xfff, 0x5, 0xfffff801, 0x9, 0x3f, 0x8, 0x80, 0x6, 0x401, 0x8000, 0x1, 0xcb, 0x1, 0x6, 0x4, 0x92, 0x800000, 0x7, 0x1f, 0x140, 0x7ff, 0xabbc, 0x401, 0x0, 0x3, 0x20, 0x48, 0x12000, 0xfa, 0x1, 0xfffff6fe, 0x0, 0x7, 0x8818, 0x8000, 0x6, 0x1f, 0x8, 0x4, 0xff, 0x101, 0xd7, 0x8, 0x5, 0xffff8001, 0x5, 0xb621, 0x1, 0x9, 0x1395db38, 0x0, 0x3], [0x6, 0x6, 0x401, 0x2d5, 0xc08, 0x3, 0x7f, 0x7, 0x8, 0x4, 0xbe1a, 0x5, 0x3, 0x93c, 0x9, 0x80, 0x800, 0x7fff, 0x6, 0x1, 0x5, 0x2, 0x9, 0x7fff, 0x0, 0x8000, 0x4, 0x6, 0x2, 0x4, 0x6, 0xa2ec, 0x7, 0x100, 0x1, 0x3, 0x1f, 0x81, 0x10000, 0xc5, 0x7ff, 0x2aae236d, 0x4, 0x2000, 0x1c, 0x3, 0x2, 0x735c, 0x7fffffff, 0x6, 0xfffffffd, 0x4, 0x3ff, 0x7fffffff, 0x8, 0x224, 0x261, 0x8b8a, 0x100, 0xffffffff, 0x7fff, 0x41, 0x401, 0x200], [0x7, 0x4, 0x2, 0x5, 0x7, 0x1, 0x8, 0x0, 0x8, 0xffffff7b, 0x0, 0x5, 0x6, 0xcc9, 0x1, 0x5, 0x2, 0xfffffffe, 0xfffffff9, 0x0, 0x5, 0x101, 0x401, 0x2, 0x3, 0x3, 0x7f76, 0x3ff, 0x9, 0xc14, 0x3, 0x7, 0x5, 0x100, 0x6, 0x8, 0x2, 0xe0, 0x3f, 0x200, 0x3, 0x9, 0x3, 0x5, 0x95c6, 0x2, 0x6, 0x20, 0x3, 0x8, 0x9, 0x7, 0x9, 0x0, 0xffffd671, 0x1, 0x0, 0x853d, 0x7, 0x3ff, 0x0, 0xfde7, 0x1, 0x5]}, 0x45c) 18:09:44 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63}, [{}]}, 0x19) 18:09:44 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r0, &(0x7f0000000040)=""/244, 0xf4) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="6653960d0ec5d684fa9f017ef0d60a3c27bc33760036001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479810be2aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e6517e615607676f8f9fc0ebf8b0b16d6f2c59957ab35d05692e664ebf68734ca53366295f4ad6142134b62f11e92ead037c7fb53455560c8ef0f1c94fafa924edfe92175aaa1c4ecc7aeeb72e0d050feacee907f40888c96a65545e07422bc6ac79f4c2d6ee3dab47d06e764682c72d7f16542fcfd05d2813cc182d1595016c179e1717c160300ab1ab0ac397e91bd193c036feb66a9ad2ec5b7967e7f5ff957f8b085a2437c5", 0xf7}], 0x4, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(r1, 0x19) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 18:09:47 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f0000000100)="6653960d0ec5d684fa9f017ef0d60a3c27bc33760036001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479810be2aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e6517e615607676f8f9fc0ebf8b0b16d6f2c59957ab35d05692e664ebf68734ca53366295f4ad6142134b62f11e92ead037c7fb53455560c8ef0f1c94fafa924edfe92175aaa1c4ecc7aeeb72e0d050feacee907f40888c96a65545e07422bc6ac79f4c2d6ee3dab47d06e764682c72d7f16542fcfd05d2813cc182d1595016c179e1717c160300ab1ab0ac397e91bd193c036feb66a9ad2ec5b7967e7f5ff957f8b085a2437c59a", 0xf8}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x19) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 18:09:47 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68}, [{0x0, 0x0, 0x0, 0x0, 0x1e00000000000000}]}, 0x78) 18:09:47 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) write$uinput_user_dev(r2, &(0x7f0000000480)={'syz0\x00', {}, 0x0, [0x4, 0x631, 0xaf, 0x2, 0x1b, 0x1, 0x10001, 0x1, 0x8, 0x3ff, 0x800, 0x7859, 0x7, 0x5, 0x7fff, 0xc05, 0xa4, 0x3, 0x4, 0xfffff800, 0x6, 0x7c, 0x6, 0xff, 0x2, 0x771, 0x5, 0xfffffff8, 0x81, 0x0, 0x6, 0x7, 0x6, 0x9, 0x3, 0x0, 0x282d298e, 0x7, 0x6, 0x3, 0xfaf9, 0x7, 0x2, 0xf9, 0xc2, 0x0, 0x8, 0x8, 0x9], [0x0, 0x7ff, 0x1f, 0x1, 0x7, 0x2, 0x6, 0xd594, 0x3, 0x2a, 0x1c9b4fd4, 0x0, 0xfff, 0x5, 0xfffff801, 0x9, 0x3f, 0x8, 0x80, 0x6, 0x401, 0x8000, 0x1, 0xcb, 0x1, 0x6, 0x4, 0x92, 0x800000, 0x7, 0x1f, 0x140, 0x7ff, 0xabbc, 0x401, 0x0, 0x3, 0x20, 0x48, 0x12000, 0xfa, 0x1, 0xfffff6fe, 0x0, 0x7, 0x8818, 0x8000, 0x6, 0x1f, 0x8, 0x4, 0xff, 0x101, 0xd7, 0x8, 0x5, 0xffff8001, 0x5, 0xb621, 0x1, 0x9, 0x1395db38, 0x0, 0x3], [0x6, 0x6, 0x401, 0x2d5, 0xc08, 0x3, 0x7f, 0x7, 0x8, 0x4, 0xbe1a, 0x5, 0x3, 0x93c, 0x9, 0x80, 0x800, 0x7fff, 0x6, 0x1, 0x5, 0x2, 0x9, 0x7fff, 0x0, 0x8000, 0x4, 0x6, 0x2, 0x4, 0x6, 0xa2ec, 0x7, 0x100, 0x1, 0x3, 0x1f, 0x81, 0x10000, 0xc5, 0x7ff, 0x2aae236d, 0x4, 0x2000, 0x1c, 0x3, 0x2, 0x735c, 0x7fffffff, 0x6, 0xfffffffd, 0x4, 0x3ff, 0x7fffffff, 0x8, 0x224, 0x261, 0x8b8a, 0x100, 0xffffffff, 0x7fff, 0x41, 0x401, 0x200], [0x7, 0x4, 0x2, 0x5, 0x7, 0x1, 0x8, 0x0, 0x8, 0xffffff7b, 0x0, 0x5, 0x6, 0xcc9, 0x1, 0x5, 0x2, 0xfffffffe, 0xfffffff9, 0x0, 0x5, 0x101, 0x401, 0x2, 0x3, 0x3, 0x7f76, 0x3ff, 0x9, 0xc14, 0x3, 0x7, 0x5, 0x100, 0x6, 0x8, 0x2, 0xe0, 0x3f, 0x200, 0x3, 0x9, 0x3, 0x5, 0x95c6, 0x2, 0x6, 0x20, 0x3, 0x8, 0x9, 0x7, 0x9, 0x0, 0xffffd671, 0x1, 0x0, 0x853d, 0x7, 0x3ff, 0x0, 0xfde7, 0x1, 0x5]}, 0x45c) 18:09:47 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) write$uinput_user_dev(r2, &(0x7f0000000480)={'syz0\x00', {}, 0x0, [0x4, 0x631, 0xaf, 0x2, 0x1b, 0x1, 0x10001, 0x1, 0x8, 0x3ff, 0x800, 0x7859, 0x7, 0x5, 0x7fff, 0xc05], [0x0, 0x7ff, 0x1f, 0x1, 0x7, 0x2, 0x6, 0xd594, 0x3, 0x2a, 0x1c9b4fd4, 0x0, 0xfff, 0x5, 0xfffff801, 0x9, 0x3f, 0x8, 0x80, 0x6, 0x401, 0x8000, 0x1, 0xcb, 0x1, 0x6, 0x4, 0x92, 0x800000, 0x7, 0x1f, 0x140, 0x7ff, 0xabbc, 0x401, 0x0, 0x3, 0x20, 0x48, 0x12000, 0xfa, 0x1, 0xfffff6fe, 0x0, 0x7, 0x8818, 0x8000, 0x6, 0x1f, 0x8, 0x4, 0xff, 0x101, 0xd7, 0x8, 0x5, 0xffff8001, 0x5, 0xb621, 0x1, 0x9, 0x1395db38, 0x0, 0x3], [0x6, 0x6, 0x401, 0x2d5, 0xc08, 0x3, 0x7f, 0x7, 0x8, 0x4, 0xbe1a, 0x5, 0x3, 0x93c, 0x9, 0x80, 0x800, 0x7fff, 0x6, 0x1, 0x5, 0x2, 0x9, 0x7fff, 0x0, 0x8000, 0x4, 0x6, 0x2, 0x4, 0x6, 0xa2ec, 0x7, 0x100, 0x1, 0x3, 0x1f, 0x81, 0x10000, 0xc5, 0x7ff, 0x2aae236d, 0x4, 0x2000, 0x1c, 0x3, 0x2, 0x735c, 0x7fffffff, 0x6, 0xfffffffd, 0x4, 0x3ff, 0x7fffffff, 0x8, 0x224, 0x261, 0x8b8a, 0x100, 0xffffffff, 0x7fff, 0x41, 0x401, 0x200], [0x7, 0x4, 0x2, 0x5, 0x7, 0x1, 0x8, 0x0, 0x8, 0xffffff7b, 0x0, 0x5, 0x6, 0xcc9, 0x1, 0x5, 0x2, 0xfffffffe, 0xfffffff9, 0x0, 0x5, 0x101, 0x401, 0x2, 0x3, 0x3, 0x7f76, 0x3ff, 0x9, 0xc14, 0x3, 0x7, 0x5, 0x100, 0x6, 0x8, 0x2, 0xe0, 0x3f, 0x200, 0x3, 0x9, 0x3, 0x5, 0x95c6, 0x2, 0x6, 0x20, 0x3, 0x8, 0x9, 0x7, 0x9, 0x0, 0xffffd671, 0x1, 0x0, 0x853d, 0x7, 0x3ff, 0x0, 0xfde7, 0x1, 0x5]}, 0x45c) 18:09:47 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63}, [{}]}, 0x1a) 18:09:47 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r0, &(0x7f0000000040)=""/244, 0xf4) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="6653960d0ec5d684fa9f017ef0d60a3c27bc33760036001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479810be2aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e6517e615607676f8f9fc0ebf8b0b16d6f2c59957ab35d05692e664ebf68734ca53366295f4ad6142134b62f11e92ead037c7fb53455560c8ef0f1c94fafa924edfe92175aaa1c4ecc7aeeb72e0d050feacee907f40888c96a65545e07422bc6ac79f4c2d6ee3dab47d06e764682c72d7f16542fcfd05d2813cc182d1595016c179e1717c160300ab1ab0ac397e91bd193c036feb66a9ad2ec5b7967e7f5ff957f8b085a2437c5", 0xf7}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(0x0, 0x19) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 18:09:47 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68}, [{0x0, 0x0, 0x0, 0x0, 0x3e00000000000000}]}, 0x78) 18:09:47 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63}, [{}]}, 0x1b) 18:09:47 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) write$uinput_user_dev(r2, &(0x7f0000000480)={'syz0\x00', {}, 0x0, [0x4, 0x631, 0xaf, 0x2, 0x1b, 0x1, 0x10001, 0x1, 0x8, 0x3ff, 0x800, 0x7859, 0x7, 0x5, 0x7fff, 0xc05, 0xa4, 0x3, 0x4, 0xfffff800, 0x6, 0x7c, 0x6, 0xff, 0x2, 0x771, 0x5, 0xfffffff8, 0x81, 0x0, 0x6, 0x7, 0x6, 0x9, 0x3, 0x0, 0x282d298e, 0x7, 0x6, 0x3, 0xfaf9, 0x7, 0x2, 0xf9, 0xc2, 0x0, 0x8, 0x8, 0x9], [0x0, 0x7ff, 0x1f, 0x1, 0x7, 0x2, 0x6, 0xd594, 0x3, 0x2a, 0x1c9b4fd4, 0x0, 0xfff, 0x5, 0xfffff801, 0x9, 0x3f, 0x8, 0x80, 0x6, 0x401, 0x8000, 0x1, 0xcb, 0x1, 0x6, 0x4, 0x92, 0x800000, 0x7, 0x1f, 0x140, 0x7ff, 0xabbc, 0x401, 0x0, 0x3, 0x20, 0x48, 0x12000, 0xfa, 0x1, 0xfffff6fe, 0x0, 0x7, 0x8818, 0x8000, 0x6, 0x1f, 0x8, 0x4, 0xff, 0x101, 0xd7, 0x8, 0x5, 0xffff8001, 0x5, 0xb621, 0x1, 0x9, 0x1395db38, 0x0, 0x3], [0x6, 0x6, 0x401, 0x2d5, 0xc08, 0x3, 0x7f, 0x7, 0x8, 0x4, 0xbe1a, 0x5, 0x3, 0x93c, 0x9, 0x80, 0x800, 0x7fff, 0x6, 0x1, 0x5, 0x2, 0x9, 0x7fff, 0x0, 0x8000, 0x4, 0x6, 0x2, 0x4, 0x6, 0xa2ec, 0x7, 0x100, 0x1, 0x3, 0x1f, 0x81, 0x10000, 0xc5, 0x7ff, 0x2aae236d, 0x4, 0x2000, 0x1c, 0x3, 0x2, 0x735c, 0x7fffffff, 0x6, 0xfffffffd, 0x4, 0x3ff, 0x7fffffff, 0x8, 0x224, 0x261, 0x8b8a, 0x100, 0xffffffff, 0x7fff, 0x41, 0x401, 0x200], [0x7, 0x4, 0x2, 0x5, 0x7, 0x1, 0x8, 0x0, 0x8, 0xffffff7b, 0x0, 0x5, 0x6, 0xcc9, 0x1, 0x5, 0x2, 0xfffffffe, 0xfffffff9, 0x0, 0x5, 0x101, 0x401, 0x2, 0x3, 0x3, 0x7f76, 0x3ff, 0x9, 0xc14, 0x3, 0x7, 0x5, 0x100, 0x6, 0x8, 0x2, 0xe0, 0x3f, 0x200, 0x3, 0x9, 0x3, 0x5, 0x95c6, 0x2, 0x6, 0x20, 0x3, 0x8, 0x9, 0x7, 0x9, 0x0, 0xffffd671, 0x1, 0x0, 0x853d, 0x7, 0x3ff, 0x0, 0xfde7, 0x1, 0x5]}, 0x45c) 18:09:47 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) write$uinput_user_dev(r2, &(0x7f0000000480)={'syz0\x00', {}, 0x0, [0x4, 0x631, 0xaf, 0x2, 0x1b, 0x1, 0x10001, 0x1, 0x8, 0x3ff, 0x800, 0x7859, 0x7, 0x5, 0x7fff], [0x0, 0x7ff, 0x1f, 0x1, 0x7, 0x2, 0x6, 0xd594, 0x3, 0x2a, 0x1c9b4fd4, 0x0, 0xfff, 0x5, 0xfffff801, 0x9, 0x3f, 0x8, 0x80, 0x6, 0x401, 0x8000, 0x1, 0xcb, 0x1, 0x6, 0x4, 0x92, 0x800000, 0x7, 0x1f, 0x140, 0x7ff, 0xabbc, 0x401, 0x0, 0x3, 0x20, 0x48, 0x12000, 0xfa, 0x1, 0xfffff6fe, 0x0, 0x7, 0x8818, 0x8000, 0x6, 0x1f, 0x8, 0x4, 0xff, 0x101, 0xd7, 0x8, 0x5, 0xffff8001, 0x5, 0xb621, 0x1, 0x9, 0x1395db38, 0x0, 0x3], [0x6, 0x6, 0x401, 0x2d5, 0xc08, 0x3, 0x7f, 0x7, 0x8, 0x4, 0xbe1a, 0x5, 0x3, 0x93c, 0x9, 0x80, 0x800, 0x7fff, 0x6, 0x1, 0x5, 0x2, 0x9, 0x7fff, 0x0, 0x8000, 0x4, 0x6, 0x2, 0x4, 0x6, 0xa2ec, 0x7, 0x100, 0x1, 0x3, 0x1f, 0x81, 0x10000, 0xc5, 0x7ff, 0x2aae236d, 0x4, 0x2000, 0x1c, 0x3, 0x2, 0x735c, 0x7fffffff, 0x6, 0xfffffffd, 0x4, 0x3ff, 0x7fffffff, 0x8, 0x224, 0x261, 0x8b8a, 0x100, 0xffffffff, 0x7fff, 0x41, 0x401, 0x200], [0x7, 0x4, 0x2, 0x5, 0x7, 0x1, 0x8, 0x0, 0x8, 0xffffff7b, 0x0, 0x5, 0x6, 0xcc9, 0x1, 0x5, 0x2, 0xfffffffe, 0xfffffff9, 0x0, 0x5, 0x101, 0x401, 0x2, 0x3, 0x3, 0x7f76, 0x3ff, 0x9, 0xc14, 0x3, 0x7, 0x5, 0x100, 0x6, 0x8, 0x2, 0xe0, 0x3f, 0x200, 0x3, 0x9, 0x3, 0x5, 0x95c6, 0x2, 0x6, 0x20, 0x3, 0x8, 0x9, 0x7, 0x9, 0x0, 0xffffd671, 0x1, 0x0, 0x853d, 0x7, 0x3ff, 0x0, 0xfde7, 0x1, 0x5]}, 0x45c) 18:09:47 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$sequencer(0xffffffffffffff9c, 0x0, 0x8002, 0x0) write$uinput_user_dev(r2, &(0x7f0000000480)={'syz0\x00', {}, 0x0, [0x4, 0x631, 0xaf, 0x2, 0x1b, 0x1, 0x10001, 0x1, 0x8, 0x3ff, 0x800, 0x7859, 0x7, 0x5, 0x7fff, 0xc05, 0xa4, 0x3, 0x4, 0xfffff800, 0x6, 0x7c, 0x6, 0xff, 0x2, 0x771, 0x5, 0xfffffff8, 0x81, 0x0, 0x6, 0x7, 0x6, 0x9, 0x3, 0x0, 0x282d298e, 0x7, 0x6, 0x3, 0xfaf9, 0x7, 0x2, 0xf9, 0xc2, 0x0, 0x8, 0x8, 0x9], [0x0, 0x7ff, 0x1f, 0x1, 0x7, 0x2, 0x6, 0xd594, 0x3, 0x2a, 0x1c9b4fd4, 0x0, 0xfff, 0x5, 0xfffff801, 0x9, 0x3f, 0x8, 0x80, 0x6, 0x401, 0x8000, 0x1, 0xcb, 0x1, 0x6, 0x4, 0x92, 0x800000, 0x7, 0x1f, 0x140, 0x7ff, 0xabbc, 0x401, 0x0, 0x3, 0x20, 0x48, 0x12000, 0xfa, 0x1, 0xfffff6fe, 0x0, 0x7, 0x8818, 0x8000, 0x6, 0x1f, 0x8, 0x4, 0xff, 0x101, 0xd7, 0x8, 0x5, 0xffff8001, 0x5, 0xb621, 0x1, 0x9, 0x1395db38, 0x0, 0x3], [0x6, 0x6, 0x401, 0x2d5, 0xc08, 0x3, 0x7f, 0x7, 0x8, 0x4, 0xbe1a, 0x5, 0x3, 0x93c, 0x9, 0x80, 0x800, 0x7fff, 0x6, 0x1, 0x5, 0x2, 0x9, 0x7fff, 0x0, 0x8000, 0x4, 0x6, 0x2, 0x4, 0x6, 0xa2ec, 0x7, 0x100, 0x1, 0x3, 0x1f, 0x81, 0x10000, 0xc5, 0x7ff, 0x2aae236d, 0x4, 0x2000, 0x1c, 0x3, 0x2, 0x735c, 0x7fffffff, 0x6, 0xfffffffd, 0x4, 0x3ff, 0x7fffffff, 0x8, 0x224, 0x261, 0x8b8a, 0x100, 0xffffffff, 0x7fff, 0x41, 0x401, 0x200], [0x7, 0x4, 0x2, 0x5, 0x7, 0x1, 0x8, 0x0, 0x8, 0xffffff7b, 0x0, 0x5, 0x6, 0xcc9, 0x1, 0x5, 0x2, 0xfffffffe, 0xfffffff9, 0x0, 0x5, 0x101, 0x401, 0x2, 0x3, 0x3, 0x7f76, 0x3ff, 0x9, 0xc14, 0x3, 0x7, 0x5, 0x100, 0x6, 0x8, 0x2, 0xe0, 0x3f, 0x200, 0x3, 0x9, 0x3, 0x5, 0x95c6, 0x2, 0x6, 0x20, 0x3, 0x8, 0x9, 0x7, 0x9, 0x0, 0xffffd671, 0x1, 0x0, 0x853d, 0x7, 0x3ff, 0x0, 0xfde7, 0x1, 0x5]}, 0x45c) 18:09:47 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63}, [{}]}, 0x1c) 18:09:50 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f0000000100)="6653960d0ec5d684fa9f017ef0d60a3c27bc33760036001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479810be2aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e6517e615607676f8f9fc0ebf8b0b16d6f2c59957ab35d05692e664ebf68734ca53366295f4ad6142134b62f11e92ead037c7fb53455560c8ef0f1c94fafa924edfe92175aaa1c4ecc7aeeb72e0d050feacee907f40888c96a65545e07422bc6ac79f4c2d6ee3dab47d06e764682c72d7f16542fcfd05d2813cc182d1595016c179e1717c160300ab1ab0ac397e91bd193c036feb66a9ad2ec5b7967e7f5ff957f8b085a2437c59a", 0xf8}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x19) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 18:09:50 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68}, [{0x0, 0x0, 0x0, 0x0, 0x3f00000000000000}]}, 0x78) 18:09:50 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) write$uinput_user_dev(r2, &(0x7f0000000480)={'syz0\x00', {}, 0x0, [0x4, 0x631, 0xaf, 0x2, 0x1b, 0x1, 0x10001, 0x1, 0x8, 0x3ff, 0x800, 0x7859, 0x7, 0x5], [0x0, 0x7ff, 0x1f, 0x1, 0x7, 0x2, 0x6, 0xd594, 0x3, 0x2a, 0x1c9b4fd4, 0x0, 0xfff, 0x5, 0xfffff801, 0x9, 0x3f, 0x8, 0x80, 0x6, 0x401, 0x8000, 0x1, 0xcb, 0x1, 0x6, 0x4, 0x92, 0x800000, 0x7, 0x1f, 0x140, 0x7ff, 0xabbc, 0x401, 0x0, 0x3, 0x20, 0x48, 0x12000, 0xfa, 0x1, 0xfffff6fe, 0x0, 0x7, 0x8818, 0x8000, 0x6, 0x1f, 0x8, 0x4, 0xff, 0x101, 0xd7, 0x8, 0x5, 0xffff8001, 0x5, 0xb621, 0x1, 0x9, 0x1395db38, 0x0, 0x3], [0x6, 0x6, 0x401, 0x2d5, 0xc08, 0x3, 0x7f, 0x7, 0x8, 0x4, 0xbe1a, 0x5, 0x3, 0x93c, 0x9, 0x80, 0x800, 0x7fff, 0x6, 0x1, 0x5, 0x2, 0x9, 0x7fff, 0x0, 0x8000, 0x4, 0x6, 0x2, 0x4, 0x6, 0xa2ec, 0x7, 0x100, 0x1, 0x3, 0x1f, 0x81, 0x10000, 0xc5, 0x7ff, 0x2aae236d, 0x4, 0x2000, 0x1c, 0x3, 0x2, 0x735c, 0x7fffffff, 0x6, 0xfffffffd, 0x4, 0x3ff, 0x7fffffff, 0x8, 0x224, 0x261, 0x8b8a, 0x100, 0xffffffff, 0x7fff, 0x41, 0x401, 0x200], [0x7, 0x4, 0x2, 0x5, 0x7, 0x1, 0x8, 0x0, 0x8, 0xffffff7b, 0x0, 0x5, 0x6, 0xcc9, 0x1, 0x5, 0x2, 0xfffffffe, 0xfffffff9, 0x0, 0x5, 0x101, 0x401, 0x2, 0x3, 0x3, 0x7f76, 0x3ff, 0x9, 0xc14, 0x3, 0x7, 0x5, 0x100, 0x6, 0x8, 0x2, 0xe0, 0x3f, 0x200, 0x3, 0x9, 0x3, 0x5, 0x95c6, 0x2, 0x6, 0x20, 0x3, 0x8, 0x9, 0x7, 0x9, 0x0, 0xffffd671, 0x1, 0x0, 0x853d, 0x7, 0x3ff, 0x0, 0xfde7, 0x1, 0x5]}, 0x45c) 18:09:50 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$sequencer(0xffffffffffffff9c, 0x0, 0x8002, 0x0) write$uinput_user_dev(r2, &(0x7f0000000480)={'syz0\x00', {}, 0x0, [0x4, 0x631, 0xaf, 0x2, 0x1b, 0x1, 0x10001, 0x1, 0x8, 0x3ff, 0x800, 0x7859, 0x7, 0x5, 0x7fff, 0xc05, 0xa4, 0x3, 0x4, 0xfffff800, 0x6, 0x7c, 0x6, 0xff, 0x2, 0x771, 0x5, 0xfffffff8, 0x81, 0x0, 0x6, 0x7, 0x6, 0x9, 0x3, 0x0, 0x282d298e, 0x7, 0x6, 0x3, 0xfaf9, 0x7, 0x2, 0xf9, 0xc2, 0x0, 0x8, 0x8, 0x9], [0x0, 0x7ff, 0x1f, 0x1, 0x7, 0x2, 0x6, 0xd594, 0x3, 0x2a, 0x1c9b4fd4, 0x0, 0xfff, 0x5, 0xfffff801, 0x9, 0x3f, 0x8, 0x80, 0x6, 0x401, 0x8000, 0x1, 0xcb, 0x1, 0x6, 0x4, 0x92, 0x800000, 0x7, 0x1f, 0x140, 0x7ff, 0xabbc, 0x401, 0x0, 0x3, 0x20, 0x48, 0x12000, 0xfa, 0x1, 0xfffff6fe, 0x0, 0x7, 0x8818, 0x8000, 0x6, 0x1f, 0x8, 0x4, 0xff, 0x101, 0xd7, 0x8, 0x5, 0xffff8001, 0x5, 0xb621, 0x1, 0x9, 0x1395db38, 0x0, 0x3], [0x6, 0x6, 0x401, 0x2d5, 0xc08, 0x3, 0x7f, 0x7, 0x8, 0x4, 0xbe1a, 0x5, 0x3, 0x93c, 0x9, 0x80, 0x800, 0x7fff, 0x6, 0x1, 0x5, 0x2, 0x9, 0x7fff, 0x0, 0x8000, 0x4, 0x6, 0x2, 0x4, 0x6, 0xa2ec, 0x7, 0x100, 0x1, 0x3, 0x1f, 0x81, 0x10000, 0xc5, 0x7ff, 0x2aae236d, 0x4, 0x2000, 0x1c, 0x3, 0x2, 0x735c, 0x7fffffff, 0x6, 0xfffffffd, 0x4, 0x3ff, 0x7fffffff, 0x8, 0x224, 0x261, 0x8b8a, 0x100, 0xffffffff, 0x7fff, 0x41, 0x401, 0x200], [0x7, 0x4, 0x2, 0x5, 0x7, 0x1, 0x8, 0x0, 0x8, 0xffffff7b, 0x0, 0x5, 0x6, 0xcc9, 0x1, 0x5, 0x2, 0xfffffffe, 0xfffffff9, 0x0, 0x5, 0x101, 0x401, 0x2, 0x3, 0x3, 0x7f76, 0x3ff, 0x9, 0xc14, 0x3, 0x7, 0x5, 0x100, 0x6, 0x8, 0x2, 0xe0, 0x3f, 0x200, 0x3, 0x9, 0x3, 0x5, 0x95c6, 0x2, 0x6, 0x20, 0x3, 0x8, 0x9, 0x7, 0x9, 0x0, 0xffffd671, 0x1, 0x0, 0x853d, 0x7, 0x3ff, 0x0, 0xfde7, 0x1, 0x5]}, 0x45c) 18:09:50 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63}, [{}]}, 0x1d) 18:09:50 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r0, &(0x7f0000000040)=""/244, 0xf4) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="6653960d0ec5d684fa9f017ef0d60a3c27bc33760036001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479810be2aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e6517e615607676f8f9fc0ebf8b0b16d6f2c59957ab35d05692e664ebf68734ca53366295f4ad6142134b62f11e92ead037c7fb53455560c8ef0f1c94fafa924edfe92175aaa1c4ecc7aeeb72e0d050feacee907f40888c96a65545e07422bc6ac79f4c2d6ee3dab47d06e764682c72d7f16542fcfd05d2813cc182d1595016c179e1717c160300ab1ab0ac397e91bd193c036feb66a9ad2ec5b7967e7f5ff957f8b085a2437c5", 0xf7}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(0x0, 0x19) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 18:09:50 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63}, [{}]}, 0x1e) 18:09:50 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68}, [{0x0, 0x0, 0x0, 0x0, 0x7f00000000000000}]}, 0x78) 18:09:50 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63}, [{}]}, 0x21) 18:09:50 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) write$uinput_user_dev(r2, &(0x7f0000000480)={'syz0\x00', {}, 0x0, [0x4, 0x631, 0xaf, 0x2, 0x1b, 0x1, 0x10001, 0x1, 0x8, 0x3ff, 0x800, 0x7859, 0x7], [0x0, 0x7ff, 0x1f, 0x1, 0x7, 0x2, 0x6, 0xd594, 0x3, 0x2a, 0x1c9b4fd4, 0x0, 0xfff, 0x5, 0xfffff801, 0x9, 0x3f, 0x8, 0x80, 0x6, 0x401, 0x8000, 0x1, 0xcb, 0x1, 0x6, 0x4, 0x92, 0x800000, 0x7, 0x1f, 0x140, 0x7ff, 0xabbc, 0x401, 0x0, 0x3, 0x20, 0x48, 0x12000, 0xfa, 0x1, 0xfffff6fe, 0x0, 0x7, 0x8818, 0x8000, 0x6, 0x1f, 0x8, 0x4, 0xff, 0x101, 0xd7, 0x8, 0x5, 0xffff8001, 0x5, 0xb621, 0x1, 0x9, 0x1395db38, 0x0, 0x3], [0x6, 0x6, 0x401, 0x2d5, 0xc08, 0x3, 0x7f, 0x7, 0x8, 0x4, 0xbe1a, 0x5, 0x3, 0x93c, 0x9, 0x80, 0x800, 0x7fff, 0x6, 0x1, 0x5, 0x2, 0x9, 0x7fff, 0x0, 0x8000, 0x4, 0x6, 0x2, 0x4, 0x6, 0xa2ec, 0x7, 0x100, 0x1, 0x3, 0x1f, 0x81, 0x10000, 0xc5, 0x7ff, 0x2aae236d, 0x4, 0x2000, 0x1c, 0x3, 0x2, 0x735c, 0x7fffffff, 0x6, 0xfffffffd, 0x4, 0x3ff, 0x7fffffff, 0x8, 0x224, 0x261, 0x8b8a, 0x100, 0xffffffff, 0x7fff, 0x41, 0x401, 0x200], [0x7, 0x4, 0x2, 0x5, 0x7, 0x1, 0x8, 0x0, 0x8, 0xffffff7b, 0x0, 0x5, 0x6, 0xcc9, 0x1, 0x5, 0x2, 0xfffffffe, 0xfffffff9, 0x0, 0x5, 0x101, 0x401, 0x2, 0x3, 0x3, 0x7f76, 0x3ff, 0x9, 0xc14, 0x3, 0x7, 0x5, 0x100, 0x6, 0x8, 0x2, 0xe0, 0x3f, 0x200, 0x3, 0x9, 0x3, 0x5, 0x95c6, 0x2, 0x6, 0x20, 0x3, 0x8, 0x9, 0x7, 0x9, 0x0, 0xffffd671, 0x1, 0x0, 0x853d, 0x7, 0x3ff, 0x0, 0xfde7, 0x1, 0x5]}, 0x45c) 18:09:50 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$sequencer(0xffffffffffffff9c, 0x0, 0x8002, 0x0) write$uinput_user_dev(r2, &(0x7f0000000480)={'syz0\x00', {}, 0x0, [0x4, 0x631, 0xaf, 0x2, 0x1b, 0x1, 0x10001, 0x1, 0x8, 0x3ff, 0x800, 0x7859, 0x7, 0x5, 0x7fff, 0xc05, 0xa4, 0x3, 0x4, 0xfffff800, 0x6, 0x7c, 0x6, 0xff, 0x2, 0x771, 0x5, 0xfffffff8, 0x81, 0x0, 0x6, 0x7, 0x6, 0x9, 0x3, 0x0, 0x282d298e, 0x7, 0x6, 0x3, 0xfaf9, 0x7, 0x2, 0xf9, 0xc2, 0x0, 0x8, 0x8, 0x9], [0x0, 0x7ff, 0x1f, 0x1, 0x7, 0x2, 0x6, 0xd594, 0x3, 0x2a, 0x1c9b4fd4, 0x0, 0xfff, 0x5, 0xfffff801, 0x9, 0x3f, 0x8, 0x80, 0x6, 0x401, 0x8000, 0x1, 0xcb, 0x1, 0x6, 0x4, 0x92, 0x800000, 0x7, 0x1f, 0x140, 0x7ff, 0xabbc, 0x401, 0x0, 0x3, 0x20, 0x48, 0x12000, 0xfa, 0x1, 0xfffff6fe, 0x0, 0x7, 0x8818, 0x8000, 0x6, 0x1f, 0x8, 0x4, 0xff, 0x101, 0xd7, 0x8, 0x5, 0xffff8001, 0x5, 0xb621, 0x1, 0x9, 0x1395db38, 0x0, 0x3], [0x6, 0x6, 0x401, 0x2d5, 0xc08, 0x3, 0x7f, 0x7, 0x8, 0x4, 0xbe1a, 0x5, 0x3, 0x93c, 0x9, 0x80, 0x800, 0x7fff, 0x6, 0x1, 0x5, 0x2, 0x9, 0x7fff, 0x0, 0x8000, 0x4, 0x6, 0x2, 0x4, 0x6, 0xa2ec, 0x7, 0x100, 0x1, 0x3, 0x1f, 0x81, 0x10000, 0xc5, 0x7ff, 0x2aae236d, 0x4, 0x2000, 0x1c, 0x3, 0x2, 0x735c, 0x7fffffff, 0x6, 0xfffffffd, 0x4, 0x3ff, 0x7fffffff, 0x8, 0x224, 0x261, 0x8b8a, 0x100, 0xffffffff, 0x7fff, 0x41, 0x401, 0x200], [0x7, 0x4, 0x2, 0x5, 0x7, 0x1, 0x8, 0x0, 0x8, 0xffffff7b, 0x0, 0x5, 0x6, 0xcc9, 0x1, 0x5, 0x2, 0xfffffffe, 0xfffffff9, 0x0, 0x5, 0x101, 0x401, 0x2, 0x3, 0x3, 0x7f76, 0x3ff, 0x9, 0xc14, 0x3, 0x7, 0x5, 0x100, 0x6, 0x8, 0x2, 0xe0, 0x3f, 0x200, 0x3, 0x9, 0x3, 0x5, 0x95c6, 0x2, 0x6, 0x20, 0x3, 0x8, 0x9, 0x7, 0x9, 0x0, 0xffffd671, 0x1, 0x0, 0x853d, 0x7, 0x3ff, 0x0, 0xfde7, 0x1, 0x5]}, 0x45c) 18:09:50 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68}, [{0x0, 0x0, 0x0, 0x0, 0x80ffffff00000000}]}, 0x78) 18:09:53 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f0000000100)="6653960d0ec5d684fa9f017ef0d60a3c27bc33760036001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479810be2aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e6517e615607676f8f9fc0ebf8b0b16d6f2c59957ab35d05692e664ebf68734ca53366295f4ad6142134b62f11e92ead037c7fb53455560c8ef0f1c94fafa924edfe92175aaa1c4ecc7aeeb72e0d050feacee907f40888c96a65545e07422bc6ac79f4c2d6ee3dab47d06e764682c72d7f16542fcfd05d2813cc182d1595016c179e1717c160300ab1ab0ac397e91bd193c036feb66a9ad2ec5b7967e7f5ff957f8b085a2437c59a", 0xf8}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x19) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 18:09:53 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63}, [{}]}, 0x22) 18:09:53 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x0, 0x0) write$uinput_user_dev(r2, &(0x7f0000000480)={'syz0\x00', {}, 0x0, [0x4, 0x631, 0xaf, 0x2, 0x1b, 0x1, 0x10001, 0x1, 0x8, 0x3ff, 0x800, 0x7859, 0x7, 0x5, 0x7fff, 0xc05, 0xa4, 0x3, 0x4, 0xfffff800, 0x6, 0x7c, 0x6, 0xff, 0x2, 0x771, 0x5, 0xfffffff8, 0x81, 0x0, 0x6, 0x7, 0x6, 0x9, 0x3, 0x0, 0x282d298e, 0x7, 0x6, 0x3, 0xfaf9, 0x7, 0x2, 0xf9, 0xc2, 0x0, 0x8, 0x8, 0x9], [0x0, 0x7ff, 0x1f, 0x1, 0x7, 0x2, 0x6, 0xd594, 0x3, 0x2a, 0x1c9b4fd4, 0x0, 0xfff, 0x5, 0xfffff801, 0x9, 0x3f, 0x8, 0x80, 0x6, 0x401, 0x8000, 0x1, 0xcb, 0x1, 0x6, 0x4, 0x92, 0x800000, 0x7, 0x1f, 0x140, 0x7ff, 0xabbc, 0x401, 0x0, 0x3, 0x20, 0x48, 0x12000, 0xfa, 0x1, 0xfffff6fe, 0x0, 0x7, 0x8818, 0x8000, 0x6, 0x1f, 0x8, 0x4, 0xff, 0x101, 0xd7, 0x8, 0x5, 0xffff8001, 0x5, 0xb621, 0x1, 0x9, 0x1395db38, 0x0, 0x3], [0x6, 0x6, 0x401, 0x2d5, 0xc08, 0x3, 0x7f, 0x7, 0x8, 0x4, 0xbe1a, 0x5, 0x3, 0x93c, 0x9, 0x80, 0x800, 0x7fff, 0x6, 0x1, 0x5, 0x2, 0x9, 0x7fff, 0x0, 0x8000, 0x4, 0x6, 0x2, 0x4, 0x6, 0xa2ec, 0x7, 0x100, 0x1, 0x3, 0x1f, 0x81, 0x10000, 0xc5, 0x7ff, 0x2aae236d, 0x4, 0x2000, 0x1c, 0x3, 0x2, 0x735c, 0x7fffffff, 0x6, 0xfffffffd, 0x4, 0x3ff, 0x7fffffff, 0x8, 0x224, 0x261, 0x8b8a, 0x100, 0xffffffff, 0x7fff, 0x41, 0x401, 0x200], [0x7, 0x4, 0x2, 0x5, 0x7, 0x1, 0x8, 0x0, 0x8, 0xffffff7b, 0x0, 0x5, 0x6, 0xcc9, 0x1, 0x5, 0x2, 0xfffffffe, 0xfffffff9, 0x0, 0x5, 0x101, 0x401, 0x2, 0x3, 0x3, 0x7f76, 0x3ff, 0x9, 0xc14, 0x3, 0x7, 0x5, 0x100, 0x6, 0x8, 0x2, 0xe0, 0x3f, 0x200, 0x3, 0x9, 0x3, 0x5, 0x95c6, 0x2, 0x6, 0x20, 0x3, 0x8, 0x9, 0x7, 0x9, 0x0, 0xffffd671, 0x1, 0x0, 0x853d, 0x7, 0x3ff, 0x0, 0xfde7, 0x1, 0x5]}, 0x45c) 18:09:53 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) write$uinput_user_dev(r2, &(0x7f0000000480)={'syz0\x00', {}, 0x0, [0x4, 0x631, 0xaf, 0x2, 0x1b, 0x1, 0x10001, 0x1, 0x8, 0x3ff, 0x800, 0x7859, 0x7], [0x0, 0x7ff, 0x1f, 0x1, 0x7, 0x2, 0x6, 0xd594, 0x3, 0x2a, 0x1c9b4fd4, 0x0, 0xfff, 0x5, 0xfffff801, 0x9, 0x3f, 0x8, 0x80, 0x6, 0x401, 0x8000, 0x1, 0xcb, 0x1, 0x6, 0x4, 0x92, 0x800000, 0x7, 0x1f, 0x140, 0x7ff, 0xabbc, 0x401, 0x0, 0x3, 0x20, 0x48, 0x12000, 0xfa, 0x1, 0xfffff6fe, 0x0, 0x7, 0x8818, 0x8000, 0x6, 0x1f, 0x8, 0x4, 0xff, 0x101, 0xd7, 0x8, 0x5, 0xffff8001, 0x5, 0xb621, 0x1, 0x9, 0x1395db38, 0x0, 0x3], [0x6, 0x6, 0x401, 0x2d5, 0xc08, 0x3, 0x7f, 0x7, 0x8, 0x4, 0xbe1a, 0x5, 0x3, 0x93c, 0x9, 0x80, 0x800, 0x7fff, 0x6, 0x1, 0x5, 0x2, 0x9, 0x7fff, 0x0, 0x8000, 0x4, 0x6, 0x2, 0x4, 0x6, 0xa2ec, 0x7, 0x100, 0x1, 0x3, 0x1f, 0x81, 0x10000, 0xc5, 0x7ff, 0x2aae236d, 0x4, 0x2000, 0x1c, 0x3, 0x2, 0x735c, 0x7fffffff, 0x6, 0xfffffffd, 0x4, 0x3ff, 0x7fffffff, 0x8, 0x224, 0x261, 0x8b8a, 0x100, 0xffffffff, 0x7fff, 0x41, 0x401, 0x200], [0x7, 0x4, 0x2, 0x5, 0x7, 0x1, 0x8, 0x0, 0x8, 0xffffff7b, 0x0, 0x5, 0x6, 0xcc9, 0x1, 0x5, 0x2, 0xfffffffe, 0xfffffff9, 0x0, 0x5, 0x101, 0x401, 0x2, 0x3, 0x3, 0x7f76, 0x3ff, 0x9, 0xc14, 0x3, 0x7, 0x5, 0x100, 0x6, 0x8, 0x2, 0xe0, 0x3f, 0x200, 0x3, 0x9, 0x3, 0x5, 0x95c6, 0x2, 0x6, 0x20, 0x3, 0x8, 0x9, 0x7, 0x9, 0x0, 0xffffd671, 0x1, 0x0, 0x853d, 0x7, 0x3ff, 0x0, 0xfde7, 0x1, 0x5]}, 0x45c) 18:09:53 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68}, [{0x0, 0x0, 0x0, 0x0, 0x9b00000000000000}]}, 0x78) 18:09:53 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r0, &(0x7f0000000040)=""/244, 0xf4) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="6653960d0ec5d684fa9f017ef0d60a3c27bc33760036001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479810be2aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e6517e615607676f8f9fc0ebf8b0b16d6f2c59957ab35d05692e664ebf68734ca53366295f4ad6142134b62f11e92ead037c7fb53455560c8ef0f1c94fafa924edfe92175aaa1c4ecc7aeeb72e0d050feacee907f40888c96a65545e07422bc6ac79f4c2d6ee3dab47d06e764682c72d7f16542fcfd05d2813cc182d1595016c179e1717c160300ab1ab0ac397e91bd193c036feb66a9ad2ec5b7967e7f5ff957f8b085a2437c5", 0xf7}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(0x0, 0x19) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 18:09:53 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68}, [{0x0, 0x0, 0x0, 0x0, 0xe803000000000000}]}, 0x78) 18:09:53 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x0, 0x0) write$uinput_user_dev(r2, &(0x7f0000000480)={'syz0\x00', {}, 0x0, [0x4, 0x631, 0xaf, 0x2, 0x1b, 0x1, 0x10001, 0x1, 0x8, 0x3ff, 0x800, 0x7859, 0x7, 0x5, 0x7fff, 0xc05, 0xa4, 0x3, 0x4, 0xfffff800, 0x6, 0x7c, 0x6, 0xff, 0x2, 0x771, 0x5, 0xfffffff8, 0x81, 0x0, 0x6, 0x7, 0x6, 0x9, 0x3, 0x0, 0x282d298e, 0x7, 0x6, 0x3, 0xfaf9, 0x7, 0x2, 0xf9, 0xc2, 0x0, 0x8, 0x8, 0x9], [0x0, 0x7ff, 0x1f, 0x1, 0x7, 0x2, 0x6, 0xd594, 0x3, 0x2a, 0x1c9b4fd4, 0x0, 0xfff, 0x5, 0xfffff801, 0x9, 0x3f, 0x8, 0x80, 0x6, 0x401, 0x8000, 0x1, 0xcb, 0x1, 0x6, 0x4, 0x92, 0x800000, 0x7, 0x1f, 0x140, 0x7ff, 0xabbc, 0x401, 0x0, 0x3, 0x20, 0x48, 0x12000, 0xfa, 0x1, 0xfffff6fe, 0x0, 0x7, 0x8818, 0x8000, 0x6, 0x1f, 0x8, 0x4, 0xff, 0x101, 0xd7, 0x8, 0x5, 0xffff8001, 0x5, 0xb621, 0x1, 0x9, 0x1395db38, 0x0, 0x3], [0x6, 0x6, 0x401, 0x2d5, 0xc08, 0x3, 0x7f, 0x7, 0x8, 0x4, 0xbe1a, 0x5, 0x3, 0x93c, 0x9, 0x80, 0x800, 0x7fff, 0x6, 0x1, 0x5, 0x2, 0x9, 0x7fff, 0x0, 0x8000, 0x4, 0x6, 0x2, 0x4, 0x6, 0xa2ec, 0x7, 0x100, 0x1, 0x3, 0x1f, 0x81, 0x10000, 0xc5, 0x7ff, 0x2aae236d, 0x4, 0x2000, 0x1c, 0x3, 0x2, 0x735c, 0x7fffffff, 0x6, 0xfffffffd, 0x4, 0x3ff, 0x7fffffff, 0x8, 0x224, 0x261, 0x8b8a, 0x100, 0xffffffff, 0x7fff, 0x41, 0x401, 0x200], [0x7, 0x4, 0x2, 0x5, 0x7, 0x1, 0x8, 0x0, 0x8, 0xffffff7b, 0x0, 0x5, 0x6, 0xcc9, 0x1, 0x5, 0x2, 0xfffffffe, 0xfffffff9, 0x0, 0x5, 0x101, 0x401, 0x2, 0x3, 0x3, 0x7f76, 0x3ff, 0x9, 0xc14, 0x3, 0x7, 0x5, 0x100, 0x6, 0x8, 0x2, 0xe0, 0x3f, 0x200, 0x3, 0x9, 0x3, 0x5, 0x95c6, 0x2, 0x6, 0x20, 0x3, 0x8, 0x9, 0x7, 0x9, 0x0, 0xffffd671, 0x1, 0x0, 0x853d, 0x7, 0x3ff, 0x0, 0xfde7, 0x1, 0x5]}, 0x45c) 18:09:53 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) write$uinput_user_dev(r2, &(0x7f0000000480)={'syz0\x00', {}, 0x0, [0x4, 0x631, 0xaf, 0x2, 0x1b, 0x1, 0x10001, 0x1, 0x8, 0x3ff, 0x800, 0x7859, 0x7], [0x0, 0x7ff, 0x1f, 0x1, 0x7, 0x2, 0x6, 0xd594, 0x3, 0x2a, 0x1c9b4fd4, 0x0, 0xfff, 0x5, 0xfffff801, 0x9, 0x3f, 0x8, 0x80, 0x6, 0x401, 0x8000, 0x1, 0xcb, 0x1, 0x6, 0x4, 0x92, 0x800000, 0x7, 0x1f, 0x140, 0x7ff, 0xabbc, 0x401, 0x0, 0x3, 0x20, 0x48, 0x12000, 0xfa, 0x1, 0xfffff6fe, 0x0, 0x7, 0x8818, 0x8000, 0x6, 0x1f, 0x8, 0x4, 0xff, 0x101, 0xd7, 0x8, 0x5, 0xffff8001, 0x5, 0xb621, 0x1, 0x9, 0x1395db38, 0x0, 0x3], [0x6, 0x6, 0x401, 0x2d5, 0xc08, 0x3, 0x7f, 0x7, 0x8, 0x4, 0xbe1a, 0x5, 0x3, 0x93c, 0x9, 0x80, 0x800, 0x7fff, 0x6, 0x1, 0x5, 0x2, 0x9, 0x7fff, 0x0, 0x8000, 0x4, 0x6, 0x2, 0x4, 0x6, 0xa2ec, 0x7, 0x100, 0x1, 0x3, 0x1f, 0x81, 0x10000, 0xc5, 0x7ff, 0x2aae236d, 0x4, 0x2000, 0x1c, 0x3, 0x2, 0x735c, 0x7fffffff, 0x6, 0xfffffffd, 0x4, 0x3ff, 0x7fffffff, 0x8, 0x224, 0x261, 0x8b8a, 0x100, 0xffffffff, 0x7fff, 0x41, 0x401, 0x200], [0x7, 0x4, 0x2, 0x5, 0x7, 0x1, 0x8, 0x0, 0x8, 0xffffff7b, 0x0, 0x5, 0x6, 0xcc9, 0x1, 0x5, 0x2, 0xfffffffe, 0xfffffff9, 0x0, 0x5, 0x101, 0x401, 0x2, 0x3, 0x3, 0x7f76, 0x3ff, 0x9, 0xc14, 0x3, 0x7, 0x5, 0x100, 0x6, 0x8, 0x2, 0xe0, 0x3f, 0x200, 0x3, 0x9, 0x3, 0x5, 0x95c6, 0x2, 0x6, 0x20, 0x3, 0x8, 0x9, 0x7, 0x9, 0x0, 0xffffd671, 0x1, 0x0, 0x853d, 0x7, 0x3ff, 0x0, 0xfde7, 0x1, 0x5]}, 0x45c) 18:09:53 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63}, [{}]}, 0x23) 18:09:53 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r0, &(0x7f0000000040)=""/244, 0xf4) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="6653960d0ec5d684fa9f017ef0d60a3c27bc33760036001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479810be2aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e6517e615607676f8f9fc0ebf8b0b16d6f2c59957ab35d05692e664ebf68734ca53366295f4ad6142134b62f11e92ead037c7fb53455560c8ef0f1c94fafa924edfe92175aaa1c4ecc7aeeb72e0d050feacee907f40888c96a65545e07422bc6ac79f4c2d6ee3dab47d06e764682c72d7f16542fcfd05d2813cc182d1595016c179e1717c160300ab1ab0ac397e91bd193c036feb66a9ad2ec5b7967e7f5ff957f8b085a2437c5", 0xf7}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x0) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 18:09:53 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68}, [{0x0, 0x0, 0x0, 0x0, 0xffff000000000000}]}, 0x78) 18:09:56 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f0000000100)="6653960d0ec5d684fa9f017ef0d60a3c27bc33760036001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479810be2aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e6517e615607676f8f9fc0ebf8b0b16d6f2c59957ab35d05692e664ebf68734ca53366295f4ad6142134b62f11e92ead037c7fb53455560c8ef0f1c94fafa924edfe92175aaa1c4ecc7aeeb72e0d050feacee907f40888c96a65545e07422bc6ac79f4c2d6ee3dab47d06e764682c72d7f16542fcfd05d2813cc182d1595016c179e1717c160300ab1ab0ac397e91bd193c036feb66a9ad2ec5b7967e7f5ff957f8b085a2437c59a", 0xf8}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x19) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 18:09:56 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x0, 0x0) write$uinput_user_dev(r2, &(0x7f0000000480)={'syz0\x00', {}, 0x0, [0x4, 0x631, 0xaf, 0x2, 0x1b, 0x1, 0x10001, 0x1, 0x8, 0x3ff, 0x800, 0x7859, 0x7, 0x5, 0x7fff, 0xc05, 0xa4, 0x3, 0x4, 0xfffff800, 0x6, 0x7c, 0x6, 0xff, 0x2, 0x771, 0x5, 0xfffffff8, 0x81, 0x0, 0x6, 0x7, 0x6, 0x9, 0x3, 0x0, 0x282d298e, 0x7, 0x6, 0x3, 0xfaf9, 0x7, 0x2, 0xf9, 0xc2, 0x0, 0x8, 0x8, 0x9], [0x0, 0x7ff, 0x1f, 0x1, 0x7, 0x2, 0x6, 0xd594, 0x3, 0x2a, 0x1c9b4fd4, 0x0, 0xfff, 0x5, 0xfffff801, 0x9, 0x3f, 0x8, 0x80, 0x6, 0x401, 0x8000, 0x1, 0xcb, 0x1, 0x6, 0x4, 0x92, 0x800000, 0x7, 0x1f, 0x140, 0x7ff, 0xabbc, 0x401, 0x0, 0x3, 0x20, 0x48, 0x12000, 0xfa, 0x1, 0xfffff6fe, 0x0, 0x7, 0x8818, 0x8000, 0x6, 0x1f, 0x8, 0x4, 0xff, 0x101, 0xd7, 0x8, 0x5, 0xffff8001, 0x5, 0xb621, 0x1, 0x9, 0x1395db38, 0x0, 0x3], [0x6, 0x6, 0x401, 0x2d5, 0xc08, 0x3, 0x7f, 0x7, 0x8, 0x4, 0xbe1a, 0x5, 0x3, 0x93c, 0x9, 0x80, 0x800, 0x7fff, 0x6, 0x1, 0x5, 0x2, 0x9, 0x7fff, 0x0, 0x8000, 0x4, 0x6, 0x2, 0x4, 0x6, 0xa2ec, 0x7, 0x100, 0x1, 0x3, 0x1f, 0x81, 0x10000, 0xc5, 0x7ff, 0x2aae236d, 0x4, 0x2000, 0x1c, 0x3, 0x2, 0x735c, 0x7fffffff, 0x6, 0xfffffffd, 0x4, 0x3ff, 0x7fffffff, 0x8, 0x224, 0x261, 0x8b8a, 0x100, 0xffffffff, 0x7fff, 0x41, 0x401, 0x200], [0x7, 0x4, 0x2, 0x5, 0x7, 0x1, 0x8, 0x0, 0x8, 0xffffff7b, 0x0, 0x5, 0x6, 0xcc9, 0x1, 0x5, 0x2, 0xfffffffe, 0xfffffff9, 0x0, 0x5, 0x101, 0x401, 0x2, 0x3, 0x3, 0x7f76, 0x3ff, 0x9, 0xc14, 0x3, 0x7, 0x5, 0x100, 0x6, 0x8, 0x2, 0xe0, 0x3f, 0x200, 0x3, 0x9, 0x3, 0x5, 0x95c6, 0x2, 0x6, 0x20, 0x3, 0x8, 0x9, 0x7, 0x9, 0x0, 0xffffd671, 0x1, 0x0, 0x853d, 0x7, 0x3ff, 0x0, 0xfde7, 0x1, 0x5]}, 0x45c) 18:09:56 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) write$uinput_user_dev(r2, &(0x7f0000000480)={'syz0\x00', {}, 0x0, [0x4, 0x631, 0xaf, 0x2, 0x1b, 0x1, 0x10001, 0x1, 0x8, 0x3ff, 0x800, 0x7859, 0x0, 0x5], [0x0, 0x7ff, 0x1f, 0x1, 0x7, 0x2, 0x6, 0xd594, 0x3, 0x2a, 0x1c9b4fd4, 0x0, 0xfff, 0x5, 0xfffff801, 0x9, 0x3f, 0x8, 0x80, 0x6, 0x401, 0x8000, 0x1, 0xcb, 0x1, 0x6, 0x4, 0x92, 0x800000, 0x7, 0x1f, 0x140, 0x7ff, 0xabbc, 0x401, 0x0, 0x3, 0x20, 0x48, 0x12000, 0xfa, 0x1, 0xfffff6fe, 0x0, 0x7, 0x8818, 0x8000, 0x6, 0x1f, 0x8, 0x4, 0xff, 0x101, 0xd7, 0x8, 0x5, 0xffff8001, 0x5, 0xb621, 0x1, 0x9, 0x1395db38, 0x0, 0x3], [0x6, 0x6, 0x401, 0x2d5, 0xc08, 0x3, 0x7f, 0x7, 0x8, 0x4, 0xbe1a, 0x5, 0x3, 0x93c, 0x9, 0x80, 0x800, 0x7fff, 0x6, 0x1, 0x5, 0x2, 0x9, 0x7fff, 0x0, 0x8000, 0x4, 0x6, 0x2, 0x4, 0x6, 0xa2ec, 0x7, 0x100, 0x1, 0x3, 0x1f, 0x81, 0x10000, 0xc5, 0x7ff, 0x2aae236d, 0x4, 0x2000, 0x1c, 0x3, 0x2, 0x735c, 0x7fffffff, 0x6, 0xfffffffd, 0x4, 0x3ff, 0x7fffffff, 0x8, 0x224, 0x261, 0x8b8a, 0x100, 0xffffffff, 0x7fff, 0x41, 0x401, 0x200], [0x7, 0x4, 0x2, 0x5, 0x7, 0x1, 0x8, 0x0, 0x8, 0xffffff7b, 0x0, 0x5, 0x6, 0xcc9, 0x1, 0x5, 0x2, 0xfffffffe, 0xfffffff9, 0x0, 0x5, 0x101, 0x401, 0x2, 0x3, 0x3, 0x7f76, 0x3ff, 0x9, 0xc14, 0x3, 0x7, 0x5, 0x100, 0x6, 0x8, 0x2, 0xe0, 0x3f, 0x200, 0x3, 0x9, 0x3, 0x5, 0x95c6, 0x2, 0x6, 0x20, 0x3, 0x8, 0x9, 0x7, 0x9, 0x0, 0xffffd671, 0x1, 0x0, 0x853d, 0x7, 0x3ff, 0x0, 0xfde7, 0x1, 0x5]}, 0x45c) 18:09:56 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63}, [{}]}, 0x24) 18:09:56 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x2}]}, 0x78) 18:09:56 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63}, [{}]}, 0x25) 18:09:56 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000480)={'syz0\x00', {}, 0x0, [0x4, 0x631, 0xaf, 0x2, 0x1b, 0x1, 0x10001, 0x1, 0x8, 0x3ff, 0x800, 0x7859, 0x7, 0x5, 0x7fff, 0xc05, 0xa4, 0x3, 0x4, 0xfffff800, 0x6, 0x7c, 0x6, 0xff, 0x2, 0x771, 0x5, 0xfffffff8, 0x81, 0x0, 0x6, 0x7, 0x6, 0x9, 0x3, 0x0, 0x282d298e, 0x7, 0x6, 0x3, 0xfaf9, 0x7, 0x2, 0xf9, 0xc2, 0x0, 0x8, 0x8, 0x9], [0x0, 0x7ff, 0x1f, 0x1, 0x7, 0x2, 0x6, 0xd594, 0x3, 0x2a, 0x1c9b4fd4, 0x0, 0xfff, 0x5, 0xfffff801, 0x9, 0x3f, 0x8, 0x80, 0x6, 0x401, 0x8000, 0x1, 0xcb, 0x1, 0x6, 0x4, 0x92, 0x800000, 0x7, 0x1f, 0x140, 0x7ff, 0xabbc, 0x401, 0x0, 0x3, 0x20, 0x48, 0x12000, 0xfa, 0x1, 0xfffff6fe, 0x0, 0x7, 0x8818, 0x8000, 0x6, 0x1f, 0x8, 0x4, 0xff, 0x101, 0xd7, 0x8, 0x5, 0xffff8001, 0x5, 0xb621, 0x1, 0x9, 0x1395db38, 0x0, 0x3], [0x6, 0x6, 0x401, 0x2d5, 0xc08, 0x3, 0x7f, 0x7, 0x8, 0x4, 0xbe1a, 0x5, 0x3, 0x93c, 0x9, 0x80, 0x800, 0x7fff, 0x6, 0x1, 0x5, 0x2, 0x9, 0x7fff, 0x0, 0x8000, 0x4, 0x6, 0x2, 0x4, 0x6, 0xa2ec, 0x7, 0x100, 0x1, 0x3, 0x1f, 0x81, 0x10000, 0xc5, 0x7ff, 0x2aae236d, 0x4, 0x2000, 0x1c, 0x3, 0x2, 0x735c, 0x7fffffff, 0x6, 0xfffffffd, 0x4, 0x3ff, 0x7fffffff, 0x8, 0x224, 0x261, 0x8b8a, 0x100, 0xffffffff, 0x7fff, 0x41, 0x401, 0x200], [0x7, 0x4, 0x2, 0x5, 0x7, 0x1, 0x8, 0x0, 0x8, 0xffffff7b, 0x0, 0x5, 0x6, 0xcc9, 0x1, 0x5, 0x2, 0xfffffffe, 0xfffffff9, 0x0, 0x5, 0x101, 0x401, 0x2, 0x3, 0x3, 0x7f76, 0x3ff, 0x9, 0xc14, 0x3, 0x7, 0x5, 0x100, 0x6, 0x8, 0x2, 0xe0, 0x3f, 0x200, 0x3, 0x9, 0x3, 0x5, 0x95c6, 0x2, 0x6, 0x20, 0x3, 0x8, 0x9, 0x7, 0x9, 0x0, 0xffffd671, 0x1, 0x0, 0x853d, 0x7, 0x3ff, 0x0, 0xfde7, 0x1, 0x5]}, 0x45c) 18:09:56 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x5}]}, 0x78) 18:09:56 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) write$uinput_user_dev(r2, &(0x7f0000000480)={'syz0\x00', {}, 0x0, [0x4, 0x631, 0xaf, 0x2, 0x1b, 0x1, 0x10001, 0x1, 0x8, 0x3ff, 0x800, 0x0, 0x0, 0x5], [0x0, 0x7ff, 0x1f, 0x1, 0x7, 0x2, 0x6, 0xd594, 0x3, 0x2a, 0x1c9b4fd4, 0x0, 0xfff, 0x5, 0xfffff801, 0x9, 0x3f, 0x8, 0x80, 0x6, 0x401, 0x8000, 0x1, 0xcb, 0x1, 0x6, 0x4, 0x92, 0x800000, 0x7, 0x1f, 0x140, 0x7ff, 0xabbc, 0x401, 0x0, 0x3, 0x20, 0x48, 0x12000, 0xfa, 0x1, 0xfffff6fe, 0x0, 0x7, 0x8818, 0x8000, 0x6, 0x1f, 0x8, 0x4, 0xff, 0x101, 0xd7, 0x8, 0x5, 0xffff8001, 0x5, 0xb621, 0x1, 0x9, 0x1395db38, 0x0, 0x3], [0x6, 0x6, 0x401, 0x2d5, 0xc08, 0x3, 0x7f, 0x7, 0x8, 0x4, 0xbe1a, 0x5, 0x3, 0x93c, 0x9, 0x80, 0x800, 0x7fff, 0x6, 0x1, 0x5, 0x2, 0x9, 0x7fff, 0x0, 0x8000, 0x4, 0x6, 0x2, 0x4, 0x6, 0xa2ec, 0x7, 0x100, 0x1, 0x3, 0x1f, 0x81, 0x10000, 0xc5, 0x7ff, 0x2aae236d, 0x4, 0x2000, 0x1c, 0x3, 0x2, 0x735c, 0x7fffffff, 0x6, 0xfffffffd, 0x4, 0x3ff, 0x7fffffff, 0x8, 0x224, 0x261, 0x8b8a, 0x100, 0xffffffff, 0x7fff, 0x41, 0x401, 0x200], [0x7, 0x4, 0x2, 0x5, 0x7, 0x1, 0x8, 0x0, 0x8, 0xffffff7b, 0x0, 0x5, 0x6, 0xcc9, 0x1, 0x5, 0x2, 0xfffffffe, 0xfffffff9, 0x0, 0x5, 0x101, 0x401, 0x2, 0x3, 0x3, 0x7f76, 0x3ff, 0x9, 0xc14, 0x3, 0x7, 0x5, 0x100, 0x6, 0x8, 0x2, 0xe0, 0x3f, 0x200, 0x3, 0x9, 0x3, 0x5, 0x95c6, 0x2, 0x6, 0x20, 0x3, 0x8, 0x9, 0x7, 0x9, 0x0, 0xffffd671, 0x1, 0x0, 0x853d, 0x7, 0x3ff, 0x0, 0xfde7, 0x1, 0x5]}, 0x45c) 18:09:56 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000480)={'syz0\x00', {}, 0x0, [0x4, 0x631, 0xaf, 0x2, 0x1b, 0x1, 0x10001, 0x1, 0x8, 0x3ff, 0x800, 0x7859, 0x7, 0x5, 0x7fff, 0xc05, 0xa4, 0x3, 0x4, 0xfffff800, 0x6, 0x7c, 0x6, 0xff, 0x2, 0x771, 0x5, 0xfffffff8, 0x81, 0x0, 0x6, 0x7, 0x6, 0x9, 0x3, 0x0, 0x282d298e, 0x7, 0x6, 0x3, 0xfaf9, 0x7, 0x2, 0xf9, 0xc2, 0x0, 0x8, 0x8, 0x9], [0x0, 0x7ff, 0x1f, 0x1, 0x7, 0x2, 0x6, 0xd594, 0x3, 0x2a, 0x1c9b4fd4, 0x0, 0xfff, 0x5, 0xfffff801, 0x9, 0x3f, 0x8, 0x80, 0x6, 0x401, 0x8000, 0x1, 0xcb, 0x1, 0x6, 0x4, 0x92, 0x800000, 0x7, 0x1f, 0x140, 0x7ff, 0xabbc, 0x401, 0x0, 0x3, 0x20, 0x48, 0x12000, 0xfa, 0x1, 0xfffff6fe, 0x0, 0x7, 0x8818, 0x8000, 0x6, 0x1f, 0x8, 0x4, 0xff, 0x101, 0xd7, 0x8, 0x5, 0xffff8001, 0x5, 0xb621, 0x1, 0x9, 0x1395db38, 0x0, 0x3], [0x6, 0x6, 0x401, 0x2d5, 0xc08, 0x3, 0x7f, 0x7, 0x8, 0x4, 0xbe1a, 0x5, 0x3, 0x93c, 0x9, 0x80, 0x800, 0x7fff, 0x6, 0x1, 0x5, 0x2, 0x9, 0x7fff, 0x0, 0x8000, 0x4, 0x6, 0x2, 0x4, 0x6, 0xa2ec, 0x7, 0x100, 0x1, 0x3, 0x1f, 0x81, 0x10000, 0xc5, 0x7ff, 0x2aae236d, 0x4, 0x2000, 0x1c, 0x3, 0x2, 0x735c, 0x7fffffff, 0x6, 