perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0xbe76f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x9, @loopback}, 0x1c) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0xa84c2, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000680)=@IORING_OP_WRITEV={0x2, 0x0, 0x2007, @fd=r0, 0x2, &(0x7f0000000500)=[{&(0x7f00000003c0)="009c9db43a65ec0a64e58b01018a39c6663ebbd10d37bb5443ec6d40a272c584c1a29ca89eee4aebb6783f52fdb26c3a8d7162ac5db04f1bd829d2e38c77e3000829fe5ec9ba9f615d9a723c949573e8028f3efa02d1163acbc3a3146a6925e32daf318946bb95c27fb11329be9e8e072f3c57ea8172d65c6c9e9ef7c1176c3d32225e40e8596c62bb79462f0cd8da06f6e5e700c1ef52931c0c49c9e9c139745b2c477a4f00", 0xa6}, {&(0x7f0000000580)="a20108c5720b3e790d4ec1273ea7f5d1f2b668de6c3db8735b0f85836afff67554da103305076c72bfeab34d7a3a2c78377efbc9c1a252f0bd8f9bd2d91cd4145496d95f57cc59224871c6ce6ee4412f5312868f4c4633ac49dc73236ab581581b76b8c298e9862af26d20360cc66988537dea3afe320b3ea9e01966c5057c86b1d02cb362083f4bc9c9ac5498354de81f1ec034ec4f5c0a99920ca6bd538a498597099def13810ea3c1d2b94dcbab685d0d9da3162e64920152fdec1536845eb9e2c866ff140f73f24eee3476d327af330740edc14a1a4c20ddb458e5356f9cb7af4951a17dcdf271460567b5777f8f", 0xf0}, {&(0x7f0000000700)="134440ea8e4cd7548a4bc0ee9c08b07a8aa6d5c6532c6279efafa3a0e08b2f44dc19c46317051b5e6bef7d7ffdb1660eecb0beb85832b55b1fc65a9b1d63363a41ddc4b01ab6cdb43ce3267aee449cc499768455dac311affb40341f79ee7f9c913b2f20b29766ebb8e6c6f7f382e94bbaabfb8972430d46142fb224cf45a14634c7d45af2dccdd1247cb9cd90c28e5285fae2344a8f45dff222361edc250bdcd93164233ecaeb87751f112442f64b487c4d37082c52c7346c7f1eda40f80d7af244efb01ec2dd26bfc3b2b1366a5f97", 0xd0}], 0x3, 0xc}, 0x2) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xa01}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000140)='/proc/sys/net/ipv4/tcp_wmem\x00', 0x1, 0x0) r2 = syz_mount_image$msdos(&(0x7f0000000180), &(0x7f0000000200)='./file1\x00', 0x3, 0x1, &(0x7f00000002c0)=[{&(0x7f0000000240)="6dc2d42e58698f7723453a1839a45d3994d58741ce8d06aaa58f9300b76ab3305e326962f9e01787afa21d189f13e60542a5fc4e11cb884aa664634b35709a5b18e82d5dac04a3ce8b351d599d99e2e36c544802253a52f7a39a6684e3", 0x5d, 0x1}], 0x1000, &(0x7f0000000300)={[{@dots}, {@fat=@showexec}, {@dots}, {@fat=@allow_utime={'allow_utime', 0x3d, 0x6}}, {@dots}], [{@func={'func', 0x3d, 'BPRM_CHECK'}}, {@euid_lt={'euid<', 0xffffffffffffffff}}, {@appraise_type}, {@subj_role={'subj_role', 0x3d, '\xc1\','}}]}) sendfile(r1, r2, 0x0, 0xfffffffffffffffa) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001)