r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0xff, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000100), 0xc}, 0x0, 0x477a, 0x0, 0x0, 0x0, 0x1000000, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xd) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000006c0)=ANY=[@ANYBLOB="98000000200039040000000000000000020000000dc0c23671f1a964651e4d52c3dc9432e6af519d60c90ca7ea83dce8f6a9c36adbbf7c23348ed7953cc124f0f2e2f1324bf1fc7a4e1f5a7bf5116e03f38056144e4fd6711849a6579e46004fbfb9ae80572129d57aa41a4c792b56978ebd2e72f57ca14145d7bcd879afed4e97abd691d56cf2d815f272170c0011000000bb3e3c7562af739c74b82fd57e7bd51e163e9c2394948632056b9357f234b64631cba457c59e6a7cae9098c89e3c7aa8b1cbc03bd674263161cff69945516e14595dfad881c353d7fb9bbdc2fb19f3306b4f29f5ac8dddb92ee4fe33f6e190dffd186aa055b9a9547a834f1d619073f3ccf4b3acda5d78a8cff254a2de72f20938d689ca4044e9b0a3ee3627818c70cc78d1fe11e55c898d61e09dd9cc4bdefd952f33df697d06ffd93de78dd16ff6fabb99fb6b42eb449d317ff0f62c982878d984496c08a7a672102affbb245b18bb390e6629232335a4ccbaa73a00d4a7b9a75298857b75fa243b23c8cf9643bb00000000005fcbe43f062951cd61eb7fd89947c9213bca5dc0b89a2e850f5d485e58951dd7d1e20a61401a4a516c41604d7981f0c5d28db9d69e0604b270a1c8a29ab4b046f86a311abcd1aedb3726442528292ebb13fb2e320499e3d0ed9dda4e2d941077db1120084174ca637e1c74bddecf39ecb482a0e075210ffa8c8a3f5cdf7889058aba3413d408c81d4c789c0bc1ded7e543a37a0ac8edaf7fbf979e986c22e25e82884240d5dc6aaab10fe2ee4df09527c6d9c18ef983eb5ffb44cdf9e7f785eb60881ee6632f2783fc485616db255f9b8730aff47c8629f4bf50f73351c37855a123b51042a8511b4ddf6cf2d97560a690ce327b731fadbd072bdea726bd8f47463e3287ebccf92ede76b35fb7fc56fbafaca2b2e4616962cd9d62bda2c7cee6365565186451f9e7aa75bb49192ae87cd00915b62924e4fc7b49519021df3c8fdac2f92efd95b2149d5af213c17b9cd739b31300b26b5b1a923b13e3163d8a6a039402c601020ef8eb5ec18944546f62a7e9ed9487cb09aecbc241b4bd48f8f7c1f0ac1f02983bc5e07ed121cd6d3072cbaf3fef41f4fcbc0fb4723d1f5f439b6a812746eacf330eb1a70c8faf9b584a47964e9901426e6b27254e0f90dcaa950a4bbcd471eb5095c32eca1200a33f28e2f79723b8612acbcde5ccf6fe9831a862fe563bad66d420db5155f54bd84c7e2d71fb7be75bbf7ef77422309a1baeda60aa4ac14859bf754880933a6a414fcb9bb758fbf458c2559274944b65488a4b85c2a9da00417f11451a64bab76043fe89dce3a79f20534f93e502b63be73e220000570a6ca7f43b45a9bf7f65ce278c2d78cf614b87810f31e7ee24177cac6b77b948c0343fa8424c1f720d594b3a3ec68d948dfa350268ed25b65e8dfcc5360beb17185493c0e1"], 0x98}}, 0x0) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x20, 0x8, 0x3f, 0x3, 0x0, 0x0, 0x4115, 0x8, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, @perf_config_ext={0x8, 0x5e5f52a8}, 0x10000, 0x2, 0x2, 0x4, 0xfff, 0x6, 0x7ff, 0x0, 0xffffffc1, 0x0, 0x8}, 0x0, 0xc, 0xffffffffffffffff, 0x1) close_range(r1, r0, 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_bp={&(0x7f0000000140), 0x7}, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r0, 0x0) add_key$keyring(0x0, &(0x7f0000000400)={'syz', 0x2}, 0x0, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000040)=@IORING_OP_FADVISE={0x18, 0x4, 0x0, @fd_index=0x7, 0x8000}, 0x1009) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000500)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, &(0x7f0000000000)=0x1, 0x4) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/snmp6\x00') sendmsg$NL80211_CMD_REQ_SET_REG(0xffffffffffffffff, 0x0, 0x20008004) syz_open_procfs(0xffffffffffffffff, 0x0) r2 = add_key(&(0x7f0000000280)='id_resolver\x00', 0x0, &(0x7f0000000080)="fa", 0x1, 0xfffffffffffffffe) keyctl$chown(0x4, r2, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f00000002c0), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, r2) unshare(0x48020200)