0xfffffffd, 0x4, 0x3ff, 0x7fffffff, 0x8, 0x224, 0x261, 0x8b8a, 0x100, 0xffffffff, 0x7fff, 0x41, 0x401, 0x200], [0x7, 0x4, 0x2, 0x5, 0x7, 0x1, 0x8, 0x0, 0x8, 0xffffff7b, 0x0, 0x5, 0x6, 0xcc9, 0x1, 0x5, 0x2, 0xfffffffe, 0xfffffff9, 0x0, 0x5, 0x101, 0x401, 0x2, 0x3, 0x3, 0x7f76, 0x3ff, 0x9, 0xc14, 0x3, 0x7, 0x5, 0x100, 0x6, 0x8, 0x2, 0xe0, 0x3f, 0x200, 0x3, 0x9, 0x3, 0x5, 0x95c6, 0x2, 0x6, 0x20, 0x3, 0x8, 0x9, 0x7, 0x9, 0x0, 0xffffd671, 0x1, 0x0, 0x853d, 0x7, 0x3ff, 0x0, 0xfde7, 0x1, 0x5]}, 0x45c) 18:09:56 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r0, &(0x7f0000000040)=""/244, 0xf4) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="6653960d0ec5d684fa9f017ef0d60a3c27bc33760036001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479810be2aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e6517e615607676f8f9fc0ebf8b0b16d6f2c59957ab35d05692e664ebf68734ca53366295f4ad6142134b62f11e92ead037c7fb53455560c8ef0f1c94fafa924edfe92175aaa1c4ecc7aeeb72e0d050feacee907f40888c96a65545e07422bc6ac79f4c2d6ee3dab47d06e764682c72d7f16542fcfd05d2813cc182d1595016c179e1717c160300ab1ab0ac397e91bd193c036feb66a9ad2ec5b7967e7f5ff957f8b085a2437c5", 0xf7}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x0) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 18:09:56 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x6}]}, 0x78) 18:09:59 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f0000000100)="6653960d0ec5d684fa9f017ef0d60a3c27bc33760036001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479810be2aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e6517e615607676f8f9fc0ebf8b0b16d6f2c59957ab35d05692e664ebf68734ca53366295f4ad6142134b62f11e92ead037c7fb53455560c8ef0f1c94fafa924edfe92175aaa1c4ecc7aeeb72e0d050feacee907f40888c96a65545e07422bc6ac79f4c2d6ee3dab47d06e764682c72d7f16542fcfd05d2813cc182d1595016c179e1717c160300ab1ab0ac397e91bd193c036feb66a9ad2ec5b7967e7f5ff957f8b085a2437c59a", 0xf8}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x19) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 18:09:59 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) write$uinput_user_dev(r2, &(0x7f0000000480)={'syz0\x00', {}, 0x0, [0x4, 0x631, 0xaf, 0x2, 0x1b, 0x1, 0x10001, 0x1, 0x8, 0x3ff, 0x0, 0x0, 0x0, 0x5], [0x0, 0x7ff, 0x1f, 0x1, 0x7, 0x2, 0x6, 0xd594, 0x3, 0x2a, 0x1c9b4fd4, 0x0, 0xfff, 0x5, 0xfffff801, 0x9, 0x3f, 0x8, 0x80, 0x6, 0x401, 0x8000, 0x1, 0xcb, 0x1, 0x6, 0x4, 0x92, 0x800000, 0x7, 0x1f, 0x140, 0x7ff, 0xabbc, 0x401, 0x0, 0x3, 0x20, 0x48, 0x12000, 0xfa, 0x1, 0xfffff6fe, 0x0, 0x7, 0x8818, 0x8000, 0x6, 0x1f, 0x8, 0x4, 0xff, 0x101, 0xd7, 0x8, 0x5, 0xffff8001, 0x5, 0xb621, 0x1, 0x9, 0x1395db38, 0x0, 0x3], [0x6, 0x6, 0x401, 0x2d5, 0xc08, 0x3, 0x7f, 0x7, 0x8, 0x4, 0xbe1a, 0x5, 0x3, 0x93c, 0x9, 0x80, 0x800, 0x7fff, 0x6, 0x1, 0x5, 0x2, 0x9, 0x7fff, 0x0, 0x8000, 0x4, 0x6, 0x2, 0x4, 0x6, 0xa2ec, 0x7, 0x100, 0x1, 0x3, 0x1f, 0x81, 0x10000, 0xc5, 0x7ff, 0x2aae236d, 0x4, 0x2000, 0x1c, 0x3, 0x2, 0x735c, 0x7fffffff, 0x6, 0xfffffffd, 0x4, 0x3ff, 0x7fffffff, 0x8, 0x224, 0x261, 0x8b8a, 0x100, 0xffffffff, 0x7fff, 0x41, 0x401, 0x200], [0x7, 0x4, 0x2, 0x5, 0x7, 0x1, 0x8, 0x0, 0x8, 0xffffff7b, 0x0, 0x5, 0x6, 0xcc9, 0x1, 0x5, 0x2, 0xfffffffe, 0xfffffff9, 0x0, 0x5, 0x101, 0x401, 0x2, 0x3, 0x3, 0x7f76, 0x3ff, 0x9, 0xc14, 0x3, 0x7, 0x5, 0x100, 0x6, 0x8, 0x2, 0xe0, 0x3f, 0x200, 0x3, 0x9, 0x3, 0x5, 0x95c6, 0x2, 0x6, 0x20, 0x3, 0x8, 0x9, 0x7, 0x9, 0x0, 0xffffd671, 0x1, 0x0, 0x853d, 0x7, 0x3ff, 0x0, 0xfde7, 0x1, 0x5]}, 0x45c) 18:09:59 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63}, [{}]}, 0x26) 18:09:59 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000480)={'syz0\x00', {}, 0x0, [0x4, 0x631, 0xaf, 0x2, 0x1b, 0x1, 0x10001, 0x1, 0x8, 0x3ff, 0x800, 0x7859, 0x7, 0x5, 0x7fff, 0xc05, 0xa4, 0x3, 0x4, 0xfffff800, 0x6, 0x7c, 0x6, 0xff, 0x2, 0x771, 0x5, 0xfffffff8, 0x81, 0x0, 0x6, 0x7, 0x6, 0x9, 0x3, 0x0, 0x282d298e, 0x7, 0x6, 0x3, 0xfaf9, 0x7, 0x2, 0xf9, 0xc2, 0x0, 0x8, 0x8, 0x9], [0x0, 0x7ff, 0x1f, 0x1, 0x7, 0x2, 0x6, 0xd594, 0x3, 0x2a, 0x1c9b4fd4, 0x0, 0xfff, 0x5, 0xfffff801, 0x9, 0x3f, 0x8, 0x80, 0x6, 0x401, 0x8000, 0x1, 0xcb, 0x1, 0x6, 0x4, 0x92, 0x800000, 0x7, 0x1f, 0x140, 0x7ff, 0xabbc, 0x401, 0x0, 0x3, 0x20, 0x48, 0x12000, 0xfa, 0x1, 0xfffff6fe, 0x0, 0x7, 0x8818, 0x8000, 0x6, 0x1f, 0x8, 0x4, 0xff, 0x101, 0xd7, 0x8, 0x5, 0xffff8001, 0x5, 0xb621, 0x1, 0x9, 0x1395db38, 0x0, 0x3], [0x6, 0x6, 0x401, 0x2d5, 0xc08, 0x3, 0x7f, 0x7, 0x8, 0x4, 0xbe1a, 0x5, 0x3, 0x93c, 0x9, 0x80, 0x800, 0x7fff, 0x6, 0x1, 0x5, 0x2, 0x9, 0x7fff, 0x0, 0x8000, 0x4, 0x6, 0x2, 0x4, 0x6, 0xa2ec, 0x7, 0x100, 0x1, 0x3, 0x1f, 0x81, 0x10000, 0xc5, 0x7ff, 0x2aae236d, 0x4, 0x2000, 0x1c, 0x3, 0x2, 0x735c, 0x7fffffff, 0x6, 0xfffffffd, 0x4, 0x3ff, 0x7fffffff, 0x8, 0x224, 0x261, 0x8b8a, 0x100, 0xffffffff, 0x7fff, 0x41, 0x401, 0x200], [0x7, 0x4, 0x2, 0x5, 0x7, 0x1, 0x8, 0x0, 0x8, 0xffffff7b, 0x0, 0x5, 0x6, 0xcc9, 0x1, 0x5, 0x2, 0xfffffffe, 0xfffffff9, 0x0, 0x5, 0x101, 0x401, 0x2, 0x3, 0x3, 0x7f76, 0x3ff, 0x9, 0xc14, 0x3, 0x7, 0x5, 0x100, 0x6, 0x8, 0x2, 0xe0, 0x3f, 0x200, 0x3, 0x9, 0x3, 0x5, 0x95c6, 0x2, 0x6, 0x20, 0x3, 0x8, 0x9, 0x7, 0x9, 0x0, 0xffffd671, 0x1, 0x0, 0x853d, 0x7, 0x3ff, 0x0, 0xfde7, 0x1, 0x5]}, 0x45c) 18:09:59 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x7}]}, 0x78) 18:09:59 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x8}]}, 0x78) 18:09:59 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) write$uinput_user_dev(r2, &(0x7f0000000480)={'syz0\x00', {}, 0x0, [0x4, 0x631, 0xaf, 0x2, 0x1b, 0x1, 0x10001, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x5], [0x0, 0x7ff, 0x1f, 0x1, 0x7, 0x2, 0x6, 0xd594, 0x3, 0x2a, 0x1c9b4fd4, 0x0, 0xfff, 0x5, 0xfffff801, 0x9, 0x3f, 0x8, 0x80, 0x6, 0x401, 0x8000, 0x1, 0xcb, 0x1, 0x6, 0x4, 0x92, 0x800000, 0x7, 0x1f, 0x140, 0x7ff, 0xabbc, 0x401, 0x0, 0x3, 0x20, 0x48, 0x12000, 0xfa, 0x1, 0xfffff6fe, 0x0, 0x7, 0x8818, 0x8000, 0x6, 0x1f, 0x8, 0x4, 0xff, 0x101, 0xd7, 0x8, 0x5, 0xffff8001, 0x5, 0xb621, 0x1, 0x9, 0x1395db38, 0x0, 0x3], [0x6, 0x6, 0x401, 0x2d5, 0xc08, 0x3, 0x7f, 0x7, 0x8, 0x4, 0xbe1a, 0x5, 0x3, 0x93c, 0x9, 0x80, 0x800, 0x7fff, 0x6, 0x1, 0x5, 0x2, 0x9, 0x7fff, 0x0, 0x8000, 0x4, 0x6, 0x2, 0x4, 0x6, 0xa2ec, 0x7, 0x100, 0x1, 0x3, 0x1f, 0x81, 0x10000, 0xc5, 0x7ff, 0x2aae236d, 0x4, 0x2000, 0x1c, 0x3, 0x2, 0x735c, 0x7fffffff, 0x6, 0xfffffffd, 0x4, 0x3ff, 0x7fffffff, 0x8, 0x224, 0x261, 0x8b8a, 0x100, 0xffffffff, 0x7fff, 0x41, 0x401, 0x200], [0x7, 0x4, 0x2, 0x5, 0x7, 0x1, 0x8, 0x0, 0x8, 0xffffff7b, 0x0, 0x5, 0x6, 0xcc9, 0x1, 0x5, 0x2, 0xfffffffe, 0xfffffff9, 0x0, 0x5, 0x101, 0x401, 0x2, 0x3, 0x3, 0x7f76, 0x3ff, 0x9, 0xc14, 0x3, 0x7, 0x5, 0x100, 0x6, 0x8, 0x2, 0xe0, 0x3f, 0x200, 0x3, 0x9, 0x3, 0x5, 0x95c6, 0x2, 0x6, 0x20, 0x3, 0x8, 0x9, 0x7, 0x9, 0x0, 0xffffd671, 0x1, 0x0, 0x853d, 0x7, 0x3ff, 0x0, 0xfde7, 0x1, 0x5]}, 0x45c) 18:09:59 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) write$uinput_user_dev(r2, 0x0, 0x0) 18:09:59 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63}, [{}]}, 0x27) 18:09:59 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r0, &(0x7f0000000040)=""/244, 0xf4) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="6653960d0ec5d684fa9f017ef0d60a3c27bc33760036001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479810be2aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e6517e615607676f8f9fc0ebf8b0b16d6f2c59957ab35d05692e664ebf68734ca53366295f4ad6142134b62f11e92ead037c7fb53455560c8ef0f1c94fafa924edfe92175aaa1c4ecc7aeeb72e0d050feacee907f40888c96a65545e07422bc6ac79f4c2d6ee3dab47d06e764682c72d7f16542fcfd05d2813cc182d1595016c179e1717c160300ab1ab0ac397e91bd193c036feb66a9ad2ec5b7967e7f5ff957f8b085a2437c5", 0xf7}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x0) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 18:09:59 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) write$uinput_user_dev(r2, &(0x7f0000000480)={'syz0\x00', {}, 0x0, [0x4, 0x631, 0xaf, 0x2, 0x1b, 0x1, 0x10001, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x5], [0x0, 0x7ff, 0x1f, 0x1, 0x7, 0x2, 0x6, 0xd594, 0x3, 0x2a, 0x1c9b4fd4, 0x0, 0xfff, 0x5, 0xfffff801, 0x9, 0x3f, 0x8, 0x80, 0x6, 0x401, 0x8000, 0x1, 0xcb, 0x1, 0x6, 0x4, 0x92, 0x800000, 0x7, 0x1f, 0x140, 0x7ff, 0xabbc, 0x401, 0x0, 0x3, 0x20, 0x48, 0x12000, 0xfa, 0x1, 0xfffff6fe, 0x0, 0x7, 0x8818, 0x8000, 0x6, 0x1f, 0x8, 0x4, 0xff, 0x101, 0xd7, 0x8, 0x5, 0xffff8001, 0x5, 0xb621, 0x1, 0x9, 0x1395db38, 0x0, 0x3], [0x6, 0x6, 0x401, 0x2d5, 0xc08, 0x3, 0x7f, 0x7, 0x8, 0x4, 0xbe1a, 0x5, 0x3, 0x93c, 0x9, 0x80, 0x800, 0x7fff, 0x6, 0x1, 0x5, 0x2, 0x9, 0x7fff, 0x0, 0x8000, 0x4, 0x6, 0x2, 0x4, 0x6, 0xa2ec, 0x7, 0x100, 0x1, 0x3, 0x1f, 0x81, 0x10000, 0xc5, 0x7ff, 0x2aae236d, 0x4, 0x2000, 0x1c, 0x3, 0x2, 0x735c, 0x7fffffff, 0x6, 0xfffffffd, 0x4, 0x3ff, 0x7fffffff, 0x8, 0x224, 0x261, 0x8b8a, 0x100, 0xffffffff, 0x7fff, 0x41, 0x401, 0x200], [0x7, 0x4, 0x2, 0x5, 0x7, 0x1, 0x8, 0x0, 0x8, 0xffffff7b, 0x0, 0x5, 0x6, 0xcc9, 0x1, 0x5, 0x2, 0xfffffffe, 0xfffffff9, 0x0, 0x5, 0x101, 0x401, 0x2, 0x3, 0x3, 0x7f76, 0x3ff, 0x9, 0xc14, 0x3, 0x7, 0x5, 0x100, 0x6, 0x8, 0x2, 0xe0, 0x3f, 0x200, 0x3, 0x9, 0x3, 0x5, 0x95c6, 0x2, 0x6, 0x20, 0x3, 0x8, 0x9, 0x7, 0x9, 0x0, 0xffffd671, 0x1, 0x0, 0x853d, 0x7, 0x3ff, 0x0, 0xfde7, 0x1, 0x5]}, 0x45c) 18:09:59 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x9}]}, 0x78) 18:10:02 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f0000000100)="6653960d0ec5d684fa9f017ef0d60a3c27bc33760036001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479810be2aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e6517e615607676f8f9fc0ebf8b0b16d6f2c59957ab35d05692e664ebf68734ca53366295f4ad6142134b62f11e92ead037c7fb53455560c8ef0f1c94fafa924edfe92175aaa1c4ecc7aeeb72e0d050feacee907f40888c96a65545e07422bc6ac79f4c2d6ee3dab47d06e764682c72d7f16542fcfd05d2813cc182d1595016c179e1717c160300ab1ab0ac397e91bd193c036feb66a9ad2ec5b7967e7f5ff957f8b085a2437c59a", 0xf8}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x19) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 18:10:02 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63}, [{}]}, 0x28) 18:10:02 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) write$uinput_user_dev(r2, 0x0, 0x0) 18:10:02 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) write$uinput_user_dev(r2, &(0x7f0000000480)={'syz0\x00', {}, 0x0, [0x4, 0x631, 0xaf, 0x2, 0x1b, 0x1, 0x10001, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x5], [0x0, 0x7ff, 0x1f, 0x1, 0x7, 0x2, 0x6, 0xd594, 0x3, 0x2a, 0x1c9b4fd4, 0x0, 0xfff, 0x5, 0xfffff801, 0x9, 0x3f, 0x8, 0x80, 0x6, 0x401, 0x8000, 0x1, 0xcb, 0x1, 0x6, 0x4, 0x92, 0x800000, 0x7, 0x1f, 0x140, 0x7ff, 0xabbc, 0x401, 0x0, 0x3, 0x20, 0x48, 0x12000, 0xfa, 0x1, 0xfffff6fe, 0x0, 0x7, 0x8818, 0x8000, 0x6, 0x1f, 0x8, 0x4, 0xff, 0x101, 0xd7, 0x8, 0x5, 0xffff8001, 0x5, 0xb621, 0x1, 0x9, 0x1395db38, 0x0, 0x3], [0x6, 0x6, 0x401, 0x2d5, 0xc08, 0x3, 0x7f, 0x7, 0x8, 0x4, 0xbe1a, 0x5, 0x3, 0x93c, 0x9, 0x80, 0x800, 0x7fff, 0x6, 0x1, 0x5, 0x2, 0x9, 0x7fff, 0x0, 0x8000, 0x4, 0x6, 0x2, 0x4, 0x6, 0xa2ec, 0x7, 0x100, 0x1, 0x3, 0x1f, 0x81, 0x10000, 0xc5, 0x7ff, 0x2aae236d, 0x4, 0x2000, 0x1c, 0x3, 0x2, 0x735c, 0x7fffffff, 0x6, 0xfffffffd, 0x4, 0x3ff, 0x7fffffff, 0x8, 0x224, 0x261, 0x8b8a, 0x100, 0xffffffff, 0x7fff, 0x41, 0x401, 0x200], [0x7, 0x4, 0x2, 0x5, 0x7, 0x1, 0x8, 0x0, 0x8, 0xffffff7b, 0x0, 0x5, 0x6, 0xcc9, 0x1, 0x5, 0x2, 0xfffffffe, 0xfffffff9, 0x0, 0x5, 0x101, 0x401, 0x2, 0x3, 0x3, 0x7f76, 0x3ff, 0x9, 0xc14, 0x3, 0x7, 0x5, 0x100, 0x6, 0x8, 0x2, 0xe0, 0x3f, 0x200, 0x3, 0x9, 0x3, 0x5, 0x95c6, 0x2, 0x6, 0x20, 0x3, 0x8, 0x9, 0x7, 0x9, 0x0, 0xffffd671, 0x1, 0x0, 0x853d, 0x7, 0x3ff, 0x0, 0xfde7, 0x1, 0x5]}, 0x45c) 18:10:02 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0xa}]}, 0x78) 18:10:02 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63}, [{}]}, 0x29) 18:10:02 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) write$uinput_user_dev(r2, &(0x7f0000000480)={'syz0\x00', {}, 0x0, [0x4, 0x631, 0xaf, 0x2, 0x1b, 0x1, 0x10001, 0x1, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x5], [0x0, 0x7ff, 0x1f, 0x1, 0x7, 0x2, 0x6, 0xd594, 0x3, 0x2a, 0x1c9b4fd4, 0x0, 0xfff, 0x5, 0xfffff801, 0x9, 0x3f, 0x8, 0x80, 0x6, 0x401, 0x8000, 0x1, 0xcb, 0x1, 0x6, 0x4, 0x92, 0x800000, 0x7, 0x1f, 0x140, 0x7ff, 0xabbc, 0x401, 0x0, 0x3, 0x20, 0x48, 0x12000, 0xfa, 0x1, 0xfffff6fe, 0x0, 0x7, 0x8818, 0x8000, 0x6, 0x1f, 0x8, 0x4, 0xff, 0x101, 0xd7, 0x8, 0x5, 0xffff8001, 0x5, 0xb621, 0x1, 0x9, 0x1395db38, 0x0, 0x3], [0x6, 0x6, 0x401, 0x2d5, 0xc08, 0x3, 0x7f, 0x7, 0x8, 0x4, 0xbe1a, 0x5, 0x3, 0x93c, 0x9, 0x80, 0x800, 0x7fff, 0x6, 0x1, 0x5, 0x2, 0x9, 0x7fff, 0x0, 0x8000, 0x4, 0x6, 0x2, 0x4, 0x6, 0xa2ec, 0x7, 0x100, 0x1, 0x3, 0x1f, 0x81, 0x10000, 0xc5, 0x7ff, 0x2aae236d, 0x4, 0x2000, 0x1c, 0x3, 0x2, 0x735c, 0x7fffffff, 0x6, 0xfffffffd, 0x4, 0x3ff, 0x7fffffff, 0x8, 0x224, 0x261, 0x8b8a, 0x100, 0xffffffff, 0x7fff, 0x41, 0x401, 0x200], [0x7, 0x4, 0x2, 0x5, 0x7, 0x1, 0x8, 0x0, 0x8, 0xffffff7b, 0x0, 0x5, 0x6, 0xcc9, 0x1, 0x5, 0x2, 0xfffffffe, 0xfffffff9, 0x0, 0x5, 0x101, 0x401, 0x2, 0x3, 0x3, 0x7f76, 0x3ff, 0x9, 0xc14, 0x3, 0x7, 0x5, 0x100, 0x6, 0x8, 0x2, 0xe0, 0x3f, 0x200, 0x3, 0x9, 0x3, 0x5, 0x95c6, 0x2, 0x6, 0x20, 0x3, 0x8, 0x9, 0x7, 0x9, 0x0, 0xffffd671, 0x1, 0x0, 0x853d, 0x7, 0x3ff, 0x0, 0xfde7, 0x1, 0x5]}, 0x45c) 18:10:02 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0xc}]}, 0x78) 18:10:02 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) write$uinput_user_dev(r2, 0x0, 0x0) 18:10:02 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63}, [{}]}, 0x2a) 18:10:02 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r0, &(0x7f0000000040)=""/244, 0xf4) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="6653960d0ec5d684fa9f017ef0d60a3c27bc33760036001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479810be2aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e6517e615607676f8f9fc0ebf8b0b16d6f2c59957ab35d05692e664ebf68734ca53366295f4ad6142134b62f11e92ead037c7fb53455560c8ef0f1c94fafa924edfe92175aaa1c4ecc7aeeb72e0d050feacee907f40888c96a65545e07422bc6ac79f4c2d6ee3dab47d06e764682c72d7f16542fcfd05d2813cc182d1595016c179e1717c160300ab1ab0ac397e91bd193c036feb66a9ad2ec5b7967e7f5ff957f8b085a2437c5", 0xf7}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x19) ptrace$cont(0xffffffffffffffff, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 18:10:02 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) write$uinput_user_dev(r2, &(0x7f0000000480)={'syz0\x00', {}, 0x0, [0x4, 0x631, 0xaf, 0x2, 0x1b, 0x1, 0x10001, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x5], [0x0, 0x7ff, 0x1f, 0x1, 0x7, 0x2, 0x6, 0xd594, 0x3, 0x2a, 0x1c9b4fd4, 0x0, 0xfff, 0x5, 0xfffff801, 0x9, 0x3f, 0x8, 0x80, 0x6, 0x401, 0x8000, 0x1, 0xcb, 0x1, 0x6, 0x4, 0x92, 0x800000, 0x7, 0x1f, 0x140, 0x7ff, 0xabbc, 0x401, 0x0, 0x3, 0x20, 0x48, 0x12000, 0xfa, 0x1, 0xfffff6fe, 0x0, 0x7, 0x8818, 0x8000, 0x6, 0x1f, 0x8, 0x4, 0xff, 0x101, 0xd7, 0x8, 0x5, 0xffff8001, 0x5, 0xb621, 0x1, 0x9, 0x1395db38, 0x0, 0x3], [0x6, 0x6, 0x401, 0x2d5, 0xc08, 0x3, 0x7f, 0x7, 0x8, 0x4, 0xbe1a, 0x5, 0x3, 0x93c, 0x9, 0x80, 0x800, 0x7fff, 0x6, 0x1, 0x5, 0x2, 0x9, 0x7fff, 0x0, 0x8000, 0x4, 0x6, 0x2, 0x4, 0x6, 0xa2ec, 0x7, 0x100, 0x1, 0x3, 0x1f, 0x81, 0x10000, 0xc5, 0x7ff, 0x2aae236d, 0x4, 0x2000, 0x1c, 0x3, 0x2, 0x735c, 0x7fffffff, 0x6, 0xfffffffd, 0x4, 0x3ff, 0x7fffffff, 0x8, 0x224, 0x261, 0x8b8a, 0x100, 0xffffffff, 0x7fff, 0x41, 0x401, 0x200], [0x7, 0x4, 0x2, 0x5, 0x7, 0x1, 0x8, 0x0, 0x8, 0xffffff7b, 0x0, 0x5, 0x6, 0xcc9, 0x1, 0x5, 0x2, 0xfffffffe, 0xfffffff9, 0x0, 0x5, 0x101, 0x401, 0x2, 0x3, 0x3, 0x7f76, 0x3ff, 0x9, 0xc14, 0x3, 0x7, 0x5, 0x100, 0x6, 0x8, 0x2, 0xe0, 0x3f, 0x200, 0x3, 0x9, 0x3, 0x5, 0x95c6, 0x2, 0x6, 0x20, 0x3, 0x8, 0x9, 0x7, 0x9, 0x0, 0xffffd671, 0x1, 0x0, 0x853d, 0x7, 0x3ff, 0x0, 0xfde7, 0x1, 0x5]}, 0x45c) 18:10:05 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0xd}]}, 0x78) 18:10:05 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f0000000100)="6653960d0ec5d684fa9f017ef0d60a3c27bc33760036001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479810be2aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e6517e615607676f8f9fc0ebf8b0b16d6f2c59957ab35d05692e664ebf68734ca53366295f4ad6142134b62f11e92ead037c7fb53455560c8ef0f1c94fafa924edfe92175aaa1c4ecc7aeeb72e0d050feacee907f40888c96a65545e07422bc6ac79f4c2d6ee3dab47d06e764682c72d7f16542fcfd05d2813cc182d1595016c179e1717c160300ab1ab0ac397e91bd193c036feb66a9ad2ec5b7967e7f5ff957f8b085a2437c59a", 0xf8}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x19) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 18:10:05 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) write$uinput_user_dev(r2, &(0x7f0000000480)={'syz0\x00', {}, 0x0, [0x4, 0x631, 0xaf, 0x2, 0x1b, 0x1, 0x10001, 0x1, 0x8, 0x3ff, 0x800, 0x7859, 0x7, 0x5, 0x7fff, 0xc05, 0xa4, 0x3, 0x4, 0xfffff800, 0x6, 0x7c, 0x6, 0xff, 0x2, 0x771, 0x5, 0xfffffff8, 0x81, 0x0, 0x6, 0x7, 0x6, 0x9, 0x3, 0x0, 0x282d298e, 0x7, 0x6, 0x3, 0xfaf9, 0x7, 0x2, 0xf9, 0xc2, 0x0, 0x8, 0x8], [0x0, 0x7ff, 0x1f, 0x1, 0x7, 0x2, 0x6, 0xd594, 0x3, 0x2a, 0x1c9b4fd4, 0x0, 0xfff, 0x5, 0xfffff801, 0x9, 0x3f, 0x8, 0x80, 0x6, 0x401, 0x8000, 0x1, 0xcb, 0x1, 0x6, 0x4, 0x92, 0x800000, 0x7, 0x1f, 0x140, 0x7ff, 0xabbc, 0x401, 0x0, 0x3, 0x20, 0x48, 0x12000, 0xfa, 0x1, 0xfffff6fe, 0x0, 0x7, 0x8818, 0x8000, 0x6, 0x1f, 0x8, 0x4, 0xff, 0x101, 0xd7, 0x8, 0x5, 0xffff8001, 0x5, 0xb621, 0x1, 0x9, 0x1395db38, 0x0, 0x3], [0x6, 0x6, 0x401, 0x2d5, 0xc08, 0x3, 0x7f, 0x7, 0x8, 0x4, 0xbe1a, 0x5, 0x3, 0x93c, 0x9, 0x80, 0x800, 0x7fff, 0x6, 0x1, 0x5, 0x2, 0x9, 0x7fff, 0x0, 0x8000, 0x4, 0x6, 0x2, 0x4, 0x6, 0xa2ec, 0x7, 0x100, 0x1, 0x3, 0x1f, 0x81, 0x10000, 0xc5, 0x7ff, 0x2aae236d, 0x4, 0x2000, 0x1c, 0x3, 0x2, 0x735c, 0x7fffffff, 0x6, 0xfffffffd, 0x4, 0x3ff, 0x7fffffff, 0x8, 0x224, 0x261, 0x8b8a, 0x100, 0xffffffff, 0x7fff, 0x41, 0x401, 0x200], [0x7, 0x4, 0x2, 0x5, 0x7, 0x1, 0x8, 0x0, 0x8, 0xffffff7b, 0x0, 0x5, 0x6, 0xcc9, 0x1, 0x5, 0x2, 0xfffffffe, 0xfffffff9, 0x0, 0x5, 0x101, 0x401, 0x2, 0x3, 0x3, 0x7f76, 0x3ff, 0x9, 0xc14, 0x3, 0x7, 0x5, 0x100, 0x6, 0x8, 0x2, 0xe0, 0x3f, 0x200, 0x3, 0x9, 0x3, 0x5, 0x95c6, 0x2, 0x6, 0x20, 0x3, 0x8, 0x9, 0x7, 0x9, 0x0, 0xffffd671, 0x1, 0x0, 0x853d, 0x7, 0x3ff, 0x0, 0xfde7, 0x1, 0x5]}, 0x45c) 18:10:05 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63}, [{}]}, 0x2b) 18:10:05 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) write$uinput_user_dev(r2, &(0x7f0000000480)={'syz0\x00', {}, 0x0, [0x4, 0x631, 0xaf, 0x2, 0x1b, 0x1, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x5], [0x0, 0x7ff, 0x1f, 0x1, 0x7, 0x2, 0x6, 0xd594, 0x3, 0x2a, 0x1c9b4fd4, 0x0, 0xfff, 0x5, 0xfffff801, 0x9, 0x3f, 0x8, 0x80, 0x6, 0x401, 0x8000, 0x1, 0xcb, 0x1, 0x6, 0x4, 0x92, 0x800000, 0x7, 0x1f, 0x140, 0x7ff, 0xabbc, 0x401, 0x0, 0x3, 0x20, 0x48, 0x12000, 0xfa, 0x1, 0xfffff6fe, 0x0, 0x7, 0x8818, 0x8000, 0x6, 0x1f, 0x8, 0x4, 0xff, 0x101, 0xd7, 0x8, 0x5, 0xffff8001, 0x5, 0xb621, 0x1, 0x9, 0x1395db38, 0x0, 0x3], [0x6, 0x6, 0x401, 0x2d5, 0xc08, 0x3, 0x7f, 0x7, 0x8, 0x4, 0xbe1a, 0x5, 0x3, 0x93c, 0x9, 0x80, 0x800, 0x7fff, 0x6, 0x1, 0x5, 0x2, 0x9, 0x7fff, 0x0, 0x8000, 0x4, 0x6, 0x2, 0x4, 0x6, 0xa2ec, 0x7, 0x100, 0x1, 0x3, 0x1f, 0x81, 0x10000, 0xc5, 0x7ff, 0x2aae236d, 0x4, 0x2000, 0x1c, 0x3, 0x2, 0x735c, 0x7fffffff, 0x6, 0xfffffffd, 0x4, 0x3ff, 0x7fffffff, 0x8, 0x224, 0x261, 0x8b8a, 0x100, 0xffffffff, 0x7fff, 0x41, 0x401, 0x200], [0x7, 0x4, 0x2, 0x5, 0x7, 0x1, 0x8, 0x0, 0x8, 0xffffff7b, 0x0, 0x5, 0x6, 0xcc9, 0x1, 0x5, 0x2, 0xfffffffe, 0xfffffff9, 0x0, 0x5, 0x101, 0x401, 0x2, 0x3, 0x3, 0x7f76, 0x3ff, 0x9, 0xc14, 0x3, 0x7, 0x5, 0x100, 0x6, 0x8, 0x2, 0xe0, 0x3f, 0x200, 0x3, 0x9, 0x3, 0x5, 0x95c6, 0x2, 0x6, 0x20, 0x3, 0x8, 0x9, 0x7, 0x9, 0x0, 0xffffd671, 0x1, 0x0, 0x853d, 0x7, 0x3ff, 0x0, 0xfde7, 0x1, 0x5]}, 0x45c) 18:10:05 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) write$uinput_user_dev(r2, &(0x7f0000000480)={'syz0\x00', {}, 0x0, [0x4, 0x631, 0xaf, 0x2, 0x1b, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x5], [0x0, 0x7ff, 0x1f, 0x1, 0x7, 0x2, 0x6, 0xd594, 0x3, 0x2a, 0x1c9b4fd4, 0x0, 0xfff, 0x5, 0xfffff801, 0x9, 0x3f, 0x8, 0x80, 0x6, 0x401, 0x8000, 0x1, 0xcb, 0x1, 0x6, 0x4, 0x92, 0x800000, 0x7, 0x1f, 0x140, 0x7ff, 0xabbc, 0x401, 0x0, 0x3, 0x20, 0x48, 0x12000, 0xfa, 0x1, 0xfffff6fe, 0x0, 0x7, 0x8818, 0x8000, 0x6, 0x1f, 0x8, 0x4, 0xff, 0x101, 0xd7, 0x8, 0x5, 0xffff8001, 0x5, 0xb621, 0x1, 0x9, 0x1395db38, 0x0, 0x3], [0x6, 0x6, 0x401, 0x2d5, 0xc08, 0x3, 0x7f, 0x7, 0x8, 0x4, 0xbe1a, 0x5, 0x3, 0x93c, 0x9, 0x80, 0x800, 0x7fff, 0x6, 0x1, 0x5, 0x2, 0x9, 0x7fff, 0x0, 0x8000, 0x4, 0x6, 0x2, 0x4, 0x6, 0xa2ec, 0x7, 0x100, 0x1, 0x3, 0x1f, 0x81, 0x10000, 0xc5, 0x7ff, 0x2aae236d, 0x4, 0x2000, 0x1c, 0x3, 0x2, 0x735c, 0x7fffffff, 0x6, 0xfffffffd, 0x4, 0x3ff, 0x7fffffff, 0x8, 0x224, 0x261, 0x8b8a, 0x100, 0xffffffff, 0x7fff, 0x41, 0x401, 0x200], [0x7, 0x4, 0x2, 0x5, 0x7, 0x1, 0x8, 0x0, 0x8, 0xffffff7b, 0x0, 0x5, 0x6, 0xcc9, 0x1, 0x5, 0x2, 0xfffffffe, 0xfffffff9, 0x0, 0x5, 0x101, 0x401, 0x2, 0x3, 0x3, 0x7f76, 0x3ff, 0x9, 0xc14, 0x3, 0x7, 0x5, 0x100, 0x6, 0x8, 0x2, 0xe0, 0x3f, 0x200, 0x3, 0x9, 0x3, 0x5, 0x95c6, 0x2, 0x6, 0x20, 0x3, 0x8, 0x9, 0x7, 0x9, 0x0, 0xffffd671, 0x1, 0x0, 0x853d, 0x7, 0x3ff, 0x0, 0xfde7, 0x1, 0x5]}, 0x45c) 18:10:05 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) write$uinput_user_dev(r2, &(0x7f0000000480)={'syz0\x00', {}, 0x0, [0x4, 0x631, 0xaf, 0x2, 0x1b, 0x1, 0x10001, 0x1, 0x8, 0x3ff, 0x800, 0x7859, 0x7, 0x5, 0x7fff, 0xc05, 0xa4, 0x3, 0x4, 0xfffff800, 0x6, 0x7c, 0x6, 0xff, 0x2, 0x771, 0x5, 0xfffffff8, 0x81, 0x0, 0x6, 0x7, 0x6, 0x9, 0x3, 0x0, 0x282d298e, 0x7, 0x6, 0x3, 0xfaf9, 0x7, 0x2, 0xf9, 0xc2, 0x0, 0x8], [0x0, 0x7ff, 0x1f, 0x1, 0x7, 0x2, 0x6, 0xd594, 0x3, 0x2a, 0x1c9b4fd4, 0x0, 0xfff, 0x5, 0xfffff801, 0x9, 0x3f, 0x8, 0x80, 0x6, 0x401, 0x8000, 0x1, 0xcb, 0x1, 0x6, 0x4, 0x92, 0x800000, 0x7, 0x1f, 0x140, 0x7ff, 0xabbc, 0x401, 0x0, 0x3, 0x20, 0x48, 0x12000, 0xfa, 0x1, 0xfffff6fe, 0x0, 0x7, 0x8818, 0x8000, 0x6, 0x1f, 0x8, 0x4, 0xff, 0x101, 0xd7, 0x8, 0x5, 0xffff8001, 0x5, 0xb621, 0x1, 0x9, 0x1395db38, 0x0, 0x3], [0x6, 0x6, 0x401, 0x2d5, 0xc08, 0x3, 0x7f, 0x7, 0x8, 0x4, 0xbe1a, 0x5, 0x3, 0x93c, 0x9, 0x80, 0x800, 0x7fff, 0x6, 0x1, 0x5, 0x2, 0x9, 0x7fff, 0x0, 0x8000, 0x4, 0x6, 0x2, 0x4, 0x6, 0xa2ec, 0x7, 0x100, 0x1, 0x3, 0x1f, 0x81, 0x10000, 0xc5, 0x7ff, 0x2aae236d, 0x4, 0x2000, 0x1c, 0x3, 0x2, 0x735c, 0x7fffffff, 0x6, 0xfffffffd, 0x4, 0x3ff, 0x7fffffff, 0x8, 0x224, 0x261, 0x8b8a, 0x100, 0xffffffff, 0x7fff, 0x41, 0x401, 0x200], [0x7, 0x4, 0x2, 0x5, 0x7, 0x1, 0x8, 0x0, 0x8, 0xffffff7b, 0x0, 0x5, 0x6, 0xcc9, 0x1, 0x5, 0x2, 0xfffffffe, 0xfffffff9, 0x0, 0x5, 0x101, 0x401, 0x2, 0x3, 0x3, 0x7f76, 0x3ff, 0x9, 0xc14, 0x3, 0x7, 0x5, 0x100, 0x6, 0x8, 0x2, 0xe0, 0x3f, 0x200, 0x3, 0x9, 0x3, 0x5, 0x95c6, 0x2, 0x6, 0x20, 0x3, 0x8, 0x9, 0x7, 0x9, 0x0, 0xffffd671, 0x1, 0x0, 0x853d, 0x7, 0x3ff, 0x0, 0xfde7, 0x1, 0x5]}, 0x45c) 18:10:05 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0xe}]}, 0x78) 18:10:05 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63}, [{}]}, 0x2c) 18:10:05 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) write$uinput_user_dev(r2, &(0x7f0000000480)={'syz0\x00', {}, 0x0, [0x4, 0x631, 0xaf, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x5], [0x0, 0x7ff, 0x1f, 0x1, 0x7, 0x2, 0x6, 0xd594, 0x3, 0x2a, 0x1c9b4fd4, 0x0, 0xfff, 0x5, 0xfffff801, 0x9, 0x3f, 0x8, 0x80, 0x6, 0x401, 0x8000, 0x1, 0xcb, 0x1, 0x6, 0x4, 0x92, 0x800000, 0x7, 0x1f, 0x140, 0x7ff, 0xabbc, 0x401, 0x0, 0x3, 0x20, 0x48, 0x12000, 0xfa, 0x1, 0xfffff6fe, 0x0, 0x7, 0x8818, 0x8000, 0x6, 0x1f, 0x8, 0x4, 0xff, 0x101, 0xd7, 0x8, 0x5, 0xffff8001, 0x5, 0xb621, 0x1, 0x9, 0x1395db38, 0x0, 0x3], [0x6, 0x6, 0x401, 0x2d5, 0xc08, 0x3, 0x7f, 0x7, 0x8, 0x4, 0xbe1a, 0x5, 0x3, 0x93c, 0x9, 0x80, 0x800, 0x7fff, 0x6, 0x1, 0x5, 0x2, 0x9, 0x7fff, 0x0, 0x8000, 0x4, 0x6, 0x2, 0x4, 0x6, 0xa2ec, 0x7, 0x100, 0x1, 0x3, 0x1f, 0x81, 0x10000, 0xc5, 0x7ff, 0x2aae236d, 0x4, 0x2000, 0x1c, 0x3, 0x2, 0x735c, 0x7fffffff, 0x6, 0xfffffffd, 0x4, 0x3ff, 0x7fffffff, 0x8, 0x224, 0x261, 0x8b8a, 0x100, 0xffffffff, 0x7fff, 0x41, 0x401, 0x200], [0x7, 0x4, 0x2, 0x5, 0x7, 0x1, 0x8, 0x0, 0x8, 0xffffff7b, 0x0, 0x5, 0x6, 0xcc9, 0x1, 0x5, 0x2, 0xfffffffe, 0xfffffff9, 0x0, 0x5, 0x101, 0x401, 0x2, 0x3, 0x3, 0x7f76, 0x3ff, 0x9, 0xc14, 0x3, 0x7, 0x5, 0x100, 0x6, 0x8, 0x2, 0xe0, 0x3f, 0x200, 0x3, 0x9, 0x3, 0x5, 0x95c6, 0x2, 0x6, 0x20, 0x3, 0x8, 0x9, 0x7, 0x9, 0x0, 0xffffd671, 0x1, 0x0, 0x853d, 0x7, 0x3ff, 0x0, 0xfde7, 0x1, 0x5]}, 0x45c) 18:10:05 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r0, &(0x7f0000000040)=""/244, 0xf4) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="6653960d0ec5d684fa9f017ef0d60a3c27bc33760036001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479810be2aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e6517e615607676f8f9fc0ebf8b0b16d6f2c59957ab35d05692e664ebf68734ca53366295f4ad6142134b62f11e92ead037c7fb53455560c8ef0f1c94fafa924edfe92175aaa1c4ecc7aeeb72e0d050feacee907f40888c96a65545e07422bc6ac79f4c2d6ee3dab47d06e764682c72d7f16542fcfd05d2813cc182d1595016c179e1717c160300ab1ab0ac397e91bd193c036feb66a9ad2ec5b7967e7f5ff957f8b085a2437c5", 0xf7}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x19) ptrace$cont(0xffffffffffffffff, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 18:10:05 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63}, [{}]}, 0x2d) 18:10:05 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) write$uinput_user_dev(r2, &(0x7f0000000480)={'syz0\x00', {}, 0x0, [0x4, 0x631, 0xaf, 0x2, 0x1b, 0x1, 0x10001, 0x1, 0x8, 0x3ff, 0x800, 0x7859, 0x7, 0x5, 0x7fff, 0xc05, 0xa4, 0x3, 0x4, 0xfffff800, 0x6, 0x7c, 0x6, 0xff, 0x2, 0x771, 0x5, 0xfffffff8, 0x81, 0x0, 0x6, 0x7, 0x6, 0x9, 0x3, 0x0, 0x282d298e, 0x7, 0x6, 0x3, 0xfaf9, 0x7, 0x2, 0xf9, 0xc2], [0x0, 0x7ff, 0x1f, 0x1, 0x7, 0x2, 0x6, 0xd594, 0x3, 0x2a, 0x1c9b4fd4, 0x0, 0xfff, 0x5, 0xfffff801, 0x9, 0x3f, 0x8, 0x80, 0x6, 0x401, 0x8000, 0x1, 0xcb, 0x1, 0x6, 0x4, 0x92, 0x800000, 0x7, 0x1f, 0x140, 0x7ff, 0xabbc, 0x401, 0x0, 0x3, 0x20, 0x48, 0x12000, 0xfa, 0x1, 0xfffff6fe, 0x0, 0x7, 0x8818, 0x8000, 0x6, 0x1f, 0x8, 0x4, 0xff, 0x101, 0xd7, 0x8, 0x5, 0xffff8001, 0x5, 0xb621, 0x1, 0x9, 0x1395db38, 0x0, 0x3], [0x6, 0x6, 0x401, 0x2d5, 0xc08, 0x3, 0x7f, 0x7, 0x8, 0x4, 0xbe1a, 0x5, 0x3, 0x93c, 0x9, 0x80, 0x800, 0x7fff, 0x6, 0x1, 0x5, 0x2, 0x9, 0x7fff, 0x0, 0x8000, 0x4, 0x6, 0x2, 0x4, 0x6, 0xa2ec, 0x7, 0x100, 0x1, 0x3, 0x1f, 0x81, 0x10000, 0xc5, 0x7ff, 0x2aae236d, 0x4, 0x2000, 0x1c, 0x3, 0x2, 0x735c, 0x7fffffff, 0x6, 0xfffffffd, 0x4, 0x3ff, 0x7fffffff, 0x8, 0x224, 0x261, 0x8b8a, 0x100, 0xffffffff, 0x7fff, 0x41, 0x401, 0x200], [0x7, 0x4, 0x2, 0x5, 0x7, 0x1, 0x8, 0x0, 0x8, 0xffffff7b, 0x0, 0x5, 0x6, 0xcc9, 0x1, 0x5, 0x2, 0xfffffffe, 0xfffffff9, 0x0, 0x5, 0x101, 0x401, 0x2, 0x3, 0x3, 0x7f76, 0x3ff, 0x9, 0xc14, 0x3, 0x7, 0x5, 0x100, 0x6, 0x8, 0x2, 0xe0, 0x3f, 0x200, 0x3, 0x9, 0x3, 0x5, 0x95c6, 0x2, 0x6, 0x20, 0x3, 0x8, 0x9, 0x7, 0x9, 0x0, 0xffffd671, 0x1, 0x0, 0x853d, 0x7, 0x3ff, 0x0, 0xfde7, 0x1, 0x5]}, 0x45c) 18:10:05 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) write$uinput_user_dev(r2, &(0x7f0000000480)={'syz0\x00', {}, 0x0, [0x4, 0x631, 0xaf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x5], [0x0, 0x7ff, 0x1f, 0x1, 0x7, 0x2, 0x6, 0xd594, 0x3, 0x2a, 0x1c9b4fd4, 0x0, 0xfff, 0x5, 0xfffff801, 0x9, 0x3f, 0x8, 0x80, 0x6, 0x401, 0x8000, 0x1, 0xcb, 0x1, 0x6, 0x4, 0x92, 0x800000, 0x7, 0x1f, 0x140, 0x7ff, 0xabbc, 0x401, 0x0, 0x3, 0x20, 0x48, 0x12000, 0xfa, 0x1, 0xfffff6fe, 0x0, 0x7, 0x8818, 0x8000, 0x6, 0x1f, 0x8, 0x4, 0xff, 0x101, 0xd7, 0x8, 0x5, 0xffff8001, 0x5, 0xb621, 0x1, 0x9, 0x1395db38, 0x0, 0x3], [0x6, 0x6, 0x401, 0x2d5, 0xc08, 0x3, 0x7f, 0x7, 0x8, 0x4, 0xbe1a, 0x5, 0x3, 0x93c, 0x9, 0x80, 0x800, 0x7fff, 0x6, 0x1, 0x5, 0x2, 0x9, 0x7fff, 0x0, 0x8000, 0x4, 0x6, 0x2, 0x4, 0x6, 0xa2ec, 0x7, 0x100, 0x1, 0x3, 0x1f, 0x81, 0x10000, 0xc5, 0x7ff, 0x2aae236d, 0x4, 0x2000, 0x1c, 0x3, 0x2, 0x735c, 0x7fffffff, 0x6, 0xfffffffd, 0x4, 0x3ff, 0x7fffffff, 0x8, 0x224, 0x261, 0x8b8a, 0x100, 0xffffffff, 0x7fff, 0x41, 0x401, 0x200], [0x7, 0x4, 0x2, 0x5, 0x7, 0x1, 0x8, 0x0, 0x8, 0xffffff7b, 0x0, 0x5, 0x6, 0xcc9, 0x1, 0x5, 0x2, 0xfffffffe, 0xfffffff9, 0x0, 0x5, 0x101, 0x401, 0x2, 0x3, 0x3, 0x7f76, 0x3ff, 0x9, 0xc14, 0x3, 0x7, 0x5, 0x100, 0x6, 0x8, 0x2, 0xe0, 0x3f, 0x200, 0x3, 0x9, 0x3, 0x5, 0x95c6, 0x2, 0x6, 0x20, 0x3, 0x8, 0x9, 0x7, 0x9, 0x0, 0xffffd671, 0x1, 0x0, 0x853d, 0x7, 0x3ff, 0x0, 0xfde7, 0x1, 0x5]}, 0x45c) 18:10:08 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f0000000100)="6653960d0ec5d684fa9f017ef0d60a3c27bc33760036001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479810be2aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e6517e615607676f8f9fc0ebf8b0b16d6f2c59957ab35d05692e664ebf68734ca53366295f4ad6142134b62f11e92ead037c7fb53455560c8ef0f1c94fafa924edfe92175aaa1c4ecc7aeeb72e0d050feacee907f40888c96a65545e07422bc6ac79f4c2d6ee3dab47d06e764682c72d7f16542fcfd05d2813cc182d1595016c179e1717c160300ab1ab0ac397e91bd193c036feb66a9ad2ec5b7967e7f5ff957f8b085a2437c59a", 0xf8}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x19) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 18:10:08 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0xf}]}, 0x78) 18:10:08 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63}, [{}]}, 0x2e) 18:10:08 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) write$uinput_user_dev(r2, &(0x7f0000000480)={'syz0\x00', {}, 0x0, [0x4, 0x631, 0xaf, 0x2, 0x1b, 0x1, 0x10001, 0x1, 0x8, 0x3ff, 0x800, 0x7859, 0x7, 0x5, 0x7fff, 0xc05, 0xa4, 0x3, 0x4, 0xfffff800, 0x6, 0x7c, 0x6, 0xff, 0x2, 0x771, 0x5, 0xfffffff8, 0x81, 0x0, 0x6, 0x7, 0x6, 0x9, 0x3, 0x0, 0x282d298e, 0x7, 0x6, 0x3, 0xfaf9, 0x7, 0x2, 0xf9], [0x0, 0x7ff, 0x1f, 0x1, 0x7, 0x2, 0x6, 0xd594, 0x3, 0x2a, 0x1c9b4fd4, 0x0, 0xfff, 0x5, 0xfffff801, 0x9, 0x3f, 0x8, 0x80, 0x6, 0x401, 0x8000, 0x1, 0xcb, 0x1, 0x6, 0x4, 0x92, 0x800000, 0x7, 0x1f, 0x140, 0x7ff, 0xabbc, 0x401, 0x0, 0x3, 0x20, 0x48, 0x12000, 0xfa, 0x1, 0xfffff6fe, 0x0, 0x7, 0x8818, 0x8000, 0x6, 0x1f, 0x8, 0x4, 0xff, 0x101, 0xd7, 0x8, 0x5, 0xffff8001, 0x5, 0xb621, 0x1, 0x9, 0x1395db38, 0x0, 0x3], [0x6, 0x6, 0x401, 0x2d5, 0xc08, 0x3, 0x7f, 0x7, 0x8, 0x4, 0xbe1a, 0x5, 0x3, 0x93c, 0x9, 0x80, 0x800, 0x7fff, 0x6, 0x1, 0x5, 0x2, 0x9, 0x7fff, 0x0, 0x8000, 0x4, 0x6, 0x2, 0x4, 0x6, 0xa2ec, 0x7, 0x100, 0x1, 0x3, 0x1f, 0x81, 0x10000, 0xc5, 0x7ff, 0x2aae236d, 0x4, 0x2000, 0x1c, 0x3, 0x2, 0x735c, 0x7fffffff, 0x6, 0xfffffffd, 0x4, 0x3ff, 0x7fffffff, 0x8, 0x224, 0x261, 0x8b8a, 0x100, 0xffffffff, 0x7fff, 0x41, 0x401, 0x200], [0x7, 0x4, 0x2, 0x5, 0x7, 0x1, 0x8, 0x0, 0x8, 0xffffff7b, 0x0, 0x5, 0x6, 0xcc9, 0x1, 0x5, 0x2, 0xfffffffe, 0xfffffff9, 0x0, 0x5, 0x101, 0x401, 0x2, 0x3, 0x3, 0x7f76, 0x3ff, 0x9, 0xc14, 0x3, 0x7, 0x5, 0x100, 0x6, 0x8, 0x2, 0xe0, 0x3f, 0x200, 0x3, 0x9, 0x3, 0x5, 0x95c6, 0x2, 0x6, 0x20, 0x3, 0x8, 0x9, 0x7, 0x9, 0x0, 0xffffd671, 0x1, 0x0, 0x853d, 0x7, 0x3ff, 0x0, 0xfde7, 0x1, 0x5]}, 0x45c) 18:10:08 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) write$uinput_user_dev(r2, &(0x7f0000000480)={'syz0\x00', {}, 0x0, [0x4, 0x631, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x5], [0x0, 0x7ff, 0x1f, 0x1, 0x7, 0x2, 0x6, 0xd594, 0x3, 0x2a, 0x1c9b4fd4, 0x0, 0xfff, 0x5, 0xfffff801, 0x9, 0x3f, 0x8, 0x80, 0x6, 0x401, 0x8000, 0x1, 0xcb, 0x1, 0x6, 0x4, 0x92, 0x800000, 0x7, 0x1f, 0x140, 0x7ff, 0xabbc, 0x401, 0x0, 0x3, 0x20, 0x48, 0x12000, 0xfa, 0x1, 0xfffff6fe, 0x0, 0x7, 0x8818, 0x8000, 0x6, 0x1f, 0x8, 0x4, 0xff, 0x101, 0xd7, 0x8, 0x5, 0xffff8001, 0x5, 0xb621, 0x1, 0x9, 0x1395db38, 0x0, 0x3], [0x6, 0x6, 0x401, 0x2d5, 0xc08, 0x3, 0x7f, 0x7, 0x8, 0x4, 0xbe1a, 0x5, 0x3, 0x93c, 0x9, 0x80, 0x800, 0x7fff, 0x6, 0x1, 0x5, 0x2, 0x9, 0x7fff, 0x0, 0x8000, 0x4, 0x6, 0x2, 0x4, 0x6, 0xa2ec, 0x7, 0x100, 0x1, 0x3, 0x1f, 0x81, 0x10000, 0xc5, 0x7ff, 0x2aae236d, 0x4, 0x2000, 0x1c, 0x3, 0x2, 0x735c, 0x7fffffff, 0x6, 0xfffffffd, 0x4, 0x3ff, 0x7fffffff, 0x8, 0x224, 0x261, 0x8b8a, 0x100, 0xffffffff, 0x7fff, 0x41, 0x401, 0x200], [0x7, 0x4, 0x2, 0x5, 0x7, 0x1, 0x8, 0x0, 0x8, 0xffffff7b, 0x0, 0x5, 0x6, 0xcc9, 0x1, 0x5, 0x2, 0xfffffffe, 0xfffffff9, 0x0, 0x5, 0x101, 0x401, 0x2, 0x3, 0x3, 0x7f76, 0x3ff, 0x9, 0xc14, 0x3, 0x7, 0x5, 0x100, 0x6, 0x8, 0x2, 0xe0, 0x3f, 0x200, 0x3, 0x9, 0x3, 0x5, 0x95c6, 0x2, 0x6, 0x20, 0x3, 0x8, 0x9, 0x7, 0x9, 0x0, 0xffffd671, 0x1, 0x0, 0x853d, 0x7, 0x3ff, 0x0, 0xfde7, 0x1, 0x5]}, 0x45c) 18:10:08 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) write$uinput_user_dev(r2, &(0x7f0000000480)={'syz0\x00', {}, 0x0, [0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x5], [0x0, 0x7ff, 0x1f, 0x1, 0x7, 0x2, 0x6, 0xd594, 0x3, 0x2a, 0x1c9b4fd4, 0x0, 0xfff, 0x5, 0xfffff801, 0x9, 0x3f, 0x8, 0x80, 0x6, 0x401, 0x8000, 0x1, 0xcb, 0x1, 0x6, 0x4, 0x92, 0x800000, 0x7, 0x1f, 0x140, 0x7ff, 0xabbc, 0x401, 0x0, 0x3, 0x20, 0x48, 0x12000, 0xfa, 0x1, 0xfffff6fe, 0x0, 0x7, 0x8818, 0x8000, 0x6, 0x1f, 0x8, 0x4, 0xff, 0x101, 0xd7, 0x8, 0x5, 0xffff8001, 0x5, 0xb621, 0x1, 0x9, 0x1395db38, 0x0, 0x3], [0x6, 0x6, 0x401, 0x2d5, 0xc08, 0x3, 0x7f, 0x7, 0x8, 0x4, 0xbe1a, 0x5, 0x3, 0x93c, 0x9, 0x80, 0x800, 0x7fff, 0x6, 0x1, 0x5, 0x2, 0x9, 0x7fff, 0x0, 0x8000, 0x4, 0x6, 0x2, 0x4, 0x6, 0xa2ec, 0x7, 0x100, 0x1, 0x3, 0x1f, 0x81, 0x10000, 0xc5, 0x7ff, 0x2aae236d, 0x4, 0x2000, 0x1c, 0x3, 0x2, 0x735c, 0x7fffffff, 0x6, 0xfffffffd, 0x4, 0x3ff, 0x7fffffff, 0x8, 0x224, 0x261, 0x8b8a, 0x100, 0xffffffff, 0x7fff, 0x41, 0x401, 0x200], [0x7, 0x4, 0x2, 0x5, 0x7, 0x1, 0x8, 0x0, 0x8, 0xffffff7b, 0x0, 0x5, 0x6, 0xcc9, 0x1, 0x5, 0x2, 0xfffffffe, 0xfffffff9, 0x0, 0x5, 0x101, 0x401, 0x2, 0x3, 0x3, 0x7f76, 0x3ff, 0x9, 0xc14, 0x3, 0x7, 0x5, 0x100, 0x6, 0x8, 0x2, 0xe0, 0x3f, 0x200, 0x3, 0x9, 0x3, 0x5, 0x95c6, 0x2, 0x6, 0x20, 0x3, 0x8, 0x9, 0x7, 0x9, 0x0, 0xffffd671, 0x1, 0x0, 0x853d, 0x7, 0x3ff, 0x0, 0xfde7, 0x1, 0x5]}, 0x45c) 18:10:08 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x18}]}, 0x78) 18:10:08 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63}, [{}]}, 0x2f) 18:10:08 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r0, &(0x7f0000000040)=""/244, 0xf4) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="6653960d0ec5d684fa9f017ef0d60a3c27bc33760036001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479810be2aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e6517e615607676f8f9fc0ebf8b0b16d6f2c59957ab35d05692e664ebf68734ca53366295f4ad6142134b62f11e92ead037c7fb53455560c8ef0f1c94fafa924edfe92175aaa1c4ecc7aeeb72e0d050feacee907f40888c96a65545e07422bc6ac79f4c2d6ee3dab47d06e764682c72d7f16542fcfd05d2813cc182d1595016c179e1717c160300ab1ab0ac397e91bd193c036feb66a9ad2ec5b7967e7f5ff957f8b085a2437c5", 0xf7}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x19) ptrace$cont(0xffffffffffffffff, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 18:10:08 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) write$uinput_user_dev(r2, &(0x7f0000000480)={'syz0\x00', {}, 0x0, [0x4, 0x631, 0xaf, 0x2, 0x1b, 0x1, 0x10001, 0x1, 0x8, 0x3ff, 0x800, 0x7859, 0x7, 0x5, 0x7fff, 0xc05, 0xa4, 0x3, 0x4, 0xfffff800, 0x6, 0x7c, 0x6, 0xff, 0x2, 0x771, 0x5, 0xfffffff8, 0x81, 0x0, 0x6, 0x7, 0x6, 0x9, 0x3, 0x0, 0x282d298e, 0x7, 0x6, 0x3, 0xfaf9, 0x7, 0x2], [0x0, 0x7ff, 0x1f, 0x1, 0x7, 0x2, 0x6, 0xd594, 0x3, 0x2a, 0x1c9b4fd4, 0x0, 0xfff, 0x5, 0xfffff801, 0x9, 0x3f, 0x8, 0x80, 0x6, 0x401, 0x8000, 0x1, 0xcb, 0x1, 0x6, 0x4, 0x92, 0x800000, 0x7, 0x1f, 0x140, 0x7ff, 0xabbc, 0x401, 0x0, 0x3, 0x20, 0x48, 0x12000, 0xfa, 0x1, 0xfffff6fe, 0x0, 0x7, 0x8818, 0x8000, 0x6, 0x1f, 0x8, 0x4, 0xff, 0x101, 0xd7, 0x8, 0x5, 0xffff8001, 0x5, 0xb621, 0x1, 0x9, 0x1395db38, 0x0, 0x3], [0x6, 0x6, 0x401, 0x2d5, 0xc08, 0x3, 0x7f, 0x7, 0x8, 0x4, 0xbe1a, 0x5, 0x3, 0x93c, 0x9, 0x80, 0x800, 0x7fff, 0x6, 0x1, 0x5, 0x2, 0x9, 0x7fff, 0x0, 0x8000, 0x4, 0x6, 0x2, 0x4, 0x6, 0xa2ec, 0x7, 0x100, 0x1, 0x3, 0x1f, 0x81, 0x10000, 0xc5, 0x7ff, 0x2aae236d, 0x4, 0x2000, 0x1c, 0x3, 0x2, 0x735c, 0x7fffffff, 0x6, 0xfffffffd, 0x4, 0x3ff, 0x7fffffff, 0x8, 0x224, 0x261, 0x8b8a, 0x100, 0xffffffff, 0x7fff, 0x41, 0x401, 0x200], [0x7, 0x4, 0x2, 0x5, 0x7, 0x1, 0x8, 0x0, 0x8, 0xffffff7b, 0x0, 0x5, 0x6, 0xcc9, 0x1, 0x5, 0x2, 0xfffffffe, 0xfffffff9, 0x0, 0x5, 0x101, 0x401, 0x2, 0x3, 0x3, 0x7f76, 0x3ff, 0x9, 0xc14, 0x3, 0x7, 0x5, 0x100, 0x6, 0x8, 0x2, 0xe0, 0x3f, 0x200, 0x3, 0x9, 0x3, 0x5, 0x95c6, 0x2, 0x6, 0x20, 0x3, 0x8, 0x9, 0x7, 0x9, 0x0, 0xffffd671, 0x1, 0x0, 0x853d, 0x7, 0x3ff, 0x0, 0xfde7, 0x1, 0x5]}, 0x45c) 18:10:08 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x19}]}, 0x78) 18:10:08 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63}, [{}]}, 0x30) 18:10:11 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f0000000100)="6653960d0ec5d684fa9f017ef0d60a3c27bc33760036001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479810be2aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e6517e615607676f8f9fc0ebf8b0b16d6f2c59957ab35d05692e664ebf68734ca53366295f4ad6142134b62f11e92ead037c7fb53455560c8ef0f1c94fafa924edfe92175aaa1c4ecc7aeeb72e0d050feacee907f40888c96a65545e07422bc6ac79f4c2d6ee3dab47d06e764682c72d7f16542fcfd05d2813cc182d1595016c179e1717c160300ab1ab0ac397e91bd193c036feb66a9ad2ec5b7967e7f5ff957f8b085a2437c59a", 0xf8}], 0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x19) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 18:10:11 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) write$uinput_user_dev(r2, &(0x7f0000000480)={'syz0\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x5], [0x0, 0x7ff, 0x1f, 0x1, 0x7, 0x2, 0x6, 0xd594, 0x3, 0x2a, 0x1c9b4fd4, 0x0, 0xfff, 0x5, 0xfffff801, 0x9, 0x3f, 0x8, 0x80, 0x6, 0x401, 0x8000, 0x1, 0xcb, 0x1, 0x6, 0x4, 0x92, 0x800000, 0x7, 0x1f, 0x140, 0x7ff, 0xabbc, 0x401, 0x0, 0x3, 0x20, 