fchown(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x120}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x6) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x0, 0x1f012, r0, 0x0) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000080)) r1 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc4}, &(0x7f0000000280)={0x0, "6ae3a2279441c8bccb61a522f5e4e661ce0cb09305967cbd5b3e03bcee0579af6f2b79a27a599a8947acb47fc038d0c2a8bf68feedeeb2fcfcb3f785bb85aec9", 0x200000}, 0x48, 0xfffffffffffffffc) keyctl$chown(0x4, r1, 0x0, 0x0) keyctl$unlink(0x9, 0x0, 0xfffffffffffffffd) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000000c0), 0x6e, &(0x7f00000001c0)=[{&(0x7f0000000140)=""/103, 0x67}], 0x1, &(0x7f0000000200)=[@cred={{0x1c}}], 0x20}, 0x40) stat(&(0x7f00000001c0)='./file2\x00', &(0x7f0000001c00)) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_RELOAD_REGDB(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, r2, 0x1}, 0x14}}, 0x0) sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000380)={&(0x7f0000000440)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="00012dbd7000fddbdf253100000008000300", @ANYRES32=0x0, @ANYBLOB="0c009900010000006f0000008ed5e310256b64492c5cf67881b349fa05e3a36e1b7adb9a1f1a38fd1c17b5bcf31322c7b9d77d582f39322606530c0bddfb2ed8c811c212d11cc4a27895e10c4651cb10e4a540223788b3c485495252d578237cac7c443c23234baff3bc27d8219d1e6eff87e301e897aadbcdc3a6a48135cc2192088f6a5e6411705d216a6e65c1fb221b0728263e09f3a38dc6e00b0bc6dbc26933076142aa2a529704c668432c4ab7d2af4c5a95dd1e7eb65d77c660ed5bace8ed"], 0x28}, 0x1, 0x0, 0x0, 0x40001}, 0x10) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x880, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fork()