r0 = openat(0xffffffffffffff9c, 0x0, 0x505103, 0x0) ioctl$F2FS_IOC_GET_PIN_FILE(r0, 0x8004f50e, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x400, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x8, 0x4}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x41}, 0x0, 0xffffffffffffffff, r0, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) sendmsg$inet(r1, &(0x7f00000008c0)={&(0x7f0000000240)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x3b}}, 0x10, 0x0}, 0x404c008) r2 = fcntl$dupfd(r1, 0x406, r1) sendmsg$inet6(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r3, &(0x7f0000000840)=[{&(0x7f0000000400)=""/180, 0xb4}, {&(0x7f0000000500)=""/218, 0xda}, {&(0x7f0000000a00)=""/236, 0xec}, {&(0x7f0000000180)=""/6, 0x6}, {&(0x7f0000000c00)=""/4094, 0xffe}, {&(0x7f00000006c0)=""/146, 0x92}, {&(0x7f0000000780)=""/140, 0x8c}], 0x7) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) mkdir(&(0x7f0000000300)='./file1\x00', 0x2d) r4 = openat$cgroup_procs(r0, &(0x7f0000000080)='cgroup.threads\x00', 0x2, 0x0) write$binfmt_elf64(r4, &(0x7f0000001fc0)=ANY=[@ANYBLOB="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"], 0x186) umount2(&(0x7f0000000200)='./file0/file0\x00', 0x4) syz_open_procfs(0x0, &(0x7f0000000040)='io\x00')