0x48, 0x12000, 0xfa, 0x1, 0xfffff6fe, 0x0, 0x7, 0x8818, 0x8000, 0x6, 0x1f, 0x8, 0x4, 0xff, 0x101, 0xd7, 0x8, 0x5, 0xffff8001, 0x5, 0xb621, 0x1, 0x9, 0x1395db38, 0x0, 0x3], [0x6, 0x6, 0x401, 0x2d5, 0xc08, 0x3, 0x7f, 0x7, 0x8, 0x4, 0xbe1a, 0x5, 0x3, 0x93c, 0x9, 0x80, 0x800, 0x7fff, 0x6, 0x1, 0x5, 0x2, 0x9, 0x7fff, 0x0, 0x8000, 0x4, 0x6, 0x2, 0x4, 0x6, 0xa2ec, 0x7, 0x100, 0x1, 0x3, 0x1f, 0x81, 0x10000, 0xc5, 0x7ff, 0x2aae236d, 0x4, 0x2000, 0x1c, 0x3, 0x2, 0x735c, 0x7fffffff, 0x6, 0xfffffffd, 0x4, 0x3ff, 0x7fffffff, 0x8, 0x224, 0x261, 0x8b8a, 0x100, 0xffffffff, 0x7fff, 0x41, 0x401, 0x200], [0x7, 0x4, 0x2, 0x5, 0x7, 0x1, 0x8, 0x0, 0x8, 0xffffff7b, 0x0, 0x5, 0x6, 0xcc9, 0x1, 0x5, 0x2, 0xfffffffe, 0xfffffff9, 0x0, 0x5, 0x101, 0x401, 0x2, 0x3, 0x3, 0x7f76, 0x3ff, 0x9, 0xc14, 0x3, 0x7, 0x5, 0x100, 0x6, 0x8, 0x2, 0xe0, 0x3f, 0x200, 0x3, 0x9, 0x3, 0x5, 0x95c6, 0x2, 0x6, 0x20, 0x3, 0x8, 0x9, 0x7, 0x9, 0x0, 0xffffd671, 0x1, 0x0, 0x853d, 0x7, 0x3ff, 0x0, 0xfde7, 0x1, 0x5]}, 0x45c) 18:10:11 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) write$uinput_user_dev(r2, &(0x7f0000000480)={'syz0\x00', {}, 0x0, [0x4, 0x631, 0xaf, 0x2, 0x1b, 0x1, 0x10001, 0x1, 0x8, 0x3ff, 0x800, 0x7859, 0x7, 0x5, 0x7fff, 0xc05, 0xa4, 0x3, 0x4, 0xfffff800, 0x6, 0x7c, 0x6, 0xff, 0x2, 0x771, 0x5, 0xfffffff8, 0x81, 0x0, 0x6, 0x7, 0x6, 0x9, 0x3, 0x0, 0x282d298e, 0x7, 0x6, 0x3, 0xfaf9, 0x7], [0x0, 0x7ff, 0x1f, 0x1, 0x7, 0x2, 0x6, 0xd594, 0x3, 0x2a, 0x1c9b4fd4, 0x0, 0xfff, 0x5, 0xfffff801, 0x9, 0x3f, 0x8, 0x80, 0x6, 0x401, 0x8000, 0x1, 0xcb, 0x1, 0x6, 0x4, 0x92, 0x800000, 0x7, 0x1f, 0x140, 0x7ff, 0xabbc, 0x401, 0x0, 0x3, 0x20, 0x48, 0x12000, 0xfa, 0x1, 0xfffff6fe, 0x0, 0x7, 0x8818, 0x8000, 0x6, 0x1f, 0x8, 0x4, 0xff, 0x101, 0xd7, 0x8, 0x5, 0xffff8001, 0x5, 0xb621, 0x1, 0x9, 0x1395db38, 0x0, 0x3], [0x6, 0x6, 0x401, 0x2d5, 0xc08, 0x3, 0x7f, 0x7, 0x8, 0x4, 0xbe1a, 0x5, 0x3, 0x93c, 0x9, 0x80, 0x800, 0x7fff, 0x6, 0x1, 0x5, 0x2, 0x9, 0x7fff, 0x0, 0x8000, 0x4, 0x6, 0x2, 0x4, 0x6, 0xa2ec, 0x7, 0x100, 0x1, 0x3, 0x1f, 0x81, 0x10000, 0xc5, 0x7ff, 0x2aae236d, 0x4, 0x2000, 0x1c, 0x3, 0x2, 0x735c, 0x7fffffff, 0x6, 0xfffffffd, 0x4, 0x3ff, 0x7fffffff, 0x8, 0x224, 0x261, 0x8b8a, 0x100, 0xffffffff, 0x7fff, 0x41, 0x401, 0x200], [0x7, 0x4, 0x2, 0x5, 0x7, 0x1, 0x8, 0x0, 0x8, 0xffffff7b, 0x0, 0x5, 0x6, 0xcc9, 0x1, 0x5, 0x2, 0xfffffffe, 0xfffffff9, 0x0, 0x5, 0x101, 0x401, 0x2, 0x3, 0x3, 0x7f76, 0x3ff, 0x9, 0xc14, 0x3, 0x7, 0x5, 0x100, 0x6, 0x8, 0x2, 0xe0, 0x3f, 0x200, 0x3, 0x9, 0x3, 0x5, 0x95c6, 0x2, 0x6, 0x20, 0x3, 0x8, 0x9, 0x7, 0x9, 0x0, 0xffffd671, 0x1, 0x0, 0x853d, 0x7, 0x3ff, 0x0, 0xfde7, 0x1, 0x5]}, 0x45c) 18:10:11 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x1a}]}, 0x78) 18:10:11 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63}, [{}]}, 0x31) 18:10:11 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) write$uinput_user_dev(r2, &(0x7f0000000480)={'syz0\x00', {}, 0x0, [0x4, 0x631, 0xaf, 0x2, 0x1b, 0x1, 0x10001, 0x1, 0x8, 0x3ff, 0x800, 0x7859, 0x7, 0x5, 0x7fff, 0xc05, 0xa4, 0x3, 0x4, 0xfffff800, 0x6, 0x7c, 0x6, 0xff, 0x2, 0x771, 0x5, 0xfffffff8, 0x81, 0x0, 0x6, 0x7, 0x6, 0x9, 0x3, 0x0, 0x282d298e, 0x7, 0x6, 0x3, 0xfaf9], [0x0, 0x7ff, 0x1f, 0x1, 0x7, 0x2, 0x6, 0xd594, 0x3, 0x2a, 0x1c9b4fd4, 0x0, 0xfff, 0x5, 0xfffff801, 0x9, 0x3f, 0x8, 0x80, 0x6, 0x401, 0x8000, 0x1, 0xcb, 0x1, 0x6, 0x4, 0x92, 0x800000, 0x7, 0x1f, 0x140, 0x7ff, 0xabbc, 0x401, 0x0, 0x3, 0x20, 0x48, 0x12000, 0xfa, 0x1, 0xfffff6fe, 0x0, 0x7, 0x8818, 0x8000, 0x6, 0x1f, 0x8, 0x4, 0xff, 0x101, 0xd7, 0x8, 0x5, 0xffff8001, 0x5, 0xb621, 0x1, 0x9, 0x1395db38, 0x0, 0x3], [0x6, 0x6, 0x401, 0x2d5, 0xc08, 0x3, 0x7f, 0x7, 0x8, 0x4, 0xbe1a, 0x5, 0x3, 0x93c, 0x9, 0x80, 0x800, 0x7fff, 0x6, 0x1, 0x5, 0x2, 0x9, 0x7fff, 0x0, 0x8000, 0x4, 0x6, 0x2, 0x4, 0x6, 0xa2ec, 0x7, 0x100, 0x1, 0x3, 0x1f, 0x81, 0x10000, 0xc5, 0x7ff, 0x2aae236d, 0x4, 0x2000, 0x1c, 0x3, 0x2, 0x735c, 0x7fffffff, 0x6, 0xfffffffd, 0x4, 0x3ff, 0x7fffffff, 0x8, 0x224, 0x261, 0x8b8a, 0x100, 0xffffffff, 0x7fff, 0x41, 0x401, 0x200], [0x7, 0x4, 0x2, 0x5, 0x7, 0x1, 0x8, 0x0, 0x8, 0xffffff7b, 0x0, 0x5, 0x6, 0xcc9, 0x1, 0x5, 0x2, 0xfffffffe, 0xfffffff9, 0x0, 0x5, 0x101, 0x401, 0x2, 0x3, 0x3, 0x7f76, 0x3ff, 0x9, 0xc14, 0x3, 0x7, 0x5, 0x100, 0x6, 0x8, 0x2, 0xe0, 0x3f, 0x200, 0x3, 0x9, 0x3, 0x5, 0x95c6, 0x2, 0x6, 0x20, 0x3, 0x8, 0x9, 0x7, 0x9, 0x0, 0xffffd671, 0x1, 0x0, 0x853d, 0x7, 0x3ff, 0x0, 0xfde7, 0x1, 0x5]}, 0x45c) 18:10:11 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) write$uinput_user_dev(r2, &(0x7f0000000480)={'syz0\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x5], [0x0, 0x7ff, 0x1f, 0x1, 0x7, 0x2, 0x6, 0xd594, 0x3, 0x2a, 0x1c9b4fd4, 0x0, 0xfff, 0x5, 0xfffff801, 0x9, 0x3f, 0x8, 0x80, 0x6, 0x401, 0x8000, 0x1, 0xcb, 0x1, 0x6, 0x4, 0x92, 0x800000, 0x7, 0x1f, 0x140, 0x7ff, 0xabbc, 0x401, 0x0, 0x3, 0x20, 0x48, 0x12000, 0xfa, 0x1, 0xfffff6fe, 0x0, 0x7, 0x8818, 0x8000, 0x6, 0x1f, 0x8, 0x4, 0xff, 0x101, 0xd7, 0x8, 0x5, 0xffff8001, 0x5, 0xb621, 0x1, 0x9, 0x1395db38], [0x6, 0x6, 0x401, 0x2d5, 0xc08, 0x3, 0x7f, 0x7, 0x8, 0x4, 0xbe1a, 0x5, 0x3, 0x93c, 0x9, 0x80, 0x800, 0x7fff, 0x6, 0x1, 0x5, 0x2, 0x9, 0x7fff, 0x0, 0x8000, 0x4, 0x6, 0x2, 0x4, 0x6, 0xa2ec, 0x7, 0x100, 0x1, 0x3, 0x1f, 0x81, 0x10000, 0xc5, 0x7ff, 0x2aae236d, 0x4, 0x2000, 0x1c, 0x3, 0x2, 0x735c, 0x7fffffff, 0x6, 0xfffffffd, 0x4, 0x3ff, 0x7fffffff, 0x8, 0x224, 0x261, 0x8b8a, 0x100, 0xffffffff, 0x7fff, 0x41, 0x401, 0x200], [0x7, 0x4, 0x2, 0x5, 0x7, 0x1, 0x8, 0x0, 0x8, 0xffffff7b, 0x0, 0x5, 0x6, 0xcc9, 0x1, 0x5, 0x2, 0xfffffffe, 0xfffffff9, 0x0, 0x5, 0x101, 0x401, 0x2, 0x3, 0x3, 0x7f76, 0x3ff, 0x9, 0xc14, 0x3, 0x7, 0x5, 0x100, 0x6, 0x8, 0x2, 0xe0, 0x3f, 0x200, 0x3, 0x9, 0x3, 0x5, 0x95c6, 0x2, 0x6, 0x20, 0x3, 0x8, 0x9, 0x7, 0x9, 0x0, 0xffffd671, 0x1, 0x0, 0x853d, 0x7, 0x3ff, 0x0, 0xfde7, 0x1, 0x5]}, 0x45c) 18:10:11 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63}, [{}]}, 0x32) 18:10:11 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r0, &(0x7f0000000040)=""/244, 0xf4) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="6653960d0ec5d684fa9f017ef0d60a3c27bc33760036001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479810be2aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e6517e615607676f8f9fc0ebf8b0b16d6f2c59957ab35d05692e664ebf68734ca53366295f4ad6142134b62f11e92ead037c7fb53455560c8ef0f1c94fafa924edfe92175aaa1c4ecc7aeeb72e0d050feacee907f40888c96a65545e07422bc6ac79f4c2d6ee3dab47d06e764682c72d7f16542fcfd05d2813cc182d1595016c179e1717c160300ab1ab0ac397e91bd193c036feb66a9ad2ec5b7967e7f5ff957f8b085a2437c5", 0xf7}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x19) ptrace$cont(0x18, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 18:10:11 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x1b}]}, 0x78) 18:10:11 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) write$uinput_user_dev(r2, &(0x7f0000000480)={'syz0\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x5], [0x0, 0x7ff, 0x1f, 0x1, 0x7, 0x2, 0x6, 0xd594, 0x3, 0x2a, 0x1c9b4fd4, 0x0, 0xfff, 0x5, 0xfffff801, 0x9, 0x3f, 0x8, 0x80, 0x6, 0x401, 0x8000, 0x1, 0xcb, 0x1, 0x6, 0x4, 0x92, 0x800000, 0x7, 0x1f, 0x140, 0x7ff, 0xabbc, 0x401, 0x0, 0x3, 0x20, 0x48, 0x12000, 0xfa, 0x1, 0xfffff6fe, 0x0, 0x7, 0x8818, 0x8000, 0x6, 0x1f, 0x8, 0x4, 0xff, 0x101, 0xd7, 0x8, 0x5, 0xffff8001, 0x5, 0xb621, 0x1, 0x9], [0x6, 0x6, 0x401, 0x2d5, 0xc08, 0x3, 0x7f, 0x7, 0x8, 0x4, 0xbe1a, 0x5, 0x3, 0x93c, 0x9, 0x80, 0x800, 0x7fff, 0x6, 0x1, 0x5, 0x2, 0x9, 0x7fff, 0x0, 0x8000, 0x4, 0x6, 0x2, 0x4, 0x6, 0xa2ec, 0x7, 0x100, 0x1, 0x3, 0x1f, 0x81, 0x10000, 0xc5, 0x7ff, 0x2aae236d, 0x4, 0x2000, 0x1c, 0x3, 0x2, 0x735c, 0x7fffffff, 0x6, 0xfffffffd, 0x4, 0x3ff, 0x7fffffff, 0x8, 0x224, 0x261, 0x8b8a, 0x100, 0xffffffff, 0x7fff, 0x41, 0x401, 0x200], [0x7, 0x4, 0x2, 0x5, 0x7, 0x1, 0x8, 0x0, 0x8, 0xffffff7b, 0x0, 0x5, 0x6, 0xcc9, 0x1, 0x5, 0x2, 0xfffffffe, 0xfffffff9, 0x0, 0x5, 0x101, 0x401, 0x2, 0x3, 0x3, 0x7f76, 0x3ff, 0x9, 0xc14, 0x3, 0x7, 0x5, 0x100, 0x6, 0x8, 0x2, 0xe0, 0x3f, 0x200, 0x3, 0x9, 0x3, 0x5, 0x95c6, 0x2, 0x6, 0x20, 0x3, 0x8, 0x9, 0x7, 0x9, 0x0, 0xffffd671, 0x1, 0x0, 0x853d, 0x7, 0x3ff, 0x0, 0xfde7, 0x1, 0x5]}, 0x45c) 18:10:11 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63}, [{}]}, 0x33) 18:10:14 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) write$uinput_user_dev(r2, &(0x7f0000000480)={'syz0\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x5], [0x0, 0x7ff, 0x1f, 0x1, 0x7, 0x2, 0x6, 0xd594, 0x3, 0x2a, 0x1c9b4fd4, 0x0, 0xfff, 0x5, 0xfffff801, 0x9, 0x3f, 0x8, 0x80, 0x6, 0x401, 0x8000, 0x1, 0xcb, 0x1, 0x6, 0x4, 0x92, 0x800000, 0x7, 0x1f, 0x140, 0x7ff, 0xabbc, 0x401, 0x0, 0x3, 0x20, 0x48, 0x12000, 0xfa, 0x1, 0xfffff6fe, 0x0, 0x7, 0x8818, 0x8000, 0x6, 0x1f, 0x8, 0x4, 0xff, 0x101, 0xd7, 0x8, 0x5, 0xffff8001, 0x5, 0xb621, 0x1], [0x6, 0x6, 0x401, 0x2d5, 0xc08, 0x3, 0x7f, 0x7, 0x8, 0x4, 0xbe1a, 0x5, 0x3, 0x93c, 0x9, 0x80, 0x800, 0x7fff, 0x6, 0x1, 0x5, 0x2, 0x9, 0x7fff, 0x0, 0x8000, 0x4, 0x6, 0x2, 0x4, 0x6, 0xa2ec, 0x7, 0x100, 0x1, 0x3, 0x1f, 0x81, 0x10000, 0xc5, 0x7ff, 0x2aae236d, 0x4, 0x2000, 0x1c, 0x3, 0x2, 0x735c, 0x7fffffff, 0x6, 0xfffffffd, 0x4, 0x3ff, 0x7fffffff, 0x8, 0x224, 0x261, 0x8b8a, 0x100, 0xffffffff, 0x7fff, 0x41, 0x401, 0x200], [0x7, 0x4, 0x2, 0x5, 0x7, 0x1, 0x8, 0x0, 0x8, 0xffffff7b, 0x0, 0x5, 0x6, 0xcc9, 0x1, 0x5, 0x2, 0xfffffffe, 0xfffffff9, 0x0, 0x5, 0x101, 0x401, 0x2, 0x3, 0x3, 0x7f76, 0x3ff, 0x9, 0xc14, 0x3, 0x7, 0x5, 0x100, 0x6, 0x8, 0x2, 0xe0, 0x3f, 0x200, 0x3, 0x9, 0x3, 0x5, 0x95c6, 0x2, 0x6, 0x20, 0x3, 0x8, 0x9, 0x7, 0x9, 0x0, 0xffffd671, 0x1, 0x0, 0x853d, 0x7, 0x3ff, 0x0, 0xfde7, 0x1, 0x5]}, 0x45c) 18:10:14 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x3d}, {0x0, 0x2a}, {0x0}, {&(0x7f0000000100)="6653960d0ec5d684fa9f017ef0d60a3c27bc33760036001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479810be2aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e6517e615607676f8f9fc0ebf8b0b16d6f2c59957ab35d05692e664ebf68734ca53366295f4ad6142134b62f11e92ead037c7fb53455560c8ef0f1c94fafa924edfe92175aaa1c4ecc7aeeb72e0d050feacee907f40888c96a65545e07422bc6ac79f4c2d6ee3dab47d06e764682c72d7f16542fcfd05d2813cc182d1595016c179e1717c160300ab1ab0ac397e91bd193c036feb66a9ad2ec5b7967e7f5ff957f8b085a2437c59a", 0xf8}], 0x4, 0x0) ptrace$setopts(0xffffffffffffffff, r0, 0x0, 0x0) tkill(r0, 0x19) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 18:10:14 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63}, [{}]}, 0x34) 18:10:14 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) write$uinput_user_dev(r2, &(0x7f0000000480)={'syz0\x00', {}, 0x0, [0x4, 0x631, 0xaf, 0x2, 0x1b, 0x1, 0x10001, 0x1, 0x8, 0x3ff, 0x800, 0x7859, 0x7, 0x5, 0x7fff, 0xc05, 0xa4, 0x3, 0x4, 0xfffff800, 0x6, 0x7c, 0x6, 0xff, 0x2, 0x771, 0x5, 0xfffffff8, 0x81, 0x0, 0x6, 0x7, 0x6, 0x9, 0x3, 0x0, 0x282d298e, 0x7, 0x6, 0x3], [0x0, 0x7ff, 0x1f, 0x1, 0x7, 0x2, 0x6, 0xd594, 0x3, 0x2a, 0x1c9b4fd4, 0x0, 0xfff, 0x5, 0xfffff801, 0x9, 0x3f, 0x8, 0x80, 0x6, 0x401, 0x8000, 0x1, 0xcb, 0x1, 0x6, 0x4, 0x92, 0x800000, 0x7, 0x1f, 0x140, 0x7ff, 0xabbc, 0x401, 0x0, 0x3, 0x20, 0x48, 0x12000, 0xfa, 0x1, 0xfffff6fe, 0x0, 0x7, 0x8818, 0x8000, 0x6, 0x1f, 0x8, 0x4, 0xff, 0x101, 0xd7, 0x8, 0x5, 0xffff8001, 0x5, 0xb621, 0x1, 0x9, 0x1395db38, 0x0, 0x3], [0x6, 0x6, 0x401, 0x2d5, 0xc08, 0x3, 0x7f, 0x7, 0x8, 0x4, 0xbe1a, 0x5, 0x3, 0x93c, 0x9, 0x80, 0x800, 0x7fff, 0x6, 0x1, 0x5, 0x2, 0x9, 0x7fff, 0x0, 0x8000, 0x4, 0x6, 0x2, 0x4, 0x6, 0xa2ec, 0x7, 0x100, 0x1, 0x3, 0x1f, 0x81, 0x10000, 0xc5, 0x7ff, 0x2aae236d, 0x4, 0x2000, 0x1c, 0x3, 0x2, 0x735c, 0x7fffffff, 0x6, 0xfffffffd, 0x4, 0x3ff, 0x7fffffff, 0x8, 0x224, 0x261, 0x8b8a, 0x100, 0xffffffff, 0x7fff, 0x41, 0x401, 0x200], [0x7, 0x4, 0x2, 0x5, 0x7, 0x1, 0x8, 0x0, 0x8, 0xffffff7b, 0x0, 0x5, 0x6, 0xcc9, 0x1, 0x5, 0x2, 0xfffffffe, 0xfffffff9, 0x0, 0x5, 0x101, 0x401, 0x2, 0x3, 0x3, 0x7f76, 0x3ff, 0x9, 0xc14, 0x3, 0x7, 0x5, 0x100, 0x6, 0x8, 0x2, 0xe0, 0x3f, 0x200, 0x3, 0x9, 0x3, 0x5, 0x95c6, 0x2, 0x6, 0x20, 0x3, 0x8, 0x9, 0x7, 0x9, 0x0, 0xffffd671, 0x1, 0x0, 0x853d, 0x7, 0x3ff, 0x0, 0xfde7, 0x1, 0x5]}, 0x45c) 18:10:14 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x1e}]}, 0x78) 18:10:14 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63}, [{}]}, 0x35) 18:10:14 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x3e}]}, 0x78) 18:10:14 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x3d}, {0x0, 0x2a}, {0x0}, {&(0x7f0000000100)="6653960d0ec5d684fa9f017ef0d60a3c27bc33760036001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479810be2aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e6517e615607676f8f9fc0ebf8b0b16d6f2c59957ab35d05692e664ebf68734ca53366295f4ad6142134b62f11e92ead037c7fb53455560c8ef0f1c94fafa924edfe92175aaa1c4ecc7aeeb72e0d050feacee907f40888c96a65545e07422bc6ac79f4c2d6ee3dab47d06e764682c72d7f16542fcfd05d2813cc182d1595016c179e1717c160300ab1ab0ac397e91bd193c036feb66a9ad2ec5b7967e7f5ff957f8b085a2437c59a", 0xf8}], 0x4, 0x0) ptrace$setopts(0xffffffffffffffff, r0, 0x0, 0x0) tkill(r0, 0x19) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 18:10:15 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r0, &(0x7f0000000040)=""/244, 0xf4) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="6653960d0ec5d684fa9f017ef0d60a3c27bc33760036001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479810be2aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e6517e615607676f8f9fc0ebf8b0b16d6f2c59957ab35d05692e664ebf68734ca53366295f4ad6142134b62f11e92ead037c7fb53455560c8ef0f1c94fafa924edfe92175aaa1c4ecc7aeeb72e0d050feacee907f40888c96a65545e07422bc6ac79f4c2d6ee3dab47d06e764682c72d7f16542fcfd05d2813cc182d1595016c179e1717c160300ab1ab0ac397e91bd193c036feb66a9ad2ec5b7967e7f5ff957f8b085a2437c5", 0xf7}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x19) ptrace$cont(0x18, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 18:10:15 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) write$uinput_user_dev(r2, &(0x7f0000000480)={'syz0\x00', {}, 0x0, [0x4, 0x631, 0xaf, 0x2, 0x1b, 0x1, 0x10001, 0x1, 0x8, 0x3ff, 0x800, 0x7859, 0x7, 0x5, 0x7fff, 0xc05, 0xa4, 0x3, 0x4, 0xfffff800, 0x6, 0x7c, 0x6, 0xff, 0x2, 0x771, 0x5, 0xfffffff8, 0x81, 0x0, 0x6, 0x7, 0x6, 0x9, 0x3, 0x0, 0x282d298e, 0x7, 0x6], [0x0, 0x7ff, 0x1f, 0x1, 0x7, 0x2, 0x6, 0xd594, 0x3, 0x2a, 0x1c9b4fd4, 0x0, 0xfff, 0x5, 0xfffff801, 0x9, 0x3f, 0x8, 0x80, 0x6, 0x401, 0x8000, 0x1, 0xcb, 0x1, 0x6, 0x4, 0x92, 0x800000, 0x7, 0x1f, 0x140, 0x7ff, 0xabbc, 0x401, 0x0, 0x3, 0x20, 0x48, 0x12000, 0xfa, 0x1, 0xfffff6fe, 0x0, 0x7, 0x8818, 0x8000, 0x6, 0x1f, 0x8, 0x4, 0xff, 0x101, 0xd7, 0x8, 0x5, 0xffff8001, 0x5, 0xb621, 0x1, 0x9, 0x1395db38, 0x0, 0x3], [0x6, 0x6, 0x401, 0x2d5, 0xc08, 0x3, 0x7f, 0x7, 0x8, 0x4, 0xbe1a, 0x5, 0x3, 0x93c, 0x9, 0x80, 0x800, 0x7fff, 0x6, 0x1, 0x5, 0x2, 0x9, 0x7fff, 0x0, 0x8000, 0x4, 0x6, 0x2, 0x4, 0x6, 0xa2ec, 0x7, 0x100, 0x1, 0x3, 0x1f, 0x81, 0x10000, 0xc5, 0x7ff, 0x2aae236d, 0x4, 0x2000, 0x1c, 0x3, 0x2, 0x735c, 0x7fffffff, 0x6, 0xfffffffd, 0x4, 0x3ff, 0x7fffffff, 0x8, 0x224, 0x261, 0x8b8a, 0x100, 0xffffffff, 0x7fff, 0x41, 0x401, 0x200], [0x7, 0x4, 0x2, 0x5, 0x7, 0x1, 0x8, 0x0, 0x8, 0xffffff7b, 0x0, 0x5, 0x6, 0xcc9, 0x1, 0x5, 0x2, 0xfffffffe, 0xfffffff9, 0x0, 0x5, 0x101, 0x401, 0x2, 0x3, 0x3, 0x7f76, 0x3ff, 0x9, 0xc14, 0x3, 0x7, 0x5, 0x100, 0x6, 0x8, 0x2, 0xe0, 0x3f, 0x200, 0x3, 0x9, 0x3, 0x5, 0x95c6, 0x2, 0x6, 0x20, 0x3, 0x8, 0x9, 0x7, 0x9, 0x0, 0xffffd671, 0x1, 0x0, 0x853d, 0x7, 0x3ff, 0x0, 0xfde7, 0x1, 0x5]}, 0x45c) 18:10:15 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) write$uinput_user_dev(r2, &(0x7f0000000480)={'syz0\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x5], [0x0, 0x7ff, 0x1f, 0x1, 0x7, 0x2, 0x6, 0xd594, 0x3, 0x2a, 0x1c9b4fd4, 0x0, 0xfff, 0x5, 0xfffff801, 0x9, 0x3f, 0x8, 0x80, 0x6, 0x401, 0x8000, 0x1, 0xcb, 0x1, 0x6, 0x4, 0x92, 0x800000, 0x7, 0x1f, 0x140, 0x7ff, 0xabbc, 0x401, 0x0, 0x3, 0x20, 0x48, 0x12000, 0xfa, 0x1, 0xfffff6fe, 0x0, 0x7, 0x8818, 0x8000, 0x6, 0x1f, 0x8, 0x4, 0xff, 0x101, 0xd7, 0x8, 0x5, 0xffff8001, 0x5, 0xb621], [0x6, 0x6, 0x401, 0x2d5, 0xc08, 0x3, 0x7f, 0x7, 0x8, 0x4, 0xbe1a, 0x5, 0x3, 0x93c, 0x9, 0x80, 0x800, 0x7fff, 0x6, 0x1, 0x5, 0x2, 0x9, 0x7fff, 0x0, 0x8000, 0x4, 0x6, 0x2, 0x4, 0x6, 0xa2ec, 0x7, 0x100, 0x1, 0x3, 0x1f, 0x81, 0x10000, 0xc5, 0x7ff, 0x2aae236d, 0x4, 0x2000, 0x1c, 0x3, 0x2, 0x735c, 0x7fffffff, 0x6, 0xfffffffd, 0x4, 0x3ff, 0x7fffffff, 0x8, 0x224, 0x261, 0x8b8a, 0x100, 0xffffffff, 0x7fff, 0x41, 0x401, 0x200], [0x7, 0x4, 0x2, 0x5, 0x7, 0x1, 0x8, 0x0, 0x8, 0xffffff7b, 0x0, 0x5, 0x6, 0xcc9, 0x1, 0x5, 0x2, 0xfffffffe, 0xfffffff9, 0x0, 0x5, 0x101, 0x401, 0x2, 0x3, 0x3, 0x7f76, 0x3ff, 0x9, 0xc14, 0x3, 0x7, 0x5, 0x100, 0x6, 0x8, 0x2, 0xe0, 0x3f, 0x200, 0x3, 0x9, 0x3, 0x5, 0x95c6, 0x2, 0x6, 0x20, 0x3, 0x8, 0x9, 0x7, 0x9, 0x0, 0xffffd671, 0x1, 0x0, 0x853d, 0x7, 0x3ff, 0x0, 0xfde7, 0x1, 0x5]}, 0x45c) 18:10:15 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x9b}]}, 0x78) 18:10:15 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x3d}, {0x0, 0x2a}, {0x0}, {&(0x7f0000000100)="6653960d0ec5d684fa9f017ef0d60a3c27bc33760036001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479810be2aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e6517e615607676f8f9fc0ebf8b0b16d6f2c59957ab35d05692e664ebf68734ca53366295f4ad6142134b62f11e92ead037c7fb53455560c8ef0f1c94fafa924edfe92175aaa1c4ecc7aeeb72e0d050feacee907f40888c96a65545e07422bc6ac79f4c2d6ee3dab47d06e764682c72d7f16542fcfd05d2813cc182d1595016c179e1717c160300ab1ab0ac397e91bd193c036feb66a9ad2ec5b7967e7f5ff957f8b085a2437c59a", 0xf8}], 0x4, 0x0) ptrace$setopts(0xffffffffffffffff, r0, 0x0, 0x0) tkill(r0, 0x19) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 18:10:15 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63}, [{}]}, 0x36) 18:10:15 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x3d}, {0x0, 0x2a}, {0x0}, {&(0x7f0000000100)="6653960d0ec5d684fa9f017ef0d60a3c27bc33760036001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479810be2aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e6517e615607676f8f9fc0ebf8b0b16d6f2c59957ab35d05692e664ebf68734ca53366295f4ad6142134b62f11e92ead037c7fb53455560c8ef0f1c94fafa924edfe92175aaa1c4ecc7aeeb72e0d050feacee907f40888c96a65545e07422bc6ac79f4c2d6ee3dab47d06e764682c72d7f16542fcfd05d2813cc182d1595016c179e1717c160300ab1ab0ac397e91bd193c036feb66a9ad2ec5b7967e7f5ff957f8b085a2437c59a", 0xf8}], 0x4, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(r0, 0x19) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 18:10:15 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0xf0}]}, 0x78) 18:10:15 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63}, [{}]}, 0x37) 18:10:15 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x180}]}, 0x78) 18:10:15 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63}, [{}]}, 0x38) 18:10:15 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) write$uinput_user_dev(r2, &(0x7f0000000480)={'syz0\x00', {}, 0x0, [0x4, 0x631, 0xaf, 0x2, 0x1b, 0x1, 0x10001, 0x1, 0x8, 0x3ff, 0x800, 0x7859, 0x7, 0x5, 0x7fff, 0xc05, 0xa4, 0x3, 0x4, 0xfffff800, 0x6, 0x7c, 0x6, 0xff, 0x2, 0x771, 0x5, 0xfffffff8, 0x81, 0x0, 0x6, 0x7, 0x6, 0x9, 0x3, 0x0, 0x282d298e, 0x7], [0x0, 0x7ff, 0x1f, 0x1, 0x7, 0x2, 0x6, 0xd594, 0x3, 0x2a, 0x1c9b4fd4, 0x0, 0xfff, 0x5, 0xfffff801, 0x9, 0x3f, 0x8, 0x80, 0x6, 0x401, 0x8000, 0x1, 0xcb, 0x1, 0x6, 0x4, 0x92, 0x800000, 0x7, 0x1f, 0x140, 0x7ff, 0xabbc, 0x401, 0x0, 0x3, 0x20, 0x48, 0x12000, 0xfa, 0x1, 0xfffff6fe, 0x0, 0x7, 0x8818, 0x8000, 0x6, 0x1f, 0x8, 0x4, 0xff, 0x101, 0xd7, 0x8, 0x5, 0xffff8001, 0x5, 0xb621, 0x1, 0x9, 0x1395db38, 0x0, 0x3], [0x6, 0x6, 0x401, 0x2d5, 0xc08, 0x3, 0x7f, 0x7, 0x8, 0x4, 0xbe1a, 0x5, 0x3, 0x93c, 0x9, 0x80, 0x800, 0x7fff, 0x6, 0x1, 0x5, 0x2, 0x9, 0x7fff, 0x0, 0x8000, 0x4, 0x6, 0x2, 0x4, 0x6, 0xa2ec, 0x7, 0x100, 0x1, 0x3, 0x1f, 0x81, 0x10000, 0xc5, 0x7ff, 0x2aae236d, 0x4, 0x2000, 0x1c, 0x3, 0x2, 0x735c, 0x7fffffff, 0x6, 0xfffffffd, 0x4, 0x3ff, 0x7fffffff, 0x8, 0x224, 0x261, 0x8b8a, 0x100, 0xffffffff, 0x7fff, 0x41, 0x401, 0x200], [0x7, 0x4, 0x2, 0x5, 0x7, 0x1, 0x8, 0x0, 0x8, 0xffffff7b, 0x0, 0x5, 0x6, 0xcc9, 0x1, 0x5, 0x2, 0xfffffffe, 0xfffffff9, 0x0, 0x5, 0x101, 0x401, 0x2, 0x3, 0x3, 0x7f76, 0x3ff, 0x9, 0xc14, 0x3, 0x7, 0x5, 0x100, 0x6, 0x8, 0x2, 0xe0, 0x3f, 0x200, 0x3, 0x9, 0x3, 0x5, 0x95c6, 0x2, 0x6, 0x20, 0x3, 0x8, 0x9, 0x7, 0x9, 0x0, 0xffffd671, 0x1, 0x0, 0x853d, 0x7, 0x3ff, 0x0, 0xfde7, 0x1, 0x5]}, 0x45c) 18:10:18 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r0, &(0x7f0000000040)=""/244, 0xf4) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="6653960d0ec5d684fa9f017ef0d60a3c27bc33760036001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479810be2aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e6517e615607676f8f9fc0ebf8b0b16d6f2c59957ab35d05692e664ebf68734ca53366295f4ad6142134b62f11e92ead037c7fb53455560c8ef0f1c94fafa924edfe92175aaa1c4ecc7aeeb72e0d050feacee907f40888c96a65545e07422bc6ac79f4c2d6ee3dab47d06e764682c72d7f16542fcfd05d2813cc182d1595016c179e1717c160300ab1ab0ac397e91bd193c036feb66a9ad2ec5b7967e7f5ff957f8b085a2437c5", 0xf7}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x19) ptrace$cont(0x18, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 18:10:18 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x3d}, {0x0, 0x2a}, {0x0}, {&(0x7f0000000100)="6653960d0ec5d684fa9f017ef0d60a3c27bc33760036001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479810be2aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e6517e615607676f8f9fc0ebf8b0b16d6f2c59957ab35d05692e664ebf68734ca53366295f4ad6142134b62f11e92ead037c7fb53455560c8ef0f1c94fafa924edfe92175aaa1c4ecc7aeeb72e0d050feacee907f40888c96a65545e07422bc6ac79f4c2d6ee3dab47d06e764682c72d7f16542fcfd05d2813cc182d1595016c179e1717c160300ab1ab0ac397e91bd193c036feb66a9ad2ec5b7967e7f5ff957f8b085a2437c59a", 0xf8}], 0x4, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(r0, 0x19) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 18:10:18 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) write$uinput_user_dev(r2, &(0x7f0000000480)={'syz0\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x5], [0x0, 0x7ff, 0x1f, 0x1, 0x7, 0x2, 0x6, 0xd594, 0x3, 0x2a, 0x1c9b4fd4, 0x0, 0xfff, 0x5, 0xfffff801, 0x9, 0x3f, 0x8, 0x80, 0x6, 0x401, 0x8000, 0x1, 0xcb, 0x1, 0x6, 0x4, 0x92, 0x800000, 0x7, 0x1f, 0x140, 0x7ff, 0xabbc, 0x401, 0x0, 0x3, 0x20, 0x48, 0x12000, 0xfa, 0x1, 0xfffff6fe, 0x0, 0x7, 0x8818, 0x8000, 0x6, 0x1f, 0x8, 0x4, 0xff, 0x101, 0xd7, 0x8, 0x5, 0xffff8001, 0x5], [0x6, 0x6, 0x401, 0x2d5, 0xc08, 0x3, 0x7f, 0x7, 0x8, 0x4, 0xbe1a, 0x5, 0x3, 0x93c, 0x9, 0x80, 0x800, 0x7fff, 0x6, 0x1, 0x5, 0x2, 0x9, 0x7fff, 0x0, 0x8000, 0x4, 0x6, 0x2, 0x4, 0x6, 0xa2ec, 0x7, 0x100, 0x1, 0x3, 0x1f, 0x81, 0x10000, 0xc5, 0x7ff, 0x2aae236d, 0x4, 0x2000, 0x1c, 0x3, 0x2, 0x735c, 0x7fffffff, 0x6, 0xfffffffd, 0x4, 0x3ff, 0x7fffffff, 0x8, 0x224, 0x261, 0x8b8a, 0x100, 0xffffffff, 0x7fff, 0x41, 0x401, 0x200], [0x7, 0x4, 0x2, 0x5, 0x7, 0x1, 0x8, 0x0, 0x8, 0xffffff7b, 0x0, 0x5, 0x6, 0xcc9, 0x1, 0x5, 0x2, 0xfffffffe, 0xfffffff9, 0x0, 0x5, 0x101, 0x401, 0x2, 0x3, 0x3, 0x7f76, 0x3ff, 0x9, 0xc14, 0x3, 0x7, 0x5, 0x100, 0x6, 0x8, 0x2, 0xe0, 0x3f, 0x200, 0x3, 0x9, 0x3, 0x5, 0x95c6, 0x2, 0x6, 0x20, 0x3, 0x8, 0x9, 0x7, 0x9, 0x0, 0xffffd671, 0x1, 0x0, 0x853d, 0x7, 0x3ff, 0x0, 0xfde7, 0x1, 0x5]}, 0x45c) 18:10:18 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x3e8}]}, 0x78) 18:10:18 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63}, [{}]}, 0x39) 18:10:18 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) write$uinput_user_dev(r2, &(0x7f0000000480)={'syz0\x00', {}, 0x0, [0x4, 0x631, 0xaf, 0x2, 0x1b, 0x1, 0x10001, 0x1, 0x8, 0x3ff, 0x800, 0x7859, 0x7, 0x5, 0x7fff, 0xc05, 0xa4, 0x3, 0x4, 0xfffff800, 0x6, 0x7c, 0x6, 0xff, 0x2, 0x771, 0x5, 0xfffffff8, 0x81, 0x0, 0x6, 0x7, 0x6, 0x9, 0x3, 0x0, 0x282d298e], [0x0, 0x7ff, 0x1f, 0x1, 0x7, 0x2, 0x6, 0xd594, 0x3, 0x2a, 0x1c9b4fd4, 0x0, 0xfff, 0x5, 0xfffff801, 0x9, 0x3f, 0x8, 0x80, 0x6, 0x401, 0x8000, 0x1, 0xcb, 0x1, 0x6, 0x4, 0x92, 0x800000, 0x7, 0x1f, 0x140, 0x7ff, 0xabbc, 0x401, 0x0, 0x3, 0x20, 0x48, 0x12000, 0xfa, 0x1, 0xfffff6fe, 0x0, 0x7, 0x8818, 0x8000, 0x6, 0x1f, 0x8, 0x4, 0xff, 0x101, 0xd7, 0x8, 0x5, 0xffff8001, 0x5, 0xb621, 0x1, 0x9, 0x1395db38, 0x0, 0x3], [0x6, 0x6, 0x401, 0x2d5, 0xc08, 0x3, 0x7f, 0x7, 0x8, 0x4, 0xbe1a, 0x5, 0x3, 0x93c, 0x9, 0x80, 0x800, 0x7fff, 0x6, 0x1, 0x5, 0x2, 0x9, 0x7fff, 0x0, 0x8000, 0x4, 0x6, 0x2, 0x4, 0x6, 0xa2ec, 0x7, 0x100, 0x1, 0x3, 0x1f, 0x81, 0x10000, 0xc5, 0x7ff, 0x2aae236d, 0x4, 0x2000, 0x1c, 0x3, 0x2, 0x735c, 0x7fffffff, 0x6, 0xfffffffd, 0x4, 0x3ff, 0x7fffffff, 0x8, 0x224, 0x261, 0x8b8a, 0x100, 0xffffffff, 0x7fff, 0x41, 0x401, 0x200], [0x7, 0x4, 0x2, 0x5, 0x7, 0x1, 0x8, 0x0, 0x8, 0xffffff7b, 0x0, 0x5, 0x6, 0xcc9, 0x1, 0x5, 0x2, 0xfffffffe, 0xfffffff9, 0x0, 0x5, 0x101, 0x401, 0x2, 0x3, 0x3, 0x7f76, 0x3ff, 0x9, 0xc14, 0x3, 0x7, 0x5, 0x100, 0x6, 0x8, 0x2, 0xe0, 0x3f, 0x200, 0x3, 0x9, 0x3, 0x5, 0x95c6, 0x2, 0x6, 0x20, 0x3, 0x8, 0x9, 0x7, 0x9, 0x0, 0xffffd671, 0x1, 0x0, 0x853d, 0x7, 0x3ff, 0x0, 0xfde7, 0x1, 0x5]}, 0x45c) 18:10:18 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x3d}, {0x0, 0x2a}, {0x0}, {&(0x7f0000000100)="6653960d0ec5d684fa9f017ef0d60a3c27bc33760036001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479810be2aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e6517e615607676f8f9fc0ebf8b0b16d6f2c59957ab35d05692e664ebf68734ca53366295f4ad6142134b62f11e92ead037c7fb53455560c8ef0f1c94fafa924edfe92175aaa1c4ecc7aeeb72e0d050feacee907f40888c96a65545e07422bc6ac79f4c2d6ee3dab47d06e764682c72d7f16542fcfd05d2813cc182d1595016c179e1717c160300ab1ab0ac397e91bd193c036feb66a9ad2ec5b7967e7f5ff957f8b085a2437c59a", 0xf8}], 0x4, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(r0, 0x19) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 18:10:18 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) write$uinput_user_dev(r2, &(0x7f0000000480)={'syz0\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x5], [0x0, 0x7ff, 0x1f, 0x1, 0x7, 0x2, 0x6, 0xd594, 0x3, 0x2a, 0x1c9b4fd4, 0x0, 0xfff, 0x5, 0xfffff801, 0x9, 0x3f, 0x8, 0x80, 0x6, 0x401, 0x8000, 0x1, 0xcb, 0x1, 0x6, 0x4, 0x92, 0x800000, 0x7, 0x1f, 0x140, 0x7ff, 0xabbc, 0x401, 0x0, 0x3, 0x20, 0x48, 0x12000, 0xfa, 0x1, 0xfffff6fe, 0x0, 0x7, 0x8818, 0x8000, 0x6, 0x1f, 0x8, 0x4, 0xff, 0x101, 0xd7, 0x8, 0x5, 0xffff8001], [0x6, 0x6, 0x401, 0x2d5, 0xc08, 0x3, 0x7f, 0x7, 0x8, 0x4, 0xbe1a, 0x5, 0x3, 0x93c, 0x9, 0x80, 0x800, 0x7fff, 0x6, 0x1, 0x5, 0x2, 0x9, 0x7fff, 0x0, 0x8000, 0x4, 0x6, 0x2, 0x4, 0x6, 0xa2ec, 0x7, 0x100, 0x1, 0x3, 0x1f, 0x81, 0x10000, 0xc5, 0x7ff, 0x2aae236d, 0x4, 0x2000, 0x1c, 0x3, 0x2, 0x735c, 0x7fffffff, 0x6, 0xfffffffd, 0x4, 0x3ff, 0x7fffffff, 0x8, 0x224, 0x261, 0x8b8a, 0x100, 0xffffffff, 0x7fff, 0x41, 0x401, 0x200], [0x7, 0x4, 0x2, 0x5, 0x7, 0x1, 0x8, 0x0, 0x8, 0xffffff7b, 0x0, 0x5, 0x6, 0xcc9, 0x1, 0x5, 0x2, 0xfffffffe, 0xfffffff9, 0x0, 0x5, 0x101, 0x401, 0x2, 0x3, 0x3, 0x7f76, 0x3ff, 0x9, 0xc14, 0x3, 0x7, 0x5, 0x100, 0x6, 0x8, 0x2, 0xe0, 0x3f, 0x200, 0x3, 0x9, 0x3, 0x5, 0x95c6, 0x2, 0x6, 0x20, 0x3, 0x8, 0x9, 0x7, 0x9, 0x0, 0xffffd671, 0x1, 0x0, 0x853d, 0x7, 0x3ff, 0x0, 0xfde7, 0x1, 0x5]}, 0x45c) 18:10:18 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) write$uinput_user_dev(r2, &(0x7f0000000480)={'syz0\x00', {}, 0x0, [0x4, 0x631, 0xaf, 0x2, 0x1b, 0x1, 0x10001, 0x1, 0x8, 0x3ff, 0x800, 0x7859, 0x7, 0x5, 0x7fff, 0xc05, 0xa4, 0x3, 0x4, 0xfffff800, 0x6, 0x7c, 0x6, 0xff, 0x2, 0x771, 0x5, 0xfffffff8, 0x81, 0x0, 0x6, 0x7, 0x6, 0x9, 0x3], [0x0, 0x7ff, 0x1f, 0x1, 0x7, 0x2, 0x6, 0xd594, 0x3, 0x2a, 0x1c9b4fd4, 0x0, 0xfff, 0x5, 0xfffff801, 0x9, 0x3f, 0x8, 0x80, 0x6, 0x401, 0x8000, 0x1, 0xcb, 0x1, 0x6, 0x4, 0x92, 0x800000, 0x7, 0x1f, 0x140, 0x7ff, 0xabbc, 0x401, 0x0, 0x3, 0x20, 0x48, 0x12000, 0xfa, 0x1, 0xfffff6fe, 0x0, 0x7, 0x8818, 0x8000, 0x6, 0x1f, 0x8, 0x4, 0xff, 0x101, 0xd7, 0x8, 0x5, 0xffff8001, 0x5, 0xb621, 0x1, 0x9, 0x1395db38, 0x0, 0x3], [0x6, 0x6, 0x401, 0x2d5, 0xc08, 0x3, 0x7f, 0x7, 0x8, 0x4, 0xbe1a, 0x5, 0x3, 0x93c, 0x9, 0x80, 0x800, 0x7fff, 0x6, 0x1, 0x5, 0x2, 0x9, 0x7fff, 0x0, 0x8000, 0x4, 0x6, 0x2, 0x4, 0x6, 0xa2ec, 0x7, 0x100, 0x1, 0x3, 0x1f, 0x81, 0x10000, 0xc5, 0x7ff, 0x2aae236d, 0x4, 0x2000, 0x1c, 0x3, 0x2, 0x735c, 0x7fffffff, 0x6, 0xfffffffd, 0x4, 0x3ff, 0x7fffffff, 0x8, 0x224, 0x261, 0x8b8a, 0x100, 0xffffffff, 0x7fff, 0x41, 0x401, 0x200], [0x7, 0x4, 0x2, 0x5, 0x7, 0x1, 0x8, 0x0, 0x8, 0xffffff7b, 0x0, 0x5, 0x6, 0xcc9, 0x1, 0x5, 0x2, 0xfffffffe, 0xfffffff9, 0x0, 0x5, 0x101, 0x401, 0x2, 0x3, 0x3, 0x7f76, 0x3ff, 0x9, 0xc14, 0x3, 0x7, 0x5, 0x100, 0x6, 0x8, 0x2, 0xe0, 0x3f, 0x200, 0x3, 0x9, 0x3, 0x5, 0x95c6, 0x2, 0x6, 0x20, 0x3, 0x8, 0x9, 0x7, 0x9, 0x0, 0xffffd671, 0x1, 0x0, 0x853d, 0x7, 0x3ff, 0x0, 0xfde7, 0x1, 0x5]}, 0x45c) 18:10:18 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x500}]}, 0x78) 18:10:18 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63}, [{}]}, 0x3a) 18:10:18 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x3d}, {0x0, 0x2a}, {0x0}, {&(0x7f0000000100)="6653960d0ec5d684fa9f017ef0d60a3c27bc33760036001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479810be2aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e6517e615607676f8f9fc0ebf8b0b16d6f2c59957ab35d05692e664ebf68734ca53366295f4ad6142134b62f11e92ead037c7fb53455560c8ef0f1c94fafa924edfe92175aaa1c4ecc7aeeb72e0d050feacee907f40888c96a65545e07422bc6ac79f4c2d6ee3dab47d06e764682c72d7f16542fcfd05d2813cc182d1595016c179e1717c160300ab1ab0ac397e91bd193c036feb66a9ad2ec5b7967e7f5ff957f8b085a2437c59a", 0xf8}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(0x0, 0x19) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 18:10:21 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r0, &(0x7f0000000040)=""/244, 0xf4) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="6653960d0ec5d684fa9f017ef0d60a3c27bc33760036001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479810be2aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e6517e615607676f8f9fc0ebf8b0b16d6f2c59957ab35d05692e664ebf68734ca53366295f4ad6142134b62f11e92ead037c7fb53455560c8ef0f1c94fafa924edfe92175aaa1c4ecc7aeeb72e0d050feacee907f40888c96a65545e07422bc6ac79f4c2d6ee3dab47d06e764682c72d7f16542fcfd05d2813cc182d1595016c179e1717c160300ab1ab0ac397e91bd193c036feb66a9ad2ec5b7967e7f5ff957f8b085a2437c5", 0xf7}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x19) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xffffffffffffffff, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 18:10:21 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) write$uinput_user_dev(r2, &(0x7f0000000480)={'syz0\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x5], [0x0, 0x7ff, 0x1f, 0x1, 0x7, 0x2, 0x6, 0xd594, 0x3, 0x2a, 0x1c9b4fd4, 0x0, 0xfff, 0x5, 0xfffff801, 0x9, 0x3f, 0x8, 0x80, 0x6, 0x401, 0x8000, 0x1, 0xcb, 0x1, 0x6, 0x4, 0x92, 0x800000, 0x7, 0x1f, 0x140, 0x7ff, 0xabbc, 0x401, 0x0, 0x3, 0x20, 0x48, 0x12000, 0xfa, 0x1, 0xfffff6fe, 0x0, 0x7, 0x8818, 0x8000, 0x6, 0x1f, 0x8, 0x4, 0xff, 0x101, 0xd7, 0x8, 0x5], [0x6, 0x6, 0x401, 0x2d5, 0xc08, 0x3, 0x7f, 0x7, 0x8, 0x4, 0xbe1a, 0x5, 0x3, 0x93c, 0x9, 0x80, 0x800, 0x7fff, 0x6, 0x1, 0x5, 0x2, 0x9, 0x7fff, 0x0, 0x8000, 0x4, 0x6, 0x2, 0x4, 0x6, 0xa2ec, 0x7, 0x100, 0x1, 0x3, 0x1f, 0x81, 0x10000, 0xc5, 0x7ff, 0x2aae236d, 0x4, 0x2000, 0x1c, 0x3, 0x2, 0x735c, 0x7fffffff, 0x6, 0xfffffffd, 0x4, 0x3ff, 0x7fffffff, 0x8, 0x224, 0x261, 0x8b8a, 0x100, 0xffffffff, 0x7fff, 0x41, 0x401, 0x200], [0x7, 0x4, 0x2, 0x5, 0x7, 0x1, 0x8, 0x0, 0x8, 0xffffff7b, 0x0, 0x5, 0x6, 0xcc9, 0x1, 0x5, 0x2, 0xfffffffe, 0xfffffff9, 0x0, 0x5, 0x101, 0x401, 0x2, 0x3, 0x3, 0x7f76, 0x3ff, 0x9, 0xc14, 0x3, 0x7, 0x5, 0x100, 0x6, 0x8, 0x2, 0xe0, 0x3f, 0x200, 0x3, 0x9, 0x3, 0x5, 0x95c6, 0x2, 0x6, 0x20, 0x3, 0x8, 0x9, 0x7, 0x9, 0x0, 0xffffd671, 0x1, 0x0, 0x853d, 0x7, 0x3ff, 0x0, 0xfde7, 0x1, 0x5]}, 0x45c) 18:10:21 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) write$uinput_user_dev(r2, &(0x7f0000000480)={'syz0\x00', {}, 0x0, [0x4, 0x631, 0xaf, 0x2, 0x1b, 0x1, 0x10001, 0x1, 0x8, 0x3ff, 0x800, 0x7859, 0x7, 0x5, 0x7fff, 0xc05, 0xa4, 0x3, 0x4, 0xfffff800, 0x6, 0x7c, 0x6, 0xff, 0x2, 0x771, 0x5, 0xfffffff8, 0x81, 0x0, 0x6, 0x7, 0x6, 0x9], [0x0, 0x7ff, 0x1f, 0x1, 0x7, 0x2, 0x6, 0xd594, 0x3, 0x2a, 0x1c9b4fd4, 0x0, 0xfff, 0x5, 0xfffff801, 0x9, 0x3f, 0x8, 0x80, 0x6, 0x401, 0x8000, 0x1, 0xcb, 0x1, 0x6, 0x4, 0x92, 0x800000, 0x7, 0x1f, 0x140, 0x7ff, 0xabbc, 0x401, 0x0, 0x3, 0x20, 0x48, 0x12000, 0xfa, 0x1, 0xfffff6fe, 0x0, 0x7, 0x8818, 0x8000, 0x6, 0x1f, 0x8, 0x4, 0xff, 0x101, 0xd7, 0x8, 0x5, 0xffff8001, 0x5, 0xb621, 0x1, 0x9, 0x1395db38, 0x0, 0x3], [0x6, 0x6, 0x401, 0x2d5, 0xc08, 0x3, 0x7f, 0x7, 0x8, 0x4, 0xbe1a, 0x5, 0x3, 0x93c, 0x9, 0x80, 0x800, 0x7fff, 0x6, 0x1, 0x5, 0x2, 0x9, 0x7fff, 0x0, 0x8000, 0x4, 0x6, 0x2, 0x4, 0x6, 0xa2ec, 0x7, 0x100, 0x1, 0x3, 0x1f, 0x81, 0x10000, 0xc5, 0x7ff, 0x2aae236d, 0x4, 0x2000, 0x1c, 0x3, 0x2, 0x735c, 0x7fffffff, 0x6, 0xfffffffd, 0x4, 0x3ff, 0x7fffffff, 0x8, 0x224, 0x261, 0x8b8a, 0x100, 0xffffffff, 0x7fff, 0x41, 0x401, 0x200], [0x7, 0x4, 0x2, 0x5, 0x7, 0x1, 0x8, 0x0, 0x8, 0xffffff7b, 0x0, 0x5, 0x6, 0xcc9, 0x1, 0x5, 0x2, 0xfffffffe, 0xfffffff9, 0x0, 0x5, 0x101, 0x401, 0x2, 0x3, 0x3, 0x7f76, 0x3ff, 0x9, 0xc14, 0x3, 0x7, 0x5, 0x100, 0x6, 0x8, 0x2, 0xe0, 0x3f, 0x200, 0x3, 0x9, 0x3, 0x5, 0x95c6, 0x2, 0x6, 0x20, 0x3, 0x8, 0x9, 0x7, 0x9, 0x0, 0xffffd671, 0x1, 0x0, 0x853d, 0x7, 0x3ff, 0x0, 0xfde7, 0x1, 0x5]}, 0x45c) 18:10:21 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63}, [{}]}, 0x3b) 18:10:21 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x600}]}, 0x78) 18:10:21 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) write$uinput_user_dev(r2, &(0x7f0000000480)={'syz0\x00', {}, 0x0, [0x4, 0x631, 0xaf, 0x2, 0x1b, 0x1, 0x10001, 0x1, 0x8, 0x3ff, 0x800, 0x7859, 0x7, 0x5, 0x7fff, 0xc05, 0xa4, 0x3, 0x4, 0xfffff800, 0x6, 0x7c, 0x6, 0xff, 0x2, 0x771, 0x5, 0xfffffff8, 0x81, 0x0, 0x6, 0x7, 0x6], [0x0, 0x7ff, 0x1f, 0x1, 0x7, 0x2, 0x6, 0xd594, 0x3, 0x2a, 0x1c9b4fd4, 0x0, 0xfff, 0x5, 0xfffff801, 0x9, 0x3f, 0x8, 0x80, 0x6, 0x401, 0x8000, 0x1, 0xcb, 0x1, 0x6, 0x4, 0x92, 0x800000, 0x7, 0x1f, 0x140, 0x7ff, 0xabbc, 0x401, 0x0, 0x3, 0x20, 0x48, 0x12000, 0xfa, 0x1, 0xfffff6fe, 0x0, 0x7, 0x8818, 0x8000, 0x6, 0x1f, 0x8, 0x4, 0xff, 0x101, 0xd7, 0x8, 0x5, 0xffff8001, 0x5, 0xb621, 0x1, 0x9, 0x1395db38, 0x0, 0x3], [0x6, 0x6, 0x401, 0x2d5, 0xc08, 0x3, 0x7f, 0x7, 0x8, 0x4, 0xbe1a, 0x5, 0x3, 0x93c, 0x9, 0x80, 0x800, 0x7fff, 0x6, 0x1, 0x5, 0x2, 0x9, 0x7fff, 0x0, 0x8000, 0x4, 0x6, 0x2, 0x4, 0x6, 0xa2ec, 0x7, 0x100, 0x1, 0x3, 0x1f, 0x81, 0x10000, 0xc5, 0x7ff, 0x2aae236d, 0x4, 0x2000, 0x1c, 0x3, 0x2, 0x735c, 0x7fffffff, 0x6, 0xfffffffd, 0x4, 0x3ff, 0x7fffffff, 0x8, 0x224, 0x261, 0x8b8a, 0x100, 0xffffffff, 0x7fff, 0x41, 0x401, 0x200], [0x7, 0x4, 0x2, 0x5, 0x7, 0x1, 0x8, 0x0, 0x8, 0xffffff7b, 0x0, 0x5, 0x6, 0xcc9, 0x1, 0x5, 0x2, 0xfffffffe, 0xfffffff9, 0x0, 0x5, 0x101, 0x401, 0x2, 0x3, 0x3, 0x7f76, 0x3ff, 0x9, 0xc14, 0x3, 0x7, 0x5, 0x100, 0x6, 0x8, 0x2, 0xe0, 0x3f, 0x200, 0x3, 0x9, 0x3, 0x5, 0x95c6, 0x2, 0x6, 0x20, 0x3, 0x8, 0x9, 0x7, 0x9, 0x0, 0xffffd671, 0x1, 0x0, 0x853d, 0x7, 0x3ff, 0x0, 0xfde7, 0x1, 0x5]}, 0x45c) 18:10:21 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x700}]}, 0x78) 18:10:21 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63}, [{}]}, 0x3c) 18:10:21 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) write$uinput_user_dev(r2, &(0x7f0000000480)={'syz0\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x5], [0x0, 0x7ff, 0x1f, 0x1, 0x7, 0x2, 0x6, 0xd594, 0x3, 0x2a, 0x1c9b4fd4, 0x0, 0xfff, 0x5, 0xfffff801, 0x9, 0x3f, 0x8, 0x80, 0x6, 0x401, 0x8000, 0x1, 0xcb, 0x1, 0x6, 0x4, 0x92, 0x800000, 0x7, 0x1f, 0x140, 0x7ff, 0xabbc, 0x401, 0x0, 0x3, 0x20, 0x48, 0x12000, 0xfa, 0x1, 0xfffff6fe, 0x0, 0x7, 0x8818, 0x8000, 0x6, 0x1f, 0x8, 0x4, 0xff, 0x101, 0xd7, 0x8], [0x6, 0x6, 0x401, 0x2d5, 0xc08, 0x3, 0x7f, 0x7, 0x8, 0x4, 0xbe1a, 0x5, 0x3, 0x93c, 0x9, 0x80, 0x800, 0x7fff, 0x6, 0x1, 0x5, 0x2, 0x9, 0x7fff, 0x0, 0x8000, 0x4, 0x6, 0x2, 0x4, 0x6, 0xa2ec, 0x7, 0x100, 0x1, 0x3, 0x1f, 0x81, 0x10000, 0xc5, 0x7ff, 0x2aae236d, 0x4, 0x2000, 0x1c, 0x3, 0x2, 0x735c, 0x7fffffff, 0x6, 0xfffffffd, 0x4, 0x3ff, 0x7fffffff, 0x8, 0x224, 0x261, 0x8b8a, 0x100, 0xffffffff, 0x7fff, 0x41, 0x401, 0x200], [0x7, 0x4, 0x2, 0x5, 0x7, 0x1, 0x8, 0x0, 0x8, 0xffffff7b, 0x0, 0x5, 0x6, 0xcc9, 0x1, 0x5, 0x2, 0xfffffffe, 0xfffffff9, 0x0, 0x5, 0x101, 0x401, 0x2, 0x3, 0x3, 0x7f76, 0x3ff, 0x9, 0xc14, 0x3, 0x7, 0x5, 0x100, 0x6, 0x8, 0x2, 0xe0, 0x3f, 0x200, 0x3, 0x9, 0x3, 0x5, 0x95c6, 0x2, 0x6, 0x20, 0x3, 0x8, 0x9, 0x7, 0x9, 0x0, 0xffffd671, 0x1, 0x0, 0x853d, 0x7, 0x3ff, 0x0, 0xfde7, 0x1, 0x5]}, 0x45c) 18:10:21 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x3d}, {0x0, 0x2a}, {0x0}, {&(0x7f0000000100)="6653960d0ec5d684fa9f017ef0d60a3c27bc33760036001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479810be2aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e6517e615607676f8f9fc0ebf8b0b16d6f2c59957ab35d05692e664ebf68734ca53366295f4ad6142134b62f11e92ead037c7fb53455560c8ef0f1c94fafa924edfe92175aaa1c4ecc7aeeb72e0d050feacee907f40888c96a65545e07422bc6ac79f4c2d6ee3dab47d06e764682c72d7f16542fcfd05d2813cc182d1595016c179e1717c160300ab1ab0ac397e91bd193c036feb66a9ad2ec5b7967e7f5ff957f8b085a2437c59a", 0xf8}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(0x0, 0x19) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 18:10:21 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) write$uinput_user_dev(r2, &(0x7f0000000480)={'syz0\x00', {}, 0x0, [0x4, 0x631, 0xaf, 0x2, 0x1b, 0x1, 0x10001, 0x1, 0x8, 0x3ff, 0x800, 0x7859, 0x7, 0x5, 0x7fff, 0xc05, 0xa4, 0x3, 0x4, 0xfffff800, 0x6, 0x7c, 0x6, 0xff, 0x2, 0x771, 0x5, 0xfffffff8, 0x81, 0x0, 0x6, 