ioctl$TCSETSW2(0xffffffffffffffff, 0x402c542c, &(0x7f00000001c0)={0x7, 0x6, 0x40, 0x20, 0x4b, "e975ab898e33a5e046140d048fc1cad2943df8", 0x400, 0x81}) r0 = perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$keyring(&(0x7f0000000180), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$KEYCTL_RESTRICT_KEYRING(0xb, r1, &(0x7f0000000200)='asymmetric\x00', &(0x7f0000000400)=@secondary) request_key(&(0x7f0000000300)='pkcs7_test\x00', &(0x7f0000000440)={'syz', 0x0}, 0xfffffffffffffffc, 0xfffffffffffffffb) r2 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000680)={&(0x7f00000006c0)=ANY=[@ANYRESHEX=r0, @ANYBLOB="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"/310], 0x20}, 0x1, 0x0, 0x0, 0x24004040}, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0xc081, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x10000000000001, 0xffffffffffffffff, 0x0) r3 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0xfffffffffffffffd, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020801000470008000f8e3", 0x33}], 0x0, &(0x7f00000000c0)=ANY=[]) mkdirat(r3, &(0x7f0000000040)='./file0\x00', 0x0) renameat(r3, &(0x7f0000000140)='./file0\x00', r3, &(0x7f0000000180)='./file1\x00') clone3(&(0x7f0000005880)={0x0, 0x0, 0x0, 0x0, {0x1e}, 0x0, 0x0, 0x0, 0x0}, 0x58)