r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x2) ftruncate(r0, 0x1000003) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa418b6d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='net/netlink\x00') read(r2, &(0x7f00000002c0)=""/225, 0xe1) socket$nl_route(0x10, 0x3, 0x0) r3 = dup2(r1, r1) write$binfmt_elf64(r3, &(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0x3c7) r4 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x266d40) r5 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000040)=[r2, r3, r1, r4, 0xffffffffffffffff, r5, r1], 0x7) fcntl$addseals(r2, 0x409, 0x8) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) ioctl$SNDRV_TIMER_IOCTL_SELECT(r5, 0x40345410, &(0x7f0000000100)={{0xffffffffffffffff, 0x0, 0x39, 0x1, 0x8}}) r6 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x105142, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lseek(r6, 0x0, 0x2) r7 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x4000, 0x0) copy_file_range(r7, 0x0, r6, 0x0, 0x200f5ef, 0x0)