0x7], [0x0, 0x7ff, 0x1f, 0x1, 0x7, 0x2, 0x6, 0xd594, 0x3, 0x2a, 0x1c9b4fd4, 0x0, 0xfff, 0x5, 0xfffff801, 0x9, 0x3f, 0x8, 0x80, 0x6, 0x401, 0x8000, 0x1, 0xcb, 0x1, 0x6, 0x4, 0x92, 0x800000, 0x7, 0x1f, 0x140, 0x7ff, 0xabbc, 0x401, 0x0, 0x3, 0x20, 0x48, 0x12000, 0xfa, 0x1, 0xfffff6fe, 0x0, 0x7, 0x8818, 0x8000, 0x6, 0x1f, 0x8, 0x4, 0xff, 0x101, 0xd7, 0x8, 0x5, 0xffff8001, 0x5, 0xb621, 0x1, 0x9, 0x1395db38, 0x0, 0x3], [0x6, 0x6, 0x401, 0x2d5, 0xc08, 0x3, 0x7f, 0x7, 0x8, 0x4, 0xbe1a, 0x5, 0x3, 0x93c, 0x9, 0x80, 0x800, 0x7fff, 0x6, 0x1, 0x5, 0x2, 0x9, 0x7fff, 0x0, 0x8000, 0x4, 0x6, 0x2, 0x4, 0x6, 0xa2ec, 0x7, 0x100, 0x1, 0x3, 0x1f, 0x81, 0x10000, 0xc5, 0x7ff, 0x2aae236d, 0x4, 0x2000, 0x1c, 0x3, 0x2, 0x735c, 0x7fffffff, 0x6, 0xfffffffd, 0x4, 0x3ff, 0x7fffffff, 0x8, 0x224, 0x261, 0x8b8a, 0x100, 0xffffffff, 0x7fff, 0x41, 0x401, 0x200], [0x7, 0x4, 0x2, 0x5, 0x7, 0x1, 0x8, 0x0, 0x8, 0xffffff7b, 0x0, 0x5, 0x6, 0xcc9, 0x1, 0x5, 0x2, 0xfffffffe, 0xfffffff9, 0x0, 0x5, 0x101, 0x401, 0x2, 0x3, 0x3, 0x7f76, 0x3ff, 0x9, 0xc14, 0x3, 0x7, 0x5, 0x100, 0x6, 0x8, 0x2, 0xe0, 0x3f, 0x200, 0x3, 0x9, 0x3, 0x5, 0x95c6, 0x2, 0x6, 0x20, 0x3, 0x8, 0x9, 0x7, 0x9, 0x0, 0xffffd671, 0x1, 0x0, 0x853d, 0x7, 0x3ff, 0x0, 0xfde7, 0x1, 0x5]}, 0x45c) 18:10:21 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63}, [{}]}, 0x3d) 18:10:24 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r0, &(0x7f0000000040)=""/244, 0xf4) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="6653960d0ec5d684fa9f017ef0d60a3c27bc33760036001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479810be2aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e6517e615607676f8f9fc0ebf8b0b16d6f2c59957ab35d05692e664ebf68734ca53366295f4ad6142134b62f11e92ead037c7fb53455560c8ef0f1c94fafa924edfe92175aaa1c4ecc7aeeb72e0d050feacee907f40888c96a65545e07422bc6ac79f4c2d6ee3dab47d06e764682c72d7f16542fcfd05d2813cc182d1595016c179e1717c160300ab1ab0ac397e91bd193c036feb66a9ad2ec5b7967e7f5ff957f8b085a2437c5", 0xf7}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x19) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xffffffffffffffff, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 18:10:24 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) write$uinput_user_dev(r2, &(0x7f0000000480)={'syz0\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x5], [0x0, 0x7ff, 0x1f, 0x1, 0x7, 0x2, 0x6, 0xd594, 0x3, 0x2a, 0x1c9b4fd4, 0x0, 0xfff, 0x5, 0xfffff801, 0x9, 0x3f, 0x8, 0x80, 0x6, 0x401, 0x8000, 0x1, 0xcb, 0x1, 0x6, 0x4, 0x92, 0x800000, 0x7, 0x1f, 0x140, 0x7ff, 0xabbc, 0x401, 0x0, 0x3, 0x20, 0x48, 0x12000, 0xfa, 0x1, 0xfffff6fe, 0x0, 0x7, 0x8818, 0x8000, 0x6, 0x1f, 0x8, 0x4, 0xff, 0x101, 0xd7], [0x6, 0x6, 0x401, 0x2d5, 0xc08, 0x3, 0x7f, 0x7, 0x8, 0x4, 0xbe1a, 0x5, 0x3, 0x93c, 0x9, 0x80, 0x800, 0x7fff, 0x6, 0x1, 0x5, 0x2, 0x9, 0x7fff, 0x0, 0x8000, 0x4, 0x6, 0x2, 0x4, 0x6, 0xa2ec, 0x7, 0x100, 0x1, 0x3, 0x1f, 0x81, 0x10000, 0xc5, 0x7ff, 0x2aae236d, 0x4, 0x2000, 0x1c, 0x3, 0x2, 0x735c, 0x7fffffff, 0x6, 0xfffffffd, 0x4, 0x3ff, 0x7fffffff, 0x8, 0x224, 0x261, 0x8b8a, 0x100, 0xffffffff, 0x7fff, 0x41, 0x401, 0x200], [0x7, 0x4, 0x2, 0x5, 0x7, 0x1, 0x8, 0x0, 0x8, 0xffffff7b, 0x0, 0x5, 0x6, 0xcc9, 0x1, 0x5, 0x2, 0xfffffffe, 0xfffffff9, 0x0, 0x5, 0x101, 0x401, 0x2, 0x3, 0x3, 0x7f76, 0x3ff, 0x9, 0xc14, 0x3, 0x7, 0x5, 0x100, 0x6, 0x8, 0x2, 0xe0, 0x3f, 0x200, 0x3, 0x9, 0x3, 0x5, 0x95c6, 0x2, 0x6, 0x20, 0x3, 0x8, 0x9, 0x7, 0x9, 0x0, 0xffffd671, 0x1, 0x0, 0x853d, 0x7, 0x3ff, 0x0, 0xfde7, 0x1, 0x5]}, 0x45c) 18:10:24 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x900}]}, 0x78) 18:10:24 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) write$uinput_user_dev(r2, &(0x7f0000000480)={'syz0\x00', {}, 0x0, [0x4, 0x631, 0xaf, 0x2, 0x1b, 0x1, 0x10001, 0x1, 0x8, 0x3ff, 0x800, 0x7859, 0x7, 0x5, 0x7fff, 0xc05, 0xa4, 0x3, 0x4, 0xfffff800, 0x6, 0x7c, 0x6, 0xff, 0x2, 0x771, 0x5, 0xfffffff8, 0x81, 0x0, 0x6], [0x0, 0x7ff, 0x1f, 0x1, 0x7, 0x2, 0x6, 0xd594, 0x3, 0x2a, 0x1c9b4fd4, 0x0, 0xfff, 0x5, 0xfffff801, 0x9, 0x3f, 0x8, 0x80, 0x6, 0x401, 0x8000, 0x1, 0xcb, 0x1, 0x6, 0x4, 0x92, 0x800000, 0x7, 0x1f, 0x140, 0x7ff, 0xabbc, 0x401, 0x0, 0x3, 0x20, 0x48, 0x12000, 0xfa, 0x1, 0xfffff6fe, 0x0, 0x7, 0x8818, 0x8000, 0x6, 0x1f, 0x8, 0x4, 0xff, 0x101, 0xd7, 0x8, 0x5, 0xffff8001, 0x5, 0xb621, 0x1, 0x9, 0x1395db38, 0x0, 0x3], [0x6, 0x6, 0x401, 0x2d5, 0xc08, 0x3, 0x7f, 0x7, 0x8, 0x4, 0xbe1a, 0x5, 0x3, 0x93c, 0x9, 0x80, 0x800, 0x7fff, 0x6, 0x1, 0x5, 0x2, 0x9, 0x7fff, 0x0, 0x8000, 0x4, 0x6, 0x2, 0x4, 0x6, 0xa2ec, 0x7, 0x100, 0x1, 0x3, 0x1f, 0x81, 0x10000, 0xc5, 0x7ff, 0x2aae236d, 0x4, 0x2000, 0x1c, 0x3, 0x2, 0x735c, 0x7fffffff, 0x6, 0xfffffffd, 0x4, 0x3ff, 0x7fffffff, 0x8, 0x224, 0x261, 0x8b8a, 0x100, 0xffffffff, 0x7fff, 0x41, 0x401, 0x200], [0x7, 0x4, 0x2, 0x5, 0x7, 0x1, 0x8, 0x0, 0x8, 0xffffff7b, 0x0, 0x5, 0x6, 0xcc9, 0x1, 0x5, 0x2, 0xfffffffe, 0xfffffff9, 0x0, 0x5, 0x101, 0x401, 0x2, 0x3, 0x3, 0x7f76, 0x3ff, 0x9, 0xc14, 0x3, 0x7, 0x5, 0x100, 0x6, 0x8, 0x2, 0xe0, 0x3f, 0x200, 0x3, 0x9, 0x3, 0x5, 0x95c6, 0x2, 0x6, 0x20, 0x3, 0x8, 0x9, 0x7, 0x9, 0x0, 0xffffd671, 0x1, 0x0, 0x853d, 0x7, 0x3ff, 0x0, 0xfde7, 0x1, 0x5]}, 0x45c) 18:10:24 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63}, [{}]}, 0x3e) 18:10:24 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) write$uinput_user_dev(r2, &(0x7f0000000480)={'syz0\x00', {}, 0x0, [0x4, 0x631, 0xaf, 0x2, 0x1b, 0x1, 0x10001, 0x1, 0x8, 0x3ff, 0x800, 0x7859, 0x7, 0x5, 0x7fff, 0xc05, 0xa4, 0x3, 0x4, 0xfffff800, 0x6, 0x7c, 0x6, 0xff, 0x2, 0x771, 0x5, 0xfffffff8, 0x81], [0x0, 0x7ff, 0x1f, 0x1, 0x7, 0x2, 0x6, 0xd594, 0x3, 0x2a, 0x1c9b4fd4, 0x0, 0xfff, 0x5, 0xfffff801, 0x9, 0x3f, 0x8, 0x80, 0x6, 0x401, 0x8000, 0x1, 0xcb, 0x1, 0x6, 0x4, 0x92, 0x800000, 0x7, 0x1f, 0x140, 0x7ff, 0xabbc, 0x401, 0x0, 0x3, 0x20, 0x48, 0x12000, 0xfa, 0x1, 0xfffff6fe, 0x0, 0x7, 0x8818, 0x8000, 0x6, 0x1f, 0x8, 0x4, 0xff, 0x101, 0xd7, 0x8, 0x5, 0xffff8001, 0x5, 0xb621, 0x1, 0x9, 0x1395db38, 0x0, 0x3], [0x6, 0x6, 0x401, 0x2d5, 0xc08, 0x3, 0x7f, 0x7, 0x8, 0x4, 0xbe1a, 0x5, 0x3, 0x93c, 0x9, 0x80, 0x800, 0x7fff, 0x6, 0x1, 0x5, 0x2, 0x9, 0x7fff, 0x0, 0x8000, 0x4, 0x6, 0x2, 0x4, 0x6, 0xa2ec, 0x7, 0x100, 0x1, 0x3, 0x1f, 0x81, 0x10000, 0xc5, 0x7ff, 0x2aae236d, 0x4, 0x2000, 0x1c, 0x3, 0x2, 0x735c, 0x7fffffff, 0x6, 0xfffffffd, 0x4, 0x3ff, 0x7fffffff, 0x8, 0x224, 0x261, 0x8b8a, 0x100, 0xffffffff, 0x7fff, 0x41, 0x401, 0x200], [0x7, 0x4, 0x2, 0x5, 0x7, 0x1, 0x8, 0x0, 0x8, 0xffffff7b, 0x0, 0x5, 0x6, 0xcc9, 0x1, 0x5, 0x2, 0xfffffffe, 0xfffffff9, 0x0, 0x5, 0x101, 0x401, 0x2, 0x3, 0x3, 0x7f76, 0x3ff, 0x9, 0xc14, 0x3, 0x7, 0x5, 0x100, 0x6, 0x8, 0x2, 0xe0, 0x3f, 0x200, 0x3, 0x9, 0x3, 0x5, 0x95c6, 0x2, 0x6, 0x20, 0x3, 0x8, 0x9, 0x7, 0x9, 0x0, 0xffffd671, 0x1, 0x0, 0x853d, 0x7, 0x3ff, 0x0, 0xfde7, 0x1, 0x5]}, 0x45c) 18:10:24 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63}, [{}]}, 0x41) 18:10:24 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) write$uinput_user_dev(r2, &(0x7f0000000480)={'syz0\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x5], [0x0, 0x7ff, 0x1f, 0x1, 0x7, 0x2, 0x6, 0xd594, 0x3, 0x2a, 0x1c9b4fd4, 0x0, 0xfff, 0x5, 0xfffff801, 0x9, 0x3f, 0x8, 0x80, 0x6, 0x401, 0x8000, 0x1, 0xcb, 0x1, 0x6, 0x4, 0x92, 0x800000, 0x7, 0x1f, 0x140, 0x7ff, 0xabbc, 0x401, 0x0, 0x3, 0x20, 0x48, 0x12000, 0xfa, 0x1, 0xfffff6fe, 0x0, 0x7, 0x8818, 0x8000, 0x6, 0x1f, 0x8, 0x4, 0xff, 0x101], [0x6, 0x6, 0x401, 0x2d5, 0xc08, 0x3, 0x7f, 0x7, 0x8, 0x4, 0xbe1a, 0x5, 0x3, 0x93c, 0x9, 0x80, 0x800, 0x7fff, 0x6, 0x1, 0x5, 0x2, 0x9, 0x7fff, 0x0, 0x8000, 0x4, 0x6, 0x2, 0x4, 0x6, 0xa2ec, 0x7, 0x100, 0x1, 0x3, 0x1f, 0x81, 0x10000, 0xc5, 0x7ff, 0x2aae236d, 0x4, 0x2000, 0x1c, 0x3, 0x2, 0x735c, 0x7fffffff, 0x6, 0xfffffffd, 0x4, 0x3ff, 0x7fffffff, 0x8, 0x224, 0x261, 0x8b8a, 0x100, 0xffffffff, 0x7fff, 0x41, 0x401, 0x200], [0x7, 0x4, 0x2, 0x5, 0x7, 0x1, 0x8, 0x0, 0x8, 0xffffff7b, 0x0, 0x5, 0x6, 0xcc9, 0x1, 0x5, 0x2, 0xfffffffe, 0xfffffff9, 0x0, 0x5, 0x101, 0x401, 0x2, 0x3, 0x3, 0x7f76, 0x3ff, 0x9, 0xc14, 0x3, 0x7, 0x5, 0x100, 0x6, 0x8, 0x2, 0xe0, 0x3f, 0x200, 0x3, 0x9, 0x3, 0x5, 0x95c6, 0x2, 0x6, 0x20, 0x3, 0x8, 0x9, 0x7, 0x9, 0x0, 0xffffd671, 0x1, 0x0, 0x853d, 0x7, 0x3ff, 0x0, 0xfde7, 0x1, 0x5]}, 0x45c) 18:10:24 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0xa00}]}, 0x78) 18:10:24 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x3d}, {0x0, 0x2a}, {0x0}, {&(0x7f0000000100)="6653960d0ec5d684fa9f017ef0d60a3c27bc33760036001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479810be2aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e6517e615607676f8f9fc0ebf8b0b16d6f2c59957ab35d05692e664ebf68734ca53366295f4ad6142134b62f11e92ead037c7fb53455560c8ef0f1c94fafa924edfe92175aaa1c4ecc7aeeb72e0d050feacee907f40888c96a65545e07422bc6ac79f4c2d6ee3dab47d06e764682c72d7f16542fcfd05d2813cc182d1595016c179e1717c160300ab1ab0ac397e91bd193c036feb66a9ad2ec5b7967e7f5ff957f8b085a2437c59a", 0xf8}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(0x0, 0x19) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 18:10:24 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63}, [{}]}, 0x42) 18:10:24 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) write$uinput_user_dev(r2, &(0x7f0000000480)={'syz0\x00', {}, 0x0, [0x4, 0x631, 0xaf, 0x2, 0x1b, 0x1, 0x10001, 0x1, 0x8, 0x3ff, 0x800, 0x7859, 0x7, 0x5, 0x7fff, 0xc05, 0xa4, 0x3, 0x4, 0xfffff800, 0x6, 0x7c, 0x6, 0xff, 0x2, 0x771, 0x5, 0xfffffff8], [0x0, 0x7ff, 0x1f, 0x1, 0x7, 0x2, 0x6, 0xd594, 0x3, 0x2a, 0x1c9b4fd4, 0x0, 0xfff, 0x5, 0xfffff801, 0x9, 0x3f, 0x8, 0x80, 0x6, 0x401, 0x8000, 0x1, 0xcb, 0x1, 0x6, 0x4, 0x92, 0x800000, 0x7, 0x1f, 0x140, 0x7ff, 0xabbc, 0x401, 0x0, 0x3, 0x20, 0x48, 0x12000, 0xfa, 0x1, 0xfffff6fe, 0x0, 0x7, 0x8818, 0x8000, 0x6, 0x1f, 0x8, 0x4, 0xff, 0x101, 0xd7, 0x8, 0x5, 0xffff8001, 0x5, 0xb621, 0x1, 0x9, 0x1395db38, 0x0, 0x3], [0x6, 0x6, 0x401, 0x2d5, 0xc08, 0x3, 0x7f, 0x7, 0x8, 0x4, 0xbe1a, 0x5, 0x3, 0x93c, 0x9, 0x80, 0x800, 0x7fff, 0x6, 0x1, 0x5, 0x2, 0x9, 0x7fff, 0x0, 0x8000, 0x4, 0x6, 0x2, 0x4, 0x6, 0xa2ec, 0x7, 0x100, 0x1, 0x3, 0x1f, 0x81, 0x10000, 0xc5, 0x7ff, 0x2aae236d, 0x4, 0x2000, 0x1c, 0x3, 0x2, 0x735c, 0x7fffffff, 0x6, 0xfffffffd, 0x4, 0x3ff, 0x7fffffff, 0x8, 0x224, 0x261, 0x8b8a, 0x100, 0xffffffff, 0x7fff, 0x41, 0x401, 0x200], [0x7, 0x4, 0x2, 0x5, 0x7, 0x1, 0x8, 0x0, 0x8, 0xffffff7b, 0x0, 0x5, 0x6, 0xcc9, 0x1, 0x5, 0x2, 0xfffffffe, 0xfffffff9, 0x0, 0x5, 0x101, 0x401, 0x2, 0x3, 0x3, 0x7f76, 0x3ff, 0x9, 0xc14, 0x3, 0x7, 0x5, 0x100, 0x6, 0x8, 0x2, 0xe0, 0x3f, 0x200, 0x3, 0x9, 0x3, 0x5, 0x95c6, 0x2, 0x6, 0x20, 0x3, 0x8, 0x9, 0x7, 0x9, 0x0, 0xffffd671, 0x1, 0x0, 0x853d, 0x7, 0x3ff, 0x0, 0xfde7, 0x1, 0x5]}, 0x45c) 18:10:27 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r0, &(0x7f0000000040)=""/244, 0xf4) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="6653960d0ec5d684fa9f017ef0d60a3c27bc33760036001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479810be2aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e6517e615607676f8f9fc0ebf8b0b16d6f2c59957ab35d05692e664ebf68734ca53366295f4ad6142134b62f11e92ead037c7fb53455560c8ef0f1c94fafa924edfe92175aaa1c4ecc7aeeb72e0d050feacee907f40888c96a65545e07422bc6ac79f4c2d6ee3dab47d06e764682c72d7f16542fcfd05d2813cc182d1595016c179e1717c160300ab1ab0ac397e91bd193c036feb66a9ad2ec5b7967e7f5ff957f8b085a2437c5", 0xf7}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x19) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xffffffffffffffff, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 18:10:27 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0xc00}]}, 0x78) 18:10:27 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) write$uinput_user_dev(r2, &(0x7f0000000480)={'syz0\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x5], [0x0, 0x7ff, 0x1f, 0x1, 0x7, 0x2, 0x6, 0xd594, 0x3, 0x2a, 0x1c9b4fd4, 0x0, 0xfff, 0x5, 0xfffff801, 0x9, 0x3f, 0x8, 0x80, 0x6, 0x401, 0x8000, 0x1, 0xcb, 0x1, 0x6, 0x4, 0x92, 0x800000, 0x7, 0x1f, 0x140, 0x7ff, 0xabbc, 0x401, 0x0, 0x3, 0x20, 0x48, 0x12000, 0xfa, 0x1, 0xfffff6fe, 0x0, 0x7, 0x8818, 0x8000, 0x6, 0x1f, 0x8, 0x4, 0xff], [0x6, 0x6, 0x401, 0x2d5, 0xc08, 0x3, 0x7f, 0x7, 0x8, 0x4, 0xbe1a, 0x5, 0x3, 0x93c, 0x9, 0x80, 0x800, 0x7fff, 0x6, 0x1, 0x5, 0x2, 0x9, 0x7fff, 0x0, 0x8000, 0x4, 0x6, 0x2, 0x4, 0x6, 0xa2ec, 0x7, 0x100, 0x1, 0x3, 0x1f, 0x81, 0x10000, 0xc5, 0x7ff, 0x2aae236d, 0x4, 0x2000, 0x1c, 0x3, 0x2, 0x735c, 0x7fffffff, 0x6, 0xfffffffd, 0x4, 0x3ff, 0x7fffffff, 0x8, 0x224, 0x261, 0x8b8a, 0x100, 0xffffffff, 0x7fff, 0x41, 0x401, 0x200], [0x7, 0x4, 0x2, 0x5, 0x7, 0x1, 0x8, 0x0, 0x8, 0xffffff7b, 0x0, 0x5, 0x6, 0xcc9, 0x1, 0x5, 0x2, 0xfffffffe, 0xfffffff9, 0x0, 0x5, 0x101, 0x401, 0x2, 0x3, 0x3, 0x7f76, 0x3ff, 0x9, 0xc14, 0x3, 0x7, 0x5, 0x100, 0x6, 0x8, 0x2, 0xe0, 0x3f, 0x200, 0x3, 0x9, 0x3, 0x5, 0x95c6, 0x2, 0x6, 0x20, 0x3, 0x8, 0x9, 0x7, 0x9, 0x0, 0xffffd671, 0x1, 0x0, 0x853d, 0x7, 0x3ff, 0x0, 0xfde7, 0x1, 0x5]}, 0x45c) 18:10:27 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63}, [{}]}, 0x43) 18:10:27 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) write$uinput_user_dev(r2, &(0x7f0000000480)={'syz0\x00', {}, 0x0, [0x4, 0x631, 0xaf, 0x2, 0x1b, 0x1, 0x10001, 0x1, 0x8, 0x3ff, 0x800, 0x7859, 0x7, 0x5, 0x7fff, 0xc05, 0xa4, 0x3, 0x4, 0xfffff800, 0x6, 0x7c, 0x6, 0xff, 0x2, 0x771, 0x5], [0x0, 0x7ff, 0x1f, 0x1, 0x7, 0x2, 0x6, 0xd594, 0x3, 0x2a, 0x1c9b4fd4, 0x0, 0xfff, 0x5, 0xfffff801, 0x9, 0x3f, 0x8, 0x80, 0x6, 0x401, 0x8000, 0x1, 0xcb, 0x1, 0x6, 0x4, 0x92, 0x800000, 0x7, 0x1f, 0x140, 0x7ff, 0xabbc, 0x401, 0x0, 0x3, 0x20, 0x48, 0x12000, 0xfa, 0x1, 0xfffff6fe, 0x0, 0x7, 0x8818, 0x8000, 0x6, 0x1f, 0x8, 0x4, 0xff, 0x101, 0xd7, 0x8, 0x5, 0xffff8001, 0x5, 0xb621, 0x1, 0x9, 0x1395db38, 0x0, 0x3], [0x6, 0x6, 0x401, 0x2d5, 0xc08, 0x3, 0x7f, 0x7, 0x8, 0x4, 0xbe1a, 0x5, 0x3, 0x93c, 0x9, 0x80, 0x800, 0x7fff, 0x6, 0x1, 0x5, 0x2, 0x9, 0x7fff, 0x0, 0x8000, 0x4, 0x6, 0x2, 0x4, 0x6, 0xa2ec, 0x7, 0x100, 0x1, 0x3, 0x1f, 0x81, 0x10000, 0xc5, 0x7ff, 0x2aae236d, 0x4, 0x2000, 0x1c, 0x3, 0x2, 0x735c, 0x7fffffff, 0x6, 0xfffffffd, 0x4, 0x3ff, 0x7fffffff, 0x8, 0x224, 0x261, 0x8b8a, 0x100, 0xffffffff, 0x7fff, 0x41, 0x401, 0x200], [0x7, 0x4, 0x2, 0x5, 0x7, 0x1, 0x8, 0x0, 0x8, 0xffffff7b, 0x0, 0x5, 0x6, 0xcc9, 0x1, 0x5, 0x2, 0xfffffffe, 0xfffffff9, 0x0, 0x5, 0x101, 0x401, 0x2, 0x3, 0x3, 0x7f76, 0x3ff, 0x9, 0xc14, 0x3, 0x7, 0x5, 0x100, 0x6, 0x8, 0x2, 0xe0, 0x3f, 0x200, 0x3, 0x9, 0x3, 0x5, 0x95c6, 0x2, 0x6, 0x20, 0x3, 0x8, 0x9, 0x7, 0x9, 0x0, 0xffffd671, 0x1, 0x0, 0x853d, 0x7, 0x3ff, 0x0, 0xfde7, 0x1, 0x5]}, 0x45c) 18:10:27 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63}, [{}]}, 0x44) 18:10:27 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) write$uinput_user_dev(r2, &(0x7f0000000480)={'syz0\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x5], [0x0, 0x7ff, 0x1f, 0x1, 0x7, 0x2, 0x6, 0xd594, 0x3, 0x2a, 0x1c9b4fd4, 0x0, 0xfff, 0x5, 0xfffff801, 0x9, 0x3f, 0x8, 0x80, 0x6, 0x401, 0x8000, 0x1, 0xcb, 0x1, 0x6, 0x4, 0x92, 0x800000, 0x7, 0x1f, 0x140, 0x7ff, 0xabbc, 0x401, 0x0, 0x3, 0x20, 0x48, 0x12000, 0xfa, 0x1, 0xfffff6fe, 0x0, 0x7, 0x8818, 0x8000, 0x6, 0x1f, 0x8, 0x4], [0x6, 0x6, 0x401, 0x2d5, 0xc08, 0x3, 0x7f, 0x7, 0x8, 0x4, 0xbe1a, 0x5, 0x3, 0x93c, 0x9, 0x80, 0x800, 0x7fff, 0x6, 0x1, 0x5, 0x2, 0x9, 0x7fff, 0x0, 0x8000, 0x4, 0x6, 0x2, 0x4, 0x6, 0xa2ec, 0x7, 0x100, 0x1, 0x3, 0x1f, 0x81, 0x10000, 0xc5, 0x7ff, 0x2aae236d, 0x4, 0x2000, 0x1c, 0x3, 0x2, 0x735c, 0x7fffffff, 0x6, 0xfffffffd, 0x4, 0x3ff, 0x7fffffff, 0x8, 0x224, 0x261, 0x8b8a, 0x100, 0xffffffff, 0x7fff, 0x41, 0x401, 0x200], [0x7, 0x4, 0x2, 0x5, 0x7, 0x1, 0x8, 0x0, 0x8, 0xffffff7b, 0x0, 0x5, 0x6, 0xcc9, 0x1, 0x5, 0x2, 0xfffffffe, 0xfffffff9, 0x0, 0x5, 0x101, 0x401, 0x2, 0x3, 0x3, 0x7f76, 0x3ff, 0x9, 0xc14, 0x3, 0x7, 0x5, 0x100, 0x6, 0x8, 0x2, 0xe0, 0x3f, 0x200, 0x3, 0x9, 0x3, 0x5, 0x95c6, 0x2, 0x6, 0x20, 0x3, 0x8, 0x9, 0x7, 0x9, 0x0, 0xffffd671, 0x1, 0x0, 0x853d, 0x7, 0x3ff, 0x0, 0xfde7, 0x1, 0x5]}, 0x45c) 18:10:27 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0xd00}]}, 0x78) 18:10:27 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) write$uinput_user_dev(r2, &(0x7f0000000480)={'syz0\x00', {}, 0x0, [0x4, 0x631, 0xaf, 0x2, 0x1b, 0x1, 0x10001, 0x1, 0x8, 0x3ff, 0x800, 0x7859, 0x7, 0x5, 0x7fff, 0xc05, 0xa4, 0x3, 0x4, 0xfffff800, 0x6, 0x7c, 0x6, 0xff, 0x2, 0x771], [0x0, 0x7ff, 0x1f, 0x1, 0x7, 0x2, 0x6, 0xd594, 0x3, 0x2a, 0x1c9b4fd4, 0x0, 0xfff, 0x5, 0xfffff801, 0x9, 0x3f, 0x8, 0x80, 0x6, 0x401, 0x8000, 0x1, 0xcb, 0x1, 0x6, 0x4, 0x92, 0x800000, 0x7, 0x1f, 0x140, 0x7ff, 0xabbc, 0x401, 0x0, 0x3, 0x20, 0x48, 0x12000, 0xfa, 0x1, 0xfffff6fe, 0x0, 0x7, 0x8818, 0x8000, 0x6, 0x1f, 0x8, 0x4, 0xff, 0x101, 0xd7, 0x8, 0x5, 0xffff8001, 0x5, 0xb621, 0x1, 0x9, 0x1395db38, 0x0, 0x3], [0x6, 0x6, 0x401, 0x2d5, 0xc08, 0x3, 0x7f, 0x7, 0x8, 0x4, 0xbe1a, 0x5, 0x3, 0x93c, 0x9, 0x80, 0x800, 0x7fff, 0x6, 0x1, 0x5, 0x2, 0x9, 0x7fff, 0x0, 0x8000, 0x4, 0x6, 0x2, 0x4, 0x6, 0xa2ec, 0x7, 0x100, 0x1, 0x3, 0x1f, 0x81, 0x10000, 0xc5, 0x7ff, 0x2aae236d, 0x4, 0x2000, 0x1c, 0x3, 0x2, 0x735c, 0x7fffffff, 0x6, 0xfffffffd, 0x4, 0x3ff, 0x7fffffff, 0x8, 0x224, 0x261, 0x8b8a, 0x100, 0xffffffff, 0x7fff, 0x41, 0x401, 0x200], [0x7, 0x4, 0x2, 0x5, 0x7, 0x1, 0x8, 0x0, 0x8, 0xffffff7b, 0x0, 0x5, 0x6, 0xcc9, 0x1, 0x5, 0x2, 0xfffffffe, 0xfffffff9, 0x0, 0x5, 0x101, 0x401, 0x2, 0x3, 0x3, 0x7f76, 0x3ff, 0x9, 0xc14, 0x3, 0x7, 0x5, 0x100, 0x6, 0x8, 0x2, 0xe0, 0x3f, 0x200, 0x3, 0x9, 0x3, 0x5, 0x95c6, 0x2, 0x6, 0x20, 0x3, 0x8, 0x9, 0x7, 0x9, 0x0, 0xffffd671, 0x1, 0x0, 0x853d, 0x7, 0x3ff, 0x0, 0xfde7, 0x1, 0x5]}, 0x45c) 18:10:27 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x3d}, {0x0, 0x2a}, {0x0}, {&(0x7f0000000100)="6653960d0ec5d684fa9f017ef0d60a3c27bc33760036001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479810be2aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e6517e615607676f8f9fc0ebf8b0b16d6f2c59957ab35d05692e664ebf68734ca53366295f4ad6142134b62f11e92ead037c7fb53455560c8ef0f1c94fafa924edfe92175aaa1c4ecc7aeeb72e0d050feacee907f40888c96a65545e07422bc6ac79f4c2d6ee3dab47d06e764682c72d7f16542fcfd05d2813cc182d1595016c179e1717c160300ab1ab0ac397e91bd193c036feb66a9ad2ec5b7967e7f5ff957f8b085a2437c59a", 0xf8}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 18:10:27 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63}, [{}]}, 0x45) 18:10:27 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) write$uinput_user_dev(r2, &(0x7f0000000480)={'syz0\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x5], [0x0, 0x7ff, 0x1f, 0x1, 0x7, 0x2, 0x6, 0xd594, 0x3, 0x2a, 0x1c9b4fd4, 0x0, 0xfff, 0x5, 0xfffff801, 0x9, 0x3f, 0x8, 0x80, 0x6, 0x401, 0x8000, 0x1, 0xcb, 0x1, 0x6, 0x4, 0x92, 0x800000, 0x7, 0x1f, 0x140, 0x7ff, 0xabbc, 0x401, 0x0, 0x3, 0x20, 0x48, 0x12000, 0xfa, 0x1, 0xfffff6fe, 0x0, 0x7, 0x8818, 0x8000, 0x6, 0x1f, 0x8], [0x6, 0x6, 0x401, 0x2d5, 0xc08, 0x3, 0x7f, 0x7, 0x8, 0x4, 0xbe1a, 0x5, 0x3, 0x93c, 0x9, 0x80, 0x800, 0x7fff, 0x6, 0x1, 0x5, 0x2, 0x9, 0x7fff, 0x0, 0x8000, 0x4, 0x6, 0x2, 0x4, 0x6, 0xa2ec, 0x7, 0x100, 0x1, 0x3, 0x1f, 0x81, 0x10000, 0xc5, 0x7ff, 0x2aae236d, 0x4, 0x2000, 0x1c, 0x3, 0x2, 0x735c, 0x7fffffff, 0x6, 0xfffffffd, 0x4, 0x3ff, 0x7fffffff, 0x8, 0x224, 0x261, 0x8b8a, 0x100, 0xffffffff, 0x7fff, 0x41, 0x401, 0x200], [0x7, 0x4, 0x2, 0x5, 0x7, 0x1, 0x8, 0x0, 0x8, 0xffffff7b, 0x0, 0x5, 0x6, 0xcc9, 0x1, 0x5, 0x2, 0xfffffffe, 0xfffffff9, 0x0, 0x5, 0x101, 0x401, 0x2, 0x3, 0x3, 0x7f76, 0x3ff, 0x9, 0xc14, 0x3, 0x7, 0x5, 0x100, 0x6, 0x8, 0x2, 0xe0, 0x3f, 0x200, 0x3, 0x9, 0x3, 0x5, 0x95c6, 0x2, 0x6, 0x20, 0x3, 0x8, 0x9, 0x7, 0x9, 0x0, 0xffffd671, 0x1, 0x0, 0x853d, 0x7, 0x3ff, 0x0, 0xfde7, 0x1, 0x5]}, 0x45c) 18:10:30 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r0, &(0x7f0000000040)=""/244, 0xf4) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="6653960d0ec5d684fa9f017ef0d60a3c27bc33760036001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479810be2aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e6517e615607676f8f9fc0ebf8b0b16d6f2c59957ab35d05692e664ebf68734ca53366295f4ad6142134b62f11e92ead037c7fb53455560c8ef0f1c94fafa924edfe92175aaa1c4ecc7aeeb72e0d050feacee907f40888c96a65545e07422bc6ac79f4c2d6ee3dab47d06e764682c72d7f16542fcfd05d2813cc182d1595016c179e1717c160300ab1ab0ac397e91bd193c036feb66a9ad2ec5b7967e7f5ff957f8b085a2437c5", 0xf7}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x19) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 18:10:30 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) write$uinput_user_dev(r2, &(0x7f0000000480)={'syz0\x00', {}, 0x0, [0x4, 0x631, 0xaf, 0x2, 0x1b, 0x1, 0x10001, 0x1, 0x8, 0x3ff, 0x800, 0x7859, 0x7, 0x5, 0x7fff, 0xc05, 0xa4, 0x3, 0x4, 0xfffff800, 0x6, 0x7c, 0x6, 0xff, 0x2], [0x0, 0x7ff, 0x1f, 0x1, 0x7, 0x2, 0x6, 0xd594, 0x3, 0x2a, 0x1c9b4fd4, 0x0, 0xfff, 0x5, 0xfffff801, 0x9, 0x3f, 0x8, 0x80, 0x6, 0x401, 0x8000, 0x1, 0xcb, 0x1, 0x6, 0x4, 0x92, 0x800000, 0x7, 0x1f, 0x140, 0x7ff, 0xabbc, 0x401, 0x0, 0x3, 0x20, 0x48, 0x12000, 0xfa, 0x1, 0xfffff6fe, 0x0, 0x7, 0x8818, 0x8000, 0x6, 0x1f, 0x8, 0x4, 0xff, 0x101, 0xd7, 0x8, 0x5, 0xffff8001, 0x5, 0xb621, 0x1, 0x9, 0x1395db38, 0x0, 0x3], [0x6, 0x6, 0x401, 0x2d5, 0xc08, 0x3, 0x7f, 0x7, 0x8, 0x4, 0xbe1a, 0x5, 0x3, 0x93c, 0x9, 0x80, 0x800, 0x7fff, 0x6, 0x1, 0x5, 0x2, 0x9, 0x7fff, 0x0, 0x8000, 0x4, 0x6, 0x2, 0x4, 0x6, 0xa2ec, 0x7, 0x100, 0x1, 0x3, 0x1f, 0x81, 0x10000, 0xc5, 0x7ff, 0x2aae236d, 0x4, 0x2000, 0x1c, 0x3, 0x2, 0x735c, 0x7fffffff, 0x6, 0xfffffffd, 0x4, 0x3ff, 0x7fffffff, 0x8, 0x224, 0x261, 0x8b8a, 0x100, 0xffffffff, 0x7fff, 0x41, 0x401, 0x200], [0x7, 0x4, 0x2, 0x5, 0x7, 0x1, 0x8, 0x0, 0x8, 0xffffff7b, 0x0, 0x5, 0x6, 0xcc9, 0x1, 0x5, 0x2, 0xfffffffe, 0xfffffff9, 0x0, 0x5, 0x101, 0x401, 0x2, 0x3, 0x3, 0x7f76, 0x3ff, 0x9, 0xc14, 0x3, 0x7, 0x5, 0x100, 0x6, 0x8, 0x2, 0xe0, 0x3f, 0x200, 0x3, 0x9, 0x3, 0x5, 0x95c6, 0x2, 0x6, 0x20, 0x3, 0x8, 0x9, 0x7, 0x9, 0x0, 0xffffd671, 0x1, 0x0, 0x853d, 0x7, 0x3ff, 0x0, 0xfde7, 0x1, 0x5]}, 0x45c) 18:10:30 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0xe00}]}, 0x78) 18:10:30 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63}, [{}]}, 0x46) 18:10:30 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) write$uinput_user_dev(r2, &(0x7f0000000480)={'syz0\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x5], [0x0, 0x7ff, 0x1f, 0x1, 0x7, 0x2, 0x6, 0xd594, 0x3, 0x2a, 0x1c9b4fd4, 0x0, 0xfff, 0x5, 0xfffff801, 0x9, 0x3f, 0x8, 0x80, 0x6, 0x401, 0x8000, 0x1, 0xcb, 0x1, 0x6, 0x4, 0x92, 0x800000, 0x7, 0x1f, 0x140, 0x7ff, 0xabbc, 0x401, 0x0, 0x3, 0x20, 0x48, 0x12000, 0xfa, 0x1, 0xfffff6fe, 0x0, 0x7, 0x8818, 0x8000, 0x6, 0x1f], [0x6, 0x6, 0x401, 0x2d5, 0xc08, 0x3, 0x7f, 0x7, 0x8, 0x4, 0xbe1a, 0x5, 0x3, 0x93c, 0x9, 0x80, 0x800, 0x7fff, 0x6, 0x1, 0x5, 0x2, 0x9, 0x7fff, 0x0, 0x8000, 0x4, 0x6, 0x2, 0x4, 0x6, 0xa2ec, 0x7, 0x100, 0x1, 0x3, 0x1f, 0x81, 0x10000, 0xc5, 0x7ff, 0x2aae236d, 0x4, 0x2000, 0x1c, 0x3, 0x2, 0x735c, 0x7fffffff, 0x6, 0xfffffffd, 0x4, 0x3ff, 0x7fffffff, 0x8, 0x224, 0x261, 0x8b8a, 0x100, 0xffffffff, 0x7fff, 0x41, 0x401, 0x200], [0x7, 0x4, 0x2, 0x5, 0x7, 0x1, 0x8, 0x0, 0x8, 0xffffff7b, 0x0, 0x5, 0x6, 0xcc9, 0x1, 0x5, 0x2, 0xfffffffe, 0xfffffff9, 0x0, 0x5, 0x101, 0x401, 0x2, 0x3, 0x3, 0x7f76, 0x3ff, 0x9, 0xc14, 0x3, 0x7, 0x5, 0x100, 0x6, 0x8, 0x2, 0xe0, 0x3f, 0x200, 0x3, 0x9, 0x3, 0x5, 0x95c6, 0x2, 0x6, 0x20, 0x3, 0x8, 0x9, 0x7, 0x9, 0x0, 0xffffd671, 0x1, 0x0, 0x853d, 0x7, 0x3ff, 0x0, 0xfde7, 0x1, 0x5]}, 0x45c) 18:10:30 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) write$uinput_user_dev(r2, &(0x7f0000000480)={'syz0\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x5], [0x0, 0x7ff, 0x1f, 0x1, 0x7, 0x2, 0x6, 0xd594, 0x3, 0x2a, 0x1c9b4fd4, 0x0, 0xfff, 0x5, 0xfffff801, 0x9, 0x3f, 0x8, 0x80, 0x6, 0x401, 0x8000, 0x1, 0xcb, 0x1, 0x6, 0x4, 0x92, 0x800000, 0x7, 0x1f, 0x140, 0x7ff, 0xabbc, 0x401, 0x0, 0x3, 0x20, 0x48, 0x12000, 0xfa, 0x1, 0xfffff6fe, 0x0, 0x7, 0x8818, 0x8000, 0x6], [0x6, 0x6, 0x401, 0x2d5, 0xc08, 0x3, 0x7f, 0x7, 0x8, 0x4, 0xbe1a, 0x5, 0x3, 0x93c, 0x9, 0x80, 0x800, 0x7fff, 0x6, 0x1, 0x5, 0x2, 0x9, 0x7fff, 0x0, 0x8000, 0x4, 0x6, 0x2, 0x4, 0x6, 0xa2ec, 0x7, 0x100, 0x1, 0x3, 0x1f, 0x81, 0x10000, 0xc5, 0x7ff, 0x2aae236d, 0x4, 0x2000, 0x1c, 0x3, 0x2, 0x735c, 0x7fffffff, 0x6, 0xfffffffd, 0x4, 0x3ff, 0x7fffffff, 0x8, 0x224, 0x261, 0x8b8a, 0x100, 0xffffffff, 0x7fff, 0x41, 0x401, 0x200], [0x7, 0x4, 0x2, 0x5, 0x7, 0x1, 0x8, 0x0, 0x8, 0xffffff7b, 0x0, 0x5, 0x6, 0xcc9, 0x1, 0x5, 0x2, 0xfffffffe, 0xfffffff9, 0x0, 0x5, 0x101, 0x401, 0x2, 0x3, 0x3, 0x7f76, 0x3ff, 0x9, 0xc14, 0x3, 0x7, 0x5, 0x100, 0x6, 0x8, 0x2, 0xe0, 0x3f, 0x200, 0x3, 0x9, 0x3, 0x5, 0x95c6, 0x2, 0x6, 0x20, 0x3, 0x8, 0x9, 0x7, 0x9, 0x0, 0xffffd671, 0x1, 0x0, 0x853d, 0x7, 0x3ff, 0x0, 0xfde7, 0x1, 0x5]}, 0x45c) 18:10:30 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) write$uinput_user_dev(r2, &(0x7f0000000480)={'syz0\x00', {}, 0x0, [0x4, 0x631, 0xaf, 0x2, 0x1b, 0x1, 0x10001, 0x1, 0x8, 0x3ff, 0x800, 0x7859, 0x7, 0x5, 0x7fff, 0xc05, 0xa4, 0x3, 0x4, 0xfffff800, 0x6, 0x7c, 0x6, 0xff], [0x0, 0x7ff, 0x1f, 0x1, 0x7, 0x2, 0x6, 0xd594, 0x3, 0x2a, 0x1c9b4fd4, 0x0, 0xfff, 0x5, 0xfffff801, 0x9, 0x3f, 0x8, 0x80, 0x6, 0x401, 0x8000, 0x1, 0xcb, 0x1, 0x6, 0x4, 0x92, 0x800000, 0x7, 0x1f, 0x140, 0x7ff, 0xabbc, 0x401, 0x0, 0x3, 0x20, 0x48, 0x12000, 0xfa, 0x1, 0xfffff6fe, 0x0, 0x7, 0x8818, 0x8000, 0x6, 0x1f, 0x8, 0x4, 0xff, 0x101, 0xd7, 0x8, 0x5, 0xffff8001, 0x5, 0xb621, 0x1, 0x9, 0x1395db38, 0x0, 0x3], [0x6, 0x6, 0x401, 0x2d5, 0xc08, 0x3, 0x7f, 0x7, 0x8, 0x4, 0xbe1a, 0x5, 0x3, 0x93c, 0x9, 0x80, 0x800, 0x7fff, 0x6, 0x1, 0x5, 0x2, 0x9, 0x7fff, 0x0, 0x8000, 0x4, 0x6, 0x2, 0x4, 0x6, 0xa2ec, 0x7, 0x100, 0x1, 0x3, 0x1f, 0x81, 0x10000, 0xc5, 0x7ff, 0x2aae236d, 0x4, 0x2000, 0x1c, 0x3, 0x2, 0x735c, 0x7fffffff, 0x6, 0xfffffffd, 0x4, 0x3ff, 0x7fffffff, 0x8, 0x224, 0x261, 0x8b8a, 0x100, 0xffffffff, 0x7fff, 0x41, 0x401, 0x200], [0x7, 0x4, 0x2, 0x5, 0x7, 0x1, 0x8, 0x0, 0x8, 0xffffff7b, 0x0, 0x5, 0x6, 0xcc9, 0x1, 0x5, 0x2, 0xfffffffe, 0xfffffff9, 0x0, 0x5, 0x101, 0x401, 0x2, 0x3, 0x3, 0x7f76, 0x3ff, 0x9, 0xc14, 0x3, 0x7, 0x5, 0x100, 0x6, 0x8, 0x2, 0xe0, 0x3f, 0x200, 0x3, 0x9, 0x3, 0x5, 0x95c6, 0x2, 0x6, 0x20, 0x3, 0x8, 0x9, 0x7, 0x9, 0x0, 0xffffd671, 0x1, 0x0, 0x853d, 0x7, 0x3ff, 0x0, 0xfde7, 0x1, 0x5]}, 0x45c) 18:10:30 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63}, [{}]}, 0x47) 18:10:30 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0xf00}]}, 0x78) 18:10:30 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x3d}, {0x0, 0x2a}, {0x0}, {&(0x7f0000000100)="6653960d0ec5d684fa9f017ef0d60a3c27bc33760036001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479810be2aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e6517e615607676f8f9fc0ebf8b0b16d6f2c59957ab35d05692e664ebf68734ca53366295f4ad6142134b62f11e92ead037c7fb53455560c8ef0f1c94fafa924edfe92175aaa1c4ecc7aeeb72e0d050feacee907f40888c96a65545e07422bc6ac79f4c2d6ee3dab47d06e764682c72d7f16542fcfd05d2813cc182d1595016c179e1717c160300ab1ab0ac397e91bd193c036feb66a9ad2ec5b7967e7f5ff957f8b085a2437c59a", 0xf8}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 18:10:30 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) write$uinput_user_dev(r2, &(0x7f0000000480)={'syz0\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x5], [0x0, 0x7ff, 0x1f, 0x1, 0x7, 0x2, 0x6, 0xd594, 0x3, 0x2a, 0x1c9b4fd4, 0x0, 0xfff, 0x5, 0xfffff801, 0x9, 0x3f, 0x8, 0x80, 0x6, 0x401, 0x8000, 0x1, 0xcb, 0x1, 0x6, 0x4, 0x92, 0x800000, 0x7, 0x1f, 0x140, 0x7ff, 0xabbc, 0x401, 0x0, 0x3, 0x20, 0x48, 0x12000, 0xfa, 0x1, 0xfffff6fe, 0x0, 0x7, 0x8818, 0x8000], [0x6, 0x6, 0x401, 0x2d5, 0xc08, 0x3, 0x7f, 0x7, 0x8, 0x4, 0xbe1a, 0x5, 0x3, 0x93c, 0x9, 0x80, 0x800, 0x7fff, 0x6, 0x1, 0x5, 0x2, 0x9, 0x7fff, 0x0, 0x8000, 0x4, 0x6, 0x2, 0x4, 0x6, 0xa2ec, 0x7, 0x100, 0x1, 0x3, 0x1f, 0x81, 0x10000, 0xc5, 0x7ff, 0x2aae236d, 0x4, 0x2000, 0x1c, 0x3, 0x2, 0x735c, 0x7fffffff, 0x6, 0xfffffffd, 0x4, 0x3ff, 0x7fffffff, 0x8, 0x224, 0x261, 0x8b8a, 0x100, 0xffffffff, 0x7fff, 0x41, 0x401, 0x200], [0x7, 0x4, 0x2, 0x5, 0x7, 0x1, 0x8, 0x0, 0x8, 0xffffff7b, 0x0, 0x5, 0x6, 0xcc9, 0x1, 0x5, 0x2, 0xfffffffe, 0xfffffff9, 0x0, 0x5, 0x101, 0x401, 0x2, 0x3, 0x3, 0x7f76, 0x3ff, 0x9, 0xc14, 0x3, 0x7, 0x5, 0x100, 0x6, 0x8, 0x2, 0xe0, 0x3f, 0x200, 0x3, 0x9, 0x3, 0x5, 0x95c6, 0x2, 0x6, 0x20, 0x3, 0x8, 0x9, 0x7, 0x9, 0x0, 0xffffd671, 0x1, 0x0, 0x853d, 0x7, 0x3ff, 0x0, 0xfde7, 0x1, 0x5]}, 0x45c) 18:10:30 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x1800}]}, 0x78) 18:10:33 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r0, &(0x7f0000000040)=""/244, 0xf4) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="6653960d0ec5d684fa9f017ef0d60a3c27bc33760036001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479810be2aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e6517e615607676f8f9fc0ebf8b0b16d6f2c59957ab35d05692e664ebf68734ca53366295f4ad6142134b62f11e92ead037c7fb53455560c8ef0f1c94fafa924edfe92175aaa1c4ecc7aeeb72e0d050feacee907f40888c96a65545e07422bc6ac79f4c2d6ee3dab47d06e764682c72d7f16542fcfd05d2813cc182d1595016c179e1717c160300ab1ab0ac397e91bd193c036feb66a9ad2ec5b7967e7f5ff957f8b085a2437c5", 0xf7}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x19) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 18:10:33 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63}, [{}]}, 0x48) 18:10:33 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) write$uinput_user_dev(r2, &(0x7f0000000480)={'syz0\x00', {}, 0x0, [0x4, 0x631, 0xaf, 0x2, 0x1b, 0x1, 0x10001, 0x1, 0x8, 0x3ff, 0x800, 0x7859, 0x7, 0x5, 0x7fff, 0xc05, 0xa4, 0x3, 0x4, 0xfffff800, 0x6, 0x7c, 0x6], [0x0, 0x7ff, 0x1f, 0x1, 0x7, 0x2, 0x6, 0xd594, 0x3, 0x2a, 0x1c9b4fd4, 0x0, 0xfff, 0x5, 0xfffff801, 0x9, 0x3f, 0x8, 0x80, 0x6, 0x401, 0x8000, 0x1, 0xcb, 0x1, 0x6, 0x4, 0x92, 0x800000, 0x7, 0x1f, 0x140, 0x7ff, 0xabbc, 0x401, 0x0, 0x3, 0x20, 0x48, 0x12000, 0xfa, 0x1, 0xfffff6fe, 0x0, 0x7, 0x8818, 0x8000, 0x6, 0x1f, 0x8, 0x4, 0xff, 0x101, 0xd7, 0x8, 0x5, 0xffff8001, 0x5, 0xb621, 0x1, 0x9, 0x1395db38, 0x0, 0x3], [0x6, 0x6, 0x401, 0x2d5, 0xc08, 0x3, 0x7f, 0x7, 0x8, 0x4, 0xbe1a, 0x5, 0x3, 0x93c, 0x9, 0x80, 0x800, 0x7fff, 0x6, 0x1, 0x5, 0x2, 0x9, 0x7fff, 0x0, 0x8000, 0x4, 0x6, 0x2, 0x4, 0x6, 0xa2ec, 0x7, 0x100, 0x1, 0x3, 0x1f, 0x81, 0x10000, 0xc5, 0x7ff, 0x2aae236d, 0x4, 0x2000, 0x1c, 0x3, 0x2, 0x735c, 0x7fffffff, 0x6, 0xfffffffd, 0x4, 0x3ff, 0x7fffffff, 0x8, 0x224, 0x261, 0x8b8a, 0x100, 0xffffffff, 0x7fff, 0x41, 0x401, 0x200], [0x7, 0x4, 0x2, 0x5, 0x7, 0x1, 0x8, 0x0, 0x8, 0xffffff7b, 0x0, 0x5, 0x6, 0xcc9, 0x1, 0x5, 0x2, 0xfffffffe, 0xfffffff9, 0x0, 0x5, 0x101, 0x401, 0x2, 0x3, 0x3, 0x7f76, 0x3ff, 0x9, 0xc14, 0x3, 0x7, 0x5, 0x100, 0x6, 0x8, 0x2, 0xe0, 0x3f, 0x200, 0x3, 0x9, 0x3, 0x5, 0x95c6, 0x2, 0x6, 0x20, 0x3, 0x8, 0x9, 0x7, 0x9, 0x0, 0xffffd671, 0x1, 0x0, 0x853d, 0x7, 0x3ff, 0x0, 0xfde7, 0x1, 0x5]}, 0x45c) 18:10:33 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) write$uinput_user_dev(r2, &(0x7f0000000480)={'syz0\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x5], [0x0, 0x7ff, 0x1f, 0x1, 0x7, 0x2, 0x6, 0xd594, 0x3, 0x2a, 0x1c9b4fd4, 0x0, 0xfff, 0x5, 0xfffff801, 0x9, 0x3f, 0x8, 0x80, 0x6, 0x401, 0x8000, 0x1, 0xcb, 0x1, 0x6, 0x4, 0x92, 0x800000, 0x7, 0x1f, 0x140, 0x7ff, 0xabbc, 0x401, 0x0, 0x3, 0x20, 0x48, 0x12000, 0xfa, 0x1, 0xfffff6fe, 0x0, 0x7, 0x8818], [0x6, 0x6, 0x401, 0x2d5, 0xc08, 0x3, 0x7f, 0x7, 0x8, 0x4, 0xbe1a, 0x5, 0x3, 0x93c, 0x9, 0x80, 0x800, 0x7fff, 0x6, 0x1, 0x5, 0x2, 0x9, 0x7fff, 0x0, 0x8000, 0x4, 0x6, 0x2, 0x4, 0x6, 0xa2ec, 0x7, 0x100, 0x1, 0x3, 0x1f, 0x81, 0x10000, 0xc5, 0x7ff, 0x2aae236d, 0x4, 0x2000, 0x1c, 0x3, 0x2, 0x735c, 0x7fffffff, 0x6, 0xfffffffd, 0x4, 0x3ff, 0x7fffffff, 0x8, 0x224, 0x261, 0x8b8a, 0x100, 0xffffffff, 0x7fff, 0x41, 0x401, 0x200], [0x7, 0x4, 0x2, 0x5, 0x7, 0x1, 0x8, 0x0, 0x8, 0xffffff7b, 0x0, 0x5, 0x6, 0xcc9, 0x1, 0x5, 0x2, 0xfffffffe, 0xfffffff9, 0x0, 0x5, 0x101, 0x401, 0x2, 0x3, 0x3, 0x7f76, 0x3ff, 0x9, 0xc14, 0x3, 0x7, 0x5, 0x100, 0x6, 0x8, 0x2, 0xe0, 0x3f, 0x200, 0x3, 0x9, 0x3, 0x5, 0x95c6, 0x2, 0x6, 0x20, 0x3, 0x8, 0x9, 0x7, 0x9, 0x0, 0xffffd671, 0x1, 0x0, 0x853d, 0x7, 0x3ff, 0x0, 0xfde7, 0x1, 0x5]}, 0x45c) 18:10:33 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x1900}]}, 0x78) 18:10:33 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x1a00}]}, 0x78) 18:10:33 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63}, [{}]}, 0x49) 18:10:33 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) write$uinput_user_dev(r2, &(0x7f0000000480)={'syz0\x00', {}, 0x0, [0x4, 0x631, 0xaf, 0x2, 0x1b, 0x1, 0x10001, 0x1, 0x8, 0x3ff, 0x800, 0x7859, 0x7, 0x5, 0x7fff, 0xc05, 0xa4, 0x3, 0x4, 0xfffff800, 0x6, 0x7c], [0x0, 0x7ff, 0x1f, 0x1, 0x7, 0x2, 0x6, 0xd594, 0x3, 0x2a, 0x1c9b4fd4, 0x0, 0xfff, 0x5, 0xfffff801, 0x9, 0x3f, 0x8, 0x80, 0x6, 0x401, 0x8000, 0x1, 0xcb, 0x1, 0x6, 0x4, 0x92, 0x800000, 0x7, 0x1f, 0x140, 0x7ff, 0xabbc, 0x401, 0x0, 0x3, 0x20, 0x48, 0x12000, 0xfa, 0x1, 0xfffff6fe, 0x0, 0x7, 0x8818, 0x8000, 0x6, 0x1f, 0x8, 0x4, 0xff, 0x101, 0xd7, 0x8, 0x5, 0xffff8001, 0x5, 0xb621, 0x1, 0x9, 0x1395db38, 0x0, 0x3], [0x6, 0x6, 0x401, 0x2d5, 0xc08, 0x3, 0x7f, 0x7, 0x8, 0x4, 0xbe1a, 0x5, 0x3, 0x93c, 0x9, 0x80, 0x800, 0x7fff, 0x6, 0x1, 0x5, 0x2, 0x9, 0x7fff, 0x0, 0x8000, 0x4, 0x6, 0x2, 0x4, 0x6, 0xa2ec, 0x7, 0x100, 0x1, 0x3, 0x1f, 0x81, 0x10000, 0xc5, 0x7ff, 0x2aae236d, 0x4, 0x2000, 0x1c, 0x3, 0x2, 0x735c, 0x7fffffff, 0x6, 0xfffffffd, 0x4, 0x3ff, 0x7fffffff, 0x8, 0x224, 0x261, 0x8b8a, 0x100, 0xffffffff, 0x7fff, 0x41, 0x401, 0x200], [0x7, 0x4, 0x2, 0x5, 0x7, 0x1, 0x8, 0x0, 0x8, 0xffffff7b, 0x0, 0x5, 0x6, 0xcc9, 0x1, 0x5, 0x2, 0xfffffffe, 0xfffffff9, 0x0, 0x5, 0x101, 0x401, 0x2, 0x3, 0x3, 0x7f76, 0x3ff, 0x9, 0xc14, 0x3, 0x7, 0x5, 0x100, 0x6, 0x8, 0x2, 0xe0, 0x3f, 0x200, 0x3, 0x9, 0x3, 0x5, 0x95c6, 0x2, 0x6, 0x20, 0x3, 0x8, 0x9, 0x7, 0x9, 0x0, 0xffffd671, 0x1, 0x0, 0x853d, 0x7, 0x3ff, 0x0, 0xfde7, 0x1, 0x5]}, 0x45c) 18:10:33 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x1b00}]}, 0x78) 18:10:33 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) write$uinput_user_dev(r2, &(0x7f0000000480)={'syz0\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x5], [0x0, 0x7ff, 0x1f, 0x1, 0x7, 0x2, 0x6, 0xd594, 0x3, 0x2a, 0x1c9b4fd4, 0x0, 0xfff, 0x5, 0xfffff801, 0x9, 0x3f, 0x8, 0x80, 0x6, 0x401, 0x8000, 0x1, 0xcb, 0x1, 0x6, 0x4, 0x92, 0x800000, 0x7, 0x1f, 0x140, 0x7ff, 0xabbc, 0x401, 0x0, 0x3, 0x20, 0x48, 0x12000, 0xfa, 0x1, 0xfffff6fe, 0x0, 0x7], [0x6, 0x6, 0x401, 0x2d5, 0xc08, 0x3, 0x7f, 0x7, 0x8, 0x4, 0xbe1a, 0x5, 0x3, 0x93c, 0x9, 0x80, 0x800, 0x7fff, 0x6, 0x1, 0x5, 0x2, 0x9, 0x7fff, 0x0, 0x8000, 0x4, 0x6, 0x2, 0x4, 0x6, 0xa2ec, 0x7, 0x100, 0x1, 0x3, 0x1f, 0x81, 0x10000, 0xc5, 0x7ff, 0x2aae236d, 0x4, 0x2000, 0x1c, 0x3, 0x2, 0x735c, 0x7fffffff, 0x6, 0xfffffffd, 0x4, 0x3ff, 0x7fffffff, 0x8, 0x224, 0x261, 0x8b8a, 0x100, 0xffffffff, 0x7fff, 0x41, 0x401, 0x200], [0x7, 0x4, 0x2, 0x5, 0x7, 0x1, 0x8, 0x0, 0x8, 0xffffff7b, 0x0, 0x5, 0x6, 0xcc9, 0x1, 0x5, 0x2, 0xfffffffe, 0xfffffff9, 0x0, 0x5, 0x101, 0x401, 0x2, 0x3, 0x3, 0x7f76, 0x3ff, 0x9, 0xc14, 0x3, 0x7, 0x5, 0x100, 0x6, 0x8, 0x2, 0xe0, 0x3f, 0x200, 0x3, 0x9, 0x3, 0x5, 0x95c6, 0x2, 0x6, 0x20, 0x3, 0x8, 0x9, 0x7, 0x9, 0x0, 0xffffd671, 0x1, 0x0, 0x853d, 0x7, 0x3ff, 0x0, 0xfde7, 0x1, 0x5]}, 0x45c) 18:10:33 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x3d}, {0x0, 0x2a}, {0x0}, {&(0x7f0000000100)="6653960d0ec5d684fa9f017ef0d60a3c27bc33760036001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479810be2aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e6517e615607676f8f9fc0ebf8b0b16d6f2c59957ab35d05692e664ebf68734ca53366295f4ad6142134b62f11e92ead037c7fb53455560c8ef0f1c94fafa924edfe92175aaa1c4ecc7aeeb72e0d050feacee907f40888c96a65545e07422bc6ac79f4c2d6ee3dab47d06e764682c72d7f16542fcfd05d2813cc182d1595016c179e1717c160300ab1ab0ac397e91bd193c036feb66a9ad2ec5b7967e7f5ff957f8b085a2437c59a", 0xf8}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 18:10:33 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63}, [{}]}, 0x4a) 18:10:36 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r0, &(0x7f0000000040)=""/244, 0xf4) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="6653960d0ec5d684fa9f017ef0d60a3c27bc33760036001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479810be2aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e6517e615607676f8f9fc0ebf8b0b16d6f2c59957ab35d05692e664ebf68734ca53366295f4ad6142134b62f11e92ead037c7fb53455560c8ef0f1c94fafa924edfe92175aaa1c4ecc7aeeb72e0d050feacee907f40888c96a65545e07422bc6ac79f4c2d6ee3dab47d06e764682c72d7f16542fcfd05d2813cc182d1595016c179e1717c160300ab1ab0ac397e91bd193c036feb66a9ad2ec5b7967e7f5ff957f8b085a2437c5", 0xf7}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x19) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) 18:10:36 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) write$uinput_user_dev(r2, &(0x7f0000000480)={'syz0\x00', {}, 0x0, [0x4, 0x631, 0xaf, 0x2, 0x1b, 0x1, 0x10001, 0x1, 0x8, 0x3ff, 0x800, 0x7859, 0x7, 0x5, 0x7fff, 0xc05, 0xa4, 0x3, 0x4, 0xfffff800, 0x6], [0x0, 0x7ff, 0x1f, 0x1, 0x7, 0x2, 0x6, 0xd594, 0x3, 0x2a, 0x1c9b4fd4, 0x0, 0xfff, 0x5, 0xfffff801, 0x9, 0x3f, 0x8, 0x80, 0x6, 0x401, 0x8000, 0x1, 0xcb, 0x1, 0x6, 0x4, 0x92, 0x800000, 0x7, 0x1f, 0x140, 0x7ff, 0xabbc, 0x401, 0x0, 0x3, 0x20, 0x48, 0x12000, 0xfa, 0x1, 0xfffff6fe, 0x0, 0x7, 0x8818, 0x8000, 0x6, 0x1f, 0x8, 0x4, 0xff, 0x101, 0xd7, 0x8, 0x5, 0xffff8001, 0x5, 0xb621, 0x1, 0x9, 0x1395db38, 0x0, 0x3], [0x6, 0x6, 0x401, 0x2d5, 0xc08, 0x3, 0x7f, 0x7, 0x8, 0x4, 0xbe1a, 0x5, 0x3, 0x93c, 0x9, 0x80, 0x800, 0x7fff, 0x6, 0x1, 0x5, 0x2, 0x9, 0x7fff, 0x0, 0x8000, 0x4, 0x6, 0x2, 0x4, 0x6, 0xa2ec, 0x7, 0x100, 0x1, 0x3, 0x1f, 0x81, 0x10000, 0xc5, 0x7ff, 0x2aae236d, 0x4, 0x2000, 0x1c, 0x3, 0x2, 0x735c, 0x7fffffff, 0x6, 0xfffffffd, 0x4, 0x3ff, 0x7fffffff, 0x8, 