r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readv(r0, &(0x7f0000000280)=[{&(0x7f0000001e00)=""/4098, 0x1002}], 0x1) r1 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\x02\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\x0fG/\xf9\n', 0x6) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x2, 0x1f012, r1, 0x0) r2 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r3, 0x40086607, &(0x7f0000000080)) mincore(&(0x7f0000b1c000/0x3000)=nil, 0x3000, &(0x7f0000000300)=""/108) signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000001000)=ANY=[@ANYBLOB="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"], 0x280}, 0x1, 0x0, 0x0, 0x81}, 0x24000050) r4 = signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r4, 0xc0502100, &(0x7f0000000500)) r5 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r0, 0xc018937b, &(0x7f0000000180)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYRES32=0xee00, @ANYRES32=0xee00, @ANYBLOB="207487696c653100"]) keyctl$chown(0x4, 0x0, r6, 0x0) keyctl$KEYCTL_MOVE(0x1e, r5, r2, r5, 0x0) request_key(&(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000200)={'syz', 0x3}, &(0x7f0000000240)='\x00', r2) readv(r1, &(0x7f0000000000)=[{&(0x7f0000000380)=""/88, 0x58}, {&(0x7f0000000400)=""/118, 0x76}], 0x100000000000030a)