mremap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4000, 0x4, &(0x7f0000ffc000/0x4000)=nil) ioctl$SIOCGSTAMP(0xffffffffffffffff, 0x8906, &(0x7f00000000c0)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) mlock2(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000080)=0x90, 0x4) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$inet6(r0, &(0x7f00000006c0)={0x0, 0x31, &(0x7f0000000540)=[{&(0x7f0000000100)=':\x00', 0xfffffdef}], 0x1}, 0x10044008) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, 0xffffffffffffffff, &(0x7f0000000040)={0x1000000a}) r2 = socket$netlink(0x10, 0x3, 0x9) sendfile(r2, r1, 0x0, 0x4000007ffffffc) add_key$user(&(0x7f0000000300), &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000340)="cc", 0x1, 0x0) setreuid(0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), 0x20000, &(0x7f0000000380)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r2, @ANYBLOB="2c63616368657461673d2d2c63616368813d667363616368652c6d73697a303030352c70726976706f72742c6d7369afd8365178303030303030303030303030303030342c644c78b998f8335800000000000000000000000000000000c96191f9d5ef9ebf79ffc0af2c60221db4e44cb986e1a8c29f52b9ac6685a42f10fb7f7de33e7f3797e449ea618c5b7fe3f429f8cc6c093ac354a374bdb34ea40923e2486340d483cf777d6d82ec32f8911cf7f64b5e6b5c7c0bd584bac4c7b46489daa502ca8e2ed8d776c495304c83365b", @ANYRESHEX, @ANYBLOB=',version=9p2000.u,cache=fscache,smackfshat=.\',mask=^MAY_WRITE,obj_role=\',\x00'])