0x224, 0x261, 0x8b8a, 0x100, 0xffffffff, 0x7fff, 0x41, 0x401, 0x200], [0x7, 0x4, 0x2, 0x5, 0x7, 0x1, 0x8, 0x0, 0x8, 0xffffff7b, 0x0, 0x5, 0x6, 0xcc9, 0x1, 0x5, 0x2, 0xfffffffe, 0xfffffff9, 0x0, 0x5, 0x101, 0x401, 0x2, 0x3, 0x3, 0x7f76, 0x3ff, 0x9, 0xc14, 0x3, 0x7, 0x5, 0x100, 0x6, 0x8, 0x2, 0xe0, 0x3f, 0x200, 0x3, 0x9, 0x3, 0x5, 0x95c6, 0x2, 0x6, 0x20, 0x3, 0x8, 0x9, 0x7, 0x9, 0x0, 0xffffd671, 0x1, 0x0, 0x853d, 0x7, 0x3ff, 0x0, 0xfde7, 0x1, 0x5]}, 0x45c) 18:10:36 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x1e00}]}, 0x78) 18:10:36 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) write$uinput_user_dev(r2, &(0x7f0000000480)={'syz0\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x5], [0x0, 0x7ff, 0x1f, 0x1, 0x7, 0x2, 0x6, 0xd594, 0x3, 0x2a, 0x1c9b4fd4, 0x0, 0xfff, 0x5, 0xfffff801, 0x9, 0x3f, 0x8, 0x80, 0x6, 0x401, 0x8000, 0x1, 0xcb, 0x1, 0x6, 0x4, 0x92, 0x800000, 0x7, 0x1f, 0x140, 0x7ff, 0xabbc, 0x401, 0x0, 0x3, 0x20, 0x48, 0x12000, 0xfa, 0x1, 0xfffff6fe], [0x6, 0x6, 0x401, 0x2d5, 0xc08, 0x3, 0x7f, 0x7, 0x8, 0x4, 0xbe1a, 0x5, 0x3, 0x93c, 0x9, 0x80, 0x800, 0x7fff, 0x6, 0x1, 0x5, 0x2, 0x9, 0x7fff, 0x0, 0x8000, 0x4, 0x6, 0x2, 0x4, 0x6, 0xa2ec, 0x7, 0x100, 0x1, 0x3, 0x1f, 0x81, 0x10000, 0xc5, 0x7ff, 0x2aae236d, 0x4, 0x2000, 0x1c, 0x3, 0x2, 0x735c, 0x7fffffff, 0x6, 0xfffffffd, 0x4, 0x3ff, 0x7fffffff, 0x8, 0x224, 0x261, 0x8b8a, 0x100, 0xffffffff, 0x7fff, 0x41, 0x401, 0x200], [0x7, 0x4, 0x2, 0x5, 0x7, 0x1, 0x8, 0x0, 0x8, 0xffffff7b, 0x0, 0x5, 0x6, 0xcc9, 0x1, 0x5, 0x2, 0xfffffffe, 0xfffffff9, 0x0, 0x5, 0x101, 0x401, 0x2, 0x3, 0x3, 0x7f76, 0x3ff, 0x9, 0xc14, 0x3, 0x7, 0x5, 0x100, 0x6, 0x8, 0x2, 0xe0, 0x3f, 0x200, 0x3, 0x9, 0x3, 0x5, 0x95c6, 0x2, 0x6, 0x20, 0x3, 0x8, 0x9, 0x7, 0x9, 0x0, 0xffffd671, 0x1, 0x0, 0x853d, 0x7, 0x3ff, 0x0, 0xfde7, 0x1, 0x5]}, 0x45c) 18:10:36 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63}, [{}]}, 0x4b) 18:10:36 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63}, [{}]}, 0x4c) 18:10:36 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) write$uinput_user_dev(r2, &(0x7f0000000480)={'syz0\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x5], [0x0, 0x7ff, 0x1f, 0x1, 0x7, 0x2, 0x6, 0xd594, 0x3, 0x2a, 0x1c9b4fd4, 0x0, 0xfff, 0x5, 0xfffff801, 0x9, 0x3f, 0x8, 0x80, 0x6, 0x401, 0x8000, 0x1, 0xcb, 0x1, 0x6, 0x4, 0x92, 0x800000, 0x7, 0x1f, 0x140, 0x7ff, 0xabbc, 0x401, 0x0, 0x3, 0x20, 0x48, 0x12000, 0xfa, 0x1], [0x6, 0x6, 0x401, 0x2d5, 0xc08, 0x3, 0x7f, 0x7, 0x8, 0x4, 0xbe1a, 0x5, 0x3, 0x93c, 0x9, 0x80, 0x800, 0x7fff, 0x6, 0x1, 0x5, 0x2, 0x9, 0x7fff, 0x0, 0x8000, 0x4, 0x6, 0x2, 0x4, 0x6, 0xa2ec, 0x7, 0x100, 0x1, 0x3, 0x1f, 0x81, 0x10000, 0xc5, 0x7ff, 0x2aae236d, 0x4, 0x2000, 0x1c, 0x3, 0x2, 0x735c, 0x7fffffff, 0x6, 0xfffffffd, 0x4, 0x3ff, 0x7fffffff, 0x8, 0x224, 0x261, 0x8b8a, 0x100, 0xffffffff, 0x7fff, 0x41, 0x401, 0x200], [0x7, 0x4, 0x2, 0x5, 0x7, 0x1, 0x8, 0x0, 0x8, 0xffffff7b, 0x0, 0x5, 0x6, 0xcc9, 0x1, 0x5, 0x2, 0xfffffffe, 0xfffffff9, 0x0, 0x5, 0x101, 0x401, 0x2, 0x3, 0x3, 0x7f76, 0x3ff, 0x9, 0xc14, 0x3, 0x7, 0x5, 0x100, 0x6, 0x8, 0x2, 0xe0, 0x3f, 0x200, 0x3, 0x9, 0x3, 0x5, 0x95c6, 0x2, 0x6, 0x20, 0x3, 0x8, 0x9, 0x7, 0x9, 0x0, 0xffffd671, 0x1, 0x0, 0x853d, 0x7, 0x3ff, 0x0, 0xfde7, 0x1, 0x5]}, 0x45c) 18:10:36 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x3e00}]}, 0x78) 18:10:36 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) write$uinput_user_dev(r2, &(0x7f0000000480)={'syz0\x00', {}, 0x0, [0x4, 0x631, 0xaf, 0x2, 0x1b, 0x1, 0x10001, 0x1, 0x8, 0x3ff, 0x800, 0x7859, 0x7, 0x5, 0x7fff, 0xc05, 0xa4, 0x3, 0x4, 0xfffff800], [0x0, 0x7ff, 0x1f, 0x1, 0x7, 0x2, 0x6, 0xd594, 0x3, 0x2a, 0x1c9b4fd4, 0x0, 0xfff, 0x5, 0xfffff801, 0x9, 0x3f, 0x8, 0x80, 0x6, 0x401, 0x8000, 0x1, 0xcb, 0x1, 0x6, 0x4, 0x92, 0x800000, 0x7, 0x1f, 0x140, 0x7ff, 0xabbc, 0x401, 0x0, 0x3, 0x20, 0x48, 0x12000, 0xfa, 0x1, 0xfffff6fe, 0x0, 0x7, 0x8818, 0x8000, 0x6, 0x1f, 0x8, 0x4, 0xff, 0x101, 0xd7, 0x8, 0x5, 0xffff8001, 0x5, 0xb621, 0x1, 0x9, 0x1395db38, 0x0, 0x3], [0x6, 0x6, 0x401, 0x2d5, 0xc08, 0x3, 0x7f, 0x7, 0x8, 0x4, 0xbe1a, 0x5, 0x3, 0x93c, 0x9, 0x80, 0x800, 0x7fff, 0x6, 0x1, 0x5, 0x2, 0x9, 0x7fff, 0x0, 0x8000, 0x4, 0x6, 0x2, 0x4, 0x6, 0xa2ec, 0x7, 0x100, 0x1, 0x3, 0x1f, 0x81, 0x10000, 0xc5, 0x7ff, 0x2aae236d, 0x4, 0x2000, 0x1c, 0x3, 0x2, 0x735c, 0x7fffffff, 0x6, 0xfffffffd, 0x4, 0x3ff, 0x7fffffff, 0x8, 0x224, 0x261, 0x8b8a, 0x100, 0xffffffff, 0x7fff, 0x41, 0x401, 0x200], [0x7, 0x4, 0x2, 0x5, 0x7, 0x1, 0x8, 0x0, 0x8, 0xffffff7b, 0x0, 0x5, 0x6, 0xcc9, 0x1, 0x5, 0x2, 0xfffffffe, 0xfffffff9, 0x0, 0x5, 0x101, 0x401, 0x2, 0x3, 0x3, 0x7f76, 0x3ff, 0x9, 0xc14, 0x3, 0x7, 0x5, 0x100, 0x6, 0x8, 0x2, 0xe0, 0x3f, 0x200, 0x3, 0x9, 0x3, 0x5, 0x95c6, 0x2, 0x6, 0x20, 0x3, 0x8, 0x9, 0x7, 0x9, 0x0, 0xffffd671, 0x1, 0x0, 0x853d, 0x7, 0x3ff, 0x0, 0xfde7, 0x1, 0x5]}, 0x45c) 18:10:36 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) write$uinput_user_dev(r2, &(0x7f0000000480)={'syz0\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x5], [0x0, 0x7ff, 0x1f, 0x1, 0x7, 0x2, 0x6, 0xd594, 0x3, 0x2a, 0x1c9b4fd4, 0x0, 0xfff, 0x5, 0xfffff801, 0x9, 0x3f, 0x8, 0x80, 0x6, 0x401, 0x8000, 0x1, 0xcb, 0x1, 0x6, 0x4, 0x92, 0x800000, 0x7, 0x1f, 0x140, 0x7ff, 0xabbc, 0x401, 0x0, 0x3, 0x20, 0x48, 0x12000, 0xfa], [0x6, 0x6, 0x401, 0x2d5, 0xc08, 0x3, 0x7f, 0x7, 0x8, 0x4, 0xbe1a, 0x5, 0x3, 0x93c, 0x9, 0x80, 0x800, 0x7fff, 0x6, 0x1, 0x5, 0x2, 0x9, 0x7fff, 0x0, 0x8000, 0x4, 0x6, 0x2, 0x4, 0x6, 0xa2ec, 0x7, 0x100, 0x1, 0x3, 0x1f, 0x81, 0x10000, 0xc5, 0x7ff, 0x2aae236d, 0x4, 0x2000, 0x1c, 0x3, 0x2, 0x735c, 0x7fffffff, 0x6, 0xfffffffd, 0x4, 0x3ff, 0x7fffffff, 0x8, 0x224, 0x261, 0x8b8a, 0x100, 0xffffffff, 0x7fff, 0x41, 0x401, 0x200], [0x7, 0x4, 0x2, 0x5, 0x7, 0x1, 0x8, 0x0, 0x8, 0xffffff7b, 0x0, 0x5, 0x6, 0xcc9, 0x1, 0x5, 0x2, 0xfffffffe, 0xfffffff9, 0x0, 0x5, 0x101, 0x401, 0x2, 0x3, 0x3, 0x7f76, 0x3ff, 0x9, 0xc14, 0x3, 0x7, 0x5, 0x100, 0x6, 0x8, 0x2, 0xe0, 0x3f, 0x200, 0x3, 0x9, 0x3, 0x5, 0x95c6, 0x2, 0x6, 0x20, 0x3, 0x8, 0x9, 0x7, 0x9, 0x0, 0xffffd671, 0x1, 0x0, 0x853d, 0x7, 0x3ff, 0x0, 0xfde7, 0x1, 0x5]}, 0x45c) 18:10:36 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x3d}, {0x0, 0x2a}, {0x0}, {&(0x7f0000000100)="6653960d0ec5d684fa9f017ef0d60a3c27bc33760036001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479810be2aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e6517e615607676f8f9fc0ebf8b0b16d6f2c59957ab35d05692e664ebf68734ca53366295f4ad6142134b62f11e92ead037c7fb53455560c8ef0f1c94fafa924edfe92175aaa1c4ecc7aeeb72e0d050feacee907f40888c96a65545e07422bc6ac79f4c2d6ee3dab47d06e764682c72d7f16542fcfd05d2813cc182d1595016c179e1717c160300ab1ab0ac397e91bd193c036feb66a9ad2ec5b7967e7f5ff957f8b085a2437c59a", 0xf8}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x19) ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 18:10:36 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63}, [{}]}, 0x4d) 18:10:39 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r0, &(0x7f0000000040)=""/244, 0xf4) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="6653960d0ec5d684fa9f017ef0d60a3c27bc33760036001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479810be2aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e6517e615607676f8f9fc0ebf8b0b16d6f2c59957ab35d05692e664ebf68734ca53366295f4ad6142134b62f11e92ead037c7fb53455560c8ef0f1c94fafa924edfe92175aaa1c4ecc7aeeb72e0d050feacee907f40888c96a65545e07422bc6ac79f4c2d6ee3dab47d06e764682c72d7f16542fcfd05d2813cc182d1595016c179e1717c160300ab1ab0ac397e91bd193c036feb66a9ad2ec5b7967e7f5ff957f8b085a2437c5", 0xf7}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x19) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, 0x0) ptrace$cont(0x9, r1, 0x0, 0x0) 18:10:39 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) write$uinput_user_dev(r2, &(0x7f0000000480)={'syz0\x00', {}, 0x0, [0x4, 0x631, 0xaf, 0x2, 0x1b, 0x1, 0x10001, 0x1, 0x8, 0x3ff, 0x800, 0x7859, 0x7, 0x5, 0x7fff, 0xc05, 0xa4, 0x3, 0x4], [0x0, 0x7ff, 0x1f, 0x1, 0x7, 0x2, 0x6, 0xd594, 0x3, 0x2a, 0x1c9b4fd4, 0x0, 0xfff, 0x5, 0xfffff801, 0x9, 0x3f, 0x8, 0x80, 0x6, 0x401, 0x8000, 0x1, 0xcb, 0x1, 0x6, 0x4, 0x92, 0x800000, 0x7, 0x1f, 0x140, 0x7ff, 0xabbc, 0x401, 0x0, 0x3, 0x20, 0x48, 0x12000, 0xfa, 0x1, 0xfffff6fe, 0x0, 0x7, 0x8818, 0x8000, 0x6, 0x1f, 0x8, 0x4, 0xff, 0x101, 0xd7, 0x8, 0x5, 0xffff8001, 0x5, 0xb621, 0x1, 0x9, 0x1395db38, 0x0, 0x3], [0x6, 0x6, 0x401, 0x2d5, 0xc08, 0x3, 0x7f, 0x7, 0x8, 0x4, 0xbe1a, 0x5, 0x3, 0x93c, 0x9, 0x80, 0x800, 0x7fff, 0x6, 0x1, 0x5, 0x2, 0x9, 0x7fff, 0x0, 0x8000, 0x4, 0x6, 0x2, 0x4, 0x6, 0xa2ec, 0x7, 0x100, 0x1, 0x3, 0x1f, 0x81, 0x10000, 0xc5, 0x7ff, 0x2aae236d, 0x4, 0x2000, 0x1c, 0x3, 0x2, 0x735c, 0x7fffffff, 0x6, 0xfffffffd, 0x4, 0x3ff, 0x7fffffff, 0x8, 0x224, 0x261, 0x8b8a, 0x100, 0xffffffff, 0x7fff, 0x41, 0x401, 0x200], [0x7, 0x4, 0x2, 0x5, 0x7, 0x1, 0x8, 0x0, 0x8, 0xffffff7b, 0x0, 0x5, 0x6, 0xcc9, 0x1, 0x5, 0x2, 0xfffffffe, 0xfffffff9, 0x0, 0x5, 0x101, 0x401, 0x2, 0x3, 0x3, 0x7f76, 0x3ff, 0x9, 0xc14, 0x3, 0x7, 0x5, 0x100, 0x6, 0x8, 0x2, 0xe0, 0x3f, 0x200, 0x3, 0x9, 0x3, 0x5, 0x95c6, 0x2, 0x6, 0x20, 0x3, 0x8, 0x9, 0x7, 0x9, 0x0, 0xffffd671, 0x1, 0x0, 0x853d, 0x7, 0x3ff, 0x0, 0xfde7, 0x1, 0x5]}, 0x45c) 18:10:39 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x3f00}]}, 0x78) 18:10:39 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) write$uinput_user_dev(r2, &(0x7f0000000480)={'syz0\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x5], [0x0, 0x7ff, 0x1f, 0x1, 0x7, 0x2, 0x6, 0xd594, 0x3, 0x2a, 0x1c9b4fd4, 0x0, 0xfff, 0x5, 0xfffff801, 0x9, 0x3f, 0x8, 0x80, 0x6, 0x401, 0x8000, 0x1, 0xcb, 0x1, 0x6, 0x4, 0x92, 0x800000, 0x7, 0x1f, 0x140, 0x7ff, 0xabbc, 0x401, 0x0, 0x3, 0x20, 0x48, 0x12000], [0x6, 0x6, 0x401, 0x2d5, 0xc08, 0x3, 0x7f, 0x7, 0x8, 0x4, 0xbe1a, 0x5, 0x3, 0x93c, 0x9, 0x80, 0x800, 0x7fff, 0x6, 0x1, 0x5, 0x2, 0x9, 0x7fff, 0x0, 0x8000, 0x4, 0x6, 0x2, 0x4, 0x6, 0xa2ec, 0x7, 0x100, 0x1, 0x3, 0x1f, 0x81, 0x10000, 0xc5, 0x7ff, 0x2aae236d, 0x4, 0x2000, 0x1c, 0x3, 0x2, 0x735c, 0x7fffffff, 0x6, 0xfffffffd, 0x4, 0x3ff, 0x7fffffff, 0x8, 0x224, 0x261, 0x8b8a, 0x100, 0xffffffff, 0x7fff, 0x41, 0x401, 0x200], [0x7, 0x4, 0x2, 0x5, 0x7, 0x1, 0x8, 0x0, 0x8, 0xffffff7b, 0x0, 0x5, 0x6, 0xcc9, 0x1, 0x5, 0x2, 0xfffffffe, 0xfffffff9, 0x0, 0x5, 0x101, 0x401, 0x2, 0x3, 0x3, 0x7f76, 0x3ff, 0x9, 0xc14, 0x3, 0x7, 0x5, 0x100, 0x6, 0x8, 0x2, 0xe0, 0x3f, 0x200, 0x3, 0x9, 0x3, 0x5, 0x95c6, 0x2, 0x6, 0x20, 0x3, 0x8, 0x9, 0x7, 0x9, 0x0, 0xffffd671, 0x1, 0x0, 0x853d, 0x7, 0x3ff, 0x0, 0xfde7, 0x1, 0x5]}, 0x45c) 18:10:39 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63}, [{}]}, 0x4e) 18:10:39 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63}, [{}]}, 0x4f) 18:10:39 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) write$uinput_user_dev(r2, &(0x7f0000000480)={'syz0\x00', {}, 0x0, [0x4, 0x631, 0xaf, 0x2, 0x1b, 0x1, 0x10001, 0x1, 0x8, 0x3ff, 0x800, 0x7859, 0x7, 0x5, 0x7fff, 0xc05, 0xa4, 0x3], [0x0, 0x7ff, 0x1f, 0x1, 0x7, 0x2, 0x6, 0xd594, 0x3, 0x2a, 0x1c9b4fd4, 0x0, 0xfff, 0x5, 0xfffff801, 0x9, 0x3f, 0x8, 0x80, 0x6, 0x401, 0x8000, 0x1, 0xcb, 0x1, 0x6, 0x4, 0x92, 0x800000, 0x7, 0x1f, 0x140, 0x7ff, 0xabbc, 0x401, 0x0, 0x3, 0x20, 0x48, 0x12000, 0xfa, 0x1, 0xfffff6fe, 0x0, 0x7, 0x8818, 0x8000, 0x6, 0x1f, 0x8, 0x4, 0xff, 0x101, 0xd7, 0x8, 0x5, 0xffff8001, 0x5, 0xb621, 0x1, 0x9, 0x1395db38, 0x0, 0x3], [0x6, 0x6, 0x401, 0x2d5, 0xc08, 0x3, 0x7f, 0x7, 0x8, 0x4, 0xbe1a, 0x5, 0x3, 0x93c, 0x9, 0x80, 0x800, 0x7fff, 0x6, 0x1, 0x5, 0x2, 0x9, 0x7fff, 0x0, 0x8000, 0x4, 0x6, 0x2, 0x4, 0x6, 0xa2ec, 0x7, 0x100, 0x1, 0x3, 0x1f, 0x81, 0x10000, 0xc5, 0x7ff, 0x2aae236d, 0x4, 0x2000, 0x1c, 0x3, 0x2, 0x735c, 0x7fffffff, 0x6, 0xfffffffd, 0x4, 0x3ff, 0x7fffffff, 0x8, 0x224, 0x261, 0x8b8a, 0x100, 0xffffffff, 0x7fff, 0x41, 0x401, 0x200], [0x7, 0x4, 0x2, 0x5, 0x7, 0x1, 0x8, 0x0, 0x8, 0xffffff7b, 0x0, 0x5, 0x6, 0xcc9, 0x1, 0x5, 0x2, 0xfffffffe, 0xfffffff9, 0x0, 0x5, 0x101, 0x401, 0x2, 0x3, 0x3, 0x7f76, 0x3ff, 0x9, 0xc14, 0x3, 0x7, 0x5, 0x100, 0x6, 0x8, 0x2, 0xe0, 0x3f, 0x200, 0x3, 0x9, 0x3, 0x5, 0x95c6, 0x2, 0x6, 0x20, 0x3, 0x8, 0x9, 0x7, 0x9, 0x0, 0xffffd671, 0x1, 0x0, 0x853d, 0x7, 0x3ff, 0x0, 0xfde7, 0x1, 0x5]}, 0x45c) 18:10:39 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x7f00}]}, 0x78) 18:10:39 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) write$uinput_user_dev(r2, &(0x7f0000000480)={'syz0\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x5], [0x0, 0x7ff, 0x1f, 0x1, 0x7, 0x2, 0x6, 0xd594, 0x3, 0x2a, 0x1c9b4fd4, 0x0, 0xfff, 0x5, 0xfffff801, 0x9, 0x3f, 0x8, 0x80, 0x6, 0x401, 0x8000, 0x1, 0xcb, 0x1, 0x6, 0x4, 0x92, 0x800000, 0x7, 0x1f, 0x140, 0x7ff, 0xabbc, 0x401, 0x0, 0x3, 0x20, 0x48], [0x6, 0x6, 0x401, 0x2d5, 0xc08, 0x3, 0x7f, 0x7, 0x8, 0x4, 0xbe1a, 0x5, 0x3, 0x93c, 0x9, 0x80, 0x800, 0x7fff, 0x6, 0x1, 0x5, 0x2, 0x9, 0x7fff, 0x0, 0x8000, 0x4, 0x6, 0x2, 0x4, 0x6, 0xa2ec, 0x7, 0x100, 0x1, 0x3, 0x1f, 0x81, 0x10000, 0xc5, 0x7ff, 0x2aae236d, 0x4, 0x2000, 0x1c, 0x3, 0x2, 0x735c, 0x7fffffff, 0x6, 0xfffffffd, 0x4, 0x3ff, 0x7fffffff, 0x8, 0x224, 0x261, 0x8b8a, 0x100, 0xffffffff, 0x7fff, 0x41, 0x401, 0x200], [0x7, 0x4, 0x2, 0x5, 0x7, 0x1, 0x8, 0x0, 0x8, 0xffffff7b, 0x0, 0x5, 0x6, 0xcc9, 0x1, 0x5, 0x2, 0xfffffffe, 0xfffffff9, 0x0, 0x5, 0x101, 0x401, 0x2, 0x3, 0x3, 0x7f76, 0x3ff, 0x9, 0xc14, 0x3, 0x7, 0x5, 0x100, 0x6, 0x8, 0x2, 0xe0, 0x3f, 0x200, 0x3, 0x9, 0x3, 0x5, 0x95c6, 0x2, 0x6, 0x20, 0x3, 0x8, 0x9, 0x7, 0x9, 0x0, 0xffffd671, 0x1, 0x0, 0x853d, 0x7, 0x3ff, 0x0, 0xfde7, 0x1, 0x5]}, 0x45c) 18:10:39 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63}, [{}]}, 0x50) 18:10:39 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x3d}, {0x0, 0x2a}, {0x0}, {&(0x7f0000000100)="6653960d0ec5d684fa9f017ef0d60a3c27bc33760036001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479810be2aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e6517e615607676f8f9fc0ebf8b0b16d6f2c59957ab35d05692e664ebf68734ca53366295f4ad6142134b62f11e92ead037c7fb53455560c8ef0f1c94fafa924edfe92175aaa1c4ecc7aeeb72e0d050feacee907f40888c96a65545e07422bc6ac79f4c2d6ee3dab47d06e764682c72d7f16542fcfd05d2813cc182d1595016c179e1717c160300ab1ab0ac397e91bd193c036feb66a9ad2ec5b7967e7f5ff957f8b085a2437c59a", 0xf8}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x19) ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 18:10:39 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x9b00}]}, 0x78) 18:10:42 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r0, &(0x7f0000000040)=""/244, 0xf4) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="6653960d0ec5d684fa9f017ef0d60a3c27bc33760036001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479810be2aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e6517e615607676f8f9fc0ebf8b0b16d6f2c59957ab35d05692e664ebf68734ca53366295f4ad6142134b62f11e92ead037c7fb53455560c8ef0f1c94fafa924edfe92175aaa1c4ecc7aeeb72e0d050feacee907f40888c96a65545e07422bc6ac79f4c2d6ee3dab47d06e764682c72d7f16542fcfd05d2813cc182d1595016c179e1717c160300ab1ab0ac397e91bd193c036feb66a9ad2ec5b7967e7f5ff957f8b085a2437c5", 0xf7}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x19) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, 0x0) ptrace$cont(0x9, r1, 0x0, 0x0) 18:10:42 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) write$uinput_user_dev(r2, &(0x7f0000000480)={'syz0\x00', {}, 0x0, [0x4, 0x631, 0xaf, 0x2, 0x1b, 0x1, 0x10001, 0x1, 0x8, 0x3ff, 0x800, 0x7859, 0x7, 0x5, 0x7fff, 0xc05, 0xa4], [0x0, 0x7ff, 0x1f, 0x1, 0x7, 0x2, 0x6, 0xd594, 0x3, 0x2a, 0x1c9b4fd4, 0x0, 0xfff, 0x5, 0xfffff801, 0x9, 0x3f, 0x8, 0x80, 0x6, 0x401, 0x8000, 0x1, 0xcb, 0x1, 0x6, 0x4, 0x92, 0x800000, 0x7, 0x1f, 0x140, 0x7ff, 0xabbc, 0x401, 0x0, 0x3, 0x20, 0x48, 0x12000, 0xfa, 0x1, 0xfffff6fe, 0x0, 0x7, 0x8818, 0x8000, 0x6, 0x1f, 0x8, 0x4, 0xff, 0x101, 0xd7, 0x8, 0x5, 0xffff8001, 0x5, 0xb621, 0x1, 0x9, 0x1395db38, 0x0, 0x3], [0x6, 0x6, 0x401, 0x2d5, 0xc08, 0x3, 0x7f, 0x7, 0x8, 0x4, 0xbe1a, 0x5, 0x3, 0x93c, 0x9, 0x80, 0x800, 0x7fff, 0x6, 0x1, 0x5, 0x2, 0x9, 0x7fff, 0x0, 0x8000, 0x4, 0x6, 0x2, 0x4, 0x6, 0xa2ec, 0x7, 0x100, 0x1, 0x3, 0x1f, 0x81, 0x10000, 0xc5, 0x7ff, 0x2aae236d, 0x4, 0x2000, 0x1c, 0x3, 0x2, 0x735c, 0x7fffffff, 0x6, 0xfffffffd, 0x4, 0x3ff, 0x7fffffff, 0x8, 0x224, 0x261, 0x8b8a, 0x100, 0xffffffff, 0x7fff, 0x41, 0x401, 0x200], [0x7, 0x4, 0x2, 0x5, 0x7, 0x1, 0x8, 0x0, 0x8, 0xffffff7b, 0x0, 0x5, 0x6, 0xcc9, 0x1, 0x5, 0x2, 0xfffffffe, 0xfffffff9, 0x0, 0x5, 0x101, 0x401, 0x2, 0x3, 0x3, 0x7f76, 0x3ff, 0x9, 0xc14, 0x3, 0x7, 0x5, 0x100, 0x6, 0x8, 0x2, 0xe0, 0x3f, 0x200, 0x3, 0x9, 0x3, 0x5, 0x95c6, 0x2, 0x6, 0x20, 0x3, 0x8, 0x9, 0x7, 0x9, 0x0, 0xffffd671, 0x1, 0x0, 0x853d, 0x7, 0x3ff, 0x0, 0xfde7, 0x1, 0x5]}, 0x45c) 18:10:42 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) write$uinput_user_dev(r2, &(0x7f0000000480)={'syz0\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x5], [0x0, 0x7ff, 0x1f, 0x1, 0x7, 0x2, 0x6, 0xd594, 0x3, 0x2a, 0x1c9b4fd4, 0x0, 0xfff, 0x5, 0xfffff801, 0x9, 0x3f, 0x8, 0x80, 0x6, 0x401, 0x8000, 0x1, 0xcb, 0x1, 0x6, 0x4, 0x92, 0x800000, 0x7, 0x1f, 0x140, 0x7ff, 0xabbc, 0x401, 0x0, 0x3, 0x20], [0x6, 0x6, 0x401, 0x2d5, 0xc08, 0x3, 0x7f, 0x7, 0x8, 0x4, 0xbe1a, 0x5, 0x3, 0x93c, 0x9, 0x80, 0x800, 0x7fff, 0x6, 0x1, 0x5, 0x2, 0x9, 0x7fff, 0x0, 0x8000, 0x4, 0x6, 0x2, 0x4, 0x6, 0xa2ec, 0x7, 0x100, 0x1, 0x3, 0x1f, 0x81, 0x10000, 0xc5, 0x7ff, 0x2aae236d, 0x4, 0x2000, 0x1c, 0x3, 0x2, 0x735c, 0x7fffffff, 0x6, 0xfffffffd, 0x4, 0x3ff, 0x7fffffff, 0x8, 0x224, 0x261, 0x8b8a, 0x100, 0xffffffff, 0x7fff, 0x41, 0x401, 0x200], [0x7, 0x4, 0x2, 0x5, 0x7, 0x1, 0x8, 0x0, 0x8, 0xffffff7b, 0x0, 0x5, 0x6, 0xcc9, 0x1, 0x5, 0x2, 0xfffffffe, 0xfffffff9, 0x0, 0x5, 0x101, 0x401, 0x2, 0x3, 0x3, 0x7f76, 0x3ff, 0x9, 0xc14, 0x3, 0x7, 0x5, 0x100, 0x6, 0x8, 0x2, 0xe0, 0x3f, 0x200, 0x3, 0x9, 0x3, 0x5, 0x95c6, 0x2, 0x6, 0x20, 0x3, 0x8, 0x9, 0x7, 0x9, 0x0, 0xffffd671, 0x1, 0x0, 0x853d, 0x7, 0x3ff, 0x0, 0xfde7, 0x1, 0x5]}, 0x45c) 18:10:42 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63}, [{}]}, 0x51) 18:10:42 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0xe803}]}, 0x78) 18:10:42 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0xf000}]}, 0x78) 18:10:42 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) write$uinput_user_dev(r2, &(0x7f0000000480)={'syz0\x00', {}, 0x0, [0x4, 0x631, 0xaf, 0x2, 0x1b, 0x1, 0x10001, 0x1, 0x8, 0x3ff, 0x800, 0x7859, 0x7, 0x5, 0x7fff, 0xc05], [0x0, 0x7ff, 0x1f, 0x1, 0x7, 0x2, 0x6, 0xd594, 0x3, 0x2a, 0x1c9b4fd4, 0x0, 0xfff, 0x5, 0xfffff801, 0x9, 0x3f, 0x8, 0x80, 0x6, 0x401, 0x8000, 0x1, 0xcb, 0x1, 0x6, 0x4, 0x92, 0x800000, 0x7, 0x1f, 0x140, 0x7ff, 0xabbc, 0x401, 0x0, 0x3, 0x20, 0x48, 0x12000, 0xfa, 0x1, 0xfffff6fe, 0x0, 0x7, 0x8818, 0x8000, 0x6, 0x1f, 0x8, 0x4, 0xff, 0x101, 0xd7, 0x8, 0x5, 0xffff8001, 0x5, 0xb621, 0x1, 0x9, 0x1395db38, 0x0, 0x3], [0x6, 0x6, 0x401, 0x2d5, 0xc08, 0x3, 0x7f, 0x7, 0x8, 0x4, 0xbe1a, 0x5, 0x3, 0x93c, 0x9, 0x80, 0x800, 0x7fff, 0x6, 0x1, 0x5, 0x2, 0x9, 0x7fff, 0x0, 0x8000, 0x4, 0x6, 0x2, 0x4, 0x6, 0xa2ec, 0x7, 0x100, 0x1, 0x3, 0x1f, 0x81, 0x10000, 0xc5, 0x7ff, 0x2aae236d, 0x4, 0x2000, 0x1c, 0x3, 0x2, 0x735c, 0x7fffffff, 0x6, 0xfffffffd, 0x4, 0x3ff, 0x7fffffff, 0x8, 0x224, 0x261, 0x8b8a, 0x100, 0xffffffff, 0x7fff, 0x41, 0x401, 0x200], [0x7, 0x4, 0x2, 0x5, 0x7, 0x1, 0x8, 0x0, 0x8, 0xffffff7b, 0x0, 0x5, 0x6, 0xcc9, 0x1, 0x5, 0x2, 0xfffffffe, 0xfffffff9, 0x0, 0x5, 0x101, 0x401, 0x2, 0x3, 0x3, 0x7f76, 0x3ff, 0x9, 0xc14, 0x3, 0x7, 0x5, 0x100, 0x6, 0x8, 0x2, 0xe0, 0x3f, 0x200, 0x3, 0x9, 0x3, 0x5, 0x95c6, 0x2, 0x6, 0x20, 0x3, 0x8, 0x9, 0x7, 0x9, 0x0, 0xffffd671, 0x1, 0x0, 0x853d, 0x7, 0x3ff, 0x0, 0xfde7, 0x1, 0x5]}, 0x45c) 18:10:42 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) write$uinput_user_dev(r2, &(0x7f0000000480)={'syz0\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x5], [0x0, 0x7ff, 0x1f, 0x1, 0x7, 0x2, 0x6, 0xd594, 0x3, 0x2a, 0x1c9b4fd4, 0x0, 0xfff, 0x5, 0xfffff801, 0x9, 0x3f, 0x8, 0x80, 0x6, 0x401, 0x8000, 0x1, 0xcb, 0x1, 0x6, 0x4, 0x92, 0x800000, 0x7, 0x1f, 0x140, 0x7ff, 0xabbc, 0x401, 0x0, 0x3], [0x6, 0x6, 0x401, 0x2d5, 0xc08, 0x3, 0x7f, 0x7, 0x8, 0x4, 0xbe1a, 0x5, 0x3, 0x93c, 0x9, 0x80, 0x800, 0x7fff, 0x6, 0x1, 0x5, 0x2, 0x9, 0x7fff, 0x0, 0x8000, 0x4, 0x6, 0x2, 0x4, 0x6, 0xa2ec, 0x7, 0x100, 0x1, 0x3, 0x1f, 0x81, 0x10000, 0xc5, 0x7ff, 0x2aae236d, 0x4, 0x2000, 0x1c, 0x3, 0x2, 0x735c, 0x7fffffff, 0x6, 0xfffffffd, 0x4, 0x3ff, 0x7fffffff, 0x8, 0x224, 0x261, 0x8b8a, 0x100, 0xffffffff, 0x7fff, 0x41, 0x401, 0x200], [0x7, 0x4, 0x2, 0x5, 0x7, 0x1, 0x8, 0x0, 0x8, 0xffffff7b, 0x0, 0x5, 0x6, 0xcc9, 0x1, 0x5, 0x2, 0xfffffffe, 0xfffffff9, 0x0, 0x5, 0x101, 0x401, 0x2, 0x3, 0x3, 0x7f76, 0x3ff, 0x9, 0xc14, 0x3, 0x7, 0x5, 0x100, 0x6, 0x8, 0x2, 0xe0, 0x3f, 0x200, 0x3, 0x9, 0x3, 0x5, 0x95c6, 0x2, 0x6, 0x20, 0x3, 0x8, 0x9, 0x7, 0x9, 0x0, 0xffffd671, 0x1, 0x0, 0x853d, 0x7, 0x3ff, 0x0, 0xfde7, 0x1, 0x5]}, 0x45c) 18:10:42 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63}, [{}]}, 0x52) 18:10:42 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0xf00000}]}, 0x78) 18:10:42 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x3d}, {0x0, 0x2a}, {0x0}, {&(0x7f0000000100)="6653960d0ec5d684fa9f017ef0d60a3c27bc33760036001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479810be2aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e6517e615607676f8f9fc0ebf8b0b16d6f2c59957ab35d05692e664ebf68734ca53366295f4ad6142134b62f11e92ead037c7fb53455560c8ef0f1c94fafa924edfe92175aaa1c4ecc7aeeb72e0d050feacee907f40888c96a65545e07422bc6ac79f4c2d6ee3dab47d06e764682c72d7f16542fcfd05d2813cc182d1595016c179e1717c160300ab1ab0ac397e91bd193c036feb66a9ad2ec5b7967e7f5ff957f8b085a2437c59a", 0xf8}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x19) ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 18:10:42 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) write$uinput_user_dev(r2, &(0x7f0000000480)={'syz0\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x5], [0x0, 0x7ff, 0x1f, 0x1, 0x7, 0x2, 0x6, 0xd594, 0x3, 0x2a, 0x1c9b4fd4, 0x0, 0xfff, 0x5, 0xfffff801, 0x9, 0x3f, 0x8, 0x80, 0x6, 0x401, 0x8000, 0x1, 0xcb, 0x1, 0x6, 0x4, 0x92, 0x800000, 0x7, 0x1f, 0x140, 0x7ff, 0xabbc, 0x401], [0x6, 0x6, 0x401, 0x2d5, 0xc08, 0x3, 0x7f, 0x7, 0x8, 0x4, 0xbe1a, 0x5, 0x3, 0x93c, 0x9, 0x80, 0x800, 0x7fff, 0x6, 0x1, 0x5, 0x2, 0x9, 0x7fff, 0x0, 0x8000, 0x4, 0x6, 0x2, 0x4, 0x6, 0xa2ec, 0x7, 0x100, 0x1, 0x3, 0x1f, 0x81, 0x10000, 0xc5, 0x7ff, 0x2aae236d, 0x4, 0x2000, 0x1c, 0x3, 0x2, 0x735c, 0x7fffffff, 0x6, 0xfffffffd, 0x4, 0x3ff, 0x7fffffff, 0x8, 0x224, 0x261, 0x8b8a, 0x100, 0xffffffff, 0x7fff, 0x41, 0x401, 0x200], [0x7, 0x4, 0x2, 0x5, 0x7, 0x1, 0x8, 0x0, 0x8, 0xffffff7b, 0x0, 0x5, 0x6, 0xcc9, 0x1, 0x5, 0x2, 0xfffffffe, 0xfffffff9, 0x0, 0x5, 0x101, 0x401, 0x2, 0x3, 0x3, 0x7f76, 0x3ff, 0x9, 0xc14, 0x3, 0x7, 0x5, 0x100, 0x6, 0x8, 0x2, 0xe0, 0x3f, 0x200, 0x3, 0x9, 0x3, 0x5, 0x95c6, 0x2, 0x6, 0x20, 0x3, 0x8, 0x9, 0x7, 0x9, 0x0, 0xffffd671, 0x1, 0x0, 0x853d, 0x7, 0x3ff, 0x0, 0xfde7, 0x1, 0x5]}, 0x45c) 18:10:45 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r0, &(0x7f0000000040)=""/244, 0xf4) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="6653960d0ec5d684fa9f017ef0d60a3c27bc33760036001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479810be2aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e6517e615607676f8f9fc0ebf8b0b16d6f2c59957ab35d05692e664ebf68734ca53366295f4ad6142134b62f11e92ead037c7fb53455560c8ef0f1c94fafa924edfe92175aaa1c4ecc7aeeb72e0d050feacee907f40888c96a65545e07422bc6ac79f4c2d6ee3dab47d06e764682c72d7f16542fcfd05d2813cc182d1595016c179e1717c160300ab1ab0ac397e91bd193c036feb66a9ad2ec5b7967e7f5ff957f8b085a2437c5", 0xf7}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x19) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, 0x0) ptrace$cont(0x9, r1, 0x0, 0x0) 18:10:45 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) write$uinput_user_dev(r2, &(0x7f0000000480)={'syz0\x00', {}, 0x0, [0x4, 0x631, 0xaf, 0x2, 0x1b, 0x1, 0x10001, 0x1, 0x8, 0x3ff, 0x800, 0x7859, 0x7, 0x5, 0x7fff], [0x0, 0x7ff, 0x1f, 0x1, 0x7, 0x2, 0x6, 0xd594, 0x3, 0x2a, 0x1c9b4fd4, 0x0, 0xfff, 0x5, 0xfffff801, 0x9, 0x3f, 0x8, 0x80, 0x6, 0x401, 0x8000, 0x1, 0xcb, 0x1, 0x6, 0x4, 0x92, 0x800000, 0x7, 0x1f, 0x140, 0x7ff, 0xabbc, 0x401, 0x0, 0x3, 0x20, 0x48, 0x12000, 0xfa, 0x1, 0xfffff6fe, 0x0, 0x7, 0x8818, 0x8000, 0x6, 0x1f, 0x8, 0x4, 0xff, 0x101, 0xd7, 0x8, 0x5, 0xffff8001, 0x5, 0xb621, 0x1, 0x9, 0x1395db38, 0x0, 0x3], [0x6, 0x6, 0x401, 0x2d5, 0xc08, 0x3, 0x7f, 0x7, 0x8, 0x4, 0xbe1a, 0x5, 0x3, 0x93c, 0x9, 0x80, 0x800, 0x7fff, 0x6, 0x1, 0x5, 0x2, 0x9, 0x7fff, 0x0, 0x8000, 0x4, 0x6, 0x2, 0x4, 0x6, 0xa2ec, 0x7, 0x100, 0x1, 0x3, 0x1f, 0x81, 0x10000, 0xc5, 0x7ff, 0x2aae236d, 0x4, 0x2000, 0x1c, 0x3, 0x2, 0x735c, 0x7fffffff, 0x6, 0xfffffffd, 0x4, 0x3ff, 0x7fffffff, 0x8, 0x224, 0x261, 0x8b8a, 0x100, 0xffffffff, 0x7fff, 0x41, 0x401, 0x200], [0x7, 0x4, 0x2, 0x5, 0x7, 0x1, 0x8, 0x0, 0x8, 0xffffff7b, 0x0, 0x5, 0x6, 0xcc9, 0x1, 0x5, 0x2, 0xfffffffe, 0xfffffff9, 0x0, 0x5, 0x101, 0x401, 0x2, 0x3, 0x3, 0x7f76, 0x3ff, 0x9, 0xc14, 0x3, 0x7, 0x5, 0x100, 0x6, 0x8, 0x2, 0xe0, 0x3f, 0x200, 0x3, 0x9, 0x3, 0x5, 0x95c6, 0x2, 0x6, 0x20, 0x3, 0x8, 0x9, 0x7, 0x9, 0x0, 0xffffd671, 0x1, 0x0, 0x853d, 0x7, 0x3ff, 0x0, 0xfde7, 0x1, 0x5]}, 0x45c) 18:10:45 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63}, [{}]}, 0x53) 18:10:45 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000}]}, 0x78) 18:10:45 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) write$uinput_user_dev(r2, &(0x7f0000000480)={'syz0\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x5], [0x0, 0x7ff, 0x1f, 0x1, 0x7, 0x2, 0x6, 0xd594, 0x3, 0x2a, 0x1c9b4fd4, 0x0, 0xfff, 0x5, 0xfffff801, 0x9, 0x3f, 0x8, 0x80, 0x6, 0x401, 0x8000, 0x1, 0xcb, 0x1, 0x6, 0x4, 0x92, 0x800000, 0x7, 0x1f, 0x140, 0x7ff, 0xabbc], [0x6, 0x6, 0x401, 0x2d5, 0xc08, 0x3, 0x7f, 0x7, 0x8, 0x4, 0xbe1a, 0x5, 0x3, 0x93c, 0x9, 0x80, 0x800, 0x7fff, 0x6, 0x1, 0x5, 0x2, 0x9, 0x7fff, 0x0, 0x8000, 0x4, 0x6, 0x2, 0x4, 0x6, 0xa2ec, 0x7, 0x100, 0x1, 0x3, 0x1f, 0x81, 0x10000, 0xc5, 0x7ff, 0x2aae236d, 0x4, 0x2000, 0x1c, 0x3, 0x2, 0x735c, 0x7fffffff, 0x6, 0xfffffffd, 0x4, 0x3ff, 0x7fffffff, 0x8, 0x224, 0x261, 0x8b8a, 0x100, 0xffffffff, 0x7fff, 0x41, 0x401, 0x200], [0x7, 0x4, 0x2, 0x5, 0x7, 0x1, 0x8, 0x0, 0x8, 0xffffff7b, 0x0, 0x5, 0x6, 0xcc9, 0x1, 0x5, 0x2, 0xfffffffe, 0xfffffff9, 0x0, 0x5, 0x101, 0x401, 0x2, 0x3, 0x3, 0x7f76, 0x3ff, 0x9, 0xc14, 0x3, 0x7, 0x5, 0x100, 0x6, 0x8, 0x2, 0xe0, 0x3f, 0x200, 0x3, 0x9, 0x3, 0x5, 0x95c6, 0x2, 0x6, 0x20, 0x3, 0x8, 0x9, 0x7, 0x9, 0x0, 0xffffd671, 0x1, 0x0, 0x853d, 0x7, 0x3ff, 0x0, 0xfde7, 0x1, 0x5]}, 0x45c) 18:10:45 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63}, [{}]}, 0x54) 18:10:45 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x1800000}]}, 0x78) 18:10:45 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) write$uinput_user_dev(r2, &(0x7f0000000480)={'syz0\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x5], [0x0, 0x7ff, 0x1f, 0x1, 0x7, 0x2, 0x6, 0xd594, 0x3, 0x2a, 0x1c9b4fd4, 0x0, 0xfff, 0x5, 0xfffff801, 0x9, 0x3f, 0x8, 0x80, 0x6, 0x401, 0x8000, 0x1, 0xcb, 0x1, 0x6, 0x4, 0x92, 0x800000, 0x7, 0x1f, 0x140, 0x7ff], [0x6, 0x6, 0x401, 0x2d5, 0xc08, 0x3, 0x7f, 0x7, 0x8, 0x4, 0xbe1a, 0x5, 0x3, 0x93c, 0x9, 0x80, 0x800, 0x7fff, 0x6, 0x1, 0x5, 0x2, 0x9, 0x7fff, 0x0, 0x8000, 0x4, 0x6, 0x2, 0x4, 0x6, 0xa2ec, 0x7, 0x100, 0x1, 0x3, 0x1f, 0x81, 0x10000, 0xc5, 0x7ff, 0x2aae236d, 0x4, 0x2000, 0x1c, 0x3, 0x2, 0x735c, 0x7fffffff, 0x6, 0xfffffffd, 0x4, 0x3ff, 0x7fffffff, 0x8, 0x224, 0x261, 0x8b8a, 0x100, 0xffffffff, 0x7fff, 0x41, 0x401, 0x200], [0x7, 0x4, 0x2, 0x5, 0x7, 0x1, 0x8, 0x0, 0x8, 0xffffff7b, 0x0, 0x5, 0x6, 0xcc9, 0x1, 0x5, 0x2, 0xfffffffe, 0xfffffff9, 0x0, 0x5, 0x101, 0x401, 0x2, 0x3, 0x3, 0x7f76, 0x3ff, 0x9, 0xc14, 0x3, 0x7, 0x5, 0x100, 0x6, 0x8, 0x2, 0xe0, 0x3f, 0x200, 0x3, 0x9, 0x3, 0x5, 0x95c6, 0x2, 0x6, 0x20, 0x3, 0x8, 0x9, 0x7, 0x9, 0x0, 0xffffd671, 0x1, 0x0, 0x853d, 0x7, 0x3ff, 0x0, 0xfde7, 0x1, 0x5]}, 0x45c) 18:10:45 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63}, [{}]}, 0x55) 18:10:45 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) write$uinput_user_dev(r2, &(0x7f0000000480)={'syz0\x00', {}, 0x0, [0x4, 0x631, 0xaf, 0x2, 0x1b, 0x1, 0x10001, 0x1, 0x8, 0x3ff, 0x800, 0x7859, 0x7, 0x5], [0x0, 0x7ff, 0x1f, 0x1, 0x7, 0x2, 0x6, 0xd594, 0x3, 0x2a, 0x1c9b4fd4, 0x0, 0xfff, 0x5, 0xfffff801, 0x9, 0x3f, 0x8, 0x80, 0x6, 0x401, 0x8000, 0x1, 0xcb, 0x1, 0x6, 0x4, 0x92, 0x800000, 0x7, 0x1f, 0x140, 0x7ff, 0xabbc, 0x401, 0x0, 0x3, 0x20, 0x48, 0x12000, 0xfa, 0x1, 0xfffff6fe, 0x0, 0x7, 0x8818, 0x8000, 0x6, 0x1f, 0x8, 0x4, 0xff, 0x101, 0xd7, 0x8, 0x5, 0xffff8001, 0x5, 0xb621, 0x1, 0x9, 0x1395db38, 0x0, 0x3], [0x6, 0x6, 0x401, 0x2d5, 0xc08, 0x3, 0x7f, 0x7, 0x8, 0x4, 0xbe1a, 0x5, 0x3, 0x93c, 0x9, 0x80, 0x800, 0x7fff, 0x6, 0x1, 0x5, 0x2, 0x9, 0x7fff, 0x0, 0x8000, 0x4, 0x6, 0x2, 0x4, 0x6, 0xa2ec, 0x7, 0x100, 0x1, 0x3, 0x1f, 0x81, 0x10000, 0xc5, 0x7ff, 0x2aae236d, 0x4, 0x2000, 0x1c, 0x3, 0x2, 0x735c, 0x7fffffff, 0x6, 0xfffffffd, 0x4, 0x3ff, 0x7fffffff, 0x8, 0x224, 0x261, 0x8b8a, 0x100, 0xffffffff, 0x7fff, 0x41, 0x401, 0x200], [0x7, 0x4, 0x2, 0x5, 0x7, 0x1, 0x8, 0x0, 0x8, 0xffffff7b, 0x0, 0x5, 0x6, 0xcc9, 0x1, 0x5, 0x2, 0xfffffffe, 0xfffffff9, 0x0, 0x5, 0x101, 0x401, 0x2, 0x3, 0x3, 0x7f76, 0x3ff, 0x9, 0xc14, 0x3, 0x7, 0x5, 0x100, 0x6, 0x8, 0x2, 0xe0, 0x3f, 0x200, 0x3, 0x9, 0x3, 0x5, 0x95c6, 0x2, 0x6, 0x20, 0x3, 0x8, 0x9, 0x7, 0x9, 0x0, 0xffffd671, 0x1, 0x0, 0x853d, 0x7, 0x3ff, 0x0, 0xfde7, 0x1, 0x5]}, 0x45c) 18:10:45 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x3d}, {0x0, 0x2a}, {0x0}, {&(0x7f0000000100)="6653960d0ec5d684fa9f017ef0d60a3c27bc33760036001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479810be2aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e6517e615607676f8f9fc0ebf8b0b16d6f2c59957ab35d05692e664ebf68734ca53366295f4ad6142134b62f11e92ead037c7fb53455560c8ef0f1c94fafa924edfe92175aaa1c4ecc7aeeb72e0d050feacee907f40888c96a65545e07422bc6ac79f4c2d6ee3dab47d06e764682c72d7f16542fcfd05d2813cc182d1595016c179e1717c160300ab1ab0ac397e91bd193c036feb66a9ad2ec5b7967e7f5ff957f8b085a2437c59a", 0xf8}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x19) ptrace$cont(0x18, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 18:10:45 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000}]}, 0x78) 18:10:48 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) write$uinput_user_dev(r2, &(0x7f0000000480)={'syz0\x00', {}, 0x0, [0x4, 0x631, 0xaf, 0x2, 0x1b, 0x1, 0x10001, 0x1, 0x8, 0x3ff, 0x800, 0x7859, 0x7], [0x0, 0x7ff, 0x1f, 0x1, 0x7, 0x2, 0x6, 0xd594, 0x3, 0x2a, 0x1c9b4fd4, 0x0, 0xfff, 0x5, 0xfffff801, 0x9, 0x3f, 0x8, 0x80, 0x6, 0x401, 0x8000, 0x1, 0xcb, 0x1, 0x6, 0x4, 0x92, 0x800000, 0x7, 0x1f, 0x140, 0x7ff, 0xabbc, 0x401, 0x0, 0x3, 0x20, 0x48, 0x12000, 0xfa, 0x1, 0xfffff6fe, 0x0, 0x7, 0x8818, 0x8000, 0x6, 0x1f, 0x8, 0x4, 0xff, 0x101, 0xd7, 0x8, 0x5, 0xffff8001, 0x5, 0xb621, 0x1, 0x9, 0x1395db38, 0x0, 0x3], [0x6, 0x6, 0x401, 0x2d5, 0xc08, 0x3, 0x7f, 0x7, 0x8, 0x4, 0xbe1a, 0x5, 0x3, 0x93c, 0x9, 0x80, 0x800, 0x7fff, 0x6, 0x1, 0x5, 0x2, 0x9, 0x7fff, 0x0, 0x8000, 0x4, 0x6, 0x2, 0x4, 0x6, 0xa2ec, 0x7, 0x100, 0x1, 0x3, 0x1f, 0x81, 0x10000, 0xc5, 0x7ff, 0x2aae236d, 0x4, 0x2000, 0x1c, 0x3, 0x2, 0x735c, 0x7fffffff, 0x6, 0xfffffffd, 0x4, 0x3ff, 0x7fffffff, 0x8, 0x224, 0x261, 0x8b8a, 0x100, 0xffffffff, 0x7fff, 0x41, 0x401, 0x200], [0x7, 0x4, 0x2, 0x5, 0x7, 0x1, 0x8, 0x0, 0x8, 0xffffff7b, 0x0, 0x5, 0x6, 0xcc9, 0x1, 0x5, 0x2, 0xfffffffe, 0xfffffff9, 0x0, 0x5, 0x101, 0x401, 0x2, 0x3, 0x3, 0x7f76, 0x3ff, 0x9, 0xc14, 0x3, 0x7, 0x5, 0x100, 0x6, 0x8, 0x2, 0xe0, 0x3f, 0x200, 0x3, 0x9, 0x3, 0x5, 0x95c6, 0x2, 0x6, 0x20, 0x3, 0x8, 0x9, 0x7, 0x9, 0x0, 0xffffd671, 0x1, 0x0, 0x853d, 0x7, 0x3ff, 0x0, 0xfde7, 0x1, 0x5]}, 0x45c) 18:10:48 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r0, &(0x7f0000000040)=""/244, 0xf4) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="6653960d0ec5d684fa9f017ef0d60a3c27bc33760036001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479810be2aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e6517e615607676f8f9fc0ebf8b0b16d6f2c59957ab35d05692e664ebf68734ca53366295f4ad6142134b62f11e92ead037c7fb53455560c8ef0f1c94fafa924edfe92175aaa1c4ecc7aeeb72e0d050feacee907f40888c96a65545e07422bc6ac79f4c2d6ee3dab47d06e764682c72d7f16542fcfd05d2813cc182d1595016c179e1717c160300ab1ab0ac397e91bd193c036feb66a9ad2ec5b7967e7f5ff957f8b085a2437c5", 0xf7}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x19) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0xffffffffffffffff, r1, 0x0, 0x0) 18:10:48 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) write$uinput_user_dev(r2, &(0x7f0000000480)={'syz0\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x5], [0x0, 0x7ff, 0x1f, 0x1, 0x7, 0x2, 0x6, 0xd594, 0x3, 0x2a, 0x1c9b4fd4, 0x0, 0xfff, 0x5, 0xfffff801, 0x9, 0x3f, 0x8, 0x80, 0x6, 0x401, 0x8000, 0x1, 0xcb, 0x1, 0x6, 0x4, 0x92, 0x800000, 0x7, 0x1f, 0x140], [0x6, 0x6, 0x401, 0x2d5, 0xc08, 0x3, 0x7f, 0x7, 0x8, 0x4, 0xbe1a, 0x5, 0x3, 0x93c, 0x9, 0x80, 0x800, 0x7fff, 0x6, 0x1, 0x5, 0x2, 0x9, 0x7fff, 0x0, 0x8000, 0x4, 0x6, 0x2, 0x4, 0x6, 0xa2ec, 0x7, 0x100, 0x1, 0x3, 0x1f, 0x81, 0x10000, 0xc5, 0x7ff, 0x2aae236d, 0x4, 0x2000, 0x1c, 0x3, 0x2, 0x735c, 0x7fffffff, 0x6, 0xfffffffd, 0x4, 0x3ff, 0x7fffffff, 0x8, 0x224, 0x261, 0x8b8a, 0x100, 0xffffffff, 0x7fff, 0x41, 0x401, 0x200], [0x7, 0x4, 0x2, 0x5, 0x7, 0x1, 0x8, 0x0, 0x8, 0xffffff7b, 0x0, 0x5, 0x6, 0xcc9, 0x1, 0x5, 0x2, 0xfffffffe, 0xfffffff9, 0x0, 0x5, 0x101, 0x401, 0x2, 0x3, 0x3, 0x7f76, 0x3ff, 0x9, 0xc14, 0x3, 0x7, 0x5, 0x100, 0x6, 0x8, 0x2, 0xe0, 0x3f, 0x200, 0x3, 0x9, 0x3, 0x5, 0x95c6, 0x2, 0x6, 0x20, 0x3, 0x8, 0x9, 0x7, 0x9, 0x0, 0xffffd671, 0x1, 0x0, 0x853d, 0x7, 0x3ff, 0x0, 0xfde7, 0x1, 0x5]}, 0x45c) 18:10:48 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63}, [{}]}, 0x56) 18:10:48 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x5000000}]}, 0x78) 18:10:48 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) write$uinput_user_dev(r2, &(0x7f0000000480)={'syz0\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x5], [0x0, 0x7ff, 0x1f, 0x1, 0x7, 0x2, 0x6, 0xd594, 0x3, 0x2a, 0x1c9b4fd4, 0x0, 0xfff, 0x5, 0xfffff801, 0x9, 0x3f, 0x8, 0x80, 0x6, 0x401, 0x8000, 0x1, 0xcb, 0x1, 0x6, 0x4, 0x92, 0x800000, 0x7, 0x1f], [0x6, 0x6, 0x401, 0x2d5, 0xc08, 0x3, 0x7f, 0x7, 0x8, 0x4, 0xbe1a, 0x5, 0x3, 0x93c, 0x9, 0x80, 0x800, 0x7fff, 0x6, 0x1, 0x5, 0x2, 0x9, 0x7fff, 0x0, 0x8000, 0x4, 0x6, 0x2, 0x4, 0x6, 0xa2ec, 0x7, 0x100, 0x1, 0x3, 0x1f, 0x81, 0x10000, 0xc5, 0x7ff, 0x2aae236d, 0x4, 0x2000, 0x1c, 0x3, 0x2, 0x735c, 0x7fffffff, 0x6, 0xfffffffd, 0x4, 0x3ff, 0x7fffffff, 0x8, 0x224, 0x261, 0x8b8a, 0x100, 0xffffffff, 0x7fff, 0x41, 0x401, 0x200], [0x7, 0x4, 0x2, 0x5, 0x7, 0x1, 0x8, 0x0, 0x8, 0xffffff7b, 0x0, 0x5, 0x6, 0xcc9, 0x1, 0x5, 0x2, 0xfffffffe, 0xfffffff9, 0x0, 0x5, 0x101, 0x401, 0x2, 0x3, 0x3, 0x7f76, 0x3ff, 0x9, 0xc14, 0x3, 0x7, 0x5, 0x100, 0x6, 0x8, 0x2, 0xe0, 0x3f, 0x200, 0x3, 0x9, 0x3, 0x5, 0x95c6, 0x2, 0x6, 0x20, 0x3, 0x8, 0x9, 0x7, 0x9, 0x0, 0xffffd671, 0x1, 0x0, 0x853d, 0x7, 0x3ff, 0x0, 0xfde7, 0x1, 0x5]}, 0x45c) 18:10:48 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) write$uinput_user_dev(r2, &(0x7f0000000480)={'syz0\x00', {}, 0x0, [0x4, 0x631, 0xaf, 0x2, 0x1b, 0x1, 0x10001, 0x1, 0x8, 0x3ff, 0x800, 0x7859, 0x7], [0x0, 0x7ff, 0x1f, 0x1, 0x7, 0x2, 0x6, 0xd594, 0x3, 0x2a, 0x1c9b4fd4, 0x0, 0xfff, 0x5, 0xfffff801, 0x9, 0x3f, 0x8, 0x80, 0x6, 0x401, 0x8000, 0x1, 0xcb, 0x1, 0x6, 0x4, 0x92, 0x800000, 0x7, 0x1f, 0x140, 0x7ff, 0xabbc, 0x401, 0x0, 0x3, 0x20, 0x48, 0x12000, 0xfa, 0x1, 0xfffff6fe, 0x0, 0x7, 0x8818, 0x8000, 0x6, 0x1f, 0x8, 0x4, 0xff, 0x101, 0xd7, 0x8, 0x5, 0xffff8001, 0x5, 0xb621, 0x1, 0x9, 0x1395db38, 0x0, 0x3], [0x6, 0x6, 0x401, 0x2d5, 0xc08, 0x3, 0x7f, 0x7, 0x8, 0x4, 0xbe1a, 0x5, 0x3, 0x93c, 0x9, 0x80, 0x800, 0x7fff, 0x6, 0x1, 0x5, 0x2, 0x9, 0x7fff, 0x0, 0x8000, 0x4, 0x6, 0x2, 0x4, 0x6, 0xa2ec, 0x7, 0x100, 0x1, 0x3, 0x1f, 0x81, 0x10000, 0xc5, 0x7ff, 0x2aae236d, 0x4, 0x2000, 0x1c, 0x3, 0x2, 0x735c, 0x7fffffff, 0x6, 0xfffffffd, 0x4, 0x3ff, 0x7fffffff, 0x8, 0x224, 0x261, 0x8b8a, 0x100, 0xffffffff, 0x7fff, 0x41, 0x401, 0x200], [0x7, 0x4, 0x2, 0x5, 0x7, 0x1, 0x8, 0x0, 0x8, 0xffffff7b, 0x0, 0x5, 0x6, 0xcc9, 0x1, 0x5, 0x2, 0xfffffffe, 0xfffffff9, 0x0, 0x5, 0x101, 0x401, 0x2, 0x3, 0x3, 0x7f76, 0x3ff, 0x9, 0xc14, 0x3, 0x7, 0x5, 0x100, 0x6, 0x8, 0x2, 0xe0, 0x3f, 0x200, 0x3, 0x9, 0x3, 0x5, 0x95c6, 0x2, 0x6, 0x20, 0x3, 0x8, 0x9, 0x7, 0x9, 0x0, 0xffffd671, 0x1, 0x0, 0x853d, 0x7, 0x3ff, 0x0, 0xfde7, 0x1, 0x5]}, 0x45c) 18:10:48 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63}, [{}]}, 0x57) 18:10:48 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x6000000}]}, 0x78) 18:10:48 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) write$uinput_user_dev(r2, &(0x7f0000000480)={'syz0\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x5], [0x0, 0x7ff, 0x1f, 0x1, 0x7, 0x2, 0x6, 0xd594, 0x3, 0x2a, 0x1c9b4fd4, 0x0, 0xfff, 0x5, 0xfffff801, 0x9, 0x3f, 0x8, 0x80, 0x6, 0x401, 0x8000, 0x1, 0xcb, 0x1, 0x6, 0x4, 0x92, 0x800000, 0x7], [0x6, 0x6, 0x401, 0x2d5, 0xc08, 0x3, 0x7f, 0x7, 0x8, 0x4, 0xbe1a, 0x5, 0x3, 0x93c, 0x9, 0x80, 0x800, 0x7fff, 0x6, 0x1, 0x5, 0x2, 0x9, 0x7fff, 0x0, 0x8000, 0x4, 0x6, 0x2, 0x4, 0x6, 0xa2ec, 0x7, 0x100, 0x1, 0x3, 0x1f, 0x81, 0x10000, 0xc5, 0x7ff, 0x2aae236d, 0x4, 0x2000, 0x1c, 0x3, 0x2, 0x735c, 0x7fffffff, 0x6, 0xfffffffd, 0x4, 0x3ff, 0x7fffffff, 0x8, 0x224, 0x261, 0x8b8a, 0x100, 0xffffffff, 0x7fff, 0x41, 0x401, 0x200], [0x7, 0x4, 0x2, 0x5, 0x7, 0x1, 0x8, 0x0, 0x8, 0xffffff7b, 0x0, 0x5, 0x6, 0xcc9, 0x1, 0x5, 0x2, 0xfffffffe, 0xfffffff9, 0x0, 0x5, 0x101, 0x401, 0x2, 0x3, 0x3, 0x7f76, 0x3ff, 0x9, 0xc14, 0x3, 0x7, 0x5, 0x100, 0x6, 0x8, 