r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readv(r0, &(0x7f0000000280)=[{&(0x7f0000001e00)=""/4098, 0x1002}], 0x1) r2 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\x02\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\x0fG/\xf9\n', 0x6) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x2, 0x1f012, r2, 0x0) r3 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r4, 0x40086607, &(0x7f0000000080)) mincore(&(0x7f0000b1c000/0x3000)=nil, 0x3000, &(0x7f0000000300)=""/108) signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000840)=ANY=[@ANYBLOB="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"], 0x280}, 0x1, 0x0, 0x0, 0x81}, 0x24000050) r5 = signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r5, 0xc0502100, &(0x7f0000000500)) r6 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r0, 0xc018937b, &(0x7f0000000180)={{0x1, 0x1, 0x18, r0, {0xee00, 0xee00}}, './file1\x00'}) keyctl$chown(0x4, 0x0, r7, 0x0) keyctl$KEYCTL_MOVE(0x1e, r3, r6, 0xfffffffffffffff9, 0x0) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x3}, &(0x7f0000000240)='\x00', r3) readv(r2, &(0x7f0000000000)=[{&(0x7f0000000380)=""/88, 0x58}, {&(0x7f0000000400)=""/118, 0x76}], 0x100000000000030a) fcntl$dupfd(r1, 0x406, 0xffffffffffffffff)