perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter\x00') pread64(r0, &(0x7f0000000240)=""/83, 0x53, 0x200000048) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f00000098c0)=ANY=[@ANYBLOB="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"], 0x31b) ioctl$INCFS_IOC_FILL_BLOCKS(r1, 0x80106720, &(0x7f0000000080)={0x0, 0x0}) clone3(&(0x7f00000008c0)={0x3040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffff9c, 0x0, 0x0, 0x0, 0x0) msgsnd(0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="09e9af064571d8569be44f8f3b03461c633528808a17dc17eea0390153efab6d4652ce9f4387057db34bf3571bf8fa08c11b465b6de544feea36356d9d54924207d5a05f4e4b78bbfecae64496cbe6dbf40fb9ba3ae3acc21d48aeed1157bc65f739d3fd2a873f0f79000000000000000000000000000000e926872b1032e2"], 0x8, 0x0)