0x2, 0xe0, 0x3f, 0x200, 0x3, 0x9, 0x3, 0x5, 0x95c6, 0x2, 0x6, 0x20, 0x3, 0x8, 0x9, 0x7, 0x9, 0x0, 0xffffd671, 0x1, 0x0, 0x853d, 0x7, 0x3ff, 0x0, 0xfde7, 0x1, 0x5]}, 0x45c) 18:10:48 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x3d}, {0x0, 0x2a}, {0x0}, {&(0x7f0000000100)="6653960d0ec5d684fa9f017ef0d60a3c27bc33760036001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479810be2aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e6517e615607676f8f9fc0ebf8b0b16d6f2c59957ab35d05692e664ebf68734ca53366295f4ad6142134b62f11e92ead037c7fb53455560c8ef0f1c94fafa924edfe92175aaa1c4ecc7aeeb72e0d050feacee907f40888c96a65545e07422bc6ac79f4c2d6ee3dab47d06e764682c72d7f16542fcfd05d2813cc182d1595016c179e1717c160300ab1ab0ac397e91bd193c036feb66a9ad2ec5b7967e7f5ff957f8b085a2437c59a", 0xf8}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x19) ptrace$cont(0x18, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 18:10:48 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x7000000}]}, 0x78) 18:10:48 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) write$uinput_user_dev(r2, &(0x7f0000000480)={'syz0\x00', {}, 0x0, [0x4, 0x631, 0xaf, 0x2, 0x1b, 0x1, 0x10001, 0x1, 0x8, 0x3ff, 0x800, 0x7859, 0x7], [0x0, 0x7ff, 0x1f, 0x1, 0x7, 0x2, 0x6, 0xd594, 0x3, 0x2a, 0x1c9b4fd4, 0x0, 0xfff, 0x5, 0xfffff801, 0x9, 0x3f, 0x8, 0x80, 0x6, 0x401, 0x8000, 0x1, 0xcb, 0x1, 0x6, 0x4, 0x92, 0x800000, 0x7, 0x1f, 0x140, 0x7ff, 0xabbc, 0x401, 0x0, 0x3, 0x20, 0x48, 0x12000, 0xfa, 0x1, 0xfffff6fe, 0x0, 0x7, 0x8818, 0x8000, 0x6, 0x1f, 0x8, 0x4, 0xff, 0x101, 0xd7, 0x8, 0x5, 0xffff8001, 0x5, 0xb621, 0x1, 0x9, 0x1395db38, 0x0, 0x3], [0x6, 0x6, 0x401, 0x2d5, 0xc08, 0x3, 0x7f, 0x7, 0x8, 0x4, 0xbe1a, 0x5, 0x3, 0x93c, 0x9, 0x80, 0x800, 0x7fff, 0x6, 0x1, 0x5, 0x2, 0x9, 0x7fff, 0x0, 0x8000, 0x4, 0x6, 0x2, 0x4, 0x6, 0xa2ec, 0x7, 0x100, 0x1, 0x3, 0x1f, 0x81, 0x10000, 0xc5, 0x7ff, 0x2aae236d, 0x4, 0x2000, 0x1c, 0x3, 0x2, 0x735c, 0x7fffffff, 0x6, 0xfffffffd, 0x4, 0x3ff, 0x7fffffff, 0x8, 0x224, 0x261, 0x8b8a, 0x100, 0xffffffff, 0x7fff, 0x41, 0x401, 0x200], [0x7, 0x4, 0x2, 0x5, 0x7, 0x1, 0x8, 0x0, 0x8, 0xffffff7b, 0x0, 0x5, 0x6, 0xcc9, 0x1, 0x5, 0x2, 0xfffffffe, 0xfffffff9, 0x0, 0x5, 0x101, 0x401, 0x2, 0x3, 0x3, 0x7f76, 0x3ff, 0x9, 0xc14, 0x3, 0x7, 0x5, 0x100, 0x6, 0x8, 0x2, 0xe0, 0x3f, 0x200, 0x3, 0x9, 0x3, 0x5, 0x95c6, 0x2, 0x6, 0x20, 0x3, 0x8, 0x9, 0x7, 0x9, 0x0, 0xffffd671, 0x1, 0x0, 0x853d, 0x7, 0x3ff, 0x0, 0xfde7, 0x1, 0x5]}, 0x45c) 18:10:48 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63}, [{}]}, 0x58) 18:10:51 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r0, &(0x7f0000000040)=""/244, 0xf4) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="6653960d0ec5d684fa9f017ef0d60a3c27bc33760036001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479810be2aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e6517e615607676f8f9fc0ebf8b0b16d6f2c59957ab35d05692e664ebf68734ca53366295f4ad6142134b62f11e92ead037c7fb53455560c8ef0f1c94fafa924edfe92175aaa1c4ecc7aeeb72e0d050feacee907f40888c96a65545e07422bc6ac79f4c2d6ee3dab47d06e764682c72d7f16542fcfd05d2813cc182d1595016c179e1717c160300ab1ab0ac397e91bd193c036feb66a9ad2ec5b7967e7f5ff957f8b085a2437c5", 0xf7}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x19) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0xffffffffffffffff, r1, 0x0, 0x0) 18:10:51 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) write$uinput_user_dev(r2, &(0x7f0000000480)={'syz0\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x5], [0x0, 0x7ff, 0x1f, 0x1, 0x7, 0x2, 0x6, 0xd594, 0x3, 0x2a, 0x1c9b4fd4, 0x0, 0xfff, 0x5, 0xfffff801, 0x9, 0x3f, 0x8, 0x80, 0x6, 0x401, 0x8000, 0x1, 0xcb, 0x1, 0x6, 0x4, 0x92, 0x800000], [0x6, 0x6, 0x401, 0x2d5, 0xc08, 0x3, 0x7f, 0x7, 0x8, 0x4, 0xbe1a, 0x5, 0x3, 0x93c, 0x9, 0x80, 0x800, 0x7fff, 0x6, 0x1, 0x5, 0x2, 0x9, 0x7fff, 0x0, 0x8000, 0x4, 0x6, 0x2, 0x4, 0x6, 0xa2ec, 0x7, 0x100, 0x1, 0x3, 0x1f, 0x81, 0x10000, 0xc5, 0x7ff, 0x2aae236d, 0x4, 0x2000, 0x1c, 0x3, 0x2, 0x735c, 0x7fffffff, 0x6, 0xfffffffd, 0x4, 0x3ff, 0x7fffffff, 0x8, 0x224, 0x261, 0x8b8a, 0x100, 0xffffffff, 0x7fff, 0x41, 0x401, 0x200], [0x7, 0x4, 0x2, 0x5, 0x7, 0x1, 0x8, 0x0, 0x8, 0xffffff7b, 0x0, 0x5, 0x6, 0xcc9, 0x1, 0x5, 0x2, 0xfffffffe, 0xfffffff9, 0x0, 0x5, 0x101, 0x401, 0x2, 0x3, 0x3, 0x7f76, 0x3ff, 0x9, 0xc14, 0x3, 0x7, 0x5, 0x100, 0x6, 0x8, 0x2, 0xe0, 0x3f, 0x200, 0x3, 0x9, 0x3, 0x5, 0x95c6, 0x2, 0x6, 0x20, 0x3, 0x8, 0x9, 0x7, 0x9, 0x0, 0xffffd671, 0x1, 0x0, 0x853d, 0x7, 0x3ff, 0x0, 0xfde7, 0x1, 0x5]}, 0x45c) 18:10:51 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000}]}, 0x78) 18:10:51 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63}, [{}]}, 0x59) 18:10:51 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) write$uinput_user_dev(r2, &(0x7f0000000480)={'syz0\x00', {}, 0x0, [0x4, 0x631, 0xaf, 0x2, 0x1b, 0x1, 0x10001, 0x1, 0x8, 0x3ff, 0x800, 0x7859, 0x0, 0x5], [0x0, 0x7ff, 0x1f, 0x1, 0x7, 0x2, 0x6, 0xd594, 0x3, 0x2a, 0x1c9b4fd4, 0x0, 0xfff, 0x5, 0xfffff801, 0x9, 0x3f, 0x8, 0x80, 0x6, 0x401, 0x8000, 0x1, 0xcb, 0x1, 0x6, 0x4, 0x92, 0x800000, 0x7, 0x1f, 0x140, 0x7ff, 0xabbc, 0x401, 0x0, 0x3, 0x20, 0x48, 0x12000, 0xfa, 0x1, 0xfffff6fe, 0x0, 0x7, 0x8818, 0x8000, 0x6, 0x1f, 0x8, 0x4, 0xff, 0x101, 0xd7, 0x8, 0x5, 0xffff8001, 0x5, 0xb621, 0x1, 0x9, 0x1395db38, 0x0, 0x3], [0x6, 0x6, 0x401, 0x2d5, 0xc08, 0x3, 0x7f, 0x7, 0x8, 0x4, 0xbe1a, 0x5, 0x3, 0x93c, 0x9, 0x80, 0x800, 0x7fff, 0x6, 0x1, 0x5, 0x2, 0x9, 0x7fff, 0x0, 0x8000, 0x4, 0x6, 0x2, 0x4, 0x6, 0xa2ec, 0x7, 0x100, 0x1, 0x3, 0x1f, 0x81, 0x10000, 0xc5, 0x7ff, 0x2aae236d, 0x4, 0x2000, 0x1c, 0x3, 0x2, 0x735c, 0x7fffffff, 0x6, 0xfffffffd, 0x4, 0x3ff, 0x7fffffff, 0x8, 0x224, 0x261, 0x8b8a, 0x100, 0xffffffff, 0x7fff, 0x41, 0x401, 0x200], [0x7, 0x4, 0x2, 0x5, 0x7, 0x1, 0x8, 0x0, 0x8, 0xffffff7b, 0x0, 0x5, 0x6, 0xcc9, 0x1, 0x5, 0x2, 0xfffffffe, 0xfffffff9, 0x0, 0x5, 0x101, 0x401, 0x2, 0x3, 0x3, 0x7f76, 0x3ff, 0x9, 0xc14, 0x3, 0x7, 0x5, 0x100, 0x6, 0x8, 0x2, 0xe0, 0x3f, 0x200, 0x3, 0x9, 0x3, 0x5, 0x95c6, 0x2, 0x6, 0x20, 0x3, 0x8, 0x9, 0x7, 0x9, 0x0, 0xffffd671, 0x1, 0x0, 0x853d, 0x7, 0x3ff, 0x0, 0xfde7, 0x1, 0x5]}, 0x45c) 18:10:51 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63}, [{}]}, 0x5a) 18:10:51 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x9000000}]}, 0x78) 18:10:51 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) write$uinput_user_dev(r2, &(0x7f0000000480)={'syz0\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x5], [0x0, 0x7ff, 0x1f, 0x1, 0x7, 0x2, 0x6, 0xd594, 0x3, 0x2a, 0x1c9b4fd4, 0x0, 0xfff, 0x5, 0xfffff801, 0x9, 0x3f, 0x8, 0x80, 0x6, 0x401, 0x8000, 0x1, 0xcb, 0x1, 0x6, 0x4, 0x92], [0x6, 0x6, 0x401, 0x2d5, 0xc08, 0x3, 0x7f, 0x7, 0x8, 0x4, 0xbe1a, 0x5, 0x3, 0x93c, 0x9, 0x80, 0x800, 0x7fff, 0x6, 0x1, 0x5, 0x2, 0x9, 0x7fff, 0x0, 0x8000, 0x4, 0x6, 0x2, 0x4, 0x6, 0xa2ec, 0x7, 0x100, 0x1, 0x3, 0x1f, 0x81, 0x10000, 0xc5, 0x7ff, 0x2aae236d, 0x4, 0x2000, 0x1c, 0x3, 0x2, 0x735c, 0x7fffffff, 0x6, 0xfffffffd, 0x4, 0x3ff, 0x7fffffff, 0x8, 0x224, 0x261, 0x8b8a, 0x100, 0xffffffff, 0x7fff, 0x41, 0x401, 0x200], [0x7, 0x4, 0x2, 0x5, 0x7, 0x1, 0x8, 0x0, 0x8, 0xffffff7b, 0x0, 0x5, 0x6, 0xcc9, 0x1, 0x5, 0x2, 0xfffffffe, 0xfffffff9, 0x0, 0x5, 0x101, 0x401, 0x2, 0x3, 0x3, 0x7f76, 0x3ff, 0x9, 0xc14, 0x3, 0x7, 0x5, 0x100, 0x6, 0x8, 0x2, 0xe0, 0x3f, 0x200, 0x3, 0x9, 0x3, 0x5, 0x95c6, 0x2, 0x6, 0x20, 0x3, 0x8, 0x9, 0x7, 0x9, 0x0, 0xffffd671, 0x1, 0x0, 0x853d, 0x7, 0x3ff, 0x0, 0xfde7, 0x1, 0x5]}, 0x45c) 18:10:51 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x3d}, {0x0, 0x2a}, {0x0}, {&(0x7f0000000100)="6653960d0ec5d684fa9f017ef0d60a3c27bc33760036001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479810be2aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e6517e615607676f8f9fc0ebf8b0b16d6f2c59957ab35d05692e664ebf68734ca53366295f4ad6142134b62f11e92ead037c7fb53455560c8ef0f1c94fafa924edfe92175aaa1c4ecc7aeeb72e0d050feacee907f40888c96a65545e07422bc6ac79f4c2d6ee3dab47d06e764682c72d7f16542fcfd05d2813cc182d1595016c179e1717c160300ab1ab0ac397e91bd193c036feb66a9ad2ec5b7967e7f5ff957f8b085a2437c59a", 0xf8}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x19) ptrace$cont(0x18, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 18:10:51 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) write$uinput_user_dev(r2, &(0x7f0000000480)={'syz0\x00', {}, 0x0, [0x4, 0x631, 0xaf, 0x2, 0x1b, 0x1, 0x10001, 0x1, 0x8, 0x3ff, 0x800, 0x0, 0x0, 0x5], [0x0, 0x7ff, 0x1f, 0x1, 0x7, 0x2, 0x6, 0xd594, 0x3, 0x2a, 0x1c9b4fd4, 0x0, 0xfff, 0x5, 0xfffff801, 0x9, 0x3f, 0x8, 0x80, 0x6, 0x401, 0x8000, 0x1, 0xcb, 0x1, 0x6, 0x4, 0x92, 0x800000, 0x7, 0x1f, 0x140, 0x7ff, 0xabbc, 0x401, 0x0, 0x3, 0x20, 0x48, 0x12000, 0xfa, 0x1, 0xfffff6fe, 0x0, 0x7, 0x8818, 0x8000, 0x6, 0x1f, 0x8, 0x4, 0xff, 0x101, 0xd7, 0x8, 0x5, 0xffff8001, 0x5, 0xb621, 0x1, 0x9, 0x1395db38, 0x0, 0x3], [0x6, 0x6, 0x401, 0x2d5, 0xc08, 0x3, 0x7f, 0x7, 0x8, 0x4, 0xbe1a, 0x5, 0x3, 0x93c, 0x9, 0x80, 0x800, 0x7fff, 0x6, 0x1, 0x5, 0x2, 0x9, 0x7fff, 0x0, 0x8000, 0x4, 0x6, 0x2, 0x4, 0x6, 0xa2ec, 0x7, 0x100, 0x1, 0x3, 0x1f, 0x81, 0x10000, 0xc5, 0x7ff, 0x2aae236d, 0x4, 0x2000, 0x1c, 0x3, 0x2, 0x735c, 0x7fffffff, 0x6, 0xfffffffd, 0x4, 0x3ff, 0x7fffffff, 0x8, 0x224, 0x261, 0x8b8a, 0x100, 0xffffffff, 0x7fff, 0x41, 0x401, 0x200], [0x7, 0x4, 0x2, 0x5, 0x7, 0x1, 0x8, 0x0, 0x8, 0xffffff7b, 0x0, 0x5, 0x6, 0xcc9, 0x1, 0x5, 0x2, 0xfffffffe, 0xfffffff9, 0x0, 0x5, 0x101, 0x401, 0x2, 0x3, 0x3, 0x7f76, 0x3ff, 0x9, 0xc14, 0x3, 0x7, 0x5, 0x100, 0x6, 0x8, 0x2, 0xe0, 0x3f, 0x200, 0x3, 0x9, 0x3, 0x5, 0x95c6, 0x2, 0x6, 0x20, 0x3, 0x8, 0x9, 0x7, 0x9, 0x0, 0xffffd671, 0x1, 0x0, 0x853d, 0x7, 0x3ff, 0x0, 0xfde7, 0x1, 0x5]}, 0x45c) 18:10:51 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63}, [{}]}, 0x5b) 18:10:51 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) write$uinput_user_dev(r2, &(0x7f0000000480)={'syz0\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x5], [0x0, 0x7ff, 0x1f, 0x1, 0x7, 0x2, 0x6, 0xd594, 0x3, 0x2a, 0x1c9b4fd4, 0x0, 0xfff, 0x5, 0xfffff801, 0x9, 0x3f, 0x8, 0x80, 0x6, 0x401, 0x8000, 0x1, 0xcb, 0x1, 0x6, 0x4], [0x6, 0x6, 0x401, 0x2d5, 0xc08, 0x3, 0x7f, 0x7, 0x8, 0x4, 0xbe1a, 0x5, 0x3, 0x93c, 0x9, 0x80, 0x800, 0x7fff, 0x6, 0x1, 0x5, 0x2, 0x9, 0x7fff, 0x0, 0x8000, 0x4, 0x6, 0x2, 0x4, 0x6, 0xa2ec, 0x7, 0x100, 0x1, 0x3, 0x1f, 0x81, 0x10000, 0xc5, 0x7ff, 0x2aae236d, 0x4, 0x2000, 0x1c, 0x3, 0x2, 0x735c, 0x7fffffff, 0x6, 0xfffffffd, 0x4, 0x3ff, 0x7fffffff, 0x8, 0x224, 0x261, 0x8b8a, 0x100, 0xffffffff, 0x7fff, 0x41, 0x401, 0x200], [0x7, 0x4, 0x2, 0x5, 0x7, 0x1, 0x8, 0x0, 0x8, 0xffffff7b, 0x0, 0x5, 0x6, 0xcc9, 0x1, 0x5, 0x2, 0xfffffffe, 0xfffffff9, 0x0, 0x5, 0x101, 0x401, 0x2, 0x3, 0x3, 0x7f76, 0x3ff, 0x9, 0xc14, 0x3, 0x7, 0x5, 0x100, 0x6, 0x8, 0x2, 0xe0, 0x3f, 0x200, 0x3, 0x9, 0x3, 0x5, 0x95c6, 0x2, 0x6, 0x20, 0x3, 0x8, 0x9, 0x7, 0x9, 0x0, 0xffffd671, 0x1, 0x0, 0x853d, 0x7, 0x3ff, 0x0, 0xfde7, 0x1, 0x5]}, 0x45c) 18:10:54 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r0, &(0x7f0000000040)=""/244, 0xf4) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="6653960d0ec5d684fa9f017ef0d60a3c27bc33760036001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479810be2aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e6517e615607676f8f9fc0ebf8b0b16d6f2c59957ab35d05692e664ebf68734ca53366295f4ad6142134b62f11e92ead037c7fb53455560c8ef0f1c94fafa924edfe92175aaa1c4ecc7aeeb72e0d050feacee907f40888c96a65545e07422bc6ac79f4c2d6ee3dab47d06e764682c72d7f16542fcfd05d2813cc182d1595016c179e1717c160300ab1ab0ac397e91bd193c036feb66a9ad2ec5b7967e7f5ff957f8b085a2437c5", 0xf7}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x19) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0xffffffffffffffff, r1, 0x0, 0x0) 18:10:54 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0xa000000}]}, 0x78) 18:10:54 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) write$uinput_user_dev(r2, &(0x7f0000000480)={'syz0\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x5], [0x0, 0x7ff, 0x1f, 0x1, 0x7, 0x2, 0x6, 0xd594, 0x3, 0x2a, 0x1c9b4fd4, 0x0, 0xfff, 0x5, 0xfffff801, 0x9, 0x3f, 0x8, 0x80, 0x6, 0x401, 0x8000, 0x1, 0xcb, 0x1, 0x6], [0x6, 0x6, 0x401, 0x2d5, 0xc08, 0x3, 0x7f, 0x7, 0x8, 0x4, 0xbe1a, 0x5, 0x3, 0x93c, 0x9, 0x80, 0x800, 0x7fff, 0x6, 0x1, 0x5, 0x2, 0x9, 0x7fff, 0x0, 0x8000, 0x4, 0x6, 0x2, 0x4, 0x6, 0xa2ec, 0x7, 0x100, 0x1, 0x3, 0x1f, 0x81, 0x10000, 0xc5, 0x7ff, 0x2aae236d, 0x4, 0x2000, 0x1c, 0x3, 0x2, 0x735c, 0x7fffffff, 0x6, 0xfffffffd, 0x4, 0x3ff, 0x7fffffff, 0x8, 0x224, 0x261, 0x8b8a, 0x100, 0xffffffff, 0x7fff, 0x41, 0x401, 0x200], [0x7, 0x4, 0x2, 0x5, 0x7, 0x1, 0x8, 0x0, 0x8, 0xffffff7b, 0x0, 0x5, 0x6, 0xcc9, 0x1, 0x5, 0x2, 0xfffffffe, 0xfffffff9, 0x0, 0x5, 0x101, 0x401, 0x2, 0x3, 0x3, 0x7f76, 0x3ff, 0x9, 0xc14, 0x3, 0x7, 0x5, 0x100, 0x6, 0x8, 0x2, 0xe0, 0x3f, 0x200, 0x3, 0x9, 0x3, 0x5, 0x95c6, 0x2, 0x6, 0x20, 0x3, 0x8, 0x9, 0x7, 0x9, 0x0, 0xffffd671, 0x1, 0x0, 0x853d, 0x7, 0x3ff, 0x0, 0xfde7, 0x1, 0x5]}, 0x45c) 18:10:54 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) write$uinput_user_dev(r2, &(0x7f0000000480)={'syz0\x00', {}, 0x0, [0x4, 0x631, 0xaf, 0x2, 0x1b, 0x1, 0x10001, 0x1, 0x8, 0x3ff, 0x0, 0x0, 0x0, 0x5], [0x0, 0x7ff, 0x1f, 0x1, 0x7, 0x2, 0x6, 0xd594, 0x3, 0x2a, 0x1c9b4fd4, 0x0, 0xfff, 0x5, 0xfffff801, 0x9, 0x3f, 0x8, 0x80, 0x6, 0x401, 0x8000, 0x1, 0xcb, 0x1, 0x6, 0x4, 0x92, 0x800000, 0x7, 0x1f, 0x140, 0x7ff, 0xabbc, 0x401, 0x0, 0x3, 0x20, 0x48, 0x12000, 0xfa, 0x1, 0xfffff6fe, 0x0, 0x7, 0x8818, 0x8000, 0x6, 0x1f, 0x8, 0x4, 0xff, 0x101, 0xd7, 0x8, 0x5, 0xffff8001, 0x5, 0xb621, 0x1, 0x9, 0x1395db38, 0x0, 0x3], [0x6, 0x6, 0x401, 0x2d5, 0xc08, 0x3, 0x7f, 0x7, 0x8, 0x4, 0xbe1a, 0x5, 0x3, 0x93c, 0x9, 0x80, 0x800, 0x7fff, 0x6, 0x1, 0x5, 0x2, 0x9, 0x7fff, 0x0, 0x8000, 0x4, 0x6, 0x2, 0x4, 0x6, 0xa2ec, 0x7, 0x100, 0x1, 0x3, 0x1f, 0x81, 0x10000, 0xc5, 0x7ff, 0x2aae236d, 0x4, 0x2000, 0x1c, 0x3, 0x2, 0x735c, 0x7fffffff, 0x6, 0xfffffffd, 0x4, 0x3ff, 0x7fffffff, 0x8, 0x224, 0x261, 0x8b8a, 0x100, 0xffffffff, 0x7fff, 0x41, 0x401, 0x200], [0x7, 0x4, 0x2, 0x5, 0x7, 0x1, 0x8, 0x0, 0x8, 0xffffff7b, 0x0, 0x5, 0x6, 0xcc9, 0x1, 0x5, 0x2, 0xfffffffe, 0xfffffff9, 0x0, 0x5, 0x101, 0x401, 0x2, 0x3, 0x3, 0x7f76, 0x3ff, 0x9, 0xc14, 0x3, 0x7, 0x5, 0x100, 0x6, 0x8, 0x2, 0xe0, 0x3f, 0x200, 0x3, 0x9, 0x3, 0x5, 0x95c6, 0x2, 0x6, 0x20, 0x3, 0x8, 0x9, 0x7, 0x9, 0x0, 0xffffd671, 0x1, 0x0, 0x853d, 0x7, 0x3ff, 0x0, 0xfde7, 0x1, 0x5]}, 0x45c) 18:10:54 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63}, [{}]}, 0x5c) 18:10:54 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) write$uinput_user_dev(r2, &(0x7f0000000480)={'syz0\x00', {}, 0x0, [0x4, 0x631, 0xaf, 0x2, 0x1b, 0x1, 0x10001, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x5], [0x0, 0x7ff, 0x1f, 0x1, 0x7, 0x2, 0x6, 0xd594, 0x3, 0x2a, 0x1c9b4fd4, 0x0, 0xfff, 0x5, 0xfffff801, 0x9, 0x3f, 0x8, 0x80, 0x6, 0x401, 0x8000, 0x1, 0xcb, 0x1, 0x6, 0x4, 0x92, 0x800000, 0x7, 0x1f, 0x140, 0x7ff, 0xabbc, 0x401, 0x0, 0x3, 0x20, 0x48, 0x12000, 0xfa, 0x1, 0xfffff6fe, 0x0, 0x7, 0x8818, 0x8000, 0x6, 0x1f, 0x8, 0x4, 0xff, 0x101, 0xd7, 0x8, 0x5, 0xffff8001, 0x5, 0xb621, 0x1, 0x9, 0x1395db38, 0x0, 0x3], [0x6, 0x6, 0x401, 0x2d5, 0xc08, 0x3, 0x7f, 0x7, 0x8, 0x4, 0xbe1a, 0x5, 0x3, 0x93c, 0x9, 0x80, 0x800, 0x7fff, 0x6, 0x1, 0x5, 0x2, 0x9, 0x7fff, 0x0, 0x8000, 0x4, 0x6, 0x2, 0x4, 0x6, 0xa2ec, 0x7, 0x100, 0x1, 0x3, 0x1f, 0x81, 0x10000, 0xc5, 0x7ff, 0x2aae236d, 0x4, 0x2000, 0x1c, 0x3, 0x2, 0x735c, 0x7fffffff, 0x6, 0xfffffffd, 0x4, 0x3ff, 0x7fffffff, 0x8, 0x224, 0x261, 0x8b8a, 0x100, 0xffffffff, 0x7fff, 0x41, 0x401, 0x200], [0x7, 0x4, 0x2, 0x5, 0x7, 0x1, 0x8, 0x0, 0x8, 0xffffff7b, 0x0, 0x5, 0x6, 0xcc9, 0x1, 0x5, 0x2, 0xfffffffe, 0xfffffff9, 0x0, 0x5, 0x101, 0x401, 0x2, 0x3, 0x3, 0x7f76, 0x3ff, 0x9, 0xc14, 0x3, 0x7, 0x5, 0x100, 0x6, 0x8, 0x2, 0xe0, 0x3f, 0x200, 0x3, 0x9, 0x3, 0x5, 0x95c6, 0x2, 0x6, 0x20, 0x3, 0x8, 0x9, 0x7, 0x9, 0x0, 0xffffd671, 0x1, 0x0, 0x853d, 0x7, 0x3ff, 0x0, 0xfde7, 0x1, 0x5]}, 0x45c) 18:10:54 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) write$uinput_user_dev(r2, &(0x7f0000000480)={'syz0\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x5], [0x0, 0x7ff, 0x1f, 0x1, 0x7, 0x2, 0x6, 0xd594, 0x3, 0x2a, 0x1c9b4fd4, 0x0, 0xfff, 0x5, 0xfffff801, 0x9, 0x3f, 0x8, 0x80, 0x6, 0x401, 0x8000, 0x1, 0xcb, 0x1, 0x6], [0x6, 0x6, 0x401, 0x2d5, 0xc08, 0x3, 0x7f, 0x7, 0x8, 0x4, 0xbe1a, 0x5, 0x3, 0x93c, 0x9, 0x80, 0x800, 0x7fff, 0x6, 0x1, 0x5, 0x2, 0x9, 0x7fff, 0x0, 0x8000, 0x4, 0x6, 0x2, 0x4, 0x6, 0xa2ec, 0x7, 0x100, 0x1, 0x3, 0x1f, 0x81, 0x10000, 0xc5, 0x7ff, 0x2aae236d, 0x4, 0x2000, 0x1c, 0x3, 0x2, 0x735c, 0x7fffffff, 0x6, 0xfffffffd, 0x4, 0x3ff, 0x7fffffff, 0x8, 0x224, 0x261, 0x8b8a, 0x100, 0xffffffff, 0x7fff, 0x41, 0x401, 0x200], [0x7, 0x4, 0x2, 0x5, 0x7, 0x1, 0x8, 0x0, 0x8, 0xffffff7b, 0x0, 0x5, 0x6, 0xcc9, 0x1, 0x5, 0x2, 0xfffffffe, 0xfffffff9, 0x0, 0x5, 0x101, 0x401, 0x2, 0x3, 0x3, 0x7f76, 0x3ff, 0x9, 0xc14, 0x3, 0x7, 0x5, 0x100, 0x6, 0x8, 0x2, 0xe0, 0x3f, 0x200, 0x3, 0x9, 0x3, 0x5, 0x95c6, 0x2, 0x6, 0x20, 0x3, 0x8, 0x9, 0x7, 0x9, 0x0, 0xffffd671, 0x1, 0x0, 0x853d, 0x7, 0x3ff, 0x0, 0xfde7, 0x1, 0x5]}, 0x45c) 18:10:54 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0xc000000}]}, 0x78) 18:10:54 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x3d}, {0x0, 0x2a}, {0x0}, {&(0x7f0000000100)="6653960d0ec5d684fa9f017ef0d60a3c27bc33760036001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479810be2aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e6517e615607676f8f9fc0ebf8b0b16d6f2c59957ab35d05692e664ebf68734ca53366295f4ad6142134b62f11e92ead037c7fb53455560c8ef0f1c94fafa924edfe92175aaa1c4ecc7aeeb72e0d050feacee907f40888c96a65545e07422bc6ac79f4c2d6ee3dab47d06e764682c72d7f16542fcfd05d2813cc182d1595016c179e1717c160300ab1ab0ac397e91bd193c036feb66a9ad2ec5b7967e7f5ff957f8b085a2437c59a", 0xf8}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x19) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xffffffffffffffff, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 18:10:54 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63}, [{}]}, 0x5d) 18:10:54 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) write$uinput_user_dev(r2, &(0x7f0000000480)={'syz0\x00', {}, 0x0, [0x4, 0x631, 0xaf, 0x2, 0x1b, 0x1, 0x10001, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x5], [0x0, 0x7ff, 0x1f, 0x1, 0x7, 0x2, 0x6, 0xd594, 0x3, 0x2a, 0x1c9b4fd4, 0x0, 0xfff, 0x5, 0xfffff801, 0x9, 0x3f, 0x8, 0x80, 0x6, 0x401, 0x8000, 0x1, 0xcb, 0x1, 0x6, 0x4, 0x92, 0x800000, 0x7, 0x1f, 0x140, 0x7ff, 0xabbc, 0x401, 0x0, 0x3, 0x20, 0x48, 0x12000, 0xfa, 0x1, 0xfffff6fe, 0x0, 0x7, 0x8818, 0x8000, 0x6, 0x1f, 0x8, 0x4, 0xff, 0x101, 0xd7, 0x8, 0x5, 0xffff8001, 0x5, 0xb621, 0x1, 0x9, 0x1395db38, 0x0, 0x3], [0x6, 0x6, 0x401, 0x2d5, 0xc08, 0x3, 0x7f, 0x7, 0x8, 0x4, 0xbe1a, 0x5, 0x3, 0x93c, 0x9, 0x80, 0x800, 0x7fff, 0x6, 0x1, 0x5, 0x2, 0x9, 0x7fff, 0x0, 0x8000, 0x4, 0x6, 0x2, 0x4, 0x6, 0xa2ec, 0x7, 0x100, 0x1, 0x3, 0x1f, 0x81, 0x10000, 0xc5, 0x7ff, 0x2aae236d, 0x4, 0x2000, 0x1c, 0x3, 0x2, 0x735c, 0x7fffffff, 0x6, 0xfffffffd, 0x4, 0x3ff, 0x7fffffff, 0x8, 0x224, 0x261, 0x8b8a, 0x100, 0xffffffff, 0x7fff, 0x41, 0x401, 0x200], [0x7, 0x4, 0x2, 0x5, 0x7, 0x1, 0x8, 0x0, 0x8, 0xffffff7b, 0x0, 0x5, 0x6, 0xcc9, 0x1, 0x5, 0x2, 0xfffffffe, 0xfffffff9, 0x0, 0x5, 0x101, 0x401, 0x2, 0x3, 0x3, 0x7f76, 0x3ff, 0x9, 0xc14, 0x3, 0x7, 0x5, 0x100, 0x6, 0x8, 0x2, 0xe0, 0x3f, 0x200, 0x3, 0x9, 0x3, 0x5, 0x95c6, 0x2, 0x6, 0x20, 0x3, 0x8, 0x9, 0x7, 0x9, 0x0, 0xffffd671, 0x1, 0x0, 0x853d, 0x7, 0x3ff, 0x0, 0xfde7, 0x1, 0x5]}, 0x45c) 18:10:54 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) write$uinput_user_dev(r2, &(0x7f0000000480)={'syz0\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x5], [0x0, 0x7ff, 0x1f, 0x1, 0x7, 0x2, 0x6, 0xd594, 0x3, 0x2a, 0x1c9b4fd4, 0x0, 0xfff, 0x5, 0xfffff801, 0x9, 0x3f, 0x8, 0x80, 0x6, 0x401, 0x8000, 0x1, 0xcb, 0x1, 0x6], [0x6, 0x6, 0x401, 0x2d5, 0xc08, 0x3, 0x7f, 0x7, 0x8, 0x4, 0xbe1a, 0x5, 0x3, 0x93c, 0x9, 0x80, 0x800, 0x7fff, 0x6, 0x1, 0x5, 0x2, 0x9, 0x7fff, 0x0, 0x8000, 0x4, 0x6, 0x2, 0x4, 0x6, 0xa2ec, 0x7, 0x100, 0x1, 0x3, 0x1f, 0x81, 0x10000, 0xc5, 0x7ff, 0x2aae236d, 0x4, 0x2000, 0x1c, 0x3, 0x2, 0x735c, 0x7fffffff, 0x6, 0xfffffffd, 0x4, 0x3ff, 0x7fffffff, 0x8, 0x224, 0x261, 0x8b8a, 0x100, 0xffffffff, 0x7fff, 0x41, 0x401, 0x200], [0x7, 0x4, 0x2, 0x5, 0x7, 0x1, 0x8, 0x0, 0x8, 0xffffff7b, 0x0, 0x5, 0x6, 0xcc9, 0x1, 0x5, 0x2, 0xfffffffe, 0xfffffff9, 0x0, 0x5, 0x101, 0x401, 0x2, 0x3, 0x3, 0x7f76, 0x3ff, 0x9, 0xc14, 0x3, 0x7, 0x5, 0x100, 0x6, 0x8, 0x2, 0xe0, 0x3f, 0x200, 0x3, 0x9, 0x3, 0x5, 0x95c6, 0x2, 0x6, 0x20, 0x3, 0x8, 0x9, 0x7, 0x9, 0x0, 0xffffd671, 0x1, 0x0, 0x853d, 0x7, 0x3ff, 0x0, 0xfde7, 0x1, 0x5]}, 0x45c) 18:10:57 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r0, &(0x7f0000000040)=""/244, 0xf4) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="6653960d0ec5d684fa9f017ef0d60a3c27bc33760036001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479810be2aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e6517e615607676f8f9fc0ebf8b0b16d6f2c59957ab35d05692e664ebf68734ca53366295f4ad6142134b62f11e92ead037c7fb53455560c8ef0f1c94fafa924edfe92175aaa1c4ecc7aeeb72e0d050feacee907f40888c96a65545e07422bc6ac79f4c2d6ee3dab47d06e764682c72d7f16542fcfd05d2813cc182d1595016c179e1717c160300ab1ab0ac397e91bd193c036feb66a9ad2ec5b7967e7f5ff957f8b085a2437c5", 0xf7}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x19) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, 0x0, 0x0, 0x0) 18:10:57 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0xd000000}]}, 0x78) 18:10:57 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63}, [{}]}, 0x5e) 18:10:57 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) write$uinput_user_dev(r2, &(0x7f0000000480)={'syz0\x00', {}, 0x0, [0x4, 0x631, 0xaf, 0x2, 0x1b, 0x1, 0x10001, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x5], [0x0, 0x7ff, 0x1f, 0x1, 0x7, 0x2, 0x6, 0xd594, 0x3, 0x2a, 0x1c9b4fd4, 0x0, 0xfff, 0x5, 0xfffff801, 0x9, 0x3f, 0x8, 0x80, 0x6, 0x401, 0x8000, 0x1, 0xcb, 0x1, 0x6, 0x4, 0x92, 0x800000, 0x7, 0x1f, 0x140, 0x7ff, 0xabbc, 0x401, 0x0, 0x3, 0x20, 0x48, 0x12000, 0xfa, 0x1, 0xfffff6fe, 0x0, 0x7, 0x8818, 0x8000, 0x6, 0x1f, 0x8, 0x4, 0xff, 0x101, 0xd7, 0x8, 0x5, 0xffff8001, 0x5, 0xb621, 0x1, 0x9, 0x1395db38, 0x0, 0x3], [0x6, 0x6, 0x401, 0x2d5, 0xc08, 0x3, 0x7f, 0x7, 0x8, 0x4, 0xbe1a, 0x5, 0x3, 0x93c, 0x9, 0x80, 0x800, 0x7fff, 0x6, 0x1, 0x5, 0x2, 0x9, 0x7fff, 0x0, 0x8000, 0x4, 0x6, 0x2, 0x4, 0x6, 0xa2ec, 0x7, 0x100, 0x1, 0x3, 0x1f, 0x81, 0x10000, 0xc5, 0x7ff, 0x2aae236d, 0x4, 0x2000, 0x1c, 0x3, 0x2, 0x735c, 0x7fffffff, 0x6, 0xfffffffd, 0x4, 0x3ff, 0x7fffffff, 0x8, 0x224, 0x261, 0x8b8a, 0x100, 0xffffffff, 0x7fff, 0x41, 0x401, 0x200], [0x7, 0x4, 0x2, 0x5, 0x7, 0x1, 0x8, 0x0, 0x8, 0xffffff7b, 0x0, 0x5, 0x6, 0xcc9, 0x1, 0x5, 0x2, 0xfffffffe, 0xfffffff9, 0x0, 0x5, 0x101, 0x401, 0x2, 0x3, 0x3, 0x7f76, 0x3ff, 0x9, 0xc14, 0x3, 0x7, 0x5, 0x100, 0x6, 0x8, 0x2, 0xe0, 0x3f, 0x200, 0x3, 0x9, 0x3, 0x5, 0x95c6, 0x2, 0x6, 0x20, 0x3, 0x8, 0x9, 0x7, 0x9, 0x0, 0xffffd671, 0x1, 0x0, 0x853d, 0x7, 0x3ff, 0x0, 0xfde7, 0x1, 0x5]}, 0x45c) 18:10:57 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) write$uinput_user_dev(r2, &(0x7f0000000480)={'syz0\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x5], [0x0, 0x7ff, 0x1f, 0x1, 0x7, 0x2, 0x6, 0xd594, 0x3, 0x2a, 0x1c9b4fd4, 0x0, 0xfff, 0x5, 0xfffff801, 0x9, 0x3f, 0x8, 0x80, 0x6, 0x401, 0x8000, 0x1, 0xcb, 0x1, 0x0, 0x4], [0x6, 0x6, 0x401, 0x2d5, 0xc08, 0x3, 0x7f, 0x7, 0x8, 0x4, 0xbe1a, 0x5, 0x3, 0x93c, 0x9, 0x80, 0x800, 0x7fff, 0x6, 0x1, 0x5, 0x2, 0x9, 0x7fff, 0x0, 0x8000, 0x4, 0x6, 0x2, 0x4, 0x6, 0xa2ec, 0x7, 0x100, 0x1, 0x3, 0x1f, 0x81, 0x10000, 0xc5, 0x7ff, 0x2aae236d, 0x4, 0x2000, 0x1c, 0x3, 0x2, 0x735c, 0x7fffffff, 0x6, 0xfffffffd, 0x4, 0x3ff, 0x7fffffff, 0x8, 0x224, 0x261, 0x8b8a, 0x100, 0xffffffff, 0x7fff, 0x41, 0x401, 0x200], [0x7, 0x4, 0x2, 0x5, 0x7, 0x1, 0x8, 0x0, 0x8, 0xffffff7b, 0x0, 0x5, 0x6, 0xcc9, 0x1, 0x5, 0x2, 0xfffffffe, 0xfffffff9, 0x0, 0x5, 0x101, 0x401, 0x2, 0x3, 0x3, 0x7f76, 0x3ff, 0x9, 0xc14, 0x3, 0x7, 0x5, 0x100, 0x6, 0x8, 0x2, 0xe0, 0x3f, 0x200, 0x3, 0x9, 0x3, 0x5, 0x95c6, 0x2, 0x6, 0x20, 0x3, 0x8, 0x9, 0x7, 0x9, 0x0, 0xffffd671, 0x1, 0x0, 0x853d, 0x7, 0x3ff, 0x0, 0xfde7, 0x1, 0x5]}, 0x45c) 18:10:57 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63}, [{}]}, 0x5f) 18:10:57 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0xe000000}]}, 0x78) 18:10:57 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) write$uinput_user_dev(r2, &(0x7f0000000480)={'syz0\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x5], [0x0, 0x7ff, 0x1f, 0x1, 0x7, 0x2, 0x6, 0xd594, 0x3, 0x2a, 0x1c9b4fd4, 0x0, 0xfff, 0x5, 0xfffff801, 0x9, 0x3f, 0x8, 0x80, 0x6, 0x401, 0x8000, 0x1, 0xcb, 0x0, 0x0, 0x4], [0x6, 0x6, 0x401, 0x2d5, 0xc08, 0x3, 0x7f, 0x7, 0x8, 0x4, 0xbe1a, 0x5, 0x3, 0x93c, 0x9, 0x80, 0x800, 0x7fff, 0x6, 0x1, 0x5, 0x2, 0x9, 0x7fff, 0x0, 0x8000, 0x4, 0x6, 0x2, 0x4, 0x6, 0xa2ec, 0x7, 0x100, 0x1, 0x3, 0x1f, 0x81, 0x10000, 0xc5, 0x7ff, 0x2aae236d, 0x4, 0x2000, 0x1c, 0x3, 0x2, 0x735c, 0x7fffffff, 0x6, 0xfffffffd, 0x4, 0x3ff, 0x7fffffff, 0x8, 0x224, 0x261, 0x8b8a, 0x100, 0xffffffff, 0x7fff, 0x41, 0x401, 0x200], [0x7, 0x4, 0x2, 0x5, 0x7, 0x1, 0x8, 0x0, 0x8, 0xffffff7b, 0x0, 0x5, 0x6, 0xcc9, 0x1, 0x5, 0x2, 0xfffffffe, 0xfffffff9, 0x0, 0x5, 0x101, 0x401, 0x2, 0x3, 0x3, 0x7f76, 0x3ff, 0x9, 0xc14, 0x3, 0x7, 0x5, 0x100, 0x6, 0x8, 0x2, 0xe0, 0x3f, 0x200, 0x3, 0x9, 0x3, 0x5, 0x95c6, 0x2, 0x6, 0x20, 0x3, 0x8, 0x9, 0x7, 0x9, 0x0, 0xffffd671, 0x1, 0x0, 0x853d, 0x7, 0x3ff, 0x0, 0xfde7, 0x1, 0x5]}, 0x45c) 18:10:57 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x3d}, {0x0, 0x2a}, {0x0}, {&(0x7f0000000100)="6653960d0ec5d684fa9f017ef0d60a3c27bc33760036001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479810be2aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e6517e615607676f8f9fc0ebf8b0b16d6f2c59957ab35d05692e664ebf68734ca53366295f4ad6142134b62f11e92ead037c7fb53455560c8ef0f1c94fafa924edfe92175aaa1c4ecc7aeeb72e0d050feacee907f40888c96a65545e07422bc6ac79f4c2d6ee3dab47d06e764682c72d7f16542fcfd05d2813cc182d1595016c179e1717c160300ab1ab0ac397e91bd193c036feb66a9ad2ec5b7967e7f5ff957f8b085a2437c59a", 0xf8}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x19) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xffffffffffffffff, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 18:10:57 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) write$uinput_user_dev(r2, &(0x7f0000000480)={'syz0\x00', {}, 0x0, [0x4, 0x631, 0xaf, 0x2, 0x1b, 0x1, 0x10001, 0x1, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x5], [0x0, 0x7ff, 0x1f, 0x1, 0x7, 0x2, 0x6, 0xd594, 0x3, 0x2a, 0x1c9b4fd4, 0x0, 0xfff, 0x5, 0xfffff801, 0x9, 0x3f, 0x8, 0x80, 0x6, 0x401, 0x8000, 0x1, 0xcb, 0x1, 0x6, 0x4, 0x92, 0x800000, 0x7, 0x1f, 0x140, 0x7ff, 0xabbc, 0x401, 0x0, 0x3, 0x20, 0x48, 0x12000, 0xfa, 0x1, 0xfffff6fe, 0x0, 0x7, 0x8818, 0x8000, 0x6, 0x1f, 0x8, 0x4, 0xff, 0x101, 0xd7, 0x8, 0x5, 0xffff8001, 0x5, 0xb621, 0x1, 0x9, 0x1395db38, 0x0, 0x3], [0x6, 0x6, 0x401, 0x2d5, 0xc08, 0x3, 0x7f, 0x7, 0x8, 0x4, 0xbe1a, 0x5, 0x3, 0x93c, 0x9, 0x80, 0x800, 0x7fff, 0x6, 0x1, 0x5, 0x2, 0x9, 0x7fff, 0x0, 0x8000, 0x4, 0x6, 0x2, 0x4, 0x6, 0xa2ec, 0x7, 0x100, 0x1, 0x3, 0x1f, 0x81, 0x10000, 0xc5, 0x7ff, 0x2aae236d, 0x4, 0x2000, 0x1c, 0x3, 0x2, 0x735c, 0x7fffffff, 0x6, 0xfffffffd, 0x4, 0x3ff, 0x7fffffff, 0x8, 0x224, 0x261, 0x8b8a, 0x100, 0xffffffff, 0x7fff, 0x41, 0x401, 0x200], [0x7, 0x4, 0x2, 0x5, 0x7, 0x1, 0x8, 0x0, 0x8, 0xffffff7b, 0x0, 0x5, 0x6, 0xcc9, 0x1, 0x5, 0x2, 0xfffffffe, 0xfffffff9, 0x0, 0x5, 0x101, 0x401, 0x2, 0x3, 0x3, 0x7f76, 0x3ff, 0x9, 0xc14, 0x3, 0x7, 0x5, 0x100, 0x6, 0x8, 0x2, 0xe0, 0x3f, 0x200, 0x3, 0x9, 0x3, 0x5, 0x95c6, 0x2, 0x6, 0x20, 0x3, 0x8, 0x9, 0x7, 0x9, 0x0, 0xffffd671, 0x1, 0x0, 0x853d, 0x7, 0x3ff, 0x0, 0xfde7, 0x1, 0x5]}, 0x45c) 18:10:57 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63}, [{}]}, 0x60) 18:10:57 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0xf000000}]}, 0x78) 18:11:00 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r0, &(0x7f0000000040)=""/244, 0xf4) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="6653960d0ec5d684fa9f017ef0d60a3c27bc33760036001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479810be2aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e6517e615607676f8f9fc0ebf8b0b16d6f2c59957ab35d05692e664ebf68734ca53366295f4ad6142134b62f11e92ead037c7fb53455560c8ef0f1c94fafa924edfe92175aaa1c4ecc7aeeb72e0d050feacee907f40888c96a65545e07422bc6ac79f4c2d6ee3dab47d06e764682c72d7f16542fcfd05d2813cc182d1595016c179e1717c160300ab1ab0ac397e91bd193c036feb66a9ad2ec5b7967e7f5ff957f8b085a2437c5", 0xf7}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x19) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, 0x0, 0x0, 0x0) 18:11:00 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) write$uinput_user_dev(r2, &(0x7f0000000480)={'syz0\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x5], [0x0, 0x7ff, 0x1f, 0x1, 0x7, 0x2, 0x6, 0xd594, 0x3, 0x2a, 0x1c9b4fd4, 0x0, 0xfff, 0x5, 0xfffff801, 0x9, 0x3f, 0x8, 0x80, 0x6, 0x401, 0x8000, 0x1, 0x0, 0x0, 0x0, 0x4], [0x6, 0x6, 0x401, 0x2d5, 0xc08, 0x3, 0x7f, 0x7, 0x8, 0x4, 0xbe1a, 0x5, 0x3, 0x93c, 0x9, 0x80, 0x800, 0x7fff, 0x6, 0x1, 0x5, 0x2, 0x9, 0x7fff, 0x0, 0x8000, 0x4, 0x6, 0x2, 0x4, 0x6, 0xa2ec, 0x7, 0x100, 0x1, 0x3, 0x1f, 0x81, 0x10000, 0xc5, 0x7ff, 0x2aae236d, 0x4, 0x2000, 0x1c, 0x3, 0x2, 0x735c, 0x7fffffff, 0x6, 0xfffffffd, 0x4, 0x3ff, 0x7fffffff, 0x8, 0x224, 0x261, 0x8b8a, 0x100, 0xffffffff, 0x7fff, 0x41, 0x401, 0x200], [0x7, 0x4, 0x2, 0x5, 0x7, 0x1, 0x8, 0x0, 0x8, 0xffffff7b, 0x0, 0x5, 0x6, 0xcc9, 0x1, 0x5, 0x2, 0xfffffffe, 0xfffffff9, 0x0, 0x5, 0x101, 0x401, 0x2, 0x3, 0x3, 0x7f76, 0x3ff, 0x9, 0xc14, 0x3, 0x7, 0x5, 0x100, 0x6, 0x8, 0x2, 0xe0, 0x3f, 0x200, 0x3, 0x9, 0x3, 0x5, 0x95c6, 0x2, 0x6, 0x20, 0x3, 0x8, 0x9, 0x7, 0x9, 0x0, 0xffffd671, 0x1, 0x0, 0x853d, 0x7, 0x3ff, 0x0, 0xfde7, 0x1, 0x5]}, 0x45c) 18:11:00 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) write$uinput_user_dev(r2, &(0x7f0000000480)={'syz0\x00', {}, 0x0, [0x4, 0x631, 0xaf, 0x2, 0x1b, 0x1, 0x10001, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x5], [0x0, 0x7ff, 0x1f, 0x1, 0x7, 0x2, 0x6, 0xd594, 0x3, 0x2a, 0x1c9b4fd4, 0x0, 0xfff, 0x5, 0xfffff801, 0x9, 0x3f, 0x8, 0x80, 0x6, 0x401, 0x8000, 0x1, 0xcb, 0x1, 0x6, 0x4, 0x92, 0x800000, 0x7, 0x1f, 0x140, 0x7ff, 0xabbc, 0x401, 0x0, 0x3, 0x20, 0x48, 0x12000, 0xfa, 0x1, 0xfffff6fe, 0x0, 0x7, 0x8818, 0x8000, 0x6, 0x1f, 0x8, 0x4, 0xff, 0x101, 0xd7, 0x8, 0x5, 0xffff8001, 0x5, 0xb621, 0x1, 0x9, 0x1395db38, 0x0, 0x3], [0x6, 0x6, 0x401, 0x2d5, 0xc08, 0x3, 0x7f, 0x7, 0x8, 0x4, 0xbe1a, 0x5, 0x3, 0x93c, 0x9, 0x80, 0x800, 0x7fff, 0x6, 0x1, 0x5, 0x2, 0x9, 0x7fff, 0x0, 0x8000, 0x4, 0x6, 0x2, 0x4, 0x6, 0xa2ec, 0x7, 0x100, 0x1, 0x3, 0x1f, 0x81, 0x10000, 0xc5, 0x7ff, 0x2aae236d, 0x4, 0x2000, 0x1c, 0x3, 0x2, 0x735c, 0x7fffffff, 0x6, 0xfffffffd, 0x4, 0x3ff, 0x7fffffff, 0x8, 0x224, 0x261, 0x8b8a, 0x100, 0xffffffff, 0x7fff, 0x41, 0x401, 0x200], [0x7, 0x4, 0x2, 0x5, 0x7, 0x1, 0x8, 0x0, 0x8, 0xffffff7b, 0x0, 0x5, 0x6, 0xcc9, 0x1, 0x5, 0x2, 0xfffffffe, 0xfffffff9, 0x0, 0x5, 0x101, 0x401, 0x2, 0x3, 0x3, 0x7f76, 0x3ff, 0x9, 0xc14, 0x3, 0x7, 0x5, 0x100, 0x6, 0x8, 0x2, 0xe0, 0x3f, 0x200, 0x3, 0x9, 0x3, 0x5, 0x95c6, 0x2, 0x6, 0x20, 0x3, 0x8, 0x9, 0x7, 0x9, 0x0, 0xffffd671, 0x1, 0x0, 0x853d, 0x7, 0x3ff, 0x0, 0xfde7, 0x1, 0x5]}, 0x45c) 18:11:00 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x18000000}]}, 0x78) 18:11:00 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63}, [{}]}, 0x61) 18:11:00 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63}, [{}]}, 0x62) 18:11:00 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x19000000}]}, 0x78) 18:11:00 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) write$uinput_user_dev(r2, &(0x7f0000000480)={'syz0\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x5], [0x0, 0x7ff, 0x1f, 0x1, 0x7, 0x2, 0x6, 0xd594, 0x3, 0x2a, 0x1c9b4fd4, 0x0, 0xfff, 0x5, 0xfffff801, 0x9, 0x3f, 0x8, 0x80, 0x6, 0x401, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x4], [0x6, 0x6, 0x401, 0x2d5, 0xc08, 0x3, 0x7f, 0x7, 0x8, 0x4, 0xbe1a, 0x5, 0x3, 0x93c, 0x9, 0x80, 0x800, 0x7fff, 0x6, 0x1, 0x5, 0x2, 0x9, 0x7fff, 0x0, 0x8000, 0x4, 0x6, 0x2, 0x4, 0x6, 0xa2ec, 0x7, 0x100, 0x1, 0x3, 0x1f, 0x81, 0x10000, 0xc5, 0x7ff, 0x2aae236d, 0x4, 0x2000, 0x1c, 0x3, 0x2, 0x735c, 0x7fffffff, 0x6, 0xfffffffd, 0x4, 0x3ff, 0x7fffffff, 0x8, 0x224, 0x261, 0x8b8a, 0x100, 0xffffffff, 0x7fff, 0x41, 0x401, 0x200], [0x7, 0x4, 0x2, 0x5, 0x7, 0x1, 0x8, 0x0, 0x8, 0xffffff7b, 0x0, 0x5, 0x6, 0xcc9, 0x1, 0x5, 0x2, 0xfffffffe, 0xfffffff9, 0x0, 0x5, 0x101, 0x401, 0x2, 0x3, 0x3, 0x7f76, 0x3ff, 0x9, 0xc14, 0x3, 0x7, 0x5, 0x100, 0x6, 0x8, 0x2, 0xe0, 0x3f, 0x200, 0x3, 0x9, 0x3, 0x5, 0x95c6, 0x2, 0x6, 0x20, 0x3, 0x8, 0x9, 0x7, 0x9, 0x0, 0xffffd671, 0x1, 0x0, 0x853d, 0x7, 0x3ff, 0x0, 0xfde7, 0x1, 0x5]}, 0x45c) 18:11:00 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x3d}, {0x0, 0x2a}, {0x0}, {&(0x7f0000000100)="6653960d0ec5d684fa9f017ef0d60a3c27bc33760036001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479810be2aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e6517e615607676f8f9fc0ebf8b0b16d6f2c59957ab35d05692e664ebf68734ca53366295f4ad6142134b62f11e92ead037c7fb53455560c8ef0f1c94fafa924edfe92175aaa1c4ecc7aeeb72e0d050feacee907f40888c96a65545e07422bc6ac79f4c2d6ee3dab47d06e764682c72d7f16542fcfd05d2813cc182d1595016c179e1717c160300ab1ab0ac397e91bd193c036feb66a9ad2ec5b7967e7f5ff957f8b085a2437c59a", 0xf8}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x19) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xffffffffffffffff, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 18:11:00 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) write$uinput_user_dev(r2, &(0x7f0000000480)={'syz0\x00', {}, 0x0, [0x4, 0x631, 0xaf, 0x2, 0x1b, 0x1, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x5], [0x0, 0x7ff, 0x1f, 0x1, 0x7, 0x2, 0x6, 0xd594, 0x3, 0x2a, 0x1c9b4fd4, 0x0, 0xfff, 0x5, 0xfffff801, 0x9, 0x3f, 0x8, 0x80, 0x6, 0x401, 0x8000, 0x1, 0xcb, 0x1, 0x6, 0x4, 0x92, 0x800000, 0x7, 0x1f, 0x140, 0x7ff, 0xabbc, 0x401, 0x0, 0x3, 0x20, 0x48, 0x12000, 0xfa, 0x1, 0xfffff6fe, 0x0, 0x7, 0x8818, 0x8000, 0x6, 0x1f, 0x8, 0x4, 0xff, 0x101, 0xd7, 0x8, 0x5, 0xffff8001, 0x5, 0xb621, 0x1, 0x9, 0x1395db38, 0x0, 0x3], [0x6, 0x6, 0x401, 0x2d5, 0xc08, 0x3, 0x7f, 0x7, 0x8, 0x4, 0xbe1a, 0x5, 0x3, 0x93c, 0x9, 0x80, 0x800, 0x7fff, 0x6, 0x1, 0x5, 0x2, 0x9, 0x7fff, 0x0, 0x8000, 0x4, 0x6, 0x2, 0x4, 0x6, 0xa2ec, 0x7, 0x100, 0x1, 0x3, 0x1f, 0x81, 0x10000, 0xc5, 0x7ff, 0x2aae236d, 0x4, 0x2000, 0x1c, 0x3, 0x2, 0x735c, 0x7fffffff, 0x6, 0xfffffffd, 0x4, 0x3ff, 0x7fffffff, 0x8, 0x224, 0x261, 0x8b8a, 0x100, 0xffffffff, 0x7fff, 0x41, 0x401, 0x200], [0x7, 0x4, 0x2, 0x5, 0x7, 0x1, 0x8, 0x0, 0x8, 0xffffff7b, 0x0, 0x5, 0x6, 0xcc9, 0x1, 0x5, 0x2, 0xfffffffe, 0xfffffff9, 0x0, 0x5, 0x101, 0x401, 0x2, 0x3, 0x3, 0x7f76, 0x3ff, 0x9, 0xc14, 0x3, 0x7, 0x5, 0x100, 0x6, 0x8, 0x2, 0xe0, 0x3f, 0x200, 0x3, 0x9, 0x3, 0x5, 0x95c6, 0x2, 0x6, 0x20, 0x3, 0x8, 0x9, 0x7, 0x9, 0x0, 0xffffd671, 0x1, 0x0, 0x853d, 0x7, 0x3ff, 0x0, 0xfde7, 0x1, 0x5]}, 0x45c) 18:11:00 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) write$uinput_user_dev(r2, &(0x7f0000000480)={'syz0\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x5], [0x0, 0x7ff, 0x1f, 0x1, 0x7, 0x2, 0x6, 0xd594, 0x3, 0x2a, 0x1c9b4fd4, 0x0, 0xfff, 0x5, 0xfffff801, 0x9, 0x3f, 0x8, 0x80, 0x6, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4], [0x6, 0x6, 0x401, 0x2d5, 0xc08, 0x3, 0x7f, 0x7, 0x8, 0x4, 0xbe1a, 0x5, 0x3, 0x93c, 0x9, 0x80, 0x800, 0x7fff, 0x6, 0x1, 0x5, 0x2, 0x9, 0x7fff, 0x0, 0x8000, 0x4, 0x6, 0x2, 0x4, 0x6, 0xa2ec, 0x7, 0x100, 0x1, 0x3, 0x1f, 0x81, 0x10000, 0xc5, 0x7ff, 0x2aae236d, 0x4, 0x2000, 0x1c, 0x3, 0x2, 0x735c, 0x7fffffff, 0x6, 0xfffffffd, 0x4, 0x3ff, 0x7fffffff, 0x8, 0x224, 0x261, 0x8b8a, 0x100, 0xffffffff, 0x7fff, 0x41, 0x401, 0x200], [0x7, 0x4, 0x2, 0x5, 0x7, 0x1, 0x8, 0x0, 0x8, 0xffffff7b, 0x0, 0x5, 0x6, 0xcc9, 0x1, 0x5, 0x2, 0xfffffffe, 0xfffffff9, 0x0, 0x5, 0x101, 0x401, 0x2, 0x3, 0x3, 0x7f76, 0x3ff, 0x9, 0xc14, 0x3, 0x7, 0x5, 0x100, 0x6, 0x8, 0x2, 0xe0, 0x3f, 0x200, 0x3, 0x9, 0x3, 0x5, 0x95c6, 0x2, 0x6, 0x20, 0x3, 0x8, 0x9, 0x7, 0x9, 0x0, 0xffffd671, 0x1, 0x0, 0x853d, 0x7, 0x3ff, 0x0, 0xfde7, 0x1, 0x5]}, 0x45c) 18:11:00 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63}, [{}]}, 0x63) 18:11:03 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='ns\x00') getdents(r0, &(0x7f0000000040)=""/244, 0xf4) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="6653960d0ec5d684fa9f017ef0d60a3c27bc33760036001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479810be2aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e6517e615607676f8f9fc0ebf8b0b16d6f2c59957ab35d05692e664ebf68734ca53366295f4ad6142134b62f11e92ead037c7fb53455560c8ef0f1c94fafa924edfe92175aaa1c4ecc7aeeb72e0d050feacee907f40888c96a65545e07422bc6ac79f4c2d6ee3dab47d06e764682c72d7f16542fcfd05d2813cc182d1595016c179e1717c160300ab1ab0ac397e91bd193c036feb66a9ad2ec5b7967e7f5ff957f8b085a2437c5", 0xf7}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x19) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, 0x0, 0x0, 0x0) 18:11:03 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x1a000000}]}, 0x78) 18:11:03 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63}, [{}]}, 0x64) 18:11:03 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) write$uinput_user_dev(r2, &(0x7f0000000480)={'syz0\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x5], [0x0, 0x7ff, 0x1f, 0x1, 0x7, 0x2, 0x6, 0xd594, 0x3, 0x2a, 0x1c9b4fd4, 0x0, 0xfff, 