prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) prctl$PR_GET_TAGGED_ADDR_CTRL(0x38) r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r0, 0xc0189373, &(0x7f0000000380)=ANY=[@ANYBLOB="010000480100000018000000a35cdb56715c87048e60931398a3ec608b265e94abc32e9a8ea8199096cfe5298d4f9b980f66dc8cac6bc0ba891005f3bc191fc5cee85f0f3fba3042c8cbaf58cb5f1227c91ad47c582c91a4544874bf681a4a6d58d2e64bddff0f10c1a45dbafa32cfcef6bca192c628d280650994c724f63298120259159f789f60a3f9fce9c471b5f5f8cc4990d045209459b76c5fbaabe6a8974428592781077a7c7c377b5c8be3369ef4ce97838e6e7adce5b682f900"/200, @ANYRES32=r0, @ANYBLOB="000000c0000000002e2f66696c653000"]) r2 = openat(r1, &(0x7f0000000140)='./file1\x00', 0x80000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x7, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1f, 0x3, 0x3, &(0x7f0000000200)) readahead(r3, 0x8, 0x8) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x9, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8}, 0x0, 0x2, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400, 0x80000, 0x0, 0x204738d712d63115, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$tty1(0xc, 0x4, 0x1) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x5}}}, {{0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}}}}, 0x108) r5 = accept4$inet(r4, &(0x7f0000000000)={0x2, 0x0, @local}, &(0x7f0000000040)=0x10, 0x0) ioctl$sock_SIOCGIFCONF(r5, 0x8912, &(0x7f0000000100)=@buf={0x18, &(0x7f0000000080)="b6a79db32c3ff2e5b10faa24dc8055e80cde008c4ed39d58"}) write$binfmt_elf64(r4, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x42a) dup3(0xffffffffffffffff, r3, 0x0) lseek(r2, 0x0, 0x7) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0)