perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000001e00)) r0 = syz_open_procfs(0x0, &(0x7f0000001580)='net/snmp\x00') readv(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000001780)=""/251, 0xfb}, {&(0x7f0000001500)=""/102, 0x66}, {&(0x7f0000001900)=""/130, 0x82}, {&(0x7f00000019c0)=""/95, 0x5f}], 0x4) readv(r0, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4095, 0xfff}], 0x17) readv(0xffffffffffffffff, &(0x7f0000000480)=[{&(0x7f0000001640)=""/79, 0x4f}, {&(0x7f0000000200)=""/58, 0x3a}, {&(0x7f00000016c0)=""/100, 0x64}], 0x3) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r1, 0x6801, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000001a40)=ANY=[@ANYRES32=0xffffffffffffffff, @ANYBLOB="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"]) getdents(r2, &(0x7f0000000380)=""/215, 0xd7) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0/file1\x00', 0x0) mount$9p_unix(&(0x7f0000000140)='./file1\x00', &(0x7f00000001c0)='./file1\x00', 0x0, 0x1f381d, 0x0) syz_open_dev$tty20(0xc, 0x4, 0x0)