0x5, 0xfffff801, 0x9, 0x3f, 0x8, 0x80, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4], [0x6, 0x6, 0x401, 0x2d5, 0xc08, 0x3, 0x7f, 0x7, 0x8, 0x4, 0xbe1a, 0x5, 0x3, 0x93c, 0x9, 0x80, 0x800, 0x7fff, 0x6, 0x1, 0x5, 0x2, 0x9, 0x7fff, 0x0, 0x8000, 0x4, 0x6, 0x2, 0x4, 0x6, 0xa2ec, 0x7, 0x100, 0x1, 0x3, 0x1f, 0x81, 0x10000, 0xc5, 0x7ff, 0x2aae236d, 0x4, 0x2000, 0x1c, 0x3, 0x2, 0x735c, 0x7fffffff, 0x6, 0xfffffffd, 0x4, 0x3ff, 0x7fffffff, 0x8, 0x224, 0x261, 0x8b8a, 0x100, 0xffffffff, 0x7fff, 0x41, 0x401, 0x200], [0x7, 0x4, 0x2, 0x5, 0x7, 0x1, 0x8, 0x0, 0x8, 0xffffff7b, 0x0, 0x5, 0x6, 0xcc9, 0x1, 0x5, 0x2, 0xfffffffe, 0xfffffff9, 0x0, 0x5, 0x101, 0x401, 0x2, 0x3, 0x3, 0x7f76, 0x3ff, 0x9, 0xc14, 0x3, 0x7, 0x5, 0x100, 0x6, 0x8, 0x2, 0xe0, 0x3f, 0x200, 0x3, 0x9, 0x3, 0x5, 0x95c6, 0x2, 0x6, 0x20, 0x3, 0x8, 0x9, 0x7, 0x9, 0x0, 0xffffd671, 0x1, 0x0, 0x853d, 0x7, 0x3ff, 0x0, 0xfde7, 0x1, 0x5]}, 0x45c) 18:11:03 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) write$uinput_user_dev(r2, &(0x7f0000000480)={'syz0\x00', {}, 0x0, [0x4, 0x631, 0xaf, 0x2, 0x1b, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x5], [0x0, 0x7ff, 0x1f, 0x1, 0x7, 0x2, 0x6, 0xd594, 0x3, 0x2a, 0x1c9b4fd4, 0x0, 0xfff, 0x5, 0xfffff801, 0x9, 0x3f, 0x8, 0x80, 0x6, 0x401, 0x8000, 0x1, 0xcb, 0x1, 0x6, 0x4, 0x92, 0x800000, 0x7, 0x1f, 0x140, 0x7ff, 0xabbc, 0x401, 0x0, 0x3, 0x20, 0x48, 0x12000, 0xfa, 0x1, 0xfffff6fe, 0x0, 0x7, 0x8818, 0x8000, 0x6, 0x1f, 0x8, 0x4, 0xff, 0x101, 0xd7, 0x8, 0x5, 0xffff8001, 0x5, 0xb621, 0x1, 0x9, 0x1395db38, 0x0, 0x3], [0x6, 0x6, 0x401, 0x2d5, 0xc08, 0x3, 0x7f, 0x7, 0x8, 0x4, 0xbe1a, 0x5, 0x3, 0x93c, 0x9, 0x80, 0x800, 0x7fff, 0x6, 0x1, 0x5, 0x2, 0x9, 0x7fff, 0x0, 0x8000, 0x4, 0x6, 0x2, 0x4, 0x6, 0xa2ec, 0x7, 0x100, 0x1, 0x3, 0x1f, 0x81, 0x10000, 0xc5, 0x7ff, 0x2aae236d, 0x4, 0x2000, 0x1c, 0x3, 0x2, 0x735c, 0x7fffffff, 0x6, 0xfffffffd, 0x4, 0x3ff, 0x7fffffff, 0x8, 0x224, 0x261, 0x8b8a, 0x100, 0xffffffff, 0x7fff, 0x41, 0x401, 0x200], [0x7, 0x4, 0x2, 0x5, 0x7, 0x1, 0x8, 0x0, 0x8, 0xffffff7b, 0x0, 0x5, 0x6, 0xcc9, 0x1, 0x5, 0x2, 0xfffffffe, 0xfffffff9, 0x0, 0x5, 0x101, 0x401, 0x2, 0x3, 0x3, 0x7f76, 0x3ff, 0x9, 0xc14, 0x3, 0x7, 0x5, 0x100, 0x6, 0x8, 0x2, 0xe0, 0x3f, 0x200, 0x3, 0x9, 0x3, 0x5, 0x95c6, 0x2, 0x6, 0x20, 0x3, 0x8, 0x9, 0x7, 0x9, 0x0, 0xffffd671, 0x1, 0x0, 0x853d, 0x7, 0x3ff, 0x0, 0xfde7, 0x1, 0x5]}, 0x45c) 18:11:03 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x3d}, {0x0, 0x2a}, {0x0}, {&(0x7f0000000100)="6653960d0ec5d684fa9f017ef0d60a3c27bc33760036001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479810be2aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e6517e615607676f8f9fc0ebf8b0b16d6f2c59957ab35d05692e664ebf68734ca53366295f4ad6142134b62f11e92ead037c7fb53455560c8ef0f1c94fafa924edfe92175aaa1c4ecc7aeeb72e0d050feacee907f40888c96a65545e07422bc6ac79f4c2d6ee3dab47d06e764682c72d7f16542fcfd05d2813cc182d1595016c179e1717c160300ab1ab0ac397e91bd193c036feb66a9ad2ec5b7967e7f5ff957f8b085a2437c59a", 0xf8}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x19) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 18:11:03 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) write$uinput_user_dev(r2, &(0x7f0000000480)={'syz0\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x5], [0x0, 0x7ff, 0x1f, 0x1, 0x7, 0x2, 0x6, 0xd594, 0x3, 0x2a, 0x1c9b4fd4, 0x0, 0xfff, 0x5, 0xfffff801, 0x9, 0x3f, 0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4], [0x6, 0x6, 0x401, 0x2d5, 0xc08, 0x3, 0x7f, 0x7, 0x8, 0x4, 0xbe1a, 0x5, 0x3, 0x93c, 0x9, 0x80, 0x800, 0x7fff, 0x6, 0x1, 0x5, 0x2, 0x9, 0x7fff, 0x0, 0x8000, 0x4, 0x6, 0x2, 0x4, 0x6, 0xa2ec, 0x7, 0x100, 0x1, 0x3, 0x1f, 0x81, 0x10000, 0xc5, 0x7ff, 0x2aae236d, 0x4, 0x2000, 0x1c, 0x3, 0x2, 0x735c, 0x7fffffff, 0x6, 0xfffffffd, 0x4, 0x3ff, 0x7fffffff, 0x8, 0x224, 0x261, 0x8b8a, 0x100, 0xffffffff, 0x7fff, 0x41, 0x401, 0x200], [0x7, 0x4, 0x2, 0x5, 0x7, 0x1, 0x8, 0x0, 0x8, 0xffffff7b, 0x0, 0x5, 0x6, 0xcc9, 0x1, 0x5, 0x2, 0xfffffffe, 0xfffffff9, 0x0, 0x5, 0x101, 0x401, 0x2, 0x3, 0x3, 0x7f76, 0x3ff, 0x9, 0xc14, 0x3, 0x7, 0x5, 0x100, 0x6, 0x8, 0x2, 0xe0, 0x3f, 0x200, 0x3, 0x9, 0x3, 0x5, 0x95c6, 0x2, 0x6, 0x20, 0x3, 0x8, 0x9, 0x7, 0x9, 0x0, 0xffffd671, 0x1, 0x0, 0x853d, 0x7, 0x3ff, 0x0, 0xfde7, 0x1, 0x5]}, 0x45c) 18:11:03 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) write$uinput_user_dev(r2, &(0x7f0000000480)={'syz0\x00', {}, 0x0, [0x4, 0x631, 0xaf, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x5], [0x0, 0x7ff, 0x1f, 0x1, 0x7, 0x2, 0x6, 0xd594, 0x3, 0x2a, 0x1c9b4fd4, 0x0, 0xfff, 0x5, 0xfffff801, 0x9, 0x3f, 0x8, 0x80, 0x6, 0x401, 0x8000, 0x1, 0xcb, 0x1, 0x6, 0x4, 0x92, 0x800000, 0x7, 0x1f, 0x140, 0x7ff, 0xabbc, 0x401, 0x0, 0x3, 0x20, 0x48, 0x12000, 0xfa, 0x1, 0xfffff6fe, 0x0, 0x7, 0x8818, 0x8000, 0x6, 0x1f, 0x8, 0x4, 0xff, 0x101, 0xd7, 0x8, 0x5, 0xffff8001, 0x5, 0xb621, 0x1, 0x9, 0x1395db38, 0x0, 0x3], [0x6, 0x6, 0x401, 0x2d5, 0xc08, 0x3, 0x7f, 0x7, 0x8, 0x4, 0xbe1a, 0x5, 0x3, 0x93c, 0x9, 0x80, 0x800, 0x7fff, 0x6, 0x1, 0x5, 0x2, 0x9, 0x7fff, 0x0, 0x8000, 0x4, 0x6, 0x2, 0x4, 0x6, 0xa2ec, 0x7, 0x100, 0x1, 0x3, 0x1f, 0x81, 0x10000, 0xc5, 0x7ff, 0x2aae236d, 0x4, 0x2000, 0x1c, 0x3, 0x2, 0x735c, 0x7fffffff, 0x6, 0xfffffffd, 0x4, 0x3ff, 0x7fffffff, 0x8, 0x224, 0x261, 0x8b8a, 0x100, 0xffffffff, 0x7fff, 0x41, 0x401, 0x200], [0x7, 0x4, 0x2, 0x5, 0x7, 0x1, 0x8, 0x0, 0x8, 0xffffff7b, 0x0, 0x5, 0x6, 0xcc9, 0x1, 0x5, 0x2, 0xfffffffe, 0xfffffff9, 0x0, 0x5, 0x101, 0x401, 0x2, 0x3, 0x3, 0x7f76, 0x3ff, 0x9, 0xc14, 0x3, 0x7, 0x5, 0x100, 0x6, 0x8, 0x2, 0xe0, 0x3f, 0x200, 0x3, 0x9, 0x3, 0x5, 0x95c6, 0x2, 0x6, 0x20, 0x3, 0x8, 0x9, 0x7, 0x9, 0x0, 0xffffd671, 0x1, 0x0, 0x853d, 0x7, 0x3ff, 0x0, 0xfde7, 0x1, 0x5]}, 0x45c) 18:11:03 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x1b000000}]}, 0x78) 18:11:03 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63}, [{}]}, 0x65) 18:11:03 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) write$uinput_user_dev(r2, &(0x7f0000000480)={'syz0\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x5], [0x0, 0x7ff, 0x1f, 0x1, 0x7, 0x2, 0x6, 0xd594, 0x3, 0x2a, 0x1c9b4fd4, 0x0, 0xfff, 0x5, 0xfffff801, 0x9, 0x3f, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4], [0x6, 0x6, 0x401, 0x2d5, 0xc08, 0x3, 0x7f, 0x7, 0x8, 0x4, 0xbe1a, 0x5, 0x3, 0x93c, 0x9, 0x80, 0x800, 0x7fff, 0x6, 0x1, 0x5, 0x2, 0x9, 0x7fff, 0x0, 0x8000, 0x4, 0x6, 0x2, 0x4, 0x6, 0xa2ec, 0x7, 0x100, 0x1, 0x3, 0x1f, 0x81, 0x10000, 0xc5, 0x7ff, 0x2aae236d, 0x4, 0x2000, 0x1c, 0x3, 0x2, 0x735c, 0x7fffffff, 0x6, 0xfffffffd, 0x4, 0x3ff, 0x7fffffff, 0x8, 0x224, 0x261, 0x8b8a, 0x100, 0xffffffff, 0x7fff, 0x41, 0x401, 0x200], [0x7, 0x4, 0x2, 0x5, 0x7, 0x1, 0x8, 0x0, 0x8, 0xffffff7b, 0x0, 0x5, 0x6, 0xcc9, 0x1, 0x5, 0x2, 0xfffffffe, 0xfffffff9, 0x0, 0x5, 0x101, 0x401, 0x2, 0x3, 0x3, 0x7f76, 0x3ff, 0x9, 0xc14, 0x3, 0x7, 0x5, 0x100, 0x6, 0x8, 0x2, 0xe0, 0x3f, 0x200, 0x3, 0x9, 0x3, 0x5, 0x95c6, 0x2, 0x6, 0x20, 0x3, 0x8, 0x9, 0x7, 0x9, 0x0, 0xffffd671, 0x1, 0x0, 0x853d, 0x7, 0x3ff, 0x0, 0xfde7, 0x1, 0x5]}, 0x45c) 18:11:03 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) write$uinput_user_dev(r2, &(0x7f0000000480)={'syz0\x00', {}, 0x0, [0x4, 0x631, 0xaf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x5], [0x0, 0x7ff, 0x1f, 0x1, 0x7, 0x2, 0x6, 0xd594, 0x3, 0x2a, 0x1c9b4fd4, 0x0, 0xfff, 0x5, 0xfffff801, 0x9, 0x3f, 0x8, 0x80, 0x6, 0x401, 0x8000, 0x1, 0xcb, 0x1, 0x6, 0x4, 0x92, 0x800000, 0x7, 0x1f, 0x140, 0x7ff, 0xabbc, 0x401, 0x0, 0x3, 0x20, 0x48, 0x12000, 0xfa, 0x1, 0xfffff6fe, 0x0, 0x7, 0x8818, 0x8000, 0x6, 0x1f, 0x8, 0x4, 0xff, 0x101, 0xd7, 0x8, 0x5, 0xffff8001, 0x5, 0xb621, 0x1, 0x9, 0x1395db38, 0x0, 0x3], [0x6, 0x6, 0x401, 0x2d5, 0xc08, 0x3, 0x7f, 0x7, 0x8, 0x4, 0xbe1a, 0x5, 0x3, 0x93c, 0x9, 0x80, 0x800, 0x7fff, 0x6, 0x1, 0x5, 0x2, 0x9, 0x7fff, 0x0, 0x8000, 0x4, 0x6, 0x2, 0x4, 0x6, 0xa2ec, 0x7, 0x100, 0x1, 0x3, 0x1f, 0x81, 0x10000, 0xc5, 0x7ff, 0x2aae236d, 0x4, 0x2000, 0x1c, 0x3, 0x2, 0x735c, 0x7fffffff, 0x6, 0xfffffffd, 0x4, 0x3ff, 0x7fffffff, 0x8, 0x224, 0x261, 0x8b8a, 0x100, 0xffffffff, 0x7fff, 0x41, 0x401, 0x200], [0x7, 0x4, 0x2, 0x5, 0x7, 0x1, 0x8, 0x0, 0x8, 0xffffff7b, 0x0, 0x5, 0x6, 0xcc9, 0x1, 0x5, 0x2, 0xfffffffe, 0xfffffff9, 0x0, 0x5, 0x101, 0x401, 0x2, 0x3, 0x3, 0x7f76, 0x3ff, 0x9, 0xc14, 0x3, 0x7, 0x5, 0x100, 0x6, 0x8, 0x2, 0xe0, 0x3f, 0x200, 0x3, 0x9, 0x3, 0x5, 0x95c6, 0x2, 0x6, 0x20, 0x3, 0x8, 0x9, 0x7, 0x9, 0x0, 0xffffd671, 0x1, 0x0, 0x853d, 0x7, 0x3ff, 0x0, 0xfde7, 0x1, 0x5]}, 0x45c) 18:11:06 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x3d}, {0x0, 0x2a}, {0x0}, {&(0x7f0000000100)="6653960d0ec5d684fa9f017ef0d60a3c27bc33760036001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479810be2aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e6517e615607676f8f9fc0ebf8b0b16d6f2c59957ab35d05692e664ebf68734ca53366295f4ad6142134b62f11e92ead037c7fb53455560c8ef0f1c94fafa924edfe92175aaa1c4ecc7aeeb72e0d050feacee907f40888c96a65545e07422bc6ac79f4c2d6ee3dab47d06e764682c72d7f16542fcfd05d2813cc182d1595016c179e1717c160300ab1ab0ac397e91bd193c036feb66a9ad2ec5b7967e7f5ff957f8b085a2437c59a", 0xf8}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x19) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 18:11:06 executing program 0: openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) socket$inet6(0xa, 0x2, 0x0) pipe(&(0x7f0000000140)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) pselect6(0xa, &(0x7f00000002c0), 0x0, &(0x7f0000000300)={0x3ff}, 0x0, 0x0) 18:11:06 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x1e000000}]}, 0x78) 18:11:06 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63}, [{}]}, 0x66) 18:11:06 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) write$uinput_user_dev(r2, &(0x7f0000000480)={'syz0\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x5], [0x0, 0x7ff, 0x1f, 0x1, 0x7, 0x2, 0x6, 0xd594, 0x3, 0x2a, 0x1c9b4fd4, 0x0, 0xfff, 0x5, 0xfffff801, 0x9, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4], [0x6, 0x6, 0x401, 0x2d5, 0xc08, 0x3, 0x7f, 0x7, 0x8, 0x4, 0xbe1a, 0x5, 0x3, 0x93c, 0x9, 0x80, 0x800, 0x7fff, 0x6, 0x1, 0x5, 0x2, 0x9, 0x7fff, 0x0, 0x8000, 0x4, 0x6, 0x2, 0x4, 0x6, 0xa2ec, 0x7, 0x100, 0x1, 0x3, 0x1f, 0x81, 0x10000, 0xc5, 0x7ff, 0x2aae236d, 0x4, 0x2000, 0x1c, 0x3, 0x2, 0x735c, 0x7fffffff, 0x6, 0xfffffffd, 0x4, 0x3ff, 0x7fffffff, 0x8, 0x224, 0x261, 0x8b8a, 0x100, 0xffffffff, 0x7fff, 0x41, 0x401, 0x200], [0x7, 0x4, 0x2, 0x5, 0x7, 0x1, 0x8, 0x0, 0x8, 0xffffff7b, 0x0, 0x5, 0x6, 0xcc9, 0x1, 0x5, 0x2, 0xfffffffe, 0xfffffff9, 0x0, 0x5, 0x101, 0x401, 0x2, 0x3, 0x3, 0x7f76, 0x3ff, 0x9, 0xc14, 0x3, 0x7, 0x5, 0x100, 0x6, 0x8, 0x2, 0xe0, 0x3f, 0x200, 0x3, 0x9, 0x3, 0x5, 0x95c6, 0x2, 0x6, 0x20, 0x3, 0x8, 0x9, 0x7, 0x9, 0x0, 0xffffd671, 0x1, 0x0, 0x853d, 0x7, 0x3ff, 0x0, 0xfde7, 0x1, 0x5]}, 0x45c) 18:11:06 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) write$uinput_user_dev(r2, &(0x7f0000000480)={'syz0\x00', {}, 0x0, [0x4, 0x631, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x5], [0x0, 0x7ff, 0x1f, 0x1, 0x7, 0x2, 0x6, 0xd594, 0x3, 0x2a, 0x1c9b4fd4, 0x0, 0xfff, 0x5, 0xfffff801, 0x9, 0x3f, 0x8, 0x80, 0x6, 0x401, 0x8000, 0x1, 0xcb, 0x1, 0x6, 0x4, 0x92, 0x800000, 0x7, 0x1f, 0x140, 0x7ff, 0xabbc, 0x401, 0x0, 0x3, 0x20, 0x48, 0x12000, 0xfa, 0x1, 0xfffff6fe, 0x0, 0x7, 0x8818, 0x8000, 0x6, 0x1f, 0x8, 0x4, 0xff, 0x101, 0xd7, 0x8, 0x5, 0xffff8001, 0x5, 0xb621, 0x1, 0x9, 0x1395db38, 0x0, 0x3], [0x6, 0x6, 0x401, 0x2d5, 0xc08, 0x3, 0x7f, 0x7, 0x8, 0x4, 0xbe1a, 0x5, 0x3, 0x93c, 0x9, 0x80, 0x800, 0x7fff, 0x6, 0x1, 0x5, 0x2, 0x9, 0x7fff, 0x0, 0x8000, 0x4, 0x6, 0x2, 0x4, 0x6, 0xa2ec, 0x7, 0x100, 0x1, 0x3, 0x1f, 0x81, 0x10000, 0xc5, 0x7ff, 0x2aae236d, 0x4, 0x2000, 0x1c, 0x3, 0x2, 0x735c, 0x7fffffff, 0x6, 0xfffffffd, 0x4, 0x3ff, 0x7fffffff, 0x8, 0x224, 0x261, 0x8b8a, 0x100, 0xffffffff, 0x7fff, 0x41, 0x401, 0x200], [0x7, 0x4, 0x2, 0x5, 0x7, 0x1, 0x8, 0x0, 0x8, 0xffffff7b, 0x0, 0x5, 0x6, 0xcc9, 0x1, 0x5, 0x2, 0xfffffffe, 0xfffffff9, 0x0, 0x5, 0x101, 0x401, 0x2, 0x3, 0x3, 0x7f76, 0x3ff, 0x9, 0xc14, 0x3, 0x7, 0x5, 0x100, 0x6, 0x8, 0x2, 0xe0, 0x3f, 0x200, 0x3, 0x9, 0x3, 0x5, 0x95c6, 0x2, 0x6, 0x20, 0x3, 0x8, 0x9, 0x7, 0x9, 0x0, 0xffffd671, 0x1, 0x0, 0x853d, 0x7, 0x3ff, 0x0, 0xfde7, 0x1, 0x5]}, 0x45c) 18:11:06 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63}, [{}]}, 0x67) 18:11:06 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) write$uinput_user_dev(r2, &(0x7f0000000480)={'syz0\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x5], [0x0, 0x7ff, 0x1f, 0x1, 0x7, 0x2, 0x6, 0xd594, 0x3, 0x2a, 0x1c9b4fd4, 0x0, 0xfff, 0x5, 0xfffff801, 0x9, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4], [0x6, 0x6, 0x401, 0x2d5, 0xc08, 0x3, 0x7f, 0x7, 0x8, 0x4, 0xbe1a, 0x5, 0x3, 0x93c, 0x9, 0x80, 0x800, 0x7fff, 0x6, 0x1, 0x5, 0x2, 0x9, 0x7fff, 0x0, 0x8000, 0x4, 0x6, 0x2, 0x4, 0x6, 0xa2ec, 0x7, 0x100, 0x1, 0x3, 0x1f, 0x81, 0x10000, 0xc5, 0x7ff, 0x2aae236d, 0x4, 0x2000, 0x1c, 0x3, 0x2, 0x735c, 0x7fffffff, 0x6, 0xfffffffd, 0x4, 0x3ff, 0x7fffffff, 0x8, 0x224, 0x261, 0x8b8a, 0x100, 0xffffffff, 0x7fff, 0x41, 0x401, 0x200], [0x7, 0x4, 0x2, 0x5, 0x7, 0x1, 0x8, 0x0, 0x8, 0xffffff7b, 0x0, 0x5, 0x6, 0xcc9, 0x1, 0x5, 0x2, 0xfffffffe, 0xfffffff9, 0x0, 0x5, 0x101, 0x401, 0x2, 0x3, 0x3, 0x7f76, 0x3ff, 0x9, 0xc14, 0x3, 0x7, 0x5, 0x100, 0x6, 0x8, 0x2, 0xe0, 0x3f, 0x200, 0x3, 0x9, 0x3, 0x5, 0x95c6, 0x2, 0x6, 0x20, 0x3, 0x8, 0x9, 0x7, 0x9, 0x0, 0xffffd671, 0x1, 0x0, 0x853d, 0x7, 0x3ff, 0x0, 0xfde7, 0x1, 0x5]}, 0x45c) 18:11:06 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x3e000000}]}, 0x78) 18:11:06 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) write$uinput_user_dev(r2, &(0x7f0000000480)={'syz0\x00', {}, 0x0, [0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x5], [0x0, 0x7ff, 0x1f, 0x1, 0x7, 0x2, 0x6, 0xd594, 0x3, 0x2a, 0x1c9b4fd4, 0x0, 0xfff, 0x5, 0xfffff801, 0x9, 0x3f, 0x8, 0x80, 0x6, 0x401, 0x8000, 0x1, 0xcb, 0x1, 0x6, 0x4, 0x92, 0x800000, 0x7, 0x1f, 0x140, 0x7ff, 0xabbc, 0x401, 0x0, 0x3, 0x20, 0x48, 0x12000, 0xfa, 0x1, 0xfffff6fe, 0x0, 0x7, 0x8818, 0x8000, 0x6, 0x1f, 0x8, 0x4, 0xff, 0x101, 0xd7, 0x8, 0x5, 0xffff8001, 0x5, 0xb621, 0x1, 0x9, 0x1395db38, 0x0, 0x3], [0x6, 0x6, 0x401, 0x2d5, 0xc08, 0x3, 0x7f, 0x7, 0x8, 0x4, 0xbe1a, 0x5, 0x3, 0x93c, 0x9, 0x80, 0x800, 0x7fff, 0x6, 0x1, 0x5, 0x2, 0x9, 0x7fff, 0x0, 0x8000, 0x4, 0x6, 0x2, 0x4, 0x6, 0xa2ec, 0x7, 0x100, 0x1, 0x3, 0x1f, 0x81, 0x10000, 0xc5, 0x7ff, 0x2aae236d, 0x4, 0x2000, 0x1c, 0x3, 0x2, 0x735c, 0x7fffffff, 0x6, 0xfffffffd, 0x4, 0x3ff, 0x7fffffff, 0x8, 0x224, 0x261, 0x8b8a, 0x100, 0xffffffff, 0x7fff, 0x41, 0x401, 0x200], [0x7, 0x4, 0x2, 0x5, 0x7, 0x1, 0x8, 0x0, 0x8, 0xffffff7b, 0x0, 0x5, 0x6, 0xcc9, 0x1, 0x5, 0x2, 0xfffffffe, 0xfffffff9, 0x0, 0x5, 0x101, 0x401, 0x2, 0x3, 0x3, 0x7f76, 0x3ff, 0x9, 0xc14, 0x3, 0x7, 0x5, 0x100, 0x6, 0x8, 0x2, 0xe0, 0x3f, 0x200, 0x3, 0x9, 0x3, 0x5, 0x95c6, 0x2, 0x6, 0x20, 0x3, 0x8, 0x9, 0x7, 0x9, 0x0, 0xffffd671, 0x1, 0x0, 0x853d, 0x7, 0x3ff, 0x0, 0xfde7, 0x1, 0x5]}, 0x45c) 18:11:06 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) write$uinput_user_dev(r2, &(0x7f0000000480)={'syz0\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x5], [0x0, 0x7ff, 0x1f, 0x1, 0x7, 0x2, 0x6, 0xd594, 0x3, 0x2a, 0x1c9b4fd4, 0x0, 0xfff, 0x5, 0xfffff801, 0x9, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4], [0x6, 0x6, 0x401, 0x2d5, 0xc08, 0x3, 0x7f, 0x7, 0x8, 0x4, 0xbe1a, 0x5, 0x3, 0x93c, 0x9, 0x80, 0x800, 0x7fff, 0x6, 0x1, 0x5, 0x2, 0x9, 0x7fff, 0x0, 0x8000, 0x4, 0x6, 0x2, 0x4, 0x6, 0xa2ec, 0x7, 0x100, 0x1, 0x3, 0x1f, 0x81, 0x10000, 0xc5, 0x7ff, 0x2aae236d, 0x4, 0x2000, 0x1c, 0x3, 0x2, 0x735c, 0x7fffffff, 0x6, 0xfffffffd, 0x4, 0x3ff, 0x7fffffff, 0x8, 0x224, 0x261, 0x8b8a, 0x100, 0xffffffff, 0x7fff, 0x41, 0x401, 0x200], [0x7, 0x4, 0x2, 0x5, 0x7, 0x1, 0x8, 0x0, 0x8, 0xffffff7b, 0x0, 0x5, 0x6, 0xcc9, 0x1, 0x5, 0x2, 0xfffffffe, 0xfffffff9, 0x0, 0x5, 0x101, 0x401, 0x2, 0x3, 0x3, 0x7f76, 0x3ff, 0x9, 0xc14, 0x3, 0x7, 0x5, 0x100, 0x6, 0x8, 0x2, 0xe0, 0x3f, 0x200, 0x3, 0x9, 0x3, 0x5, 0x95c6, 0x2, 0x6, 0x20, 0x3, 0x8, 0x9, 0x7, 0x9, 0x0, 0xffffd671, 0x1, 0x0, 0x853d, 0x7, 0x3ff, 0x0, 0xfde7, 0x1, 0x5]}, 0x45c) 18:11:07 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63}, [{}]}, 0x68) 18:11:09 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x3d}, {0x0, 0x2a}, {0x0}, {&(0x7f0000000100)="6653960d0ec5d684fa9f017ef0d60a3c27bc33760036001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479810be2aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e6517e615607676f8f9fc0ebf8b0b16d6f2c59957ab35d05692e664ebf68734ca53366295f4ad6142134b62f11e92ead037c7fb53455560c8ef0f1c94fafa924edfe92175aaa1c4ecc7aeeb72e0d050feacee907f40888c96a65545e07422bc6ac79f4c2d6ee3dab47d06e764682c72d7f16542fcfd05d2813cc182d1595016c179e1717c160300ab1ab0ac397e91bd193c036feb66a9ad2ec5b7967e7f5ff957f8b085a2437c59a", 0xf8}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x19) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 18:11:09 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) write$uinput_user_dev(r2, &(0x7f0000000480)={'syz0\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x5], [0x0, 0x7ff, 0x1f, 0x1, 0x7, 0x2, 0x6, 0xd594, 0x3, 0x2a, 0x1c9b4fd4, 0x0, 0xfff, 0x5, 0xfffff801, 0x9, 0x3f, 0x8, 0x80, 0x6, 0x401, 0x8000, 0x1, 0xcb, 0x1, 0x6, 0x4, 0x92, 0x800000, 0x7, 0x1f, 0x140, 0x7ff, 0xabbc, 0x401, 0x0, 0x3, 0x20, 0x48, 0x12000, 0xfa, 0x1, 0xfffff6fe, 0x0, 0x7, 0x8818, 0x8000, 0x6, 0x1f, 0x8, 0x4, 0xff, 0x101, 0xd7, 0x8, 0x5, 0xffff8001, 0x5, 0xb621, 0x1, 0x9, 0x1395db38, 0x0, 0x3], [0x6, 0x6, 0x401, 0x2d5, 0xc08, 0x3, 0x7f, 0x7, 0x8, 0x4, 0xbe1a, 0x5, 0x3, 0x93c, 0x9, 0x80, 0x800, 0x7fff, 0x6, 0x1, 0x5, 0x2, 0x9, 0x7fff, 0x0, 0x8000, 0x4, 0x6, 0x2, 0x4, 0x6, 0xa2ec, 0x7, 0x100, 0x1, 0x3, 0x1f, 0x81, 0x10000, 0xc5, 0x7ff, 0x2aae236d, 0x4, 0x2000, 0x1c, 0x3, 0x2, 0x735c, 0x7fffffff, 0x6, 0xfffffffd, 0x4, 0x3ff, 0x7fffffff, 0x8, 0x224, 0x261, 0x8b8a, 0x100, 0xffffffff, 0x7fff, 0x41, 0x401, 0x200], [0x7, 0x4, 0x2, 0x5, 0x7, 0x1, 0x8, 0x0, 0x8, 0xffffff7b, 0x0, 0x5, 0x6, 0xcc9, 0x1, 0x5, 0x2, 0xfffffffe, 0xfffffff9, 0x0, 0x5, 0x101, 0x401, 0x2, 0x3, 0x3, 0x7f76, 0x3ff, 0x9, 0xc14, 0x3, 0x7, 0x5, 0x100, 0x6, 0x8, 0x2, 0xe0, 0x3f, 0x200, 0x3, 0x9, 0x3, 0x5, 0x95c6, 0x2, 0x6, 0x20, 0x3, 0x8, 0x9, 0x7, 0x9, 0x0, 0xffffd671, 0x1, 0x0, 0x853d, 0x7, 0x3ff, 0x0, 0xfde7, 0x1, 0x5]}, 0x45c) 18:11:09 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x3f000000}]}, 0x78) 18:11:09 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) write$uinput_user_dev(r2, &(0x7f0000000480)={'syz0\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x5], [0x0, 0x7ff, 0x1f, 0x1, 0x7, 0x2, 0x6, 0xd594, 0x3, 0x2a, 0x1c9b4fd4, 0x0, 0xfff, 0x5, 0xfffff801, 0x9, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4], [0x6, 0x6, 0x401, 0x2d5, 0xc08, 0x3, 0x7f, 0x7, 0x8, 0x4, 0xbe1a, 0x5, 0x3, 0x93c, 0x9, 0x80, 0x800, 0x7fff, 0x6, 0x1, 0x5, 0x2, 0x9, 0x7fff, 0x0, 0x8000, 0x4, 0x6, 0x2, 0x4, 0x6, 0xa2ec, 0x7, 0x100, 0x1, 0x3, 0x1f, 0x81, 0x10000, 0xc5, 0x7ff, 0x2aae236d, 0x4, 0x2000, 0x1c, 0x3, 0x2, 0x735c, 0x7fffffff, 0x6, 0xfffffffd, 0x4, 0x3ff, 0x7fffffff, 0x8, 0x224, 0x261, 0x8b8a, 0x100, 0xffffffff, 0x7fff, 0x41, 0x401, 0x200], [0x7, 0x4, 0x2, 0x5, 0x7, 0x1, 0x8, 0x0, 0x8, 0xffffff7b, 0x0, 0x5, 0x6, 0xcc9, 0x1, 0x5, 0x2, 0xfffffffe, 0xfffffff9, 0x0, 0x5, 0x101, 0x401, 0x2, 0x3, 0x3, 0x7f76, 0x3ff, 0x9, 0xc14, 0x3, 0x7, 0x5, 0x100, 0x6, 0x8, 0x2, 0xe0, 0x3f, 0x200, 0x3, 0x9, 0x3, 0x5, 0x95c6, 0x2, 0x6, 0x20, 0x3, 0x8, 0x9, 0x7, 0x9, 0x0, 0xffffd671, 0x1, 0x0, 0x853d, 0x7, 0x3ff, 0x0, 0xfde7, 0x1, 0x5]}, 0x45c) 18:11:09 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63}, [{}]}, 0x69) 18:11:09 executing program 0: 18:11:09 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x7f000000}]}, 0x78) 18:11:09 executing program 0: 18:11:09 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) write$uinput_user_dev(r2, &(0x7f0000000480)={'syz0\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x5], [0x0, 0x7ff, 0x1f, 0x1, 0x7, 0x2, 0x6, 0xd594, 0x3, 0x2a, 0x1c9b4fd4, 0x0, 0xfff, 0x5, 0xfffff801, 0x9, 0x3f, 0x8, 0x80, 0x6, 0x401, 0x8000, 0x1, 0xcb, 0x1, 0x6, 0x4, 0x92, 0x800000, 0x7, 0x1f, 0x140, 0x7ff, 0xabbc, 0x401, 0x0, 0x3, 0x20, 0x48, 0x12000, 0xfa, 0x1, 0xfffff6fe, 0x0, 0x7, 0x8818, 0x8000, 0x6, 0x1f, 0x8, 0x4, 0xff, 0x101, 0xd7, 0x8, 0x5, 0xffff8001, 0x5, 0xb621, 0x1, 0x9, 0x1395db38], [0x6, 0x6, 0x401, 0x2d5, 0xc08, 0x3, 0x7f, 0x7, 0x8, 0x4, 0xbe1a, 0x5, 0x3, 0x93c, 0x9, 0x80, 0x800, 0x7fff, 0x6, 0x1, 0x5, 0x2, 0x9, 0x7fff, 0x0, 0x8000, 0x4, 0x6, 0x2, 0x4, 0x6, 0xa2ec, 0x7, 0x100, 0x1, 0x3, 0x1f, 0x81, 0x10000, 0xc5, 0x7ff, 0x2aae236d, 0x4, 0x2000, 0x1c, 0x3, 0x2, 0x735c, 0x7fffffff, 0x6, 0xfffffffd, 0x4, 0x3ff, 0x7fffffff, 0x8, 0x224, 0x261, 0x8b8a, 0x100, 0xffffffff, 0x7fff, 0x41, 0x401, 0x200], [0x7, 0x4, 0x2, 0x5, 0x7, 0x1, 0x8, 0x0, 0x8, 0xffffff7b, 0x0, 0x5, 0x6, 0xcc9, 0x1, 0x5, 0x2, 0xfffffffe, 0xfffffff9, 0x0, 0x5, 0x101, 0x401, 0x2, 0x3, 0x3, 0x7f76, 0x3ff, 0x9, 0xc14, 0x3, 0x7, 0x5, 0x100, 0x6, 0x8, 0x2, 0xe0, 0x3f, 0x200, 0x3, 0x9, 0x3, 0x5, 0x95c6, 0x2, 0x6, 0x20, 0x3, 0x8, 0x9, 0x7, 0x9, 0x0, 0xffffd671, 0x1, 0x0, 0x853d, 0x7, 0x3ff, 0x0, 0xfde7, 0x1, 0x5]}, 0x45c) 18:11:09 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63}, [{}]}, 0x6a) 18:11:09 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) write$uinput_user_dev(r2, &(0x7f0000000480)={'syz0\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x5], [0x0, 0x7ff, 0x1f, 0x1, 0x7, 0x2, 0x6, 0xd594, 0x3, 0x2a, 0x1c9b4fd4, 0x0, 0xfff, 0x5, 0xfffff801, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4], [0x6, 0x6, 0x401, 0x2d5, 0xc08, 0x3, 0x7f, 0x7, 0x8, 0x4, 0xbe1a, 0x5, 0x3, 0x93c, 0x9, 0x80, 0x800, 0x7fff, 0x6, 0x1, 0x5, 0x2, 0x9, 0x7fff, 0x0, 0x8000, 0x4, 0x6, 0x2, 0x4, 0x6, 0xa2ec, 0x7, 0x100, 0x1, 0x3, 0x1f, 0x81, 0x10000, 0xc5, 0x7ff, 0x2aae236d, 0x4, 0x2000, 0x1c, 0x3, 0x2, 0x735c, 0x7fffffff, 0x6, 0xfffffffd, 0x4, 0x3ff, 0x7fffffff, 0x8, 0x224, 0x261, 0x8b8a, 0x100, 0xffffffff, 0x7fff, 0x41, 0x401, 0x200], [0x7, 0x4, 0x2, 0x5, 0x7, 0x1, 0x8, 0x0, 0x8, 0xffffff7b, 0x0, 0x5, 0x6, 0xcc9, 0x1, 0x5, 0x2, 0xfffffffe, 0xfffffff9, 0x0, 0x5, 0x101, 0x401, 0x2, 0x3, 0x3, 0x7f76, 0x3ff, 0x9, 0xc14, 0x3, 0x7, 0x5, 0x100, 0x6, 0x8, 0x2, 0xe0, 0x3f, 0x200, 0x3, 0x9, 0x3, 0x5, 0x95c6, 0x2, 0x6, 0x20, 0x3, 0x8, 0x9, 0x7, 0x9, 0x0, 0xffffd671, 0x1, 0x0, 0x853d, 0x7, 0x3ff, 0x0, 0xfde7, 0x1, 0x5]}, 0x45c) 18:11:10 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) write$uinput_user_dev(r2, &(0x7f0000000480)={'syz0\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x5], [0x0, 0x7ff, 0x1f, 0x1, 0x7, 0x2, 0x6, 0xd594, 0x3, 0x2a, 0x1c9b4fd4, 0x0, 0xfff, 0x5, 0xfffff801, 0x9, 0x3f, 0x8, 0x80, 0x6, 0x401, 0x8000, 0x1, 0xcb, 0x1, 0x6, 0x4, 0x92, 0x800000, 0x7, 0x1f, 0x140, 0x7ff, 0xabbc, 0x401, 0x0, 0x3, 0x20, 0x48, 0x12000, 0xfa, 0x1, 0xfffff6fe, 0x0, 0x7, 0x8818, 0x8000, 0x6, 0x1f, 0x8, 0x4, 0xff, 0x101, 0xd7, 0x8, 0x5, 0xffff8001, 0x5, 0xb621, 0x1, 0x9], [0x6, 0x6, 0x401, 0x2d5, 0xc08, 0x3, 0x7f, 0x7, 0x8, 0x4, 0xbe1a, 0x5, 0x3, 0x93c, 0x9, 0x80, 0x800, 0x7fff, 0x6, 0x1, 0x5, 0x2, 0x9, 0x7fff, 0x0, 0x8000, 0x4, 0x6, 0x2, 0x4, 0x6, 0xa2ec, 0x7, 0x100, 0x1, 0x3, 0x1f, 0x81, 0x10000, 0xc5, 0x7ff, 0x2aae236d, 0x4, 0x2000, 0x1c, 0x3, 0x2, 0x735c, 0x7fffffff, 0x6, 0xfffffffd, 0x4, 0x3ff, 0x7fffffff, 0x8, 0x224, 0x261, 0x8b8a, 0x100, 0xffffffff, 0x7fff, 0x41, 0x401, 0x200], [0x7, 0x4, 0x2, 0x5, 0x7, 0x1, 0x8, 0x0, 0x8, 0xffffff7b, 0x0, 0x5, 0x6, 0xcc9, 0x1, 0x5, 0x2, 0xfffffffe, 0xfffffff9, 0x0, 0x5, 0x101, 0x401, 0x2, 0x3, 0x3, 0x7f76, 0x3ff, 0x9, 0xc14, 0x3, 0x7, 0x5, 0x100, 0x6, 0x8, 0x2, 0xe0, 0x3f, 0x200, 0x3, 0x9, 0x3, 0x5, 0x95c6, 0x2, 0x6, 0x20, 0x3, 0x8, 0x9, 0x7, 0x9, 0x0, 0xffffd671, 0x1, 0x0, 0x853d, 0x7, 0x3ff, 0x0, 0xfde7, 0x1, 0x5]}, 0x45c) 18:11:12 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x3d}, {0x0, 0x2a}, {0x0}, {&(0x7f0000000100)="6653960d0ec5d684fa9f017ef0d60a3c27bc33760036001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479810be2aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e6517e615607676f8f9fc0ebf8b0b16d6f2c59957ab35d05692e664ebf68734ca53366295f4ad6142134b62f11e92ead037c7fb53455560c8ef0f1c94fafa924edfe92175aaa1c4ecc7aeeb72e0d050feacee907f40888c96a65545e07422bc6ac79f4c2d6ee3dab47d06e764682c72d7f16542fcfd05d2813cc182d1595016c179e1717c160300ab1ab0ac397e91bd193c036feb66a9ad2ec5b7967e7f5ff957f8b085a2437c59a", 0xf8}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x19) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, 0x0) ptrace$cont(0x9, r0, 0x0, 0x0) 18:11:12 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x80ffffff}]}, 0x78) 18:11:12 executing program 0: 18:11:12 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63}, [{}]}, 0x6b) 18:11:12 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) write$uinput_user_dev(r2, &(0x7f0000000480)={'syz0\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x5], [0x0, 0x7ff, 0x1f, 0x1, 0x7, 0x2, 0x6, 0xd594, 0x3, 0x2a, 0x1c9b4fd4, 0x0, 0xfff, 0x5, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4], [0x6, 0x6, 0x401, 0x2d5, 0xc08, 0x3, 0x7f, 0x7, 0x8, 0x4, 0xbe1a, 0x5, 0x3, 0x93c, 0x9, 0x80, 0x800, 0x7fff, 0x6, 0x1, 0x5, 0x2, 0x9, 0x7fff, 0x0, 0x8000, 0x4, 0x6, 0x2, 0x4, 0x6, 0xa2ec, 0x7, 0x100, 0x1, 0x3, 0x1f, 0x81, 0x10000, 0xc5, 0x7ff, 0x2aae236d, 0x4, 0x2000, 0x1c, 0x3, 0x2, 0x735c, 0x7fffffff, 0x6, 0xfffffffd, 0x4, 0x3ff, 0x7fffffff, 0x8, 0x224, 0x261, 0x8b8a, 0x100, 0xffffffff, 0x7fff, 0x41, 0x401, 0x200], [0x7, 0x4, 0x2, 0x5, 0x7, 0x1, 0x8, 0x0, 0x8, 0xffffff7b, 0x0, 0x5, 0x6, 0xcc9, 0x1, 0x5, 0x2, 0xfffffffe, 0xfffffff9, 0x0, 0x5, 0x101, 0x401, 0x2, 0x3, 0x3, 0x7f76, 0x3ff, 0x9, 0xc14, 0x3, 0x7, 0x5, 0x100, 0x6, 0x8, 0x2, 0xe0, 0x3f, 0x200, 0x3, 0x9, 0x3, 0x5, 0x95c6, 0x2, 0x6, 0x20, 0x3, 0x8, 0x9, 0x7, 0x9, 0x0, 0xffffd671, 0x1, 0x0, 0x853d, 0x7, 0x3ff, 0x0, 0xfde7, 0x1, 0x5]}, 0x45c) 18:11:12 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) write$uinput_user_dev(r2, &(0x7f0000000480)={'syz0\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x5], [0x0, 0x7ff, 0x1f, 0x1, 0x7, 0x2, 0x6, 0xd594, 0x3, 0x2a, 0x1c9b4fd4, 0x0, 0xfff, 0x5, 0xfffff801, 0x9, 0x3f, 0x8, 0x80, 0x6, 0x401, 0x8000, 0x1, 0xcb, 0x1, 0x6, 0x4, 0x92, 0x800000, 0x7, 0x1f, 0x140, 0x7ff, 0xabbc, 0x401, 0x0, 0x3, 0x20, 0x48, 0x12000, 0xfa, 0x1, 0xfffff6fe, 0x0, 0x7, 0x8818, 0x8000, 0x6, 0x1f, 0x8, 0x4, 0xff, 0x101, 0xd7, 0x8, 0x5, 0xffff8001, 0x5, 0xb621, 0x1], [0x6, 0x6, 0x401, 0x2d5, 0xc08, 0x3, 0x7f, 0x7, 0x8, 0x4, 0xbe1a, 0x5, 0x3, 0x93c, 0x9, 0x80, 0x800, 0x7fff, 0x6, 0x1, 0x5, 0x2, 0x9, 0x7fff, 0x0, 0x8000, 0x4, 0x6, 0x2, 0x4, 0x6, 0xa2ec, 0x7, 0x100, 0x1, 0x3, 0x1f, 0x81, 0x10000, 0xc5, 0x7ff, 0x2aae236d, 0x4, 0x2000, 0x1c, 0x3, 0x2, 0x735c, 0x7fffffff, 0x6, 0xfffffffd, 0x4, 0x3ff, 0x7fffffff, 0x8, 0x224, 0x261, 0x8b8a, 0x100, 0xffffffff, 0x7fff, 0x41, 0x401, 0x200], [0x7, 0x4, 0x2, 0x5, 0x7, 0x1, 0x8, 0x0, 0x8, 0xffffff7b, 0x0, 0x5, 0x6, 0xcc9, 0x1, 0x5, 0x2, 0xfffffffe, 0xfffffff9, 0x0, 0x5, 0x101, 0x401, 0x2, 0x3, 0x3, 0x7f76, 0x3ff, 0x9, 0xc14, 0x3, 0x7, 0x5, 0x100, 0x6, 0x8, 0x2, 0xe0, 0x3f, 0x200, 0x3, 0x9, 0x3, 0x5, 0x95c6, 0x2, 0x6, 0x20, 0x3, 0x8, 0x9, 0x7, 0x9, 0x0, 0xffffd671, 0x1, 0x0, 0x853d, 0x7, 0x3ff, 0x0, 0xfde7, 0x1, 0x5]}, 0x45c) 18:11:12 executing program 0: 18:11:12 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63}, [{}]}, 0x6c) 18:11:12 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x9b000000}]}, 0x78) 18:11:12 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) write$uinput_user_dev(r2, &(0x7f0000000480)={'syz0\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x5], [0x0, 0x7ff, 0x1f, 0x1, 0x7, 0x2, 0x6, 0xd594, 0x3, 0x2a, 0x1c9b4fd4, 0x0, 0xfff, 0x5, 0xfffff801, 0x9, 0x3f, 0x8, 0x80, 0x6, 0x401, 0x8000, 0x1, 0xcb, 0x1, 0x6, 0x4, 0x92, 0x800000, 0x7, 0x1f, 0x140, 0x7ff, 0xabbc, 0x401, 0x0, 0x3, 0x20, 0x48, 0x12000, 0xfa, 0x1, 0xfffff6fe, 0x0, 0x7, 0x8818, 0x8000, 0x6, 0x1f, 0x8, 0x4, 0xff, 0x101, 0xd7, 0x8, 0x5, 0xffff8001, 0x5, 0xb621], [0x6, 0x6, 0x401, 0x2d5, 0xc08, 0x3, 0x7f, 0x7, 0x8, 0x4, 0xbe1a, 0x5, 0x3, 0x93c, 0x9, 0x80, 0x800, 0x7fff, 0x6, 0x1, 0x5, 0x2, 0x9, 0x7fff, 0x0, 0x8000, 0x4, 0x6, 0x2, 0x4, 0x6, 0xa2ec, 0x7, 0x100, 0x1, 0x3, 0x1f, 0x81, 0x10000, 0xc5, 0x7ff, 0x2aae236d, 0x4, 0x2000, 0x1c, 0x3, 0x2, 0x735c, 0x7fffffff, 0x6, 0xfffffffd, 0x4, 0x3ff, 0x7fffffff, 0x8, 0x224, 0x261, 0x8b8a, 0x100, 0xffffffff, 0x7fff, 0x41, 0x401, 0x200], [0x7, 0x4, 0x2, 0x5, 0x7, 0x1, 0x8, 0x0, 0x8, 0xffffff7b, 0x0, 0x5, 0x6, 0xcc9, 0x1, 0x5, 0x2, 0xfffffffe, 0xfffffff9, 0x0, 0x5, 0x101, 0x401, 0x2, 0x3, 0x3, 0x7f76, 0x3ff, 0x9, 0xc14, 0x3, 0x7, 0x5, 0x100, 0x6, 0x8, 0x2, 0xe0, 0x3f, 0x200, 0x3, 0x9, 0x3, 0x5, 0x95c6, 0x2, 0x6, 0x20, 0x3, 0x8, 0x9, 0x7, 0x9, 0x0, 0xffffd671, 0x1, 0x0, 0x853d, 0x7, 0x3ff, 0x0, 0xfde7, 0x1, 0x5]}, 0x45c) 18:11:12 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) write$uinput_user_dev(r2, &(0x7f0000000480)={'syz0\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x5], [0x0, 0x7ff, 0x1f, 0x1, 0x7, 0x2, 0x6, 0xd594, 0x3, 0x2a, 0x1c9b4fd4, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4], [0x6, 0x6, 0x401, 0x2d5, 0xc08, 0x3, 0x7f, 0x7, 0x8, 0x4, 0xbe1a, 0x5, 0x3, 0x93c, 0x9, 0x80, 0x800, 0x7fff, 0x6, 0x1, 0x5, 0x2, 0x9, 0x7fff, 0x0, 0x8000, 0x4, 0x6, 0x2, 0x4, 0x6, 0xa2ec, 0x7, 0x100, 0x1, 0x3, 0x1f, 0x81, 0x10000, 0xc5, 0x7ff, 0x2aae236d, 0x4, 0x2000, 0x1c, 0x3, 0x2, 0x735c, 0x7fffffff, 0x6, 0xfffffffd, 0x4, 0x3ff, 0x7fffffff, 0x8, 0x224, 0x261, 0x8b8a, 0x100, 0xffffffff, 0x7fff, 0x41, 0x401, 0x200], [0x7, 0x4, 0x2, 0x5, 0x7, 0x1, 0x8, 0x0, 0x8, 0xffffff7b, 0x0, 0x5, 0x6, 0xcc9, 0x1, 0x5, 0x2, 0xfffffffe, 0xfffffff9, 0x0, 0x5, 0x101, 0x401, 0x2, 0x3, 0x3, 0x7f76, 0x3ff, 0x9, 0xc14, 0x3, 0x7, 0x5, 0x100, 0x6, 0x8, 0x2, 0xe0, 0x3f, 0x200, 0x3, 0x9, 0x3, 0x5, 0x95c6, 0x2, 0x6, 0x20, 0x3, 0x8, 0x9, 0x7, 0x9, 0x0, 0xffffd671, 0x1, 0x0, 0x853d, 0x7, 0x3ff, 0x0, 0xfde7, 0x1, 0x5]}, 0x45c) 18:11:12 executing program 0: 18:11:15 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x3d}, {0x0, 0x2a}, {0x0}, {&(0x7f0000000100)="6653960d0ec5d684fa9f017ef0d60a3c27bc33760036001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479810be2aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e6517e615607676f8f9fc0ebf8b0b16d6f2c59957ab35d05692e664ebf68734ca53366295f4ad6142134b62f11e92ead037c7fb53455560c8ef0f1c94fafa924edfe92175aaa1c4ecc7aeeb72e0d050feacee907f40888c96a65545e07422bc6ac79f4c2d6ee3dab47d06e764682c72d7f16542fcfd05d2813cc182d1595016c179e1717c160300ab1ab0ac397e91bd193c036feb66a9ad2ec5b7967e7f5ff957f8b085a2437c59a", 0xf8}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x19) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, 0x0) ptrace$cont(0x9, r0, 0x0, 0x0) 18:11:15 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63}, [{}]}, 0x6d) 18:11:15 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0xe8030000}]}, 0x78) 18:11:15 executing program 0: 18:11:15 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) write$uinput_user_dev(r2, &(0x7f0000000480)={'syz0\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x5], [0x0, 0x7ff, 0x1f, 0x1, 0x7, 0x2, 0x6, 0xd594, 0x3, 0x2a, 0x1c9b4fd4, 0x0, 0xfff, 0x5, 0xfffff801, 0x9, 0x3f, 0x8, 0x80, 0x6, 0x401, 0x8000, 0x1, 0xcb, 0x1, 0x6, 0x4, 0x92, 0x800000, 0x7, 0x1f, 0x140, 0x7ff, 0xabbc, 0x401, 0x0, 0x3, 0x20, 0x48, 0x12000, 0xfa, 0x1, 0xfffff6fe, 0x0, 0x7, 0x8818, 0x8000, 0x6, 0x1f, 0x8, 0x4, 0xff, 0x101, 0xd7, 0x8, 0x5, 0xffff8001, 0x5], [0x6, 0x6, 0x401, 0x2d5, 0xc08, 0x3, 0x7f, 0x7, 0x8, 0x4, 0xbe1a, 0x5, 0x3, 0x93c, 0x9, 0x80, 0x800, 0x7fff, 0x6, 0x1, 0x5, 0x2, 0x9, 0x7fff, 0x0, 0x8000, 0x4, 0x6, 0x2, 0x4, 0x6, 0xa2ec, 0x7, 0x100, 0x1, 0x3, 0x1f, 0x81, 0x10000, 0xc5, 0x7ff, 0x2aae236d, 0x4, 0x2000, 0x1c, 0x3, 0x2, 0x735c, 0x7fffffff, 0x6, 0xfffffffd, 0x4, 0x3ff, 0x7fffffff, 0x8, 0x224, 0x261, 0x8b8a, 0x100, 0xffffffff, 0x7fff, 0x41, 0x401, 0x200], [0x7, 0x4, 0x2, 0x5, 0x7, 0x1, 0x8, 0x0, 0x8, 0xffffff7b, 0x0, 0x5, 0x6, 0xcc9, 0x1, 0x5, 0x2, 0xfffffffe, 0xfffffff9, 0x0, 0x5, 0x101, 0x401, 0x2, 0x3, 0x3, 0x7f76, 0x3ff, 0x9, 0xc14, 0x3, 0x7, 0x5, 0x100, 0x6, 0x8, 0x2, 0xe0, 0x3f, 0x200, 0x3, 0x9, 0x3, 0x5, 0x95c6, 0x2, 0x6, 0x20, 0x3, 0x8, 0x9, 0x7, 0x9, 0x0, 0xffffd671, 0x1, 0x0, 0x853d, 0x7, 0x3ff, 0x0, 0xfde7, 0x1, 0x5]}, 0x45c) 18:11:15 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) write$uinput_user_dev(r2, &(0x7f0000000480)={'syz0\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x5], [0x0, 0x7ff, 0x1f, 0x1, 0x7, 0x2, 0x6, 0xd594, 0x3, 0x2a, 0x1c9b4fd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4], [0x6, 0x6, 0x401, 0x2d5, 0xc08, 0x3, 0x7f, 0x7, 0x8, 0x4, 0xbe1a, 0x5, 0x3, 0x93c, 0x9, 0x80, 0x800, 0x7fff, 0x6, 0x1, 0x5, 0x2, 0x9, 0x7fff, 0x0, 0x8000, 0x4, 0x6, 0x2, 0x4, 0x6, 0xa2ec, 0x7, 0x100, 0x1, 0x3, 0x1f, 0x81, 0x10000, 0xc5, 0x7ff, 0x2aae236d, 0x4, 0x2000, 0x1c, 0x3, 0x2, 0x735c, 0x7fffffff, 0x6, 0xfffffffd, 0x4, 0x3ff, 0x7fffffff, 0x8, 0x224, 0x261, 0x8b8a, 0x100, 0xffffffff, 0x7fff, 0x41, 0x401, 0x200], [0x7, 0x4, 0x2, 0x5, 0x7, 0x1, 0x8, 0x0, 0x8, 0xffffff7b, 0x0, 0x5, 0x6, 0xcc9, 0x1, 0x5, 0x2, 0xfffffffe, 0xfffffff9, 0x0, 0x5, 0x101, 0x401, 0x2, 0x3, 0x3, 0x7f76, 0x3ff, 0x9, 0xc14, 0x3, 0x7, 0x5, 0x100, 0x6, 0x8, 0x2, 0xe0, 0x3f, 0x200, 0x3, 0x9, 0x3, 0x5, 0x95c6, 0x2, 0x6, 0x20, 0x3, 0x8, 0x9, 0x7, 0x9, 0x0, 0xffffd671, 0x1, 0x0, 0x853d, 0x7, 0x3ff, 0x0, 0xfde7, 0x1, 0x5]}, 0x45c) 18:11:15 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_GET(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000500)=ANY=[@ANYBLOB="1800000001020101"], 0x18}}, 0x0) 18:11:15 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63}, [{}]}, 0x6e) 18:11:15 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) write$uinput_user_dev(r2, &(0x7f0000000480)={'syz0\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x5], [0x0, 0x7ff, 0x1f, 0x1, 0x7, 0x2, 0x6, 0xd594, 0x3, 0x2a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4], [0x6, 0x6, 0x401, 0x2d5, 0xc08, 0x3, 0x7f, 0x7, 0x8, 0x4, 0xbe1a, 0x5, 0x3, 0x93c, 0x9, 0x80, 0x800, 0x7fff, 0x6, 0x1, 0x5, 0x2, 0x9, 0x7fff, 0x0, 0x8000, 0x4, 0x6, 0x2, 0x4, 0x6, 0xa2ec, 0x7, 0x100, 0x1, 0x3, 0x1f, 0x81, 0x10000, 0xc5, 0x7ff, 0x2aae236d, 0x4, 0x2000, 0x1c, 0x3, 0x2, 0x735c, 0x7fffffff, 0x6, 0xfffffffd, 0x4, 0x3ff, 0x7fffffff, 0x8, 0x224, 0x261, 0x8b8a, 0x100, 0xffffffff, 0x7fff, 0x41, 0x401, 0x200], [0x7, 0x4, 0x2, 0x5, 0x7, 0x1, 0x8, 0x0, 0x8, 0xffffff7b, 0x0, 0x5, 0x6, 0xcc9, 0x1, 0x5, 0x2, 0xfffffffe, 0xfffffff9, 0x0, 0x5, 0x101, 0x401, 0x2, 0x3, 0x3, 0x7f76, 0x3ff, 0x9, 0xc14, 0x3, 0x7, 0x5, 0x100, 0x6, 0x8, 0x2, 0xe0, 0x3f, 0x200, 0x3, 0x9, 0x3, 0x5, 0x95c6, 0x2, 0x6, 0x20, 0x3, 0x8, 0x9, 0x7, 0x9, 0x0, 0xffffd671, 0x1, 0x0, 0x853d, 0x7, 0x3ff, 0x0, 0xfde7, 0x1, 0x5]}, 0x45c) 18:11:15 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0xffff0000}]}, 0x78) 18:11:16 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) write$uinput_user_dev(r2, &(0x7f0000000480)={'syz0\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x5], [0x0, 0x7ff, 0x1f, 0x1, 0x7, 0x2, 0x6, 0xd594, 0x3, 0x2a, 0x1c9b4fd4, 0x0, 0xfff, 0x5, 0xfffff801, 0x9, 0x3f, 0x8, 0x80, 0x6, 0x401, 0x8000, 0x1, 0xcb, 0x1, 0x6, 0x4, 0x92, 0x800000, 0x7, 0x1f, 0x140, 0x7ff, 0xabbc, 0x401, 0x0, 0x3, 0x20, 0x48, 0x12000, 0xfa, 0x1, 0xfffff6fe, 0x0, 0x7, 0x8818, 0x8000, 0x6, 0x1f, 0x8, 0x4, 0xff, 0x101, 0xd7, 0x8, 0x5, 0xffff8001], [0x6, 0x6, 0x401, 0x2d5, 0xc08, 0x3, 0x7f, 0x7, 0x8, 0x4, 0xbe1a, 0x5, 0x3, 0x93c, 0x9, 0x80, 0x800, 0x7fff, 0x6, 0x1, 0x5, 0x2, 0x9, 0x7fff, 0x0, 0x8000, 0x4, 0x6, 0x2, 0x4, 0x6, 0xa2ec, 0x7, 0x100, 0x1, 0x3, 0x1f, 0x81, 0x10000, 0xc5, 0x7ff, 0x2aae236d, 0x4, 0x2000, 0x1c, 0x3, 0x2, 0x735c, 0x7fffffff, 0x6, 0xfffffffd, 0x4, 0x3ff, 0x7fffffff, 0x8, 0x224, 0x261, 0x8b8a, 0x100, 0xffffffff, 0x7fff, 0x41, 0x401, 0x200], [0x7, 0x4, 0x2, 0x5, 0x7, 0x1, 0x8, 0x0, 0x8, 0xffffff7b, 0x0, 0x5, 0x6, 0xcc9, 0x1, 0x5, 0x2, 0xfffffffe, 0xfffffff9, 0x0, 0x5, 0x101, 0x401, 0x2, 0x3, 0x3, 0x7f76, 0x3ff, 0x9, 0xc14, 0x3, 0x7, 0x5, 0x100, 0x6, 0x8, 0x2, 0xe0, 0x3f, 0x200, 0x3, 0x9, 0x3, 0x5, 0x95c6, 0x2, 0x6, 0x20, 0x3, 0x8, 0x9, 0x7, 0x9, 0x0, 0xffffd671, 0x1, 0x0, 0x853d, 0x7, 0x3ff, 0x0, 0xfde7, 0x1, 0x5]}, 0x45c) 18:11:16 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) write$uinput_user_dev(r2, &(0x7f0000000480)={'syz0\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x5], [0x0, 0x7ff, 0x1f, 0x1, 0x7, 0x2, 0x6, 0xd594, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4], [0x6, 0x6, 0x401, 0x2d5, 0xc08, 0x3, 0x7f, 0x7, 0x8, 0x4, 0xbe1a, 0x5, 0x3, 0x93c, 0x9, 0x80, 0x800, 0x7fff, 0x6, 0x1, 0x5, 0x2, 0x9, 0x7fff, 0x0, 0x8000, 0x4, 0x6, 0x2, 0x4, 0x6, 0xa2ec, 0x7, 0x100, 0x1, 0x3, 0x1f, 0x81, 0x10000, 0xc5, 0x7ff, 0x2aae236d, 0x4, 0x2000, 0x1c, 0x3, 0x2, 0x735c, 0x7fffffff, 0x6, 0xfffffffd, 0x4, 0x3ff, 0x7fffffff, 0x8, 0x224, 0x261, 0x8b8a, 0x100, 0xffffffff, 0x7fff, 0x41, 0x401, 0x200], [0x7, 0x4, 0x2, 0x5, 0x7, 0x1, 0x8, 0x0, 0x8, 0xffffff7b, 0x0, 0x5, 0x6, 0xcc9, 0x1, 0x5, 0x2, 0xfffffffe, 0xfffffff9, 0x0, 0x5, 0x101, 0x401, 0x2, 0x3, 0x3, 0x7f76, 0x3ff, 0x9, 0xc14, 0x3, 0x7, 0x5, 0x100, 0x6, 0x8, 0x2, 0xe0, 0x3f, 0x200, 0x3, 0x9, 0x3, 0x5, 0x95c6, 0x2, 0x6, 0x20, 0x3, 0x8, 0x9, 0x7, 0x9, 0x0, 0xffffd671, 0x1, 0x0, 0x853d, 0x7, 0x3ff, 0x0, 0xfde7, 0x1, 0x5]}, 0x45c) [ 1193.171327] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. 