perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000440)="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", 0x164}], 0x1, 0x0) r1 = add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000100)=0x5e) r2 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x1}, 0x0, 0x0, r1) add_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)="18419cc68448de3ae8f97ea6a46d823d4f19cecbf569a58b79851d91f3da031fecf4dfebf4ac3b13988a048b4e35761cb05a5d5b28e1ca6ceebae02cbbf7e894098749d5f99cb226f14f00b6034bfb02a7a5af409f531820bd319b9d7c3405022b550d32ad368fdbbddb8ed631d1dde9a4ed", 0xff10, r2) syz_open_procfs(0x0, &(0x7f0000000300)='net/ip_tables_matches\x00')