18:11:18 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63}, [{}]}, 0x6f) 18:11:18 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x3d}, {0x0, 0x2a}, {0x0}, {&(0x7f0000000100)="6653960d0ec5d684fa9f017ef0d60a3c27bc33760036001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479810be2aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e6517e615607676f8f9fc0ebf8b0b16d6f2c59957ab35d05692e664ebf68734ca53366295f4ad6142134b62f11e92ead037c7fb53455560c8ef0f1c94fafa924edfe92175aaa1c4ecc7aeeb72e0d050feacee907f40888c96a65545e07422bc6ac79f4c2d6ee3dab47d06e764682c72d7f16542fcfd05d2813cc182d1595016c179e1717c160300ab1ab0ac397e91bd193c036feb66a9ad2ec5b7967e7f5ff957f8b085a2437c59a", 0xf8}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x19) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, 0x0) ptrace$cont(0x9, r0, 0x0, 0x0) 18:11:18 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff80}]}, 0x78) 18:11:18 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x6, 0x0) write$binfmt_aout(r0, &(0x7f0000001140)=ANY=[@ANYBLOB="091589a30d6b2e2e0007003a42884400100000000000003f6d4c5cfe389367049c7a3dec544bf73f480000000000000000003b40040000710e13"], 0x41) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$TCSETAF(r0, 0x5408, &(0x7f0000000080)={0x0, 0x1, 0x0, 0x0, 0x0, "c74b272358ef1584"}) 18:11:18 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) write$uinput_user_dev(r2, &(0x7f0000000480)={'syz0\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x5], [0x0, 0x7ff, 0x1f, 0x1, 0x7, 0x2, 0x6, 0xd594, 0x3, 0x2a, 0x1c9b4fd4, 0x0, 0xfff, 0x5, 0xfffff801, 0x9, 0x3f, 0x8, 0x80, 0x6, 0x401, 0x8000, 0x1, 0xcb, 0x1, 0x6, 0x4, 0x92, 0x800000, 0x7, 0x1f, 0x140, 0x7ff, 0xabbc, 0x401, 0x0, 0x3, 0x20, 0x48, 0x12000, 0xfa, 0x1, 0xfffff6fe, 0x0, 0x7, 0x8818, 0x8000, 0x6, 0x1f, 0x8, 0x4, 0xff, 0x101, 0xd7, 0x8, 0x5], [0x6, 0x6, 0x401, 0x2d5, 0xc08, 0x3, 0x7f, 0x7, 0x8, 0x4, 0xbe1a, 0x5, 0x3, 0x93c, 0x9, 0x80, 0x800, 0x7fff, 0x6, 0x1, 0x5, 0x2, 0x9, 0x7fff, 0x0, 0x8000, 0x4, 0x6, 0x2, 0x4, 0x6, 0xa2ec, 0x7, 0x100, 0x1, 0x3, 0x1f, 0x81, 0x10000, 0xc5, 0x7ff, 0x2aae236d, 0x4, 0x2000, 0x1c, 0x3, 0x2, 0x735c, 0x7fffffff, 0x6, 0xfffffffd, 0x4, 0x3ff, 0x7fffffff, 0x8, 0x224, 0x261, 0x8b8a, 0x100, 0xffffffff, 0x7fff, 0x41, 0x401, 0x200], [0x7, 0x4, 0x2, 0x5, 0x7, 0x1, 0x8, 0x0, 0x8, 0xffffff7b, 0x0, 0x5, 0x6, 0xcc9, 0x1, 0x5, 0x2, 0xfffffffe, 0xfffffff9, 0x0, 0x5, 0x101, 0x401, 0x2, 0x3, 0x3, 0x7f76, 0x3ff, 0x9, 0xc14, 0x3, 0x7, 0x5, 0x100, 0x6, 0x8, 0x2, 0xe0, 0x3f, 0x200, 0x3, 0x9, 0x3, 0x5, 0x95c6, 0x2, 0x6, 0x20, 0x3, 0x8, 0x9, 0x7, 0x9, 0x0, 0xffffd671, 0x1, 0x0, 0x853d, 0x7, 0x3ff, 0x0, 0xfde7, 0x1, 0x5]}, 0x45c) 18:11:18 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) write$uinput_user_dev(r2, &(0x7f0000000480)={'syz0\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x5], [0x0, 0x7ff, 0x1f, 0x1, 0x7, 0x2, 0x6, 0xd594, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4], [0x6, 0x6, 0x401, 0x2d5, 0xc08, 0x3, 0x7f, 0x7, 0x8, 0x4, 0xbe1a, 0x5, 0x3, 0x93c, 0x9, 0x80, 0x800, 0x7fff, 0x6, 0x1, 0x5, 0x2, 0x9, 0x7fff, 0x0, 0x8000, 0x4, 0x6, 0x2, 0x4, 0x6, 0xa2ec, 0x7, 0x100, 0x1, 0x3, 0x1f, 0x81, 0x10000, 0xc5, 0x7ff, 0x2aae236d, 0x4, 0x2000, 0x1c, 0x3, 0x2, 0x735c, 0x7fffffff, 0x6, 0xfffffffd, 0x4, 0x3ff, 0x7fffffff, 0x8, 0x224, 0x261, 0x8b8a, 0x100, 0xffffffff, 0x7fff, 0x41, 0x401, 0x200], [0x7, 0x4, 0x2, 0x5, 0x7, 0x1, 0x8, 0x0, 0x8, 0xffffff7b, 0x0, 0x5, 0x6, 0xcc9, 0x1, 0x5, 0x2, 0xfffffffe, 0xfffffff9, 0x0, 0x5, 0x101, 0x401, 0x2, 0x3, 0x3, 0x7f76, 0x3ff, 0x9, 0xc14, 0x3, 0x7, 0x5, 0x100, 0x6, 0x8, 0x2, 0xe0, 0x3f, 0x200, 0x3, 0x9, 0x3, 0x5, 0x95c6, 0x2, 0x6, 0x20, 0x3, 0x8, 0x9, 0x7, 0x9, 0x0, 0xffffd671, 0x1, 0x0, 0x853d, 0x7, 0x3ff, 0x0, 0xfde7, 0x1, 0x5]}, 0x45c) 18:11:19 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) write$uinput_user_dev(r2, &(0x7f0000000480)={'syz0\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x5], [0x0, 0x7ff, 0x1f, 0x1, 0x7, 0x2, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4], [0x6, 0x6, 0x401, 0x2d5, 0xc08, 0x3, 0x7f, 0x7, 0x8, 0x4, 0xbe1a, 0x5, 0x3, 0x93c, 0x9, 0x80, 0x800, 0x7fff, 0x6, 0x1, 0x5, 0x2, 0x9, 0x7fff, 0x0, 0x8000, 0x4, 0x6, 0x2, 0x4, 0x6, 0xa2ec, 0x7, 0x100, 0x1, 0x3, 0x1f, 0x81, 0x10000, 0xc5, 0x7ff, 0x2aae236d, 0x4, 0x2000, 0x1c, 0x3, 0x2, 0x735c, 0x7fffffff, 0x6, 0xfffffffd, 0x4, 0x3ff, 0x7fffffff, 0x8, 0x224, 0x261, 0x8b8a, 0x100, 0xffffffff, 0x7fff, 0x41, 0x401, 0x200], [0x7, 0x4, 0x2, 0x5, 0x7, 0x1, 0x8, 0x0, 0x8, 0xffffff7b, 0x0, 0x5, 0x6, 0xcc9, 0x1, 0x5, 0x2, 0xfffffffe, 0xfffffff9, 0x0, 0x5, 0x101, 0x401, 0x2, 0x3, 0x3, 0x7f76, 0x3ff, 0x9, 0xc14, 0x3, 0x7, 0x5, 0x100, 0x6, 0x8, 0x2, 0xe0, 0x3f, 0x200, 0x3, 0x9, 0x3, 0x5, 0x95c6, 0x2, 0x6, 0x20, 0x3, 0x8, 0x9, 0x7, 0x9, 0x0, 0xffffd671, 0x1, 0x0, 0x853d, 0x7, 0x3ff, 0x0, 0xfde7, 0x1, 0x5]}, 0x45c) [ 1196.138996] [ 1196.140650] ====================================================== [ 1196.146963] WARNING: possible circular locking dependency detected [ 1196.153310] 4.19.134-syzkaller #0 Not tainted [ 1196.157980] ------------------------------------------------------ [ 1196.165336] syz-executor.0/10986 is trying to acquire lock: [ 1196.171040] 0000000006773c6e (&pool->lock/1){..-.}, at: __queue_work+0x359/0x1100 [ 1196.178677] [ 1196.178677] but task is already holding lock: [ 1196.184646] 000000003313448e (&(&port->lock)->rlock){-.-.}, at: pty_write+0xf6/0x1f0 [ 1196.192595] [ 1196.192595] which lock already depends on the new lock. [ 1196.192595] [ 1196.200905] [ 1196.200905] the existing dependency chain (in reverse order) is: [ 1196.208511] [ 1196.208511] -> #4 (&(&port->lock)->rlock){-.-.}: [ 1196.214764] tty_port_tty_get+0x1d/0x80 [ 1196.219250] tty_port_default_wakeup+0x11/0x40 [ 1196.224382] serial8250_tx_chars+0x490/0xaf0 [ 1196.229306] serial8250_handle_irq.part.0+0x24b/0x290 [ 1196.235006] serial8250_default_handle_irq+0xae/0x220 [ 1196.240705] serial8250_interrupt+0xf2/0x1d0 [ 1196.245634] __handle_irq_event_percpu+0x27e/0x8e0 [ 1196.251082] handle_irq_event+0x102/0x285 [ 1196.255820] handle_edge_irq+0x260/0xcf0 [ 1196.260393] handle_irq+0x35/0x50 [ 1196.264468] do_IRQ+0x93/0x1c0 [ 1196.268177] ret_from_intr+0x0/0x1e [ 1196.272331] native_safe_halt+0xe/0x10 [ 1196.276742] default_idle+0x49/0x310 [ 1196.280981] do_idle+0x2ec/0x4b0 [ 1196.284860] cpu_startup_entry+0xc5/0xe0 [ 1196.289431] start_secondary+0x41f/0x580 [ 1196.294002] secondary_startup_64+0xa4/0xb0 [ 1196.298825] [ 1196.298825] -> #3 (&port_lock_key){-.-.}: [ 1196.304455] serial8250_console_write+0x89b/0xad0 [ 1196.309919] console_unlock+0xbb6/0x1110 [ 1196.314489] vprintk_emit+0x2d1/0x740 [ 1196.318809] vprintk_func+0x79/0x17e [ 1196.323034] printk+0xba/0xed [ 1196.326652] register_console+0x87f/0xc90 [ 1196.331330] univ8250_console_init+0x3a/0x46 [ 1196.336259] console_init+0x4cb/0x718 [ 1196.340594] start_kernel+0x686/0x911 [ 1196.344904] secondary_startup_64+0xa4/0xb0 [ 1196.349726] [ 1196.349726] -> #2 (console_owner){-...}: [ 1196.355266] vprintk_func+0x79/0x17e [ 1196.359490] printk+0xba/0xed [ 1196.363109] should_fail+0x66b/0x7b0 [ 1196.367347] __should_failslab+0x115/0x180 [ 1196.372093] should_failslab+0x5/0xf [ 1196.376319] kmem_cache_alloc+0x3f/0x370 [ 1196.380936] __debug_object_init+0x6d9/0x9b0 [ 1196.385869] __flush_work+0x270/0x8b0 [ 1196.390183] __cancel_work_timer+0x412/0x590 [ 1196.395156] uhid_char_release+0xa7/0x190 [ 1196.399822] __fput+0x2ce/0x890 [ 1196.403612] task_work_run+0x148/0x1c0 [ 1196.408010] get_signal+0x1b64/0x1f70 [ 1196.412321] do_signal+0x8f/0x1670 [ 1196.416373] exit_to_usermode_loop+0x204/0x2a0 [ 1196.421465] do_syscall_64+0x538/0x620 [ 1196.425867] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1196.431571] [ 1196.431571] -> #1 (&(&pool->lock)->rlock){-.-.}: [ 1196.438414] __queue_work+0x359/0x1100 [ 1196.442809] queue_work_on+0x17e/0x1f0 [ 1196.447206] put_pwq+0x15a/0x1b0 [ 1196.451083] destroy_workqueue+0x649/0x790 [ 1196.455873] floppy_async_init+0x1eeb/0x2024 [ 1196.460811] async_run_entry_fn+0x121/0x530 [ 1196.465654] process_one_work+0x864/0x1570 [ 1196.470396] worker_thread+0x64c/0x1130 [ 1196.474879] kthread+0x30b/0x410 [ 1196.478756] ret_from_fork+0x24/0x30 [ 1196.482974] [ 1196.482974] -> #0 (&pool->lock/1){..-.}: [ 1196.488518] _raw_spin_lock+0x2a/0x40 [ 1196.492828] __queue_work+0x359/0x1100 [ 1196.497222] queue_work_on+0x17e/0x1f0 [ 1196.501618] pty_write+0x198/0x1f0 [ 1196.505666] n_tty_write+0xa03/0xff0 [ 1196.511105] tty_write+0x496/0x810 [ 1196.515157] __vfs_write+0xf7/0x770 [ 1196.519304] vfs_write+0x1f3/0x540 [ 1196.523352] ksys_write+0x12b/0x2a0 [ 1196.527491] do_syscall_64+0xf9/0x620 [ 1196.531804] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1196.537494] [ 1196.537494] other info that might help us debug this: [ 1196.537494] [ 1196.545712] Chain exists of: [ 1196.545712] &pool->lock/1 --> &port_lock_key --> &(&port->lock)->rlock [ 1196.545712] [ 1196.556907] Possible unsafe locking scenario: [ 1196.556907] [ 1196.563036] CPU0 CPU1 [ 1196.567685] ---- ---- [ 1196.580597] lock(&(&port->lock)->rlock); [ 1196.584818] lock(&port_lock_key); [ 1196.590946] lock(&(&port->lock)->rlock); [ 1196.597681] lock(&pool->lock/1); [ 1196.601206] [ 1196.601206] *** DEADLOCK *** [ 1196.601206] [ 1196.607258] 5 locks held by syz-executor.0/10986: [ 1196.612080] #0: 000000003dbb024e (&tty->ldisc_sem){++++}, at: tty_ldisc_ref_wait+0x22/0x80 [ 1196.620574] #1: 00000000b28dc8d7 (&tty->atomic_write_lock){+.+.}, at: tty_write+0x24e/0x810 [ 1196.629150] #2: 00000000ff26fa68 (&tty->termios_rwsem){++++}, at: n_tty_write+0x1b5/0xff0 [ 1196.637557] #3: 00000000a066735e (&ldata->output_lock){+.+.}, at: n_tty_write+0x9d0/0xff0 [ 1196.645967] #4: 000000003313448e (&(&port->lock)->rlock){-.-.}, at: pty_write+0xf6/0x1f0 [ 1196.654368] [ 1196.654368] stack backtrace: [ 1196.658873] CPU: 1 PID: 10986 Comm: syz-executor.0 Not tainted 4.19.134-syzkaller #0 [ 1196.666752] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1196.676093] Call Trace: [ 1196.678678] dump_stack+0x1fc/0x2fe [ 1196.682309] print_circular_bug.constprop.0.cold+0x2d7/0x41e [ 1196.688100] __lock_acquire+0x30c9/0x3ff0 [ 1196.692265] ? debug_object_activate+0x295/0x450 [ 1196.697362] ? mark_held_locks+0xf0/0xf0 [ 1196.701418] ? lock_downgrade+0x720/0x720 [ 1196.705559] ? trace_hardirqs_off+0x64/0x200 [ 1196.709961] ? debug_object_activate+0x295/0x450 [ 1196.714717] lock_acquire+0x170/0x3c0 [ 1196.718527] ? __queue_work+0x359/0x1100 [ 1196.722596] _raw_spin_lock+0x2a/0x40 [ 1196.726396] ? __queue_work+0x359/0x1100 [ 1196.730474] __queue_work+0x359/0x1100 [ 1196.735929] ? tty_insert_flip_string_fixed_flag+0x1dc/0x250 [ 1196.741726] queue_work_on+0x17e/0x1f0 [ 1196.745621] pty_write+0x198/0x1f0 [ 1196.749169] n_tty_write+0xa03/0xff0 [ 1196.752880] ? __ldsem_down_read_nested+0xd2/0x780 [ 1196.757919] ? n_tty_open+0x160/0x160 [ 1196.761719] ? do_wait_intr_irq+0x270/0x270 [ 1196.766136] ? __might_fault+0x192/0x1d0 [ 1196.770203] tty_write+0x496/0x810 [ 1196.773739] ? n_tty_open+0x160/0x160 [ 1196.777717] __vfs_write+0xf7/0x770 [ 1196.781335] ? tty_compat_ioctl+0x270/0x270 [ 1196.785735] ? kernel_read+0x110/0x110 [ 1196.789619] ? avc_policy_seqno+0x9/0x70 [ 1196.793673] ? selinux_file_permission+0x87/0x5f0 [ 1196.798514] ? security_file_permission+0x1c0/0x220 [ 1196.803526] vfs_write+0x1f3/0x540 [ 1196.807079] ksys_write+0x12b/0x2a0 [ 1196.810705] ? __ia32_sys_read+0xb0/0xb0 [ 1196.814771] ? posix_timer_fn+0x3d0/0x3d0 [ 1196.818959] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1196.823711] ? trace_hardirqs_off_caller+0x69/0x210 [ 1196.828725] ? do_syscall_64+0x21/0x620 [ 1196.832698] do_syscall_64+0xf9/0x620 [ 1196.836542] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1196.841722] RIP: 0033:0x45c369 [ 1196.844908] Code: 8d b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 5b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1196.863817] RSP: 002b:00007feb6c2b6c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1196.871520] RAX: ffffffffffffffda RBX: 0000000000037280 RCX: 000000000045c369 [ 1196.878795] RDX: 0000000000000041 RSI: 0000000020001140 RDI: 0000000000000003 18:11:19 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0xf0000000000000}]}, 0x78) 18:11:19 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) write$uinput_user_dev(r2, &(0x7f0000000480)={'syz0\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x5], [0x0, 0x7ff, 0x1f, 0x1, 0x7, 0x2, 0x6, 0xd594, 0x3, 0x2a, 0x1c9b4fd4, 0x0, 0xfff, 0x5, 0xfffff801, 0x9, 0x3f, 0x8, 0x80, 0x6, 0x401, 0x8000, 0x1, 0xcb, 0x1, 0x6, 0x4, 0x92, 0x800000, 0x7, 0x1f, 0x140, 0x7ff, 0xabbc, 0x401, 0x0, 0x3, 0x20, 0x48, 0x12000, 0xfa, 0x1, 0xfffff6fe, 0x0, 0x7, 0x8818, 0x8000, 0x6, 0x1f, 0x8, 0x4, 0xff, 0x101, 0xd7, 0x8], [0x6, 0x6, 0x401, 0x2d5, 0xc08, 0x3, 0x7f, 0x7, 0x8, 0x4, 0xbe1a, 0x5, 0x3, 0x93c, 0x9, 0x80, 0x800, 0x7fff, 0x6, 0x1, 0x5, 0x2, 0x9, 0x7fff, 0x0, 0x8000, 0x4, 0x6, 0x2, 0x4, 0x6, 0xa2ec, 0x7, 0x100, 0x1, 0x3, 0x1f, 0x81, 0x10000, 0xc5, 0x7ff, 0x2aae236d, 0x4, 0x2000, 0x1c, 0x3, 0x2, 0x735c, 0x7fffffff, 0x6, 0xfffffffd, 0x4, 0x3ff, 0x7fffffff, 0x8, 0x224, 0x261, 0x8b8a, 0x100, 0xffffffff, 0x7fff, 0x41, 0x401, 0x200], [0x7, 0x4, 0x2, 0x5, 0x7, 0x1, 0x8, 0x0, 0x8, 0xffffff7b, 0x0, 0x5, 0x6, 0xcc9, 0x1, 0x5, 0x2, 0xfffffffe, 0xfffffff9, 0x0, 0x5, 0x101, 0x401, 0x2, 0x3, 0x3, 0x7f76, 0x3ff, 0x9, 0xc14, 0x3, 0x7, 0x5, 0x100, 0x6, 0x8, 0x2, 0xe0, 0x3f, 0x200, 0x3, 0x9, 0x3, 0x5, 0x95c6, 0x2, 0x6, 0x20, 0x3, 0x8, 0x9, 0x7, 0x9, 0x0, 0xffffd671, 0x1, 0x0, 0x853d, 0x7, 0x3ff, 0x0, 0xfde7, 0x1, 0x5]}, 0x45c) 18:11:19 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63}, [{}]}, 0x70) [ 1196.886065] RBP: 000000000078bf40 R08: 0000000000000000 R09: 0000000000000000 [ 1196.893322] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000078bf0c [ 1196.900580] R13: 00007ffc0cd00c3f R14: 00007feb6c2b79c0 R15: 000000000078bf0c 18:11:19 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) write$uinput_user_dev(r2, &(0x7f0000000480)={'syz0\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x5], [0x0, 0x7ff, 0x1f, 0x1, 0x7, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4], [0x6, 0x6, 0x401, 0x2d5, 0xc08, 0x3, 0x7f, 0x7, 0x8, 0x4, 0xbe1a, 0x5, 0x3, 0x93c, 0x9, 0x80, 0x800, 0x7fff, 0x6, 0x1, 0x5, 0x2, 0x9, 0x7fff, 0x0, 0x8000, 0x4, 0x6, 0x2, 0x4, 0x6, 0xa2ec, 0x7, 0x100, 0x1, 0x3, 0x1f, 0x81, 0x10000, 0xc5, 0x7ff, 0x2aae236d, 0x4, 0x2000, 0x1c, 0x3, 0x2, 0x735c, 0x7fffffff, 0x6, 0xfffffffd, 0x4, 0x3ff, 0x7fffffff, 0x8, 0x224, 0x261, 0x8b8a, 0x100, 0xffffffff, 0x7fff, 0x41, 0x401, 0x200], [0x7, 0x4, 0x2, 0x5, 0x7, 0x1, 0x8, 0x0, 0x8, 0xffffff7b, 0x0, 0x5, 0x6, 0xcc9, 0x1, 0x5, 0x2, 0xfffffffe, 0xfffffff9, 0x0, 0x5, 0x101, 0x401, 0x2, 0x3, 0x3, 0x7f76, 0x3ff, 0x9, 0xc14, 0x3, 0x7, 0x5, 0x100, 0x6, 0x8, 0x2, 0xe0, 0x3f, 0x200, 0x3, 0x9, 0x3, 0x5, 0x95c6, 0x2, 0x6, 0x20, 0x3, 0x8, 0x9, 0x7, 0x9, 0x0, 0xffffd671, 0x1, 0x0, 0x853d, 0x7, 0x3ff, 0x0, 0xfde7, 0x1, 0x5]}, 0x45c) 18:11:19 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000}]}, 0x78) 18:11:19 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) write$uinput_user_dev(r2, &(0x7f0000000480)={'syz0\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x5], [0x0, 0x7ff, 0x1f, 0x1, 0x7, 0x2, 0x6, 0xd594, 0x3, 0x2a, 0x1c9b4fd4, 0x0, 0xfff, 0x5, 0xfffff801, 0x9, 0x3f, 0x8, 0x80, 0x6, 0x401, 0x8000, 0x1, 0xcb, 0x1, 0x6, 0x4, 0x92, 0x800000, 0x7, 0x1f, 0x140, 0x7ff, 0xabbc, 0x401, 0x0, 0x3, 0x20, 0x48, 0x12000, 0xfa, 0x1, 0xfffff6fe, 0x0, 0x7, 0x8818, 0x8000, 0x6, 0x1f, 0x8, 0x4, 0xff, 0x101, 0xd7], [0x6, 0x6, 0x401, 0x2d5, 0xc08, 0x3, 0x7f, 0x7, 0x8, 0x4, 0xbe1a, 0x5, 0x3, 0x93c, 0x9, 0x80, 0x800, 0x7fff, 0x6, 0x1, 0x5, 0x2, 0x9, 0x7fff, 0x0, 0x8000, 0x4, 0x6, 0x2, 0x4, 0x6, 0xa2ec, 0x7, 0x100, 0x1, 0x3, 0x1f, 0x81, 0x10000, 0xc5, 0x7ff, 0x2aae236d, 0x4, 0x2000, 0x1c, 0x3, 0x2, 0x735c, 0x7fffffff, 0x6, 0xfffffffd, 0x4, 0x3ff, 0x7fffffff, 0x8, 0x224, 0x261, 0x8b8a, 0x100, 0xffffffff, 0x7fff, 0x41, 0x401, 0x200], [0x7, 0x4, 0x2, 0x5, 0x7, 0x1, 0x8, 0x0, 0x8, 0xffffff7b, 0x0, 0x5, 0x6, 0xcc9, 0x1, 0x5, 0x2, 0xfffffffe, 0xfffffff9, 0x0, 0x5, 0x101, 0x401, 0x2, 0x3, 0x3, 0x7f76, 0x3ff, 0x9, 0xc14, 0x3, 0x7, 0x5, 0x100, 0x6, 0x8, 0x2, 0xe0, 0x3f, 0x200, 0x3, 0x9, 0x3, 0x5, 0x95c6, 0x2, 0x6, 0x20, 0x3, 0x8, 0x9, 0x7, 0x9, 0x0, 0xffffd671, 0x1, 0x0, 0x853d, 0x7, 0x3ff, 0x0, 0xfde7, 0x1, 0x5]}, 0x45c) 18:11:22 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x3d}, {0x0, 0x2a}, {0x0}, {&(0x7f0000000100)="6653960d0ec5d684fa9f017ef0d60a3c27bc33760036001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479810be2aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e6517e615607676f8f9fc0ebf8b0b16d6f2c59957ab35d05692e664ebf68734ca53366295f4ad6142134b62f11e92ead037c7fb53455560c8ef0f1c94fafa924edfe92175aaa1c4ecc7aeeb72e0d050feacee907f40888c96a65545e07422bc6ac79f4c2d6ee3dab47d06e764682c72d7f16542fcfd05d2813cc182d1595016c179e1717c160300ab1ab0ac397e91bd193c036feb66a9ad2ec5b7967e7f5ff957f8b085a2437c59a", 0xf8}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x19) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x0) 18:11:22 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) write$uinput_user_dev(r2, &(0x7f0000000480)={'syz0\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x5], [0x0, 0x7ff, 0x1f, 0x1, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4], [0x6, 0x6, 0x401, 0x2d5, 0xc08, 0x3, 0x7f, 0x7, 0x8, 0x4, 0xbe1a, 0x5, 0x3, 0x93c, 0x9, 0x80, 0x800, 0x7fff, 0x6, 0x1, 0x5, 0x2, 0x9, 0x7fff, 0x0, 0x8000, 0x4, 0x6, 0x2, 0x4, 0x6, 0xa2ec, 0x7, 0x100, 0x1, 0x3, 0x1f, 0x81, 0x10000, 0xc5, 0x7ff, 0x2aae236d, 0x4, 0x2000, 0x1c, 0x3, 0x2, 0x735c, 0x7fffffff, 0x6, 0xfffffffd, 0x4, 0x3ff, 0x7fffffff, 0x8, 0x224, 0x261, 0x8b8a, 0x100, 0xffffffff, 0x7fff, 0x41, 0x401, 0x200], [0x7, 0x4, 0x2, 0x5, 0x7, 0x1, 0x8, 0x0, 0x8, 0xffffff7b, 0x0, 0x5, 0x6, 0xcc9, 0x1, 0x5, 0x2, 0xfffffffe, 0xfffffff9, 0x0, 0x5, 0x101, 0x401, 0x2, 0x3, 0x3, 0x7f76, 0x3ff, 0x9, 0xc14, 0x3, 0x7, 0x5, 0x100, 0x6, 0x8, 0x2, 0xe0, 0x3f, 0x200, 0x3, 0x9, 0x3, 0x5, 0x95c6, 0x2, 0x6, 0x20, 0x3, 0x8, 0x9, 0x7, 0x9, 0x0, 0xffffd671, 0x1, 0x0, 0x853d, 0x7, 0x3ff, 0x0, 0xfde7, 0x1, 0x5]}, 0x45c) 18:11:22 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63}, [{}]}, 0x71) 18:11:22 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x180000000000000}]}, 0x78) 18:11:22 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) write$uinput_user_dev(r2, &(0x7f0000000480)={'syz0\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x5], [0x0, 0x7ff, 0x1f, 0x1, 0x7, 0x2, 0x6, 0xd594, 0x3, 0x2a, 0x1c9b4fd4, 0x0, 0xfff, 0x5, 0xfffff801, 0x9, 0x3f, 0x8, 0x80, 0x6, 0x401, 0x8000, 0x1, 0xcb, 0x1, 0x6, 0x4, 0x92, 0x800000, 0x7, 0x1f, 0x140, 0x7ff, 0xabbc, 0x401, 0x0, 0x3, 0x20, 0x48, 0x12000, 0xfa, 0x1, 0xfffff6fe, 0x0, 0x7, 0x8818, 0x8000, 0x6, 0x1f, 0x8, 0x4, 0xff, 0x101], [0x6, 0x6, 0x401, 0x2d5, 0xc08, 0x3, 0x7f, 0x7, 0x8, 0x4, 0xbe1a, 0x5, 0x3, 0x93c, 0x9, 0x80, 0x800, 0x7fff, 0x6, 0x1, 0x5, 0x2, 0x9, 0x7fff, 0x0, 0x8000, 0x4, 0x6, 0x2, 0x4, 0x6, 0xa2ec, 0x7, 0x100, 0x1, 0x3, 0x1f, 0x81, 0x10000, 0xc5, 0x7ff, 0x2aae236d, 0x4, 0x2000, 0x1c, 0x3, 0x2, 0x735c, 0x7fffffff, 0x6, 0xfffffffd, 0x4, 0x3ff, 0x7fffffff, 0x8, 0x224, 0x261, 0x8b8a, 0x100, 0xffffffff, 0x7fff, 0x41, 0x401, 0x200], [0x7, 0x4, 0x2, 0x5, 0x7, 0x1, 0x8, 0x0, 0x8, 0xffffff7b, 0x0, 0x5, 0x6, 0xcc9, 0x1, 0x5, 0x2, 0xfffffffe, 0xfffffff9, 0x0, 0x5, 0x101, 0x401, 0x2, 0x3, 0x3, 0x7f76, 0x3ff, 0x9, 0xc14, 0x3, 0x7, 0x5, 0x100, 0x6, 0x8, 0x2, 0xe0, 0x3f, 0x200, 0x3, 0x9, 0x3, 0x5, 0x95c6, 0x2, 0x6, 0x20, 0x3, 0x8, 0x9, 0x7, 0x9, 0x0, 0xffffd671, 0x1, 0x0, 0x853d, 0x7, 0x3ff, 0x0, 0xfde7, 0x1, 0x5]}, 0x45c) 18:11:22 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x6, 0x0) write$binfmt_aout(r0, &(0x7f0000001140)=ANY=[@ANYBLOB="091589a30d6b2e2e0007003a42884400100000000000003f6d4c5cfe389367049c7a3dec544bf73f480000000000000000003b40040000710e13"], 0x41) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$TCSETAF(r0, 0x5408, &(0x7f0000000080)={0x0, 0x1, 0x0, 0x0, 0x0, "c74b272358ef1584"}) 18:11:22 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) write$uinput_user_dev(r2, &(0x7f0000000480)={'syz0\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x5], [0x0, 0x7ff, 0x1f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4], [0x6, 0x6, 0x401, 0x2d5, 0xc08, 0x3, 0x7f, 0x7, 0x8, 0x4, 0xbe1a, 0x5, 0x3, 0x93c, 0x9, 0x80, 0x800, 0x7fff, 0x6, 0x1, 0x5, 0x2, 0x9, 0x7fff, 0x0, 0x8000, 0x4, 0x6, 0x2, 0x4, 0x6, 0xa2ec, 0x7, 0x100, 0x1, 0x3, 0x1f, 0x81, 0x10000, 0xc5, 0x7ff, 0x2aae236d, 0x4, 0x2000, 0x1c, 0x3, 0x2, 0x735c, 0x7fffffff, 0x6, 0xfffffffd, 0x4, 0x3ff, 0x7fffffff, 0x8, 0x224, 0x261, 0x8b8a, 0x100, 0xffffffff, 0x7fff, 0x41, 0x401, 0x200], [0x7, 0x4, 0x2, 0x5, 0x7, 0x1, 0x8, 0x0, 0x8, 0xffffff7b, 0x0, 0x5, 0x6, 0xcc9, 0x1, 0x5, 0x2, 0xfffffffe, 0xfffffff9, 0x0, 0x5, 0x101, 0x401, 0x2, 0x3, 0x3, 0x7f76, 0x3ff, 0x9, 0xc14, 0x3, 0x7, 0x5, 0x100, 0x6, 0x8, 0x2, 0xe0, 0x3f, 0x200, 0x3, 0x9, 0x3, 0x5, 0x95c6, 0x2, 0x6, 0x20, 0x3, 0x8, 0x9, 0x7, 0x9, 0x0, 0xffffd671, 0x1, 0x0, 0x853d, 0x7, 0x3ff, 0x0, 0xfde7, 0x1, 0x5]}, 0x45c) 18:11:22 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000}]}, 0x78) 18:11:22 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63}, [{}]}, 0x72) 18:11:22 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) write$uinput_user_dev(r2, &(0x7f0000000480)={'syz0\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x5], [0x0, 0x7ff, 0x1f, 0x1, 0x7, 0x2, 0x6, 0xd594, 0x3, 0x2a, 0x1c9b4fd4, 0x0, 0xfff, 0x5, 0xfffff801, 0x9, 0x3f, 0x8, 0x80, 0x6, 0x401, 0x8000, 0x1, 0xcb, 0x1, 0x6, 0x4, 0x92, 0x800000, 0x7, 0x1f, 0x140, 0x7ff, 0xabbc, 0x401, 0x0, 0x3, 0x20, 0x48, 0x12000, 0xfa, 0x1, 0xfffff6fe, 0x0, 0x7, 0x8818, 0x8000, 0x6, 0x1f, 0x8, 0x4, 0xff], [0x6, 0x6, 0x401, 0x2d5, 0xc08, 0x3, 0x7f, 0x7, 0x8, 0x4, 0xbe1a, 0x5, 0x3, 0x93c, 0x9, 0x80, 0x800, 0x7fff, 0x6, 0x1, 0x5, 0x2, 0x9, 0x7fff, 0x0, 0x8000, 0x4, 0x6, 0x2, 0x4, 0x6, 0xa2ec, 0x7, 0x100, 0x1, 0x3, 0x1f, 0x81, 0x10000, 0xc5, 0x7ff, 0x2aae236d, 0x4, 0x2000, 0x1c, 0x3, 0x2, 0x735c, 0x7fffffff, 0x6, 0xfffffffd, 0x4, 0x3ff, 0x7fffffff, 0x8, 0x224, 0x261, 0x8b8a, 0x100, 0xffffffff, 0x7fff, 0x41, 0x401, 0x200], [0x7, 0x4, 0x2, 0x5, 0x7, 0x1, 0x8, 0x0, 0x8, 0xffffff7b, 0x0, 0x5, 0x6, 0xcc9, 0x1, 0x5, 0x2, 0xfffffffe, 0xfffffff9, 0x0, 0x5, 0x101, 0x401, 0x2, 0x3, 0x3, 0x7f76, 0x3ff, 0x9, 0xc14, 0x3, 0x7, 0x5, 0x100, 0x6, 0x8, 0x2, 0xe0, 0x3f, 0x200, 0x3, 0x9, 0x3, 0x5, 0x95c6, 0x2, 0x6, 0x20, 0x3, 0x8, 0x9, 0x7, 0x9, 0x0, 0xffffd671, 0x1, 0x0, 0x853d, 0x7, 0x3ff, 0x0, 0xfde7, 0x1, 0x5]}, 0x45c) 18:11:22 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x6, 0x0) write$binfmt_aout(r0, &(0x7f0000001140)=ANY=[@ANYBLOB="091589a30d6b2e2e0007003a42884400100000000000003f6d4c5cfe389367049c7a3dec544bf73f480000000000000000003b40040000710e13"], 0x41) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$TCSETAF(r0, 0x5408, &(0x7f0000000080)={0x0, 0x1, 0x0, 0x0, 0x0, "c74b272358ef1584"}) 18:11:22 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x500000000000000}]}, 0x78) 18:11:25 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x3d}, {0x0, 0x2a}, {0x0}, {&(0x7f0000000100)="6653960d0ec5d684fa9f017ef0d60a3c27bc33760036001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479810be2aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e6517e615607676f8f9fc0ebf8b0b16d6f2c59957ab35d05692e664ebf68734ca53366295f4ad6142134b62f11e92ead037c7fb53455560c8ef0f1c94fafa924edfe92175aaa1c4ecc7aeeb72e0d050feacee907f40888c96a65545e07422bc6ac79f4c2d6ee3dab47d06e764682c72d7f16542fcfd05d2813cc182d1595016c179e1717c160300ab1ab0ac397e91bd193c036feb66a9ad2ec5b7967e7f5ff957f8b085a2437c59a", 0xf8}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x19) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x0) 18:11:25 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) write$uinput_user_dev(r2, &(0x7f0000000480)={'syz0\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x5], [0x0, 0x7ff, 0x1f, 0x1, 0x7, 0x2, 0x6, 0xd594, 0x3, 0x2a, 0x1c9b4fd4, 0x0, 0xfff, 0x5, 0xfffff801, 0x9, 0x3f, 0x8, 0x80, 0x6, 0x401, 0x8000, 0x1, 0xcb, 0x1, 0x6, 0x4, 0x92, 0x800000, 0x7, 0x1f, 0x140, 0x7ff, 0xabbc, 0x401, 0x0, 0x3, 0x20, 0x48, 0x12000, 0xfa, 0x1, 0xfffff6fe, 0x0, 0x7, 0x8818, 0x8000, 0x6, 0x1f, 0x8, 0x4], [0x6, 0x6, 0x401, 0x2d5, 0xc08, 0x3, 0x7f, 0x7, 0x8, 0x4, 0xbe1a, 0x5, 0x3, 0x93c, 0x9, 0x80, 0x800, 0x7fff, 0x6, 0x1, 0x5, 0x2, 0x9, 0x7fff, 0x0, 0x8000, 0x4, 0x6, 0x2, 0x4, 0x6, 0xa2ec, 0x7, 0x100, 0x1, 0x3, 0x1f, 0x81, 0x10000, 0xc5, 0x7ff, 0x2aae236d, 0x4, 0x2000, 0x1c, 0x3, 0x2, 0x735c, 0x7fffffff, 0x6, 0xfffffffd, 0x4, 0x3ff, 0x7fffffff, 0x8, 0x224, 0x261, 0x8b8a, 0x100, 0xffffffff, 0x7fff, 0x41, 0x401, 0x200], [0x7, 0x4, 0x2, 0x5, 0x7, 0x1, 0x8, 0x0, 0x8, 0xffffff7b, 0x0, 0x5, 0x6, 0xcc9, 0x1, 0x5, 0x2, 0xfffffffe, 0xfffffff9, 0x0, 0x5, 0x101, 0x401, 0x2, 0x3, 0x3, 0x7f76, 0x3ff, 0x9, 0xc14, 0x3, 0x7, 0x5, 0x100, 0x6, 0x8, 0x2, 0xe0, 0x3f, 0x200, 0x3, 0x9, 0x3, 0x5, 0x95c6, 0x2, 0x6, 0x20, 0x3, 0x8, 0x9, 0x7, 0x9, 0x0, 0xffffd671, 0x1, 0x0, 0x853d, 0x7, 0x3ff, 0x0, 0xfde7, 0x1, 0x5]}, 0x45c) 18:11:25 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) write$uinput_user_dev(r2, &(0x7f0000000480)={'syz0\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x5], [0x0, 0x7ff, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4], [0x6, 0x6, 0x401, 0x2d5, 0xc08, 0x3, 0x7f, 0x7, 0x8, 0x4, 0xbe1a, 0x5, 0x3, 0x93c, 0x9, 0x80, 0x800, 0x7fff, 0x6, 0x1, 0x5, 0x2, 0x9, 0x7fff, 0x0, 0x8000, 0x4, 0x6, 0x2, 0x4, 0x6, 0xa2ec, 0x7, 0x100, 0x1, 0x3, 0x1f, 0x81, 0x10000, 0xc5, 0x7ff, 0x2aae236d, 0x4, 0x2000, 0x1c, 0x3, 0x2, 0x735c, 0x7fffffff, 0x6, 0xfffffffd, 0x4, 0x3ff, 0x7fffffff, 0x8, 0x224, 0x261, 0x8b8a, 0x100, 0xffffffff, 0x7fff, 0x41, 0x401, 0x200], [0x7, 0x4, 0x2, 0x5, 0x7, 0x1, 0x8, 0x0, 0x8, 0xffffff7b, 0x0, 0x5, 0x6, 0xcc9, 0x1, 0x5, 0x2, 0xfffffffe, 0xfffffff9, 0x0, 0x5, 0x101, 0x401, 0x2, 0x3, 0x3, 0x7f76, 0x3ff, 0x9, 0xc14, 0x3, 0x7, 0x5, 0x100, 0x6, 0x8, 0x2, 0xe0, 0x3f, 0x200, 0x3, 0x9, 0x3, 0x5, 0x95c6, 0x2, 0x6, 0x20, 0x3, 0x8, 0x9, 0x7, 0x9, 0x0, 0xffffd671, 0x1, 0x0, 0x853d, 0x7, 0x3ff, 0x0, 0xfde7, 0x1, 0x5]}, 0x45c) 18:11:25 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63}, [{}]}, 0x73) 18:11:25 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x6, 0x0) write$binfmt_aout(r0, &(0x7f0000001140)=ANY=[@ANYBLOB="091589a30d6b2e2e0007003a42884400100000000000003f6d4c5cfe389367049c7a3dec544bf73f480000000000000000003b40040000710e13"], 0x41) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$TCSETAF(r0, 0x5408, &(0x7f0000000080)={0x0, 0x1, 0x0, 0x0, 0x0, "c74b272358ef1584"}) 18:11:25 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x600000000000000}]}, 0x78) 18:11:25 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) write$uinput_user_dev(r2, &(0x7f0000000480)={'syz0\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x5], [0x0, 0x7ff, 0x1f, 0x1, 0x7, 0x2, 0x6, 0xd594, 0x3, 0x2a, 0x1c9b4fd4, 0x0, 0xfff, 0x5, 0xfffff801, 0x9, 0x3f, 0x8, 0x80, 0x6, 0x401, 0x8000, 0x1, 0xcb, 0x1, 0x6, 0x4, 0x92, 0x800000, 0x7, 0x1f, 0x140, 0x7ff, 0xabbc, 0x401, 0x0, 0x3, 0x20, 0x48, 0x12000, 0xfa, 0x1, 0xfffff6fe, 0x0, 0x7, 0x8818, 0x8000, 0x6, 0x1f, 0x8], [0x6, 0x6, 0x401, 0x2d5, 0xc08, 0x3, 0x7f, 0x7, 0x8, 0x4, 0xbe1a, 0x5, 0x3, 0x93c, 0x9, 0x80, 0x800, 0x7fff, 0x6, 0x1, 0x5, 0x2, 0x9, 0x7fff, 0x0, 0x8000, 0x4, 0x6, 0x2, 0x4, 0x6, 0xa2ec, 0x7, 0x100, 0x1, 0x3, 0x1f, 0x81, 0x10000, 0xc5, 0x7ff, 0x2aae236d, 0x4, 0x2000, 0x1c, 0x3, 0x2, 0x735c, 0x7fffffff, 0x6, 0xfffffffd, 0x4, 0x3ff, 0x7fffffff, 0x8, 0x224, 0x261, 0x8b8a, 0x100, 0xffffffff, 0x7fff, 0x41, 0x401, 0x200], [0x7, 0x4, 0x2, 0x5, 0x7, 0x1, 0x8, 0x0, 0x8, 0xffffff7b, 0x0, 0x5, 0x6, 0xcc9, 0x1, 0x5, 0x2, 0xfffffffe, 0xfffffff9, 0x0, 0x5, 0x101, 0x401, 0x2, 0x3, 0x3, 0x7f76, 0x3ff, 0x9, 0xc14, 0x3, 0x7, 0x5, 0x100, 0x6, 0x8, 0x2, 0xe0, 0x3f, 0x200, 0x3, 0x9, 0x3, 0x5, 0x95c6, 0x2, 0x6, 0x20, 0x3, 0x8, 0x9, 0x7, 0x9, 0x0, 0xffffd671, 0x1, 0x0, 0x853d, 0x7, 0x3ff, 0x0, 0xfde7, 0x1, 0x5]}, 0x45c) 18:11:25 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) write$uinput_user_dev(r2, &(0x7f0000000480)={'syz0\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x5], [0x0, 0x7ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4], [0x6, 0x6, 0x401, 0x2d5, 0xc08, 0x3, 0x7f, 0x7, 0x8, 0x4, 0xbe1a, 0x5, 0x3, 0x93c, 0x9, 0x80, 0x800, 0x7fff, 0x6, 0x1, 0x5, 0x2, 0x9, 0x7fff, 0x0, 0x8000, 0x4, 0x6, 0x2, 0x4, 0x6, 0xa2ec, 0x7, 0x100, 0x1, 0x3, 0x1f, 0x81, 0x10000, 0xc5, 0x7ff, 0x2aae236d, 0x4, 0x2000, 0x1c, 0x3, 0x2, 0x735c, 0x7fffffff, 0x6, 0xfffffffd, 0x4, 0x3ff, 0x7fffffff, 0x8, 0x224, 0x261, 0x8b8a, 0x100, 0xffffffff, 0x7fff, 0x41, 0x401, 0x200], [0x7, 0x4, 0x2, 0x5, 0x7, 0x1, 0x8, 0x0, 0x8, 0xffffff7b, 0x0, 0x5, 0x6, 0xcc9, 0x1, 0x5, 0x2, 0xfffffffe, 0xfffffff9, 0x0, 0x5, 0x101, 0x401, 0x2, 0x3, 0x3, 0x7f76, 0x3ff, 0x9, 0xc14, 0x3, 0x7, 0x5, 0x100, 0x6, 0x8, 0x2, 0xe0, 0x3f, 0x200, 0x3, 0x9, 0x3, 0x5, 0x95c6, 0x2, 0x6, 0x20, 0x3, 0x8, 0x9, 0x7, 0x9, 0x0, 0xffffd671, 0x1, 0x0, 0x853d, 0x7, 0x3ff, 0x0, 0xfde7, 0x1, 0x5]}, 0x45c) 18:11:25 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x700000000000000}]}, 0x78) 18:11:25 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63}, [{}]}, 0x74) 18:11:25 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x6, 0x0) write$binfmt_aout(r0, &(0x7f0000001140)=ANY=[@ANYBLOB="091589a30d6b2e2e0007003a42884400100000000000003f6d4c5cfe389367049c7a3dec544bf73f480000000000000000003b40040000710e13"], 0x41) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r1) ioctl$TCSETAF(r0, 0x5408, &(0x7f0000000080)={0x0, 0x1, 0x0, 0x0, 0x0, "c74b272358ef1584"}) 18:11:25 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) write$uinput_user_dev(r2, &(0x7f0000000480)={'syz0\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x5], [0x0, 0x7ff, 0x1f, 0x1, 0x7, 0x2, 0x6, 0xd594, 0x3, 0x2a, 0x1c9b4fd4, 0x0, 0xfff, 0x5, 0xfffff801, 0x9, 0x3f, 0x8, 0x80, 0x6, 0x401, 0x8000, 0x1, 0xcb, 0x1, 0x6, 0x4, 0x92, 0x800000, 0x7, 0x1f, 0x140, 0x7ff, 0xabbc, 0x401, 0x0, 0x3, 0x20, 0x48, 0x12000, 0xfa, 0x1, 0xfffff6fe, 0x0, 0x7, 0x8818, 0x8000, 0x6, 0x1f], [0x6, 0x6, 0x401, 0x2d5, 0xc08, 0x3, 0x7f, 0x7, 0x8, 0x4, 0xbe1a, 0x5, 0x3, 0x93c, 0x9, 0x80, 0x800, 0x7fff, 0x6, 0x1, 0x5, 0x2, 0x9, 0x7fff, 0x0, 0x8000, 0x4, 0x6, 0x2, 0x4, 0x6, 0xa2ec, 0x7, 0x100, 0x1, 0x3, 0x1f, 0x81, 0x10000, 0xc5, 0x7ff, 0x2aae236d, 0x4, 0x2000, 0x1c, 0x3, 0x2, 0x735c, 0x7fffffff, 0x6, 0xfffffffd, 0x4, 0x3ff, 0x7fffffff, 0x8, 0x224, 0x261, 0x8b8a, 0x100, 0xffffffff, 0x7fff, 0x41, 0x401, 0x200], [0x7, 0x4, 0x2, 0x5, 0x7, 0x1, 0x8, 0x0, 0x8, 0xffffff7b, 0x0, 0x5, 0x6, 0xcc9, 0x1, 0x5, 0x2, 0xfffffffe, 0xfffffff9, 0x0, 0x5, 0x101, 0x401, 0x2, 0x3, 0x3, 0x7f76, 0x3ff, 0x9, 0xc14, 0x3, 0x7, 0x5, 0x100, 0x6, 0x8, 0x2, 0xe0, 0x3f, 0x200, 0x3, 0x9, 0x3, 0x5, 0x95c6, 0x2, 0x6, 0x20, 0x3, 0x8, 0x9, 0x7, 0x9, 0x0, 0xffffd671, 0x1, 0x0, 0x853d, 0x7, 0x3ff, 0x0, 0xfde7, 0x1, 0x5]}, 0x45c) 18:11:25 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63}, [{}]}, 0x75) 18:11:28 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x3d}, {0x0, 0x2a}, {0x0}, {&(0x7f0000000100)="6653960d0ec5d684fa9f017ef0d60a3c27bc33760036001500ae47a825d86800278dcff47d010000805acf4f8f36460234432479810be2aed75d492b415bcee00a06dc9d8e99adaf81dcfc6afd983f79e6517e615607676f8f9fc0ebf8b0b16d6f2c59957ab35d05692e664ebf68734ca53366295f4ad6142134b62f11e92ead037c7fb53455560c8ef0f1c94fafa924edfe92175aaa1c4ecc7aeeb72e0d050feacee907f40888c96a65545e07422bc6ac79f4c2d6ee3dab47d06e764682c72d7f16542fcfd05d2813cc182d1595016c179e1717c160300ab1ab0ac397e91bd193c036feb66a9ad2ec5b7967e7f5ff957f8b085a2437c59a", 0xf8}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x19) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x0) 18:11:28 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) write$uinput_user_dev(r2, &(0x7f0000000480)={'syz0\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x5], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4], [0x6, 0x6, 0x401, 0x2d5, 0xc08, 0x3, 0x7f, 0x7, 0x8, 0x4, 0xbe1a, 0x5, 0x3, 0x93c, 0x9, 0x80, 0x800, 0x7fff, 0x6, 0x1, 0x5, 0x2, 0x9, 0x7fff, 0x0, 0x8000, 0x4, 0x6, 0x2, 0x4, 0x6, 0xa2ec, 0x7, 0x100, 0x1, 0x3, 0x1f, 0x81, 0x10000, 0xc5, 0x7ff, 0x2aae236d, 0x4, 0x2000, 0x1c, 0x3, 0x2, 0x735c, 0x7fffffff, 0x6, 0xfffffffd, 0x4, 0x3ff, 0x7fffffff, 0x8, 0x224, 0x261, 0x8b8a, 0x100, 0xffffffff, 0x7fff, 0x41, 0x401, 0x200], [0x7, 0x4, 0x2, 0x5, 0x7, 0x1, 0x8, 0x0, 0x8, 0xffffff7b, 0x0, 0x5, 0x6, 0xcc9, 0x1, 0x5, 0x2, 0xfffffffe, 0xfffffff9, 0x0, 0x5, 0x101, 0x401, 0x2, 0x3, 0x3, 0x7f76, 0x3ff, 0x9, 0xc14, 0x3, 0x7, 0x5, 0x100, 0x6, 0x8, 0x2, 0xe0, 0x3f, 0x200, 0x3, 0x9, 0x3, 0x5, 0x95c6, 0x2, 0x6, 0x20, 0x3, 0x8, 0x9, 0x7, 0x9, 0x0, 0xffffd671, 0x1, 0x0, 0x853d, 0x7, 0x3ff, 0x0, 0xfde7, 0x1, 0x5]}, 0x45c) 18:11:28 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000000000}]}, 0x78) 18:11:28 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x6, 0x0) write$binfmt_aout(r0, &(0x7f0000001140)=ANY=[@ANYBLOB="091589a30d6b2e2e0007003a42884400100000000000003f6d4c5cfe389367049c7a3dec544bf73f480000000000000000003b40040000710e13"], 0x41) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r1) ioctl$TCSETAF(r0, 0x5408, &(0x7f0000000080)={0x0, 0x1, 0x0, 0x0, 0x0, "c74b272358ef1584"}) 18:11:28 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) write$uinput_user_dev(r2, &(0x7f0000000480)={'syz0\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x5], [0x0, 0x7ff, 0x1f, 0x1, 0x7, 0x2, 0x6, 0xd594, 0x3, 0x2a, 0x1c9b4fd4, 0x0, 0xfff, 0x5, 0xfffff801, 0x9, 0x3f, 0x8, 0x80, 0x6, 0x401, 0x8000, 0x1, 0xcb, 0x1, 0x6, 0x4, 0x92, 0x800000, 0x7, 0x1f, 0x140, 0x7ff, 0xabbc, 0x401, 0x0, 0x3, 0x20, 0x48, 0x12000, 0xfa, 0x1, 0xfffff6fe, 0x0, 0x7, 0x8818, 0x8000, 0x6], [0x6, 0x6, 0x401, 0x2d5, 0xc08, 0x3, 0x7f, 0x7, 0x8, 0x4, 0xbe1a, 0x5, 0x3, 0x93c, 0x9, 0x80, 0x800, 0x7fff, 0x6, 0x1, 0x5, 0x2, 0x9, 0x7fff, 0x0, 0x8000, 0x4, 0x6, 0x2, 0x4, 0x6, 0xa2ec, 0x7, 0x100, 0x1, 0x3, 0x1f, 0x81, 0x10000, 0xc5, 0x7ff, 0x2aae236d, 0x4, 0x2000, 0x1c, 0x3, 0x2, 0x735c, 0x7fffffff, 0x6, 0xfffffffd, 0x4, 0x3ff, 0x7fffffff, 0x8, 0x224, 0x261, 0x8b8a, 0x100, 0xffffffff, 0x7fff, 0x41, 0x401, 0x200], [0x7, 0x4, 0x2, 0x5, 0x7, 0x1, 0x8, 0x0, 0x8, 0xffffff7b, 0x0, 0x5, 0x6, 0xcc9, 0x1, 0x5, 0x2, 0xfffffffe, 0xfffffff9, 0x0, 0x5, 0x101, 0x401, 0x2, 0x3, 0x3, 0x7f76, 0x3ff, 0x9, 0xc14, 0x3, 0x7, 0x5, 0x100, 0x6, 0x8, 0x2, 0xe0, 0x3f, 0x200, 0x3, 0x9, 0x3, 0x5, 0x95c6, 0x2, 0x6, 0x20, 0x3, 0x8, 0x9, 0x7, 0x9, 0x0, 0xffffd671, 0x1, 0x0, 0x853d, 0x7, 0x3ff, 0x0, 0xfde7, 0x1, 0x5]}, 0x45c) 18:11:28 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63}, [{}]}, 0x76) 18:11:28 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63}, [{}]}, 0x77) 18:11:28 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) write$uinput_user_dev(r2, &(0x7f0000000480)={'syz0\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x5], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4], [0x6, 0x6, 0x401, 0x2d5, 0xc08, 0x3, 0x7f, 0x7, 0x8, 0x4, 0xbe1a, 0x5, 0x3, 0x93c, 0x9, 0x80, 0x800, 0x7fff, 0x6, 0x1, 0x5, 0x2, 0x9, 0x7fff, 0x0, 0x8000, 0x4, 0x6, 0x2, 0x4, 0x6, 0xa2ec, 0x7, 0x100, 0x1, 0x3, 0x1f, 0x81, 0x10000, 0xc5, 0x7ff, 0x2aae236d, 0x4, 0x2000, 0x1c, 0x3, 0x2, 0x735c, 0x7fffffff, 0x6, 0xfffffffd, 0x4, 0x3ff, 0x7fffffff, 0x8, 0x224, 0x261, 0x8b8a, 0x100, 0xffffffff, 0x7fff, 0x41, 0x401], [0x7, 0x4, 0x2, 0x5, 0x7, 0x1, 0x8, 0x0, 0x8, 0xffffff7b, 0x0, 0x5, 0x6, 0xcc9, 0x1, 0x5, 0x2, 0xfffffffe, 0xfffffff9, 0x0, 0x5, 0x101, 0x401, 0x2, 0x3, 0x3, 0x7f76, 0x3ff, 0x9, 0xc14, 0x3, 0x7, 0x5, 0x100, 0x6, 0x8, 0x2, 0xe0, 0x3f, 0x200, 0x3, 0x9, 0x3, 0x5, 0x95c6, 0x2, 0x6, 0x20, 0x3, 0x8, 0x9, 0x7, 0x9, 0x0, 0xffffd671, 0x1, 0x0, 0x853d, 0x7, 0x3ff, 0x0, 0xfde7, 0x1, 0x5]}, 0x45c) 18:11:28 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68}, [{0x0, 0x0, 0x0, 0x0, 0x0, 0x900000000000000}]}, 0x78) 18:11:28 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x1b, 0x5b, 0x7, 0x7, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x63}, [{}]}, 0x200000b8) 18:11:28 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x6, 0x0) write$binfmt_aout(r0, &(0x7f0000001140)=ANY=[@ANYBLOB="091589a30d6b2e2e0007003a42884400100000000000003f6d4c5cfe389367049c7a3dec544bf73f480000000000000000003b40040000710e13"], 0x41) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r1) ioctl$TCSETAF(r0, 0x5408, &(0x7f0000000080)={0x0, 0x1, 0x0, 0x0, 0x0, "c74b272358ef1584"}) 18:11:28 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8002, 0x0) write$uinput_user_dev(r2, &(0x7f0000000480)={'syz0\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x5], [0x0, 0x7ff, 0x1f, 0x1, 0x7, 0x2, 0x6, 0xd594, 0x3, 0x2a, 0x1c9b4fd4, 0x0, 0xfff, 0x5, 0xfffff801, 0x9, 0x3f, 0x8, 0x80, 0x6, 0x401, 0x8000, 0x1, 0xcb, 0x1, 0x6, 0x4, 0x92, 0x800000, 0x7, 0x1f, 0x140, 0x7ff, 0xabbc, 0x401, 0x0, 0x3, 0x20, 0x48, 0x12000, 0xfa, 0x1, 0xfffff6fe, 0x0, 0x7, 0x8818, 0x8000], [0x6, 0x6, 0x401, 0x2d5, 0xc08, 0x3, 0x7f, 0x7, 0x8, 0x4, 0xbe1a, 0x5, 0x3, 0x93c, 0x9, 0x80, 0x800, 0x7fff, 0x6, 0x1, 0x5, 0x2, 0x9, 0x7fff, 0x0, 0x8000, 0x4, 0x6, 0x2, 0x4, 0x6, 0xa2ec, 0x7, 0x100, 0x1, 0x3, 0x1f, 0x81, 0x10000, 0xc5, 0x7ff, 0x2aae236d, 0x4, 0x2000, 0x1c, 0x3, 0x2, 0x735c, 0x7fffffff, 0x6, 0xfffffffd, 0x4, 0x3ff, 0x7fffffff, 0x8, 0x224, 0x261, 0x8b8a, 0x100, 0xffffffff, 0x7fff, 0x41, 0x401, 0x200], [0x7, 0x4, 0x2, 0x5, 0x7, 0x1, 0x8, 0x0, 0x8, 0xffffff7b, 0x0, 0x5, 0x6, 0xcc9, 0x1, 0x5, 0x2, 0xfffffffe, 0xfffffff9, 0x0, 0x5, 0x101, 0x401, 0x2, 0x3, 0x3, 0x7f76, 0x3ff, 0x9, 0xc14, 0x3, 0x7, 0x5, 0x100, 0x6, 0x8, 0x2, 0xe0, 0x3f, 0x200, 0x3, 0x9, 0x3, 0x5, 0x95c6, 0x2, 0x6, 0x20, 0x3, 0x8, 0x9, 0x7, 0x9, 0x0, 0xffffd671, 0x1, 0x0, 0x853d, 0x7, 0x3ff, 0x0, 0xfde7, 0x1, 0x5]}